Loading [MathJax]/extensions/MathZoom.js
K. Kalaiselvi - IEEE Xplore Author Profile

Showing 1-6 of 6 results

Filter Results

Show

Results

Slope stability and stabilization techniques in the Keralan cities of Thrissur, Idukki, Ernakulum, and Pathanamthitta are the focus of this research. The landslip that occurred in Thrissur, India, between 2017 and 2023 was a deliberate rock slide down a steep, sloping road cut. There are some very steep gradients along national highways in Idukki. In August of 2022, landslides in Ernakulum closed ...Show More
In emergency hospitals, the hospital conveyance framework is seen as an important component of the clinical, financial, and executive well-being areas. This study incorporates Artificial Intelligence (AI) techniques to assess and investigate cases of various ailments that occur in low-income families. The proposed system utilizes unstructured and newly presented hospital data by applying the Machi...Show More
In the competitive landscape of the job market, universities are faced with the challenge of not only providing quality education but also ensuring the successful placement of their graduates into the workforce. The use of advanced machine learning models offers a promising solution to this challenge by providing universities with the ability to efficiently analyse vast amounts of data and identif...Show More
Text summarizing is the process of condensing text such that extraneous information is deleted and only the most important information is extracted and presented in the most understandable manner. Due to the exponential growth of social media data, it is now essential to assess this text in order to extract statistics, particulars and utilize it to the best benefit of several requisitions, applica...Show More
Wireless Network Coding System encrypts data as it travels via intermediate nodes for secure data transmission, Wormhole attackers choose one of the nodes to target. The attacked node tries to attack other nodes, forming a wormhole tunnel in the process. When a wormhole attack is launched, Information bundles on one or the other side of the wormhole connection can be caught, sent through the wormh...Show More
In this paper, we have focused on the problem of malicious URLs. URL attacks have been on the rise in 2020, with most of the work being online based due to the pandemic there arises a greater scope of Phishing URLs etc. There have been existing systems but they are mostly paid, whereas with this project we aim to deploy a freemium add-on in a web browser, hosted on cloud with a real time dynamic c...Show More