C. Lakshmi

ORCID: 0000-0001-5714-4150
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Face and Expression Recognition
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Stock Market Forecasting Methods
  • Artificial Intelligence in Healthcare
  • Remote-Sensing Image Classification
  • Face recognition and analysis
  • Biometric Identification and Security
  • Cellular Automata and Applications
  • Image and Video Stabilization
  • Image Retrieval and Classification Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Machine Learning in Healthcare
  • Advanced Data Compression Techniques
  • Forensic Fingerprint Detection Methods
  • Water Quality Monitoring Technologies
  • Nausea and vomiting management
  • IoT and Edge/Fog Computing
  • Text and Document Classification Technologies
  • Healthcare Policy and Management
  • Healthcare Operations and Scheduling Optimization
  • Advanced Queuing Theory Analysis
  • Forensic and Genetic Research

SASTRA University
2018-2025

SRM University
2010-2020

SRM Institute of Science and Technology
2009-2018

Vellore Institute of Technology University
2013

Singapore-MIT Alliance for Research and Technology
2013

Cloud services offer doctors and data scientists access to medical from multiple locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore, cyber threats at rest, in transit when used by applications need be pinpointed prevented preemptively through a host of proven cryptographical solutions. The presented work integrates adaptive key generation, neural-based confusion non-XOR, namely DNA diffusion, which offers more extensive unique key, unpredictable...

10.3390/math11081769 article EN cc-by Mathematics 2023-04-07

With the extensive growth in usage of cars, newly produced cars are unable to reach customers for various reasons like high prices, less availability, financial incapability, and so on. Hence used car market is escalated across globe but India, a very nascent stage mostly dominated by unorganized sector. This gives chance fraud while buying car. precision model required which will estimate price an with none bias towards customer or merchandiser.In this model, A Supervised learning-based...

10.1109/iccci54379.2022.9740817 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2022-01-25

In the healthcare sector, e-diagnosis through medical images is essential in a multi-speciality hospital; securing becomes crucial for preserving an individual's privacy e-healthcare applications. So, this paper has proposed novel encryption scheme implemented on reconfigurable hardware. Realising image schemes FPGA hardware platforms offers substantial advantages over software implementations. The image-specific key and Hopfield Neural Network (HNN) carry out diffusion process using...

10.1038/s41598-025-88561-9 article EN cc-by-nc-nd Scientific Reports 2025-02-15

Non-Insulin Dependent Diabetes Mellitus or Type2 is one of the critical diseases and many people are suffering from it. Every year, approximately 2 to 5 million losing their lives as Diabetics. If predicted earlier, it can be controlled also, deadly risks such diabetes cardiac stroke, nephropathy other disorders associated with prevented. Therefore, early prediction helps in maintaining good health. With recent development machine learning (ML), being applied various aspects medical The Pima...

10.1109/iccci54379.2022.9740844 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2022-01-25

Traditional agriculture has been the global foundation for development centuries. However, to meet this demand and exponential growth of population, farmers need water irrigate their property. Farmers require a fix that modifies business practices because scarcity using resource. To keep up with satisfy Demand, Agriculture 4.0 become reality thanks new technologies. Automated Irrigation: Smart irrigation systems can automatically adjust schedules based on real-time data, such as weather...

10.1109/vitecon58111.2023.10157366 article EN 2023-05-05

Machine Learning is considered as a subfield of Artificial Intelligence and it concerned with the development techniques methods which enable computer to learn.In classification problems generalization control obtained by maximizing margin, corresponds minimization weight vector.The vector can be used in regression problems, loss function.The problem for linearly separable data introduces concept margin essence SVM -margin maximization.In this paper gives soft idea slack variables trade-off...

10.12732/ijpam.v87i6.2 article EN International Journal of Pure and Apllied Mathematics 2013-10-25

Background: Recent advances in medical associated technologies have drastically increased the amount of electronic records collected, stored and transferred through network. Considering significance level sensitivity collected data, security transmitted data has become a very vital challenging task for researchers. The protection these images with embedded is usually guaranteed using encryption or hiding techniques. Conventional techniques that employ are often insecure also time-consuming...

10.2174/1574362414666190304162411 article EN Current Signal Transduction Therapy 2019-03-05

Securities trade data is a high dimensional time course of action cash related that positions exceptional computational challenges. Stock variable with respect to time, suspecting the future example expenses trying task. The segments effect consistency stock can't be judged as same variables may affect estimation always. We propose burrowing approach for desire advancement securities trade. It consolidates using innate pre taking care and cross breed packing strategy Hierarchical gathering...

10.5958/0974-360x.2017.00021.x article EN Research Journal of Pharmacy and Technology 2017-01-01

Background and Objective: Iris recognition is one of the popular winning biometric frameworks, giving promising outcomes in identity authentication access control systems.In this study, an efficient, fast robust segmentation methodology suitable for non-cooperative noisy iris images proposed.Materials Methods: This proposed considers both shape spatial feature properties taken from visible spectrum near infrared spectrum.Circular hough transform applied to input image outer boundary...

10.3923/jai.2017.76.84 article EN Journal of Artificial Intelligence 2017-06-15

Information security is becoming more crucial to data transmission and storage in this era of digital communication. In numerous processes, images are frequently used. As a result, protecting the image from misuse equally crucial. Image encryption solution protect visual hackers. The chaotic algorithm unique choice, but software algorithms can be hacked anywhere. paper proposes scheme along with standalone device using FPGA. Even if compromised, FPGA keys secure. Because developed on core...

10.1109/vitecon58111.2023.10157793 article EN 2023-05-05

The common vector (CV) method is a linear subspace classifier for datasets, such as those arising in image and word recognition. In this approach, class modeled from the features of all samples corresponding class. Since are separate each feature domain, there overlapping between these subspaces loss information which turn reduces recognition performance. CV followed criterion considers only scatter matrices. Thus neglecting influence neighboring classes also Generally fails to extract...

10.1109/icmv.2009.16 article EN 2009-01-01

Forecasting stock price is a important challenging task in the real world because more and money involved they are affected by many social, economic, political psychological factors. Numerous machine learning procedures have been used to fore see developments cost. Machine classifiers include expanding past encounters into future actives. The proposed framework presents another hereditary calculation for forecast of monetary execution with information sets from known source. objective...

10.1109/iconstem.2017.8261274 article EN 2017-03-01
Coming Soon ...