Josephine M.S.

Josephine M.S.
Dr. M.G.R. University · Department of Computer Applications

About

40
Publications
1,747
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
70
Citations

Publications

Publications (40)
Article
Full-text available
The agricultural sector holds significant importance in the socio-economic structure of India. The inability of farmers to make informed decisions regarding the optimal crop selection for their land, based on non-scientific and traditional methods, poses a significant challenge for a nation where farming constitutes the livelihood of nearly 58% of...
Article
Full-text available
Wireless sensor network is recent trend development in remote technologies for ubiquitous computing in various applications, like monitoring, sensing, geo location-based applications. By the sense the transmission nodes are most probably affected by close attacks leads devastating communication defects. From the communication, ensuring security is...
Article
As National parks are one of the best places of attraction to the tourists, the so-called abode of the animals has to be protected due to the frequent intervention of human beings. On the other hand, the lives of human beings have also to be insulated from the sudden and vulnerable attack of the animals. When it comes to ‘life’, it becomes a vital...
Article
Agriculture sector plays a major role for the growth of global economy. This is one of the reasons why disease detection in herbs plants is vital in the agricultural area, as disease in them are naturally occurring phenomenon. If sufficient precautions are not taken in this sector, it can have major consequences for plants, affecting quality standa...
Article
Full-text available
Sports research and betting have been powered by quick exposure to the Internet and machine learning popularity. Football is considered the most popular game in 200 countries and contrasts to other sports. It is considered much more diverse and complicated, making soccer an enticing area to do research. A variety of methodologies and methods are us...
Article
Full-text available
With the rapidly developed IT technology, large-scale networks can be designed to link many heterogeneous devices into the Internet. The majority of current infrastructures are clustered, easier to maintain, but cannot efficiently provide immutable and verifiable service between multiple parties. For large-scale infrastructures like decentralizatio...
Book
Rapid advancements in wireless digital networking technologies have enabled the emergence of capabilities that software systems are just now starting to utilize. Wireless computing is becoming more affordable for both enterprise customers and private customers as the expense of contact and handheld computing devices (laptop computers, hand-held pho...
Chapter
In modern times, security concerns have been susceptible. Kaspersky intelligence believes which denial of service attacks has a vital effect on the network relative to many other remote security threats. The current work focus on DoS attacks in cognitive radio networks (CRNs). The presence of malicious users is threat for enhancing the effective sp...
Article
In certifiable situation, the desire levels of sensor hubs have become a high effect as far as size, cost, productivity and unwavering quality. In such a case all the sensor hubs are conveyed and current asset usage drives the sensor hubs to forfeit its exhibition level this may happened frequently in sensor medium. Hence to deploy an optimal data...
Chapter
Full-text available
Humans can effortlessly notice and perceive objects found in a photograph and video. Human visual system is speedy, correct and performs complicated tasks like identifying multiple entities and spot obstacles. An Entity is referred as an object. Object detection in videos entails verifying the presence of an item in image sequences. It is related t...
Chapter
Full-text available
A sort of inclusion improvement technique dependent on bio-inspired algorithm was implemented so as to fathom the irrationality and low system inclusion of sensor hub in WSN at the irregular dispersion. Right off the bat, the ebb and flow investigate status of WSN inclusion was broke down, the hub inclusion and territorial inclusion in WSN on the p...
Article
Monitoring of wild animals in their environment is extremely difficult. Since there are several animals in a forest detecting them manually can be a critical task. In natural habitat reliable and effective supervision of wild animals is important to notify decisions of management and conservation. Automatic camera traps or hidden cameras are highly...
Article
Purpose The purpose fo this paper is to Monitor and sense the sysmptoms of COVID-19 as a preliminary measure using electronic wearable devices. This variability is sensed by electrocardiograms observed from a multi-parameter monitor and electronic wearable. This field of interest has evolved into a wide area of investigation with today’s advancemen...
Chapter
Retrieval of right sequence in extensive quantity of records in irrelevant, unreported and concealed data by applying the process of data mining methods. Classification is a procedure used for building classification models for a set of input data. This study is about to compare and analyze the various classification algorithms for energy resources...
Article
Full-text available
Security threats are vulnerable in recent times. Kaspersky intelligence report confirms that clustering and attacks makes crucial impact on the network as compared with other security attacks in wireless based environment .The current work focus on clustering of nodes in WSNs. Cat swarm optimization (CSO) algorithm is one of the bio-inspired algori...
Article
Biometric Identification is an evergreen system in the field of security. This system is used for ensuring security by providing personal identification. Biometric identification system provides an automated identification of the individual based upon their physiological or behavioral characteristics. In biometric identification Finger Print andIri...
Article
Medical diagnosis systems play a vital role in medical practice and are used for diagnosis and treatment by several medical practitioners. Diagnosing the risk factors of pre-diabetic (IGT) cases is quite difficult. There is a big challenge to improve the diagnosis system to recognize the risks factors of impaired glucose tolerance regarding to card...
Article
The computing technology focused to mimic a human into process able devices. The super computing, cognitive and Artificial intelligent system are integrated together to design a human model for functional and thinking process. The functional processes are executed for the human based on its logical thinking and rationales. The thinking process and...
Article
Electricity plays a vital role in the economic development growth. The prosperity that development brings in turn increases the demand for more and better quality of energy services.
Article
Glaucoma is an eye disease that results in irreversible loss of vision. The early detection of glaucoma helps to prevent the vision loss. So, there is a need to develop a fast and efficient algorithm for disease prediction. Several clustering algorithms are encountered for segmentation of retinal fundus images. The existing method used K-means clus...
Article
Objectives: Heterogeneous High dimensional data clustering is the analysis of data with multiple dimensions. Large dimensions are not easy to handle. The complexity increases exponentially with the dimensionality. Dimensionality reduction is the conversion of high dimensional data into a considerable representation of reduced dimensionality that co...
Article
Iris Recognition is a highly good at producing an effective biometric identification system for future safety in the security systems to avoid fraudulent use. Iris recognition systems obtain a unique mapping algorithm for each person. And identification of this person can be done by applying the right matching algorithm. In this paper, normalizatio...
Article
The Levels of Conceptual Interoperability Model (LCIM) was a layered approach of interoperation between system software and applied in various domains successfully and featured as a reference model and also good theory model to evaluate the levels of interoperability. Now can used LCIM Model to derive effects and requirements between mobile apps a...
Article
The storage and retrieval of high dimensional unstructured conflict data needs the conversion of structure process. The storage has the major impact on access and computation time. In this paper we are going to make a significant analysis of high dimensional medical dataset with proper representations by using principal component, how to form the p...
Article
More and more applications rely on biometrics to authenticate or identify physical persons. Biometric data are intrinsically sensitive and vulnerable in today's applications: if they are stolen, their owner has currently no choice but to revoke them (if ever possible) to avoid future fraudulent use. Iris Recognition is a rapidly expanding method of...
Article
Genetic disorder is caused due to the malfunction of certain chromosomes or due to the disposition of these chromosomes. A human body is made up of different types of cells which are, built with the basic structure of DNA. DNA is the basic structure for the building block of genome. A genome is a genetic material build in human being from the hered...

Network

Cited By