Follow
Shruthi G
Shruthi G
Asst. Professor, REVA University
Verified email at reva.edu.in
Title
Cited by
Cited by
Year
Mayfly taylor optimisation-based scheduling algorithm with deep reinforcement learning for dynamic scheduling in fog-cloud computing
G Shruthi, MR Mundada, BJ Sowmya, S Supreeth
Applied computational intelligence and soft computing 2022, 2022
412022
The resource allocation using weighted greedy knapsack based algorithm in an educational fog computing environment
G Shruthi, M Mundada, S Supreeth
International Journal of Emerging Technologies in Learning (iJET) 17 (18 …, 2022
182022
Deep learning-based resource prediction and mutated leader algorithm enabled load balancing in fog computing
G Shruthi, MR Mundada, S Supreeth, B Gardiner
International Journal of computer networks and information security 15 (4 …, 2023
102023
Detection of liver lesion using ROBUST machine learning technique
K Sowmya Sundari, L.K. , Guptha, N.S. , Shruthi, G. , Thanuja, K. , Anitha
International Journal of Engineering and Advanced Technology, 2019
8*2019
Adaptive Hybridized Meta-Heuristic Algorithm for Subspace Clustering on High Dimensional Data
D Kumar, BJ Sowmya, K Anita, TN Amaresh, S Anish, S Supreeth, ...
Journal of Advances in Information Technology 14, 1103-1116, 2023
22023
Machine learning model for emotion detection and recognition using an enhanced Convolutional Neural Network
B Sowmya, SA Alex, A Kanavalli, S Supreeth, G Shruthi, S Rohith
Journal of Integrated Science and Technology 12 (4), 786-786, 2024
12024
An Efficient Framework for Web Content Mining Systems Using Improved CD-PAM Clustering and the A-CNN Technique
M Pujar, MR Mundada, BJ Sowmya, S Supreeth, G Shruthi
SN Computer Science 4 (5), 692, 2023
12023
Fortification for Cloud Data Pilfering: using Attribute-based Encryption
KA Patil, PS Hiremath, N Mohandas, BV Mohanrao, G Shruthi
International Journal of Engineering Research & Technology (IJERT) 10 (05 …, 2021
1*2021
Comparative Approach to Secure Data Over Cloud Computing Environment
YM Dalal, SN Raj, S Supreeth, G Shruthi, T Yerriswamy, A Biradar
2023 7th International Conference on Computation System and Information …, 2023
2023
A Deep Learning-Based Approach for Identification and Recognition of Criminals
BJ Sowmya, H Kavitha, P Dayananda, R Manjunath, S Supreeth, ...
International Journal of Intelligent Systems and Applications in Engineering …, 2023
2023
An Adaptive Security Scheme for Key Access on Cloud Computing
DM Patel, KK Patil, S Supreeth, BJ Ambika, Y Vishwanath, G Shruthi
International Conference on Soft Computing and Signal Processing, 483-492, 2023
2023
Design of a Smart Safety Design for Women Using IoT
G Shruthi, R Chandana, P Gagana
International Conference on Computational Intelligence in Machine Learning …, 2022
2022
A New Machine Learning Approach for Malware Classification
G Shruthi, P Shrinivasacharya
Applied Information Processing Systems: Proceedings of ICCET 2021, 301-309, 2022
2022
VEGYZONE.
C Navitha, N Neha, R Nisheetha, A Niveda, G Shruthi
International Journal of Advanced Research in Computer Science 11, 2020
2020
VIRTUAL TELEPRESENCE ROBOT CONTROLLED WITH HAND GESTURES (VITEL)
PSG Nitesh V,NitishDurairaj,NavaneetManikandan,Nithin Mohandas
International Journal of Advanced Research in Computer Science 11 (Special …, 2020
2020
Sensitive Data Sanitization along with Encryption and Third-party Auditing
SG Pavan Kumar S,Nimmanapalli Sai Abhijith Reddy,Nithesh G,Mrinal Mohan
TEST Engineering & Management, 4, 2020
2020
Abstract Extraction from Audios
SG Aditi H M,Akhila Kulkarni,Akshatha Janardhan,Anuhitha N
TEST Engineering & Management, 4, 2020
2020
Forest Fire Detection Using Convolutional Neural Networks
K Shruthi G,Disha Bhat,Gagana H,Dimple M K
International Journal of Computer Sciences and Engineering, 3, 2019
2019
Image processing and Controller Based Game Play Using Hand Gestures
RV Shruthi G,Praharsh R,R Durga Sai Eswar
International Journal of Computer Sciences and Engineering, 5, 2019
2019
IOT Based Secure Smart Home
SG Ramesh Nagappa Naik
IJCA - International Journal of Computer Applications, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20