Shitharth
Shitharth
Home
Skills
Experience
Achievements
Certifications
Publications
Gallery
Contact
CV
Light
Dark
Automatic
article-journal
Mathematical approach of fiber optics for renewable energy sources using general adversarial networks
It is significantly more challenging to extend the visibility factor to a higher depth during the development phase of a communication …
Tawfiq Hasanin
,
Hariprasath Manoharan
,
Hassan A. Alterazi
,
Gautam Srivastava
,
Shitharth Selvarajan
,
Jerry Chun-Wei Lin
Cite
URL
MSI-A: An Energy Efficient Approximated Cache Coherence Protocol
Energy consumption has become an essential factor in designing modern computer system architecture. Because of physical limits, the …
Anant Saraswat
,
Kumar Abhishek
,
Hiteshwar Kumar Azad
,
Shitharth Selvarajan
Cite
DOI
URL
Prognosis of urban environs using time series analysis for preventing overexploitation using artificial intelligence
In the process of urban environment, the optimisation of network enactment is shifted from operation to maintenance and monitoring …
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Lakshmi Narayanan
,
Takkedu Malathi
,
S. Vatchala
,
Kommu Gangadhara Rao
Cite
DOI
URL
Resource-Efficient Synthetic Data Generation for Performance Evaluation in Mobile Edge Computing Over 5G Networks
Mobile Edge Computing (MEC) in 5G networks has emerged as a promising technology to enable efficient and low-latency services for …
Chandrasen Pandey
,
Vaibhav Tiwari
,
Rajkumar Singh Rathore
,
Rutvij H. Jhaveri
,
Diptendu Sinha Roy
,
Shitharth Selvarajan
Cite
DOI
URL
RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms
This study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications …
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Alaa O. Khadidos
,
Achyut Shankar
,
M. S. Mekala
,
Adil O. Khadidos
Cite
DOI
URL
SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures
textlessabstracttextgreater textlessptextgreaterThe security of the Internet of Things (IoT) is crucial in various application …
Shitharth Selvarajan
,
Shitharth Selvarajan
,
Hariprasath Manoharan
,
Celestine Iwendi
,
Taher Al-Shehari
,
Muna Al-Razgan
,
Taha Alfakih
Cite
DOI
URL
An optimization-based machine learning technique for smart home security using 5G
Generally, cellular networks are divided into discrete geographic zones where a secure routing protocol is important. In this study, …
Vidhu Kiran Sharma
,
Srikanta Kumar Mohapatra
,
Shitharth Selvarajan
,
Saud Yonbawi
,
Ayman Yafoz
,
Sultan Alahmari
Cite
DOI
URL
Grow of Artificial Intelligence to Challenge Security in IoT Application
Artificial intelligence is intelligence revealed by software, as opposed to natural intelligence. It is the science and technology of …
M. Padmaja
,
Shitharth Selvarajan
,
K. Prasuna
,
Abhay Chaturvedi
,
Pravin R. Kshirsagar
,
A. Vani
Cite
DOI
URL
Towards improving e-commerce customer review analysis for sentiment detection
According to a report published by Business Wire, the market value of e-commerce reached US$ 13 trillion and is expected to reach US$ …
Upendra Singh
,
Anant Saraswat
,
Hiteshwar Kumar Azad
,
Kumar Abhishek
,
Shitharth Selvarajan
Cite
DOI
URL
Empirical Compression Features of Mobile Computing and Data Applications Using Deep Neural Networks
Due to the enormous data sizes involved in mobile computing and multimedia data transfer, it is possible that more data traffic may be …
Hana Almagrabi
,
Abdulrhman M. Alshareef
,
Hariprasath Manoharan
,
Hana Mujlid
,
Ayman Yafoz
,
Shitharth Selvarajan
Cite
DOI
URL
«
»
Cite
×