Asha Nathan

Asha Nathan
VIT University | VIT · Division of Software Engineering

B.E(CSE), M.B.A(HR), M.E(CSE), Ph.D.,

About

30
Publications
29,594
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
211
Citations

Publications

Publications (30)
Chapter
The emergent of machine learning (ML) and deep learning (DL) methods have created a substantial window of chance for their use in the industry. Given that both ML and DL algorithms are capable of identifying links between enormous amounts of data, one of the jobs for which these techniques have the most potential is visual inspection. These methods...
Chapter
Full-text available
In order to achieve the overall improvement of nation, knowledge with respect to IT and ICT tools were the essential key element for the country masses. Because of absence of essential and appropriate training, rural masses lacks employment in different divisions of progression. For accomplishing rural improvement, creating awareness on to Informat...
Article
In the modern environment, the innovations emerging in information technology has driven us to focus on strengthening the security process. This led to the recent advancement in face recognition technology and special attention is given to the recognition process by applying a biometric system for personal identification. Face recognition is renown...
Article
Full-text available
The elastic optical network (EON) fulfills the upcoming generation network requirements such as high-definition videos, high bandwidth demand services, and ultra-high-definition televisions. The key issues in EON are routing spectrum assignment and spectrum fragmentation for spectrum allocation. The spectrum fragmentation issues are resultant in po...
Article
Full-text available
In Information harmonizing in a finest way is dropping matching data of information. In the present method seriously used in the cloud, it outcome by declining space as well as group bandwidth used for upload, It is enough that simply single data of documentation are stored in the cloud still if many owners of a record. As an outcome, harmonizing s...
Article
Full-text available
This paper aims to detect and recognize faces in Digital Images. We have implemented our idea to train the computer to "see" or "know" how a typical face will be, a computer vision problem. Apart from using Neural Networks, we have used "Principal Component Analysis" (PCA)/KL transforms method combined with several distance measures in n-dimensiona...
Article
Full-text available
Testing is a Process, Not just a Phase. Software testing is the most challenging part of Software Development. Setting up the test environment is an important part of STLC. In the evolutionary environment the test suite size grows constantly as the new updated version of software evolves. Test suite reduction techniques plays intelligent role in de...
Article
Full-text available
Smart cities are the emerging cities that provide essential services for people to have a comfort and quality life. These cities are designed using various sustainable practices. Increase in the population and the essence of comfortable living gave a tremendous growth in the urban areas which results in the generation of huge amount of solid wastes...
Article
Full-text available
Here has been rising enthusiasm for secure structure that must be attempted and genuine and smart respond for the organizations and companions. RFID (Radio Frequency Identification) is one of the consistent and speedy techniques for perceive the material dissent. In the long-back the institutionalized distinguishing pieces of proof are more perfect...
Article
Full-text available
In this paper, we showcase demand elevated class applications, storage space of data distantly, the less protection burden of local data storage and shared pool of configurable computing resources are the services provided that can be enjoyed by the users by using cloud storage. Data integrity protection is an imposing task in cloud computing that...
Article
Software testing is primarily a broad process aimed at investigating, evaluating and ascertaining the comprehensiveness, the quality of the software system in terms of user requirements. The key characteristic of software testing is that it has huge intellectual capital got from past experiences which yields potential benefits. Many effective knowl...
Article
Full-text available
This paper considers the problem of conserving energy in a single node in a wireless sensor network by turning off the node’s radio for periods of a fixed time length. While packets may continue to arrive at the node’s buffer during the sleep periods, the node cannot transmit them until it wakes up. The objective is to design sleep control laws tha...
Article
Full-text available
Now Days, Ranking fraud plays major role in mobile applications store like play store and IOS store. Applications Developer gives fake ranking to their applications to rank up their apps in top most list of application market. Surely it turns out to increase number downloads to their applications. In this paper I am going to analysis the ranking fr...
Article
Banking institutions are backbone of any country’s economy. The financial institutions are a means of providing finance to the needy. Recent technologies have helped the organizations to grow globally. Through all this development the one thing that hasn’t changed is customer segregation. Knowledge Management Systems help anorganization cope with t...
Article
Full-text available
The main focus of this paper is on Big Data and Data Visualization techniques which together make the usage of data analytics more efficient and valuable. The term ‘Big Data’, is a phenomenon that is characterized by the rapid expansion of raw data. Big Data is often voluminous and tends to rapidly change, making it challenging to get a handle on a...
Article
Full-text available
The current 3G technologies provide many other services like video telecast, video conferencing, broadcasting TV programs, movies etc. This is achieved by feedback adaptation, whereby the media being sent is adapted in real time according to feedback information about the observed network state and application state. For the success of such adaptiv...
Article
Full-text available
Cloud computing allows to access software and services over the network. The network servers and connections are collectively known as "The Cloud". The way the cloud computing is designed that allows the user to access the similar way as super computer being accessed. User can acquire resources as they need them. Cloud computing is simply a metapho...
Preprint
Rapid Software Applications Development are getting more pervasive, and it is becoming increasingly necessary for Design Details of applications that run and are widespread. We introduce a novel approach for constructing the Entity Relation Model (E-R) and Class Diagram with minimal user intervention. The design overcomes technical challenges that...
Article
Full-text available
Now-a-days, it became very difficult to know that an accident has occurred and locate the position where it has happened. It's very difficult to save the lives of victim until anyone noticed and informed it to the ambulance or to any hospital and also if it occurs in the remote areas there will be no hope to survive or to reach the location in time...
Article
Full-text available
Rapid Software Applications Development are getting more pervasive, and it is becoming increasingly necessary for Design Details of applications that run and are widespread. We introduce a novel approach for constructing the Entity Relation Model (E-R) and Class Diagram with minimal user intervention. The design overcomes technical challenges that...
Article
Full-text available
For the last few years we have seen a rapid growth in the field of multimedia and animation, this implies the use of images that displays some useful information. Many applications in this modern age requires the use of images.Because of some disturbances in the image that is caused during the capturing process, the captured image displays the degr...
Article
Full-text available
our paper is mainly concerned on use of anonymous access of the various websites through various search engines like Google, Bing etc. Our concept makes search engines can block the user who misbehave in the network using tokens and provide safe access to several website by anonymously to hide their identity in network. This type of hiding their id...

Network

Cited By