Papers by Sivaram Rajeyyagari
Dimensionality Reduction Method for Early Detection of Dementia
Lecture notes in electrical engineering, 2022

World Journal of Advanced Engineering Technology and Sciences
Cancer is the foremost cause behind the most death pace of people around the world. Cancer of bre... more Cancer is the foremost cause behind the most death pace of people around the world. Cancer of breast is the primary reason for mortality among females. There have been various investigation or experimentation aimed at the discovery and interpretation of facts has been done on early expectation and discovery of breast cancer disease to begin treatment and increment the opportunity of endurance. Utmost research targets x-ray pictures of the breasts. Although, photographs of the breasts made by X-rays occasionally produces a threat of fake recognition which can compromise the medical status of infectious person. It’s crucial and import to locate opportunity techniques that might be simpler to put into effect and work with extraordinary records sets, inexpensive and safer, which could produce an extra dependable prognosis. This research journal recommends an associated prototype of numerous DLA (Deep Learning Algorithms) including ANN (Artificial Neural Network) and CNN (Convolutional N...

Wireless Communications and Mobile Computing
The widening of coronavirus disease (COVID-19) across the globe has put both the government and h... more The widening of coronavirus disease (COVID-19) across the globe has put both the government and humanity at risk. The funds of part of the biggest recessions are stressed out due to the severe infectivity rates and highly communicable nature of this disease. Due to the expanding consequence of cases being registered and their successive significance on the civic body administration and health professionals, certain prediction methods are intended to be necessitated to predict the number of cases in the future. In this paper, nonlinear cosine-based time series learning (NCTL) is introduced for the prediction and analysis of COVID-19 in India. First, the nonlinear least squares regressive feature selection (NLS-RFS) model is used for choosing the relevant features by considering both the active cases with less prediction error. Next, the cosine-based neighborhood filter algorithm is applied to attain the optimum filtered features to select relevant features with minimum prediction tim...
Applications of Artificial Intelligence in Biomedical Image Processing
2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS)

Journal of Data Analysis and Information Processing, 2022
COVID-19 virus is certainly considered as one of the harmful viruses amongst all the illnesses in... more COVID-19 virus is certainly considered as one of the harmful viruses amongst all the illnesses in biological science. COVID-19 symptoms are fever, cough, sore throat, and headache. The paper gave a singular function for the prediction of most of the COVID-19 virus diseases and presented with the Convolutional Neural Networks and Logistic Regression which might be the supervised learning and gaining knowledge of strategies for most of COVID-19 virus diseases detection. The proposed system makes use of an 8-fold pass determination to get a correct result. The COVID-19 virus analysis dataset is taken from Microsoft Database, Kaggle, and UCI websites gaining knowledge of the repository. The proposed studies investigate Convolutional Neural Networks (CNN) and Logistic Regression (LR) about the usage of the UCI database, Kaggle, and Google Database Datasets. This paper proposed a hybrid method for COVID-19 virus, most disease analyses through reducing the dimensionality of capabilities the usage of Logistic Regression (LR), after which making use of the brand new decreased function dataset to Convolutional Neural Networks and Logistic regression. The proposed method received the accuracy of 78.82%, sensitiveness of 97.41%, and specialness of 98.73%. The overall performance of the proposed system is appraised thinking about performance, accuracy, error rate, sensitiveness, particularity, correlation and coefficient. The proposed strategies achieved the accuracy of 78.82% and 97.41% respectively through Convolutional Neural Networks and Logistic Regression.

The use of AI in military contexts: opportunities and regulatory challenges
The Military Law and the Law of War Review, 2022
While the use of artificial intelligence (AI) and machine-learning algorithms in the context of a... more While the use of artificial intelligence (AI) and machine-learning algorithms in the context of armed conflicts has been subject to scholarly and political debate for at least the past half-decade, to date discussions have focused on the possible development and deployment of lethal autonomous weapon systems. Going beyond this narrow perspective, the article draws attention to other military uses of AI that are conceivable or in fact already exist, for example for the purpose of detention, force protection, equipment maintenance, or reconnaissance. It critically examines these different applications from a legal and ethical perspective, exposing some of the challenges inherent in the technology such as algorithmic bias or predictability. On the basis of existing and emerging approaches to the regulation of ‘civilian’ AI, the article concludes by proposing a granular, tiered way to future regulation of military AI that proceeds from the criticality of each particular application. Alo...

Oxidation characteristics and products of five ethers at low temperature
Fuel, 2016
Abstract The oxidation characteristics and products of five ethers – ethyl tert -butyl ether (ETB... more Abstract The oxidation characteristics and products of five ethers – ethyl tert -butyl ether (ETBE), methyl tert -butyl ether (MTBE), dimethyl ether (DME), diethyl ether (DEE), and diisopropyl ether (DIPE) – were determined using an accelerating rate calorimeter (ARC) at low temperatures. Oxidation temperature and pressure were calculated using temperature–time ( T – t ) and pressure–time ( P – t ) plots, and reaction products were analyzed by gas chromatography–mass spectrometry (GC–MS). Results showed that the oxidation reaction pathway of ethers with oxygen occurred in three stages: (1) promotion of oxygen and peroxide absorption by ether; (2) generation of free radicals by thermal decomposition; and (3) complex oxidation caused by free radicals. Initial auto-oxidation temperatures of DME, DEE, DIPE, MTBE, and ETBE were approximately 393 K, 389 K, 359 K, 413 K, and 383 K, respectively, and the activation energies ( E a ) for thermal decomposition were 167.3 kJ/mol, 126.7 kJ/mol, 111.6 kJ/mol, 236.7 kJ/mol, and 159.1 kJ/mol, respectively, for the first-order reaction. Peroxides of DEE, DIPE, MTBE, and ETBE were identified by iodimetry analysis when oxidation temperature was 333 K. Oxidation reaction products were complex and included alcohols, aldehydes, ketones, acids, esters, and carbon dioxide.
Managing Information and Network Security using Chaotic Bio Molecular Computing Technique
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS)

Data could be in many forms like text, image, audio, video and many others. Amongst these data, p... more Data could be in many forms like text, image, audio, video and many others. Amongst these data, processing image is of important concern even with sophisticated technologies. Generally, images consume more storage space and processing time. This work aims in attaining a novel image encryption strategy that consumes very less computational time with maximum security. The idea is to split the image into blocks and rearrange the pixels in diagonal fashion to achieve confusion. Next, the blocks are combined to form sub images and one block of the sub image is subjected to Secure Hash Algorithm (SHA 512 bits). The SHA bits are XORed with the remaining blocks of the sub image. Finally, the entire image is encrypted using Advanced Encryption Standard (AES). Decryption process is the exact reverse of encryption process. The computational overhead is very low, and security is efficient. The results are compared with existing encryption techniques.

Wireless Networks, 2020
This study aims to determine the effect of incubation time on milk clotting enzyme (MCE) activity... more This study aims to determine the effect of incubation time on milk clotting enzyme (MCE) activity produced by L. rhamnosus SKG 34 and determine the optimum incubation time to produce the highest its activity. This study used a randomized block design (RBD) with incubation time as a treatment consisting of 8 levels, that were 6 hours, 12 hours, 18 hours, 24 hours, 30 hours, 36 hours, 42 hours, and 48 hours. Data were analyzed with Variance Analysis (ANOVA) than followed by Duncan Multiple Range Test (DMRT). The analyzed were repeated 3 times resulting in 24 experimental units. The results showed that the incubation time significantly affected protease activity, MCE activity, specific protease activity and ratio of MCE to protease but did not affect the total LAB. The optimum incubation time of L. rhamnosus SKG 34 is 12 hours with total LAB 1.83 x 10 9 CFU/ml and protease activity 180.67 U/ml, MCE activity 595.06 SU, protease spesific activity 73.149 U/mg and ratio of MCE to protease 3.29 SU/U.

Journal of Healthcare Engineering , 2022
A rising proportion of older people has more demand on services including hospitals, retirement h... more A rising proportion of older people has more demand on services including hospitals, retirement homes, and assisted living facilities. Regaining control of this population's expectations will pose new difficulties for lawmakers, medical professionals, and the society at large. Smart technology can help older people to have independent and fulfilling lives while still living safely and securely in the community. In the last several decades, the number of sectors using robots has risen. Comrade robots have made their appearance in old human life, with the most recent notable appearance being in their care. e number of elderly individuals is increasing dramatically throughout the globe. e source of the story is the use of robots to help elderly people with day-today activities. Speech data and facial recognition model are done with AI model. Here, with the Comrade robotic model, elder people's healthcare system is designed with better analysis state. e aim is to put in place a simple robotic buddy to determine the health of the old person via a headband that has been given to them. Comrade robot may do things like senior citizens home automation, home equipment control, safety, and wellbeing sensing, and, in emergency situation, routine duties like navigating in the outside world. e fear that robotics and artificial intelligence would eventually eliminate most of the jobs is increasing. It is anticipated that, in order to survive and stay relevant in the constantly shifting environment of work, workers of the future will need to be creative and versatile and prepared to identify new business possibilities and change industry to meet challenges of the world. According to the research, reflective practice, time management, communicating, and collaboration are important in fostering creativity.

Journal of Healthcare Engineering
A rising proportion of older people has more demand on services including hospitals, retirement h... more A rising proportion of older people has more demand on services including hospitals, retirement homes, and assisted living facilities. Regaining control of this population’s expectations will pose new difficulties for lawmakers, medical professionals, and the society at large. Smart technology can help older people to have independent and fulfilling lives while still living safely and securely in the community. In the last several decades, the number of sectors using robots has risen. Comrade robots have made their appearance in old human life, with the most recent notable appearance being in their care. The number of elderly individuals is increasing dramatically throughout the globe. The source of the story is the use of robots to help elderly people with day-to-day activities. Speech data and facial recognition model are done with AI model. Here, with the Comrade robotic model, elder people’s healthcare system is designed with better analysis state. The aim is to put in place a s...

Analysis of Image Segmentation of Magnetic Re- sonance Image in the Presence of Inhomongeneties
The present work proposes the Image processing plays a vital role in medical diagnosis system. Ou... more The present work proposes the Image processing plays a vital role in medical diagnosis system. Out of various processing tools, image segmentation is very crucial in identifying the exact reason of disease. Image segmentation clusters the pixels into silent image regions i.e. regions corresponding to individual surfaces, objects or any part of objects. Various algorithms have been proposed for image segmentation. We have analyzed the various systems that have been developed to medical diagnosis analysis. Reviewing of these frameworks will be dependent upon level set strategies from claiming segmenting pictures. The theme, merits, faults from claiming Different frameworks will be talked about in this paper. Dependent upon that, another framework need been suggested to segmenting those MRI picture utilizing variety level situated calculation without reinitialisation for MRI image. Those framework could be used both to recreated and also genuine images.

A Review Methodology for COVID-19 Using Enhanced Techniques
The COVID-19 pandemic is straining health systems worldwide. The rapidly increasing demand on hea... more The COVID-19 pandemic is straining health systems worldwide. The rapidly increasing demand on health facilities and health care workers threatens to leave some health systems overstretched and unable to operate effectively.Coronaviruses (CoV) are a large family of viruses that cause illness ranging from the common cold to more severe diseases such as Middle East Respiratory Syndrome (MERS-CoV) and Severe Acute Respiratory Syndrome (SARS-CoV). Coronavirus disease (COVID-19) is a new strain that was discovered in 2019 and has not been previously identified in humans. The COVID-19 virus affects different people in different ways. COVID-19 is a respiratory disease and most infected people will develop mild to moderate symptoms and recover without requiring special treatment. People who have underlying medical conditions and those over 60 years old have a higher risk of developing severe disease and death. In this chapter we are also explained about covid-19 virus structure, and the proc...

A novel mechanism for dynamic multifarious and disturbed human face recognition using advanced stance coalition (ASC)
Multifarious face recognition is a significant and challenging issue in human face recognition ar... more Multifarious face recognition is a significant and challenging issue in human face recognition area. All those existing mechanisms for this issue has the least significant features with less expected outcome in the present technical scenario. In this paper, a novel scheme named Advanced Stance coalition to recognize human faces in the frame is propounded. The significant feature in ASC is to reduce the calculation time and to improve the result accuracy. Initially, images collected undergo feature extraction to identify the human face. Then, the median filtering is applied to remove noise and extract its feature. In the output section, MD5 hashing scheme is employed to prevent originality using block dioptry distribution with naive Bayes. The propounded ASC has significant features and suggests many details at training period which offers better results in the examination phase. From the result, it's clear that the proposed scheme is more persistent to noise and other major dist...

The use of gestures to convey information has been an important part of human communication. Hand... more The use of gestures to convey information has been an important part of human communication. Hand gestures can be classified into two categories: static and dynamic. The use of hand gestures as a natural interface serves as a motivating force for research on gesture nomenclature, its representations, and recognition techniques. This paper is the summary of the reviews carried out in human computer interaction (HCI) studies and concentrates on different application domains that use hand gestures for efficient interaction. This fact-finding study wishes to provide a progress report on static and dynamic hand gesture recognition (i.e., gesture taxonomies, representations, and recognition techniques) in HCI and to identify future directions. Keywords—Gesture recognition, Human Computer Interaction (HCI), AI, Language Processing. INTRODUCTION With the development of information technology in our society, we can expect that computer systems to a larger extent will be embedded into our env...

A new algorithm for detection of nodes failures and enhancement of network coverage and energy usage in wireless sensor networks
Present natural lives shows rising attention in various applications of the wireless sensor netwo... more Present natural lives shows rising attention in various applications of the wireless sensor networks (WSNs). Significant applications are isolated and stiff regions where human involvement is hazardous or unfeasible. Some examples are space investigation, battlefield observation, costal, and edge security; nowadays, such networks are needful in several manufacturing and customer applications. A WSN is a device system, indicated as nodes; these nodes intellect the atmosphere and transfer the details collected from the ground through a wireless connection. Statistics are sent, probably via many hops, to a target that can use it nearby or is linked to various networks using the gateway. The sensor nodes might be stationary or changeable. Every node has clear data about the neighborhood or not. Communication over WSN over ecological hazards is a key issue. These constraints might impact the performance of the sensors/direction finding protocols and resource utilization; thus, they may s...
Reducing the Approximations using Map Reduce

Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance
E-Government refers to the administration of Information and Communication Technologies (ICT) to ... more E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An established validation and management system could face a single failure point and the system is prone to Distributed Denial of Service Attacks (DDoS), denial of service attacks (DoS), malware and other cyber attacks. The execution of a privacy preserving and a secure decentralized system is enabled by the block chain technology. Here any third-party organizations do not have any control over the transactions of the G...
Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
Journal of Experimental & Theoretical Artificial Intelligence
Uploads
Papers by Sivaram Rajeyyagari