Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Manju Bargavi

The widespread use of Internet of Things (IoT) devices has brought about an unparalleled level of connectedness, revolutionizing several sectors and everyday existence. However, there are serious worries over the energy usage and... more
The widespread use of Internet of Things (IoT) devices has brought about an unparalleled level of connectedness, revolutionizing several sectors and everyday existence. However, there are serious worries over the energy usage and environmental effect of these devices due to their increasing deployment. The urgent problem of improving energy efficiency in Internet of Things devices is explored in this study abstract. Acknowledging the complex issues, we examine the condition of IoT device architecture at the moment, focusing on elements that lead to excessive energy usage. We examine cutting-edge techniques via an extensive examination, such as advanced computing paradigms like edge and fog computing, low-power hardware design, and energy-efficient communication protocols. The study also looks at case studies and tests conducted in the real world, providing concrete proof of the efficacy of various energy-saving strategies. Even with significant progress, issues with security, privacy, and scalability still exist. We address the trade-offs between performance and energy efficiency, highlighting the necessity of standardizing solutions. Promising future prospects are outlined in our article, such as the incorporation of block chain applications, revolutionary developments in battery technology, and renewable energy sources. The purpose of this study abstract is to direct researchers, industry practitioners, and policymakers towards sustainable solutions for reducing the energy footprint of Internet of Things devices by offering a thorough view of the present scenario and forward-looking tactics.
The nexus between artificial intelligence (AI) and human creativity offers a fascinating paradigm shift in the dynamic field of music composition. To understand the effects on musical composition, production, and performance, this... more
The nexus between artificial intelligence (AI) and human creativity offers a fascinating paradigm shift in the dynamic field of music composition. To understand the effects on musical composition, production, and performance, this research study, "Harmony in Synthesis: Exploring Human-AI Collaboration in Music," explores the dynamic interplay between human artists and AI systems. The opening establishes the scene by describing the development of AI in the music business and emphasizing the revolutionary possibilities of teamwork. This study addresses current knowledge through a thorough literature assessment, pointing out gaps that our research aims to remedy and adding to the conversation on AI's involvement in creative processes.
Conservation strategies are redefined by smart conservation, which combines wildlife monitoring and artificial intelligence (AI). Artificial intelligence (AI) technologies, such as computer vision and machine learning, automate the... more
Conservation strategies are redefined by smart conservation, which combines wildlife monitoring and artificial intelligence (AI). Artificial intelligence (AI) technologies, such as computer vision and machine learning, automate the identification of species through image and audio analysis, making habitat health assessment and population monitoring more effective. By identifying changes in land cover and habitat decline, AI in conjunction with satellite photography enables ongoing habitat monitoring. AI-driven analytics facilitates the integration of various data sources and offers insightful information for well-informed decision-making. By utilizing both historical and current data, predictive modeling helps to guide proactive conservation measures by predicting how changes in the environment will affect animal populations. AI-enabled real-time alerting and monitoring systems improve the effectiveness of actions against illicit activities like poaching. AI-powered solutions facilitate community interaction by encouraging shared responsibility and increasing awareness. Efficient resource allocation is ensured by resource optimization, which is powered by AI analysis of species distribution and habitat circumstances. This all-encompassing strategy highlights the revolutionary potential of AI in protecting biodiversity, resolving environmental issues, and promoting the long-term coexistence of ecosystems and human activity.
This investigation keeps an eye on the essential prerequisite for working on the adaptability of autonomous vehicles inside awesome and dynamic metropolitan circumstances where they share the road with human-driven vehicles. The... more
This investigation keeps an eye on the essential prerequisite for working on the adaptability of autonomous vehicles inside awesome and dynamic metropolitan circumstances where they share the road with human-driven vehicles. The burgeoning field of autonomous vehicles (AVs) stands at the forefront of urban innovation, promising transformative changes to urban transportation systems. This paper investigates the intricate dynamics of the "Urban Integration of Autonomous Vehicles: Navigation Challenges and Opportunities for Sustainable Transportation."The research delves into the complexities of integrating AVs in to urban environments, placing a particular emphasis on the navigation challenges they encounter and the potential opportunities they present for fostering sustainable transportation solutions.
Vehicular Ad-hoc Network (VANET) is associate rising autonomous dynamic topology network. It is a unique type of Mobile Ad-hoc Network during which the automobiles amendment their message with each other. VANET turns every automobile in... more
Vehicular Ad-hoc Network (VANET) is associate rising autonomous dynamic topology network. It is a unique type of Mobile Ad-hoc Network during which the automobiles amendment their message with each other. VANET turns every automobile in it into a mobile node and use those nodes to make a mobile dynamic community. The aim of VANET is to produce a wi-fi connectivity and numerous programs applications like collision dodging, safety and rising the traffic ratio as designing by the Intelligent Transportation System (ITS). The transport are strained by the sensible traffic surroundings, and currently the simulations are primarily network simulations that cannot simulate the real hint of the object (vehicle). Merely as nodes in VANETS have identical excessive mobility, so there are masses of demanding situation to route the packets to there final destination which need to be addressed by means of existing/offering new solutions for the comparable. Keeping view of above, In this paper, summarize the prevailing VANET routing protocols and classify and evaluate them. Then, listing numerous classic routing algorithms and examine their characteristics and advantages and disadvantages. Eventually, by way of analyzing the reputation of vehicle-installed routing protocols, we tend to illustrate the difficulties and challenges that vehicle-mounted routing protocols can/will encounter within the future.
A wireless ad hoc network is a collection of nodes exchanging information through radio or infrared wireless adapters. Such a network functions without an established infrastructure. Each node communicates directly with destinations... more
A wireless ad hoc network is a collection of nodes exchanging information through radio or infrared wireless adapters. Such a network functions without an established infrastructure. Each node communicates directly with destinations within wireless transmission range and indirectly with all other destinations, relying on its peers to forward traffic on its behalf. In this networks are generally characterized by bandwidth-constrained, variablecapacity links and an unpredictable, dynamic topology. Because the nodes of an ad hoc network are usually small, battery powered devices, energy management is a critical issue for practical deployment of these networks. In this paper, I introduced an Enhanced Receiver Centric Interference model (ERCIM) with PNCC algorithm to calculate the residual energy in during transmission. This algorithm proves the guarantees to build a valid topology for transfer data between source and destination.
Artificial intelligence (AI) is the imitation of human cognitive abilities. It's changing the way people think about medical services, thanks to increased access to medical information and rapid advancements in examination techniques.... more
Artificial intelligence (AI) is the imitation of human cognitive abilities. It's changing the way people think about medical services, thanks to increased access to medical information and rapid advancements in examination techniques. The authors look at the current state of AI in medical services and speculate on its future. Artificial intelligence can be used to analyse various types of medical data (structured and unstructured). AI approaches for structured data machine learning methods, such as the old-style support vector machine and neural network, as well as modern deep learning, and regular language processing for unstructured data are among the most well-known AI tactics. Finding and treatment suggestions, patient commitment and adherence, and managerial exercises are all important classifications of utilizations. Malignant growth, nervous system science, and cardiology, for example, are some of the major disease areas that use AI devices.
Wireless Ad hoc network is an emerging research area with practical applications. Among critical issues of wireless Ad hoc and sensor networks is energy consumption in general and interference in particular. Energy limitation has become a... more
Wireless Ad hoc network is an emerging research area with practical applications. Among critical issues of wireless Ad hoc and sensor networks is energy consumption in general and interference in particular. Energy limitation has become a performance bottleneck for wireless ad hoc network. The study of energy-efficient wireless devices focuses mainly on the following aspects: design of low-power consuming hardware, reduction of the computation complexity to reduce the power consumption by CPU/memory, diminishment of communication-related power consumption. In this paper, we introduced an Enhanced Receiver-Centric Interference (ERCIM) Protocol with proposed Nearest Component Connector (P-NCC) algorithm for wireless Ad hoc network. In this algorithm, asymptotically matches the lower bound, guaranteeing to build a valid topology with respect to addition or removal of single network nodes and transfer data from Source to Destination. This paper is compiled by simulations that compare the energy values with existing receiver centric model.
Laundry as a notion has changed over time. Laundry services and subsequently washing machines have supplanted the practice of doing our own laundry. Thus, much clever labor has taken the place of much hard work. Laundry stores, which... more
Laundry as a notion has changed over time. Laundry services and subsequently washing machines have supplanted the practice of doing our own laundry. Thus, much clever labor has taken the place of much hard work. Laundry stores, which greatly decreased the amount of laundry people had to do at home back then, were where the idea and development of laundry first began. which actually led to greater labour and energy savings. Based on current Internet technology advancements, laundry will evolve, and its clever work will become better and more effective as a website known as The Laundry Management. This will happen due to the fast use of online portals and other sites. It will also make a few suggestions to help this idea succeed. The data is gathered solely from secondary sources, i.e., through a review of literature, and thus it is a philosophical study.
The globe today, practically everyone uses the internet, which is filled with a vast amount of information and content, the majority of which includes pornographic and violent photos and movies. Social media has grown in importance in... more
The globe today, practically everyone uses the internet, which is filled with a vast amount of information and content, the majority of which includes pornographic and violent photos and movies. Social media has grown in importance in today's society as a result of the expansion of the internet. This has increased the risk of privacy invasion, which includes the release of private photos that should not be shared because they violate the privacy of some people. Today, even a young child can easily access these materials. Recent image leaks from prominent social media applications and the use of private photos by clever algorithms have caused the public to re-evaluate the need for individual privacy when uploading images on social media. The process of sharing photos on social networking sites is complex in and of itself, and the measures in place to safeguard privacy in daily life are labor-intensive and fall short of providing tailored, precise, and adaptable privacy protection...
The paradigm of textual or display-based control in human-computer interaction (HCI) has changed in favor of more understandable control methods, such as gesture, voice, and imitation. Speech in particular contains a large quantity of... more
The paradigm of textual or display-based control in human-computer interaction (HCI) has changed in favor of more understandable control methods, such as gesture, voice, and imitation. Speech in particular contains a large quantity of information, revealing the speaker's inner state as well as his or her goal and intention. The speaker's request can be understood through language analysis, but additional speech features show the speaker's mood, purpose, and intention. As a consequence, in modern HCI systems, emotion identification from speech has become crucial. Additionally, it is challenging to aggregate the results of the many professionals engaged in emotion identification. There have been several methods for analyzing sound in the past. However, it was impossible to analyses people's emotions during a live speech. Studies on real-time data are now more prominent than ever because of the advancement of artificial intelligence and the great performance of deep lea...
Trip planning can be difficult due to the overwhelming amount of information available and the time-consuming process of finding the best deals on flights, accommodation, and activities, making it hard for individuals to make informed... more
Trip planning can be difficult due to the overwhelming amount of information available and the time-consuming process of finding the best deals on flights, accommodation, and activities, making it hard for individuals to make informed decisions and plan an itinerary efficiently. This survey paper's goal is to explore how artificial intelligence is used in web applications for trip planning. The paper will conduct a comprehensive review of existing approaches and technologies for trip planning and will evaluate the use of natural language processing and the GPT-3 language model in generating personalized itineraries. The survey will also examine the integration of flight and accommodation booking APIs in trip planning web applications and the impact on user satisfaction and efficiency. The results of this survey will provide valuable insights into the current state of the field and will help to inform the development of future trip planning web applications that use artificial in...
The task of predicting the outcomes of football matches is rendered increasingly complex by the intricate nature of the game and the variety of variables that could affect how things turn out. In the recent past, machine learning... more
The task of predicting the outcomes of football matches is rendered increasingly complex by the intricate nature of the game and the variety of variables that could affect how things turn out. In the recent past, machine learning algorithms have been applied to this challenge, with varying degrees of success. In this particular research paper, we have meticulously evaluated the performance of several classification algorithms with the objective of predicting the outcomes of football matches in a tournament setting. The algorithms that were thoroughly tested encompassed a diverse range of classification models, including logistic regression, support vector machines and random forests. The study employed a dataset of historical match data drawn from the FIFA World Cup, historical team ranking data and team strength data from FIFA games. In order to accurately assess the efficacy of the algorithms tested, the evaluation metrics used were accuracy, precision and recall. The results of t...
Recently Internet of things (IoT)-based healthcare system has expanded significantly, however, they are restricted by the absence of an intrusion detection mechanism (IDS). Modern technologies like blockchain (BC), edge computing (EC),... more
Recently Internet of things (IoT)-based healthcare system has expanded significantly, however, they are restricted by the absence of an intrusion detection mechanism (IDS). Modern technologies like blockchain (BC), edge computing (EC), and machine learning (ML) provide a robust security solution that is well-suited to protecting patients' medical information. In this study, we offer an intelligent intrusion detection mechanism FIDANN that protects the confidentiality of medical data by completing the intrusion detection task by utilising Dwarf mongoose-optimized artificial neural networks (DMO-ANN) through a federated learning (FL) technique. In the context of recent developments in blockchain technology, such as the elimination of contaminating attacks and the provision of complete visibility and data integrity over the decentralized system with minimal additional effort. Using the model at the edges secures the cloud from attacks by limiting information from its gateway with less computing time and processing power as FL works with fewer datasets. The findings demonstrate that our suggested models perform better when dealing with the diversity of data produced by IoT devices.
Around the world, breast disease is the main kind of cancer growth in ladies, representing 25% of all cancer cases. In 2018, it brought about 2.5 million cancer cases and 628,000 deaths. As WHO reported in 2018, breast cancer is the main... more
Around the world, breast disease is the main kind of cancer growth in ladies, representing 25% of all cancer cases. In 2018, it brought about 2.5 million cancer cases and 628,000 deaths. As WHO reported in 2018, breast cancer is the main disease in Ethiopia women. Similarly, according to Ethiopia health institution report, It turns into the most dangerous disease growth rapidly and represents 33% of malignant growth cases in ladies. The right diagnosis helps to find valuable treatment. In Ethiopia, Black Lion Hospital is the only main place for the diagnosis of cancer disease. The Hospital is treating only 1% of the absolute patients and the pathologists analyze biopsy slides physically or manually. This method is tedious, might be inclined to blunder, and time-consuming method. The ML method of examination is more accurate and recovers analysis time. This paper plans to introduce an examination of the great wellknown algorithms to forecast cancer disease. Specifically random classi...
Energy utilization in general and interference in particular being among the most critical issues in wireless ad-hoc networks. The Interference reduction is through the topology control, which seeks to establish a strong network while... more
Energy utilization in general and interference in particular being among the most critical issues in wireless ad-hoc networks. The Interference reduction is through the topology control, which seeks to establish a strong network while still keeping the interference at a minimum. It conserves energy by either reducing the transmission power for each node or preserving energy-efficient routes for the entire network. There is a tradeoff between energy efficiency of the nodes and routes in the topology. In addition, it may consume considerable energy to maintain the topology due to node mobility. In this paper describes the plain definition of interference and compare the model for interference in wireless ad-hoc networks
A wireless ad hoc network is a collection of nodes exchanging information through radio or infrared wireless adapters. Such a network functions without an established infrastructure. Each node communicates directly with destinations... more
A wireless ad hoc network is a collection of nodes exchanging information through radio or infrared wireless adapters. Such a network functions without an established infrastructure. Each node communicates directly with destinations within wireless transmission range and indirectly with all other destinations, relying on its peers to forward traffic on its behalf. In this networks are generally characterized by bandwidth-constrained, variablecapacity links and an unpredictable, dynamic topology. Because the nodes of an ad hoc network are usually small, battery powered devices, energy management is a critical issue for practical deployment of these networks. In this paper, I introduced an Enhanced Receiver Centric Interference model (ERCIM) with PNCC algorithm to calculate the residual energy in during transmission. This algorithm proves the guarantees to build a valid topology for transfer data between source and destination.
Wireless Ad hoc network is an emerging research area with practical applications. Among critical issues of wireless Ad hoc and sensor networks is energy consumption in general and interference in particular. Energy limitation has become a... more
Wireless Ad hoc network is an emerging research area with practical applications. Among critical issues of wireless Ad hoc and sensor networks is energy consumption in general and interference in particular. Energy limitation has become a performance bottleneck for wireless ad hoc network. The study of energy-efficient wireless devices focuses mainly on the following aspects: design of low-power consuming hardware, reduction of the computation complexity to reduce the power consumption by CPU/memory, diminishment of communication-related power consumption. In this paper, we introduced an Enhanced Receiver-Centric Interference (ERCIM) Protocol with proposed Nearest Component Connector (P-NCC) algorithm for wireless Ad hoc network. In this algorithm, asymptotically matches the lower bound, guaranteeing to build a valid topology with respect to addition or removal of single network nodes and transfer data from Source to Destination. This paper is compiled by simulations that compare th...
Wireless ad hoc networks generate many challenging research problems as they basically have many special characteristics and some inevitable limitations, compared with other wired or wireless networks. An important requirement of these... more
Wireless ad hoc networks generate many challenging research problems as they basically have many special characteristics and some inevitable limitations, compared with other wired or wireless networks. An important requirement of these networks is that they should be self-organizing, that is, transmission ranges and data paths are dynamically modernized with changing topology. Energy conservation and network performance are probably the most critical issues in ad hoc wireless networks, because wireless devices are usually powered only by batteries and have limited computing capability and memory. In this paper we introduce an enhanced receiver centric interference model protocol with Nearest Component Connector algorithm to calculate the energy levels in wireless ad hoc networks. The new protocol guarantees to build a valid topology for transfer data from Source to Destination. Simulation and experimental results are combined to show that collision-free and energy consumption by the...
Artificial neural networks (ANNs) are non-linear mapping structures based on the function of the human brain. ANNs are known to be universal function approximators and are capable of exploiting nonlinear relationships between variables.... more
Artificial neural networks (ANNs) are non-linear mapping structures based on the function of the human brain. ANNs are known to be universal function approximators and are capable of exploiting nonlinear relationships between variables. ANNs can identify and learn correlated patterns between input data sets and corresponding target values. Crop production forecasting is a very important task for researchers in agriculture. Problems exist with multiple factors in the cropland ecosystem. This paper describes the successful application of an artificial neural network in developing a model for paddy production forecasting using backpropagation algorithms. In this paper nonlinear regression models namely Modified Horel and MorganMercer-Flodin models has been used for forecasting paddy production and this approach has been compared with ANN methodology. For the choice between nonlinear regression and ANN models, the error measures namely, Root Mean Square Error (RMSE) and Mean Absolute Er...
Vehicular Ad-hoc Network (VANET) is associate rising autonomous dynamic topology network. It is a unique type of Mobile Ad-hoc Network during which the automobiles amendment their message with each other. VANET turns every automobile in... more
Vehicular Ad-hoc Network (VANET) is associate rising autonomous dynamic topology network. It is a unique type of Mobile Ad-hoc Network during which the automobiles amendment their message with each other. VANET turns every automobile in it into a mobile node and use those nodes to make a mobile dynamic community. The aim of VANET is to produce a wi-fi connectivity and numerous programs applications like collision dodging, safety and rising the traffic ratio as designing by the Intelligent Transportation System (ITS). The transport are strained by the sensible traffic surroundings, and currently the simulations are primarily network simulations that cannot simulate the real hint of the object (vehicle). Merely as nodes in VANETS have identical excessive mobility, so there are masses of demanding situation to route the packets to there final destination which need to be addressed by means of existing/offering new solutions for the comparable. Keeping view of above, In this paper, summ...
Image restoration is an integral component of computer vision that tries to restore pictures that have been deteriorated or corrupted to their original or enhanced condition. In this study, we look into the wide picture restoration techn... more
Image restoration is an integral component of computer vision that tries to restore pictures that have been deteriorated or corrupted to their original or enhanced condition. In this study, we look into the wide picture restoration techn models. There perform quite well, particularly when i rely on handcrafted filters restricts their adaptation to more complicated forms of been revolutionized by deep learning, which is led by co learning sophisticated representations of visual data. It is because of this that CNNs are able to deal with a wide variety of degradations, such as noise, blurring, artifacts, and missing data. Ge GANs, are continually pushing the limits of what is possible by utilizing adversarial training to accomplish spectacular outcomes in the areas of to overcome: Understanding limited interpretability of the the training of successful models may be quite computationally rigorous. make navigation revolutionize image processing and analysis, ultimately contributing to advancements across a wide range of scientific and technological domains. This can be concentrating on the promising research directions that are currently being pursued.