default search action
Visvam Devadoss Ambeth Kumar
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Ritu Dewan, Sharik Ahmad, Arun Kumar Rana, Tapsi Nagpal, Vinish Kumar, Ngangbam Herojit Singh, Visvam Devadoss Ambeth Kumar, Awnish Kumar:
IoT-based energy efficient and longer lifetime compression approach for healthcare applications. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j16]Visvam Devadoss Ambeth Kumar, Sowmya Surapaneni, D. Pavitra, R. Venkatesan, Marwan Omar, Ali Kashif Bashir:
An Internet of Medical Things-Based Mental Disorder Prediction System Using EEG Sensor and Big Data Mining. J. Circuits Syst. Comput. 33(11): 2450197:1-2450197:26 (2024) - [d2]V. Devadoss Ambeth Kumar, Barrister Ramsiej, C. Vanlalnunpuia, Kunal Kumar:
Mizo Hand Sign Language. IEEE DataPort, 2024 - [d1]V. Devadoss Ambeth Kumar, Barrister Ramsiej, C. Vanlalnunpuia, Kunal Kumar:
Mizo Hand Sign Language. IEEE DataPort, 2024 - 2023
- [j15]Vijay R, Abhishek Kumar, Ankit Kumar, V. D. Ashok Kumar, Rajeshkumar K, Visvam Devadoss Ambeth Kumar, Abdul Khader Jilani Saudagar, Abirami A:
COVIDPRO-NET: a prognostic tool to detect COVID 19 patients from lung X-ray and CT images using transfer learning and Q-deformed entropy. J. Exp. Theor. Artif. Intell. 35(4): 473-488 (2023) - [j14]S. Malathi, Arockia Raj Y, Abhishek Kumar, V. D. Ashok Kumar, Ankit Kumar, Elangovan D, Visvam Devadoss Ambeth Kumar, Chitra B, A. Abirami:
Prediction of cardiovascular disease using deep learning algorithms to prevent COVID 19. J. Exp. Theor. Artif. Intell. 35(6): 791-805 (2023) - [j13]Visvam Devadoss Ambeth Kumar, S. Sharmila, Abhishek Kumar, Ali Kashif Bashir, Mamoon Rashid, Sachin Kumar Gupta, Waleed S. Alnumay:
A novel solution for finding postpartum haemorrhage using fuzzy neural techniques. Neural Comput. Appl. 35(33): 23683-23696 (2023) - 2022
- [j12]Indrajeet Kumar, Abhishek Kumar, Visvam Devadoss Ambeth Kumar, Ramani Kannan, Vrince Vimal, Kamred Udham Singh, Mufti Mahmud:
Dense Tissue Pattern Characterization Using Deep Neural Network. Cogn. Comput. 14(5): 1728-1751 (2022) - [j11]Visvam Devadoss Ambeth Kumar, Vijayakumar Varadarajan, Mukesh Kumar Gupta, Joel J. P. C. Rodrigues, Neha Janu:
AI Empowered Big Data Analytics for Industrial Applications. J. Univers. Comput. Sci. 28(9): 877-881 (2022) - [j10]Visvam Devadoss Ambeth Kumar, S. V. Ruphitha, Abhishek Kumar, Ankit Kumar, Linesh Raja, Achintya Singhal:
An effective method for predicting postpartum haemorrhage using deep learning techniques. Multim. Tools Appl. 81(29): 41881-41898 (2022) - [j9]Selvamani Hemamalini, Visvam Devadoss Ambeth Kumar:
Outlier Based Skimpy Regularization Fuzzy Clustering Algorithm for Diabetic Retinopathy Image Segmentation. Symmetry 14(12): 2512 (2022) - [j8]Visvam Devadoss Ambeth Kumar, Manish Raghuraman, Abhishek Kumar, Mamoon Rashid, Saqib Hakak, M. Praveen Kumar Reddy:
Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles. IEEE Trans. Green Commun. Netw. 6(3): 1307-1315 (2022) - [j7]Ankit Kumar, Abhishek Kumar, Ali Kashif Bashir, Mamoon Rashid, Visvam Devadoss Ambeth Kumar, Rupak Kharel:
Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset. ACM Trans. Manag. Inf. Syst. 13(1): 8:1-8:17 (2022) - 2021
- [j6]Visvam Devadoss Ambeth Kumar, Abhishek Kumar, Ranbir Singh Batth, Mamoon Rashid, Sachin Kumar Gupta, Manish Raghuraman:
Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j5]Ankit Kumar, Vijayakumar Varadarajan, Abhishek Kumar, Pankaj Dadheech, Surendra Singh Choudhary, Visvam Devadoss Ambeth Kumar, Bijaya Ketan Panigrahi, Kalyana C. Veluvolu:
Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess. Microsystems 80: 103352 (2021) - [c3]Ankit Kumar, Kamred Udham Singh, Sun-Yuan Hsieh, Visvam Devadoss Ambeth Kumar, Abhishek Kumar:
Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation. SocialSec 2021: 3-14 - 2020
- [j4]Visvam Devadoss Ambeth Kumar, S. Malathi, R. Venkatesan, K. Ramalakshmi, K. Vengatesan, Weiping Ding, Abhishek Kumar:
Exploration of an innovative geometric parameter based on performance enhancement for foot print recognition. J. Intell. Fuzzy Syst. 38(2): 2181-2196 (2020) - [j3]Rasbihari Dayal, Vijayakumar Varadarajan, Rahul Chandra Kushwaha, Abhishek Kumar, Visvam Devadoss Ambeth Kumar, Ankit Kumar:
A cognitive model for adopting ITIL framework to improve IT services in Indian IT industries. J. Intell. Fuzzy Syst. 39(6): 8091-8102 (2020) - [j2]Visvam Devadoss Ambeth Kumar, S. Malathi, Abhishek Kumar, Prakash Mohan, Kalyana C. Veluvolu:
Active Volume Control in Smart Phones Based on User Activity and Ambient Noise. Sensors 20(15): 4117 (2020) - [c2]Abhishek Kumar, Pardeep Kumar, Ashutosh Srivastava, Visvam Devadoss Ambeth Kumar, K. Vengatesan, Achintya Singhal:
Comparative Analysis of Data Mining Techniques to Predict Heart Disease for Diabetic Patients. ICACDS 2020: 507-518
2010 – 2019
- 2014
- [c1]T. Ramya, S. Malathi, G. R. Pratheeksha, Visvam Devadoss Ambeth Kumar:
Personalized authentication procedure for restricted web service access in mobile phones. ICADIWT 2014: 69-74 - 2013
- [j1]V. Devadoss Ambeth Kumar, M. Ramakrishnan:
A comparative study of fuzzy evolutionary techniques for footprint recognition and performance improvement using wavelet-based fuzzy neural network. Int. J. Comput. Appl. Technol. 48(2): 95-105 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint