Deep learning based object detection for resource constrained devices: Systematic review, future trends and challenges ahead
Deep learning models are widely being employed for object detection due to their high
performance. However, the majority of applications that require object detection are functioning …
performance. However, the majority of applications that require object detection are functioning …
Wavelet transform based steganography technique to hide audio signals in image
Abstract Information security is one of the most important factors to be considered when
secret information has to be communicated between two parties. Cryptography and …
secret information has to be communicated between two parties. Cryptography and …
[HTML][HTML] Ree-Eyring fluid flow of Cu-water nanofluid between infinite spinning disks with an effect of thermal radiation
We analyzed the Ree-Eyring fluid flow between two stretchable spinning disk with various
stretching rates along with copper–water nanoliquids. An impact of thermophoresis and …
stretching rates along with copper–water nanoliquids. An impact of thermophoresis and …
A study on the adoption of wireless communication in big data analytics using neural networks and deep learning
…, S Tripathi, CM Preeti, A Renuka… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The study explores about the Wireless communication which is one of the most rapidly
evolving and active technology fields in the communication world. Wireless communication is a …
evolving and active technology fields in the communication world. Wireless communication is a …
[PDF][PDF] Strategies for Migrating Data from Legacy Systems to the Cloud: Challenges and Solutions
S EETI, A RENUKA - TIJER (The International Journal of …, 2021 - researchgate.net
Data security is paramount; therefore, implementing encryption, authentication, and continuous
monitoring is essential to protect data integrity and confidentiality during the migration …
monitoring is essential to protect data integrity and confidentiality during the migration …
Performance analysis of the pretrained efficientdet for real-time object detection on raspberry pi
Recently there has been a lot of demand for deep learning models that can operate on a
constrained device. When it comes to the task of object detection, EfficientDet is a well-known …
constrained device. When it comes to the task of object detection, EfficientDet is a well-known …
[HTML][HTML] A magneto-bioconvective and thermal conductivity enhancement in nanofluid flow containing gyrotactic microorganism
ZA Alhussain, A Renuka, M Muthtamilselvan - Case Studies in Thermal …, 2021 - Elsevier
The current article scrutinizes the magneto-bioconvective of nanofluid flow through a rotating
cone using Cattaneo-Christov heat flux model. Additionally, we analyzed about cross …
cone using Cattaneo-Christov heat flux model. Additionally, we analyzed about cross …
Entropy analysis and nanofluid past a double stretchable spinning disk using Homotopy Analysis Method
A Renuka, M Muthtamilselvan, DH Doh… - … and Computers in …, 2020 - Elsevier
The motivation of this current study is finding the viscous dissipation and Joule heating effect
on the entropy analysis and flow of nanofluid through a two stretchable rotating disk using …
on the entropy analysis and flow of nanofluid through a two stretchable rotating disk using …
Computer-aided system for Leukocyte nucleus segmentation and Leukocyte classification based on nucleus characteristics
Differential count of leukocytes plays a consequential role in the determination of diagnostic
details of a patient. Conventionally, leukocyte identification is performed manually by skilled …
details of a patient. Conventionally, leukocyte identification is performed manually by skilled …
Linear models of cumulative distribution function for content-based medical image retrieval
We propose an Image matching technique based on Cumulative Distribution Function, which
provides a considerable reduction in the retrieval time. The two novel approaches called …
provides a considerable reduction in the retrieval time. The two novel approaches called …