Shaheema, S., Ns, B., Jose, P., Albert, I., Anorelin, A., & Tony, E. (2024). AI-Powered Traffic Surveillance: License Plate Recognition with Non-Helmet Detection Using YOLOv8. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPICES62143.2024.10779944
CSE
Upadhyay, A., Upadhyay, S., & Sharma, S. (2024). VIDEO IMAGE IDENTIFICATION AND VERIFICATION USING PRELIMINARY SCORE APPROACH FOR AUTHENTICATION AND SECURITY ENHANCEMENT. In Fusion of Artificial Intelligence and Machine Learning in Advanced Image Processing (pp. 163-180,). Apple Academic Press.
Shirisha, M. G., Prasad, M. S., Rao, B., Chetti, S., & Naikodi, C. (2024). Integration of NIST-Aligned Secure IoT Data Management Framework Tinkercad, Flask, and ThingSpeak. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICICEC62498.2024.10808927
Raj, H., Nandheeswaran, M., Singh, D., Jayanthi, M., & Kannadaguli, P. (2024). Brand Sentiment: Aspect-based Multilingual Sentiment Analysis for Strategic Brand Reputation Enhancement and Management in India. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SSITCON62437.2024.10796725
Sanath, G., Deekshitha, S., Shravya, H., Jayanthi, M., & Kannadaguli, P. (2024). Aquify:AI-Enhanced Predictive Analytics Toolkit For Water Contamination. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/I4C62240.2024.10748475
Fong, S., Deb, S., Yang, X.-S., & Li, J. (2014). Feature selection in life science classification: Metaheuristic swarm search. IT Professional, 16(4), 24-29, 6871693+. https://doi.org/10.1109/MITP.2014.50
Akhtar, M., & Sahoo, G. (2015). Enhancing cooperation in MANET using the Backbone Group model (An application of Maximum Coverage Problem). Elsevier B.V. https://doi.org/10.1016/j.procs.2015.01.013
Bhargavi, M., Naikodi, C., & Suresh, L. (2015). Sharing randomly-generated keys via alternative route in a threshold based path oriented network for robust security in MANETs. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICACCS.2015.7324085
Kumar, D., Raja, K., Nuthan, N., Sindhuja, B., Supriya, P., Chhotaray, R., & Pattnaik, S. (2011). Iris recognition based on DWT and PCA. https://doi.org/10.1109/CICN.2011.102
Biradar, S., Malipatil, S., & Naikodi, C. (2015). Releasing energy of compromised nodes in a secured heterogeneous Ad-Hoc Network(MANETs). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICACCS.2015.7324103
