Back close
Publications
Design of Hyperparameter Tuned Deep Learning based AutomatedFake News Detection in Social Networking Data

Citation : N. Kanagavalli, S. B. Priya and J. D, "Design of Hyperparameter Tuned Deep Learning based AutomatedF ...

Publisher :IEEE

Publications
Best Fit Topic Model Coherence Improvement for Subectivity Analysis of Gestational Diabetes Mellitus

Citation : J.Jeyalakshmi, S.Poonkuzhali, “Best Fit Topic Model Coherence Improvement for Subectivity Analysis ...

Publications
Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol for Wireless Sensor Networks

Citation : P.Manjula and S. Baghavathi Priya, "Chimp Optimization Algorithm based Energy Aware Secure Routing P ...

Publisher :IEEE

Publications
Speech Recognition Using Quantum Convolutional Neural Network

Citation : Thejha B., Yogeswari S., Vishalli A, Jeyalakshmi J., “Speech Recognition Using Quantum Convolution ...

Publisher :IEEE

Publications
Comparative Analysis of Supervised Machine Learning Algorithms for Evaluating the Performance Level of Students

Citation : S.Subha, S. Baghavathi Priya, ”Comparative Analysis of Supervised Machine Learning Algorithms for ...

Publisher :IEEE

Publications
Smart accident detection system

Citation : Kumar, M. L. S., Ashritha, U. S., Sumanth, Y., Hafeez, S., Preetha, P. K., & Chandran, A. (2021, Aug ...

Publications
A Hybrid Model for VANET Information Dissemination

Citation : J.Jeyalakshmi, S.Sreesubha,”A Hybrid Model for VANET Information Dissemination,International Journ ...

Publisher :Foundation of Computer Science

Publications
Sentiment Analysis for improving healthcare system for Women

Citation : J.Jeyalakshmi,K.Poornimathi,S.Sreesubha,M.Sindhuja,J.Anitha, “Sentiment Analysis for improving hea ...

Publisher :IOSR Journals

Publications
Efficient Clinical Data Analysis Using Internet of Things

Citation : K.Poornimathi,J.Jeyalakshmi,S.Sreesubha,M.Sindhuja,J.Anitha,”Efficient Clinical Data Analysis Usin ...

Publications
Effective prevention of reverse engineering attacks on software

Citation : J.Jeyalakshmi,L.Priya,S.Sreesubha,” Effective prevention of reverse engineering attacks on softwa ...

Publications
Identification of Deception Detection on Social Media (Twitter) Data Sets using Naive Base Classification and RVNN Model

Citation : N. Kanagavalli, S. Baghavathi Priya, S. Ilavarasan, “Identification of Deception Detection on Soci ...

Publications
Certificateless Effective Key Management Protocol (CL-EKM) Authentication for Multicast IoT Sensor Network

Citation : P.Manjula, Dr.S. Bagavathi priya,”Certificateless Effective Key Management Protocol (CL-EKM) Authe ...

Admissions Apply Now