- Image Retrieval and Classification Techniques
- Face recognition and analysis
- Face and Expression Recognition
- Advanced Image and Video Retrieval Techniques
- Smart Systems and Machine Learning
- Artificial Intelligence in Healthcare
- Network Security and Intrusion Detection
- Brain Tumor Detection and Classification
- Computational Drug Discovery Methods
- AI in cancer detection
- Advanced Data Compression Techniques
- IoT and Edge/Fog Computing
- Imbalanced Data Classification Techniques
- Metaheuristic Optimization Algorithms Research
- COVID-19 diagnosis using AI
- Medical Image Segmentation Techniques
- Internet of Things and AI
- Digital Imaging for Blood Diseases
- Protein Structure and Dynamics
- Radiomics and Machine Learning in Medical Imaging
- Image and Signal Denoising Methods
- Machine Learning in Bioinformatics
- Biometric Identification and Security
- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
Koneru Lakshmaiah Education Foundation
2019-2024
Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology
2021
Jawaharlal Nehru Technological University, Kakinada
2012-2015
GITAM University
2010
Deep Learning is a rapidly evolving field with critical contributions to various domains including security, healthcare, and human — computer interaction, etc. It reviews the significant developments in area of facial recognition using deep learning techniques. explains models such as Convolutional Neural Networks (CNNs), Recurrent (RNNs), Long Short-Term Memory (LSTMs), Generative Adversarial (GANs), well hybrid transfer uses. also addresses technical, ethical, legal challenges that arise...
Cloud storage, in general, is a collection of Computer Technology resources provided to consumers over the internet on leased basis. storage has several advantages, including simplicity, reliability, scalability, convergence, and cost savings. One most significant impediments cloud computing's growth security. This paper proposes security approach based now plays critical part everyone's life. Due concerns, data shared between service providers other users. In order protect from unwanted...
This study is all about the importance- of methods in big data study, and what they might mean for future- digital growth projects. The rese-arch explores current patte-rns, issues, smart plans. gives valuable information groups figuring out the- tricky mixture growth. focus pape-r on important like batch handling, stream machine- learning. It looks at their strengths, limits, use-s. We see the-ir effects growing improving. fore-cast future patterns, tackle issue-s suggest inventive...
Nowadays, huge data bases are required to store the Digital medical images so that they can be accessed easily on requirement. To retrieve diagnostic images, radiologist and physicians using Content based image retrieval (CBIR). Algorithms extract features like texture, edge, color shape from an in CBIR systems these extracted input compared for similarity with of database. In this paper, Lossless compression is used storage effective transmission inadequate bandwidth. Visually lossless...
The digital medical images are stored in large databases for easy accessibility and Content based image retrieval (CBIR) is used to retrieve diagnostic cases similar the query image.Image compression condense amount of data required represent an image, it reduces storage transmission requirements.The problem compressed studied this paper.The proposed method integrates techniques minimize bandwidth utilization.Haar wavelet without losses.Edge texture features extracted from using Sobel edge...
As the Parkinson's disease detection is topmost chronic which was on 3rd position.By using parameters of both Parkinson and Non-Parkinson's person, we can build a model algorithms easily detect disease.For dealing with dataset high dimensions, that lead to noise or redundancy may affect performance.For choosing Optimum Features are required for building be selected Nature Inspired Optimization Techniques like Particle Swarm (PSO), Gravitational Search Algorithm (GSA), Differential Evolution...
Abstract The whole world facing a huge crisis because of Corona virus also known as COVID-2019, identified first in December 2019 the city Wuhan located China. detection persons infected with is most important it can be spread easily from him to others and person may not know that he until number symptoms fallout him. In this paper done using deep learning machine algorithms X-ray images. A dataset created three classes consisting normal, corona virus, pneumonia proposed method uses ResNet50...
Various proteins play important roles in hypertension and a number of plants have been tested for their efficacy modulating hypertension.Angiotensin 1-converting enzyme, renin extracellular regulated kinase 2(ERK2) proteins, respectively, has major role therefore protein -ligand interaction studies were performed on 266 compounds from different parts 7 (Allium sativum, Coriandrum Dacus carota, Murrayya koneigii, Eucalyptus globus, Calendula officinalis Lycopersicon esculentum).Analysis was...
Face detection has become an essential biometric method used in unlocking the smart mobiles now-a-days. identifies face of user by calculating facial features. In some cases, people can use photos and masks to hack mobile security systems. order avoid this eye blinking detection, which finds eyes through proportion human was proposed paper. The Proposed detects movements eyeball number improve recognition for screen unlock on devices. To achieve halfway acknowledgment approach adjusting test...
Driver drowsiness detection methods have received significant research interest in recent years and been used a variety of contexts, including driver activity tracking visual attention monitoring. Every year, drowsiness-related accidents result serious injuries fatalities. To address this global issue, researchers are developing new technologies to detect drowsiness. The objective article is present detailed review using various techniques. Some the challenges faced while systems lack...
The proliferation of the Internet has led to emergence malware as a significant cyber threat. Malware refers any application software that executes harmful behavior, such taking data or conducting espionage. According Kaspersky Labs, is executable program specifically destroy genuine user's computer by spreading virus in different ways. To detect and identify malicious threats malware, there are several machine learning techniques. So,this study evaluates performance algorithms based on...
In this research, the multi model (image and video) based face shape detection with human temperament is developed. Here, video captured by webcam via live recording session proposed undergoes three major stages namely, pre-processing, extracted feature fusion detection. Extraction of facial landmark boundary takes place in pre-processing stage. extraction stage, handcrafted features from image are (i.e. face, forehead, eyes, cheeks, nose mouth). From frames, intrinsic related to region...
Lately, there has been notable interest in utilizing Convolutional Neural Networks (CNN) for face recognition, underlining its significance and relevance., finding utility diverse areas such as security systems, personal device authentication, social media tagging. This abstract presents an implementation of a CNN-based recognition algorithm that effectively leverages data stored within Amazon S3 bucket. The CNN model's primary objective is the precise identification categorization human...
Abstract Optimization algorithms are liable for sinking the losses and to give most precise outcomes conceivable. Optimizers utilized modify properties of neural network, example, training rate weights used reduce losses. means a procedure obtaining global optimal solution given problem under conditions. The real-world problems in scientific fields, such as engineering design economic planning, mostly multimodal, high-dimensional, disconnected, oscillated optimization problems. These complex...
This paper discusses an application of multilayer Perceptron in wireless sensor network security. The (WSN) is a distributed autonomous devices that supervise physical or environmental conditions corporately. perceptron (MLP) based media access control protocol (MAC) to secure CSMA-based networks against denial-of-service attacks launched by adversaries. MLP boost security WSN consistently monitoring the parameter reveals unusual variation case attack alerts MAC layer and mode when suspicion...
With the advancement of Computer Technology classification Medical Images has become more viable. Use traditional features made system to lose ability represent higher-level domain problem. Deep Learning models had paved a way for development generalization even poor models. have high resolution and availability dataset are also small, making these deteriorate from various limitations huge computational costs. In this paper model is proposed profound learning that incorporates Convolutional...