关注
S POORANI
S POORANI
Assistant Professor,Computer Science, Anna University
在 svce.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Crowd Density Estimation Using Neural Network for COVID-19 and Future Pandemics
SU Muthunagai, MS Girija, R Iyswarya, S Poorani, R Anitha
System Design for Epidemics Using Machine Learning and Deep Learning, 257-270, 2023
32023
Convergence Perceptual Model for Computing Time Series Data on Fog Environment
R Kesavan, S Poorani, R Iyswarya, SU Muthunagai, R Anitha, ...
Computer Vision and Machine Intelligence Paradigms for SDGs: Select …, 2023
12023
Fruit classification using convolution neural networks
J Sankaran, P Sankaran, A Ramachandran, N Deivamani
AIP Conference Proceedings 2966 (1), 2024
2024
Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management.
S Poorani, R Anitha
KSII Transactions on Internet & Information Systems 17 (11), 2023
2023
Advanced Semiconductor Classifiers Using Machine Learning Techniques
G Oviya, M Kishore, S Pradeep, S Poorani, R Anitha
2023 International Conference on Artificial Intelligence and Knowledge …, 2023
2023
A Cognitive Distortion based BB84 Protocol for Data Transmission in Intelligent System
S Poorani, R Anitha
2022 6th International Conference on Electronics, Communication and …, 2022
2022
XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector
S Pradeep, M Kishore, G Oviya, S Poorani, R Anitha
International Conference on Computing, Communications, and Cyber-Security …, 2022
2022
GPS and QR based Vehicle Tracking System
PS Praveen Kumar K, Sankar Lal T E, Shashwanth S
International Conference on “Digital Archiving and Presentation on Cultural …, 2022
2022
Convergence-Perceptual Model for Computing Time-series-Data on Fog-Environment
VL Rupa Kesavan, Poorani S, Iyswarya R, Muthunagai S.U, Anitha R
ICRTAC,CVMIP, 2021
2021
KDC Authentication for Secured Communication using Four-Way Handshake Protocol
RA R.Iyswarya, S.U.Muthunagai, S.Poorani
International Journal of Computer Applications 174 (30), 0975 – 8887, 2021
2021
“Securing Smart Vehicles at Edge Level in IoT Environment Using Standard Encryption Technique
SP R.Anitha,S.U.Muthunagai
AICTE sponsored International E- Conference on Smart Technologies in …, 2021
2021
Removal of irrelevant data in IoT using Delta Streaming
RA R.Iyswarya, S.Poorani, S.U.Muthunagai
AICTE sponsored International Conference on “Smart Materials & Emerging …, 2020
2020
HITCHHIKE – TOURIST SPOT DETECTION USING CONVOLUTION NEURAL NETWORKS
SP B.HariniShree
AICTE sponsored International Conference on “Smart Materials & Emerging …, 2020
2020
A Machine Learning Approach to improvise Protein Secondary Structure Prediction
RA R.Iyswarya,S.Poorani,S.U.Muthunagai
International Virtual Conference on Recent Trends in Science, Engineering …, 2020
2020
A Comparative Study on Face Detection Mechanism in Attendance Management
SP B.HariniShree
International Virtual Conference on Recent Trends in Science, Engineering …, 2020
2020
Tracking and Predicting Student Performance in Graduation Program using Time Series Forecasting
Poorani.S , Supraja.S
International Journal of Advanced research Trends in Engineering and …, 2018
2018
In-dependable Data hiding in an Encrypted Image using FCM-DM Algorithm
PS Janani S
IJRCCT Computer and Communication Technology 3 (2), 223-225, 2014
2014
QOS Based Packet Scheduling for Multimedia Content in a Wireless Networks
P S
National Conference on Networks,Electronic Systems,Signals and Technologies …, 2010
2010
系统目前无法执行此操作,请稍后再试。
文章 1–18