Devaraj Verma C

Devaraj Verma C
Verified
Devaraj verified their affiliation via an institutional email.
Verified
Devaraj verified their affiliation via an institutional email.
  • PhD
  • Professor at Jain University

About

29
Publications
2,417
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
61
Citations
Current institution
Jain University
Current position
  • Professor

Publications

Publications (29)
Article
Skin Cancer in today’s scenario is the most trending and common of all the cancers that directly affect the skin of the patient. It is the fifth most common type of cancer found in men and the sixth most common type in women. Surgery, Chemotherapy, Radiation therapy, and immunotherapy techniques are used to kill cancer cells. The research investiga...
Article
Full-text available
Facial attendance using face recognition and detection technology is a modern method of recording attendance based on facial features. This method is commonly used in automated attendance management systems and is efficient in tracking employee or student attendance without physical interaction. Face recognition has numerous applications such as se...
Article
The restrictions of computer aided detection(CAD) systems for mammography screening, the acute significance of early detection of breast most cancers and the greater impact of The fake or false evaluation of patients energy researchers to analyze Deep learning(DL) techniques for mammograms identification. mammograms image the background (Noise) Can...
Article
Breast cancer represents one of the leading cancer-related diseases worldwide, affecting mostly women after puberty. Even though the illness is fatal and kills thousands of people each year, it is mostly curative if found quickly. As a result, prompt and precise detection methods are critical to patient survival. Previously, doctors used manual det...
Article
Full-text available
We say how internet is everywhere, at the tips of everybody and how everyone now has a mobile phone or a laptop and so the accessibility for web application/portal is easier and more widely used which means that every person who is suffering from any sort of various range of mental health issues can have access to it. Their versatility as a platfor...
Article
Full-text available
With the increasing demand for cloud storage solutions, the main goal is to simplify the user interface while also ensuring the underlying security. Sharing a person's data isn't as private as one may think—the susceptibility of cloud storage and a lack of security has resulted in the loss of millions of records. As a result, we designed this web a...
Chapter
Full-text available
The Automated Teller Machine (ATM) in the bank enables the institutional financial cus-tomer(s) (FIC) physical money (hard cash) handling operations. The Covid-19 pandemic (C19P) introduced social distancing (SD) to safeguard human lives from the virus infection. The life-threatening situation worldwide encourages all system operations in touchless...
Chapter
Full-text available
To meet the ever-growing demand for the online computational resources, it is mandatory to have the best resource allocation algorithm to allocate the resources to its end users. For most of the Internet of Things applications, the destination for the generated data is the cloud. The data may be processed instantaneously, or it may be done afterwar...
Article
Full-text available
To meet the ever-growing demand for computational resources, it is mandatory to have the best resource allocation algorithm. In this paper, Particle Swarm Optimization (PSO) algorithm is used to address the resource optimization problem. Particle Swarm Optimization is suitable for continuous data optimization, to use in discrete data as in the case...
Research
Full-text available
Efficient resource allocation through Virtual machine placement in a clouddata center is an ever-growing demand. Different Virtual Machine optimization techniques are constructed for different optimization problems. Particle Swam Optimization (PSO) Algorithm is one of the optimization techniques to solve the multidimensional virtual machine placeme...
Article
Full-text available
Efficient resource allocation through Virtual machine placement in a cloud datacenter is an ever-growing demand. Different Virtual Machine optimization techniques are constructed for different optimization problems. Particle Swam Optimization (PSO) Algorithm is one of the optimization techniques to solve the multidimensional virtual machine placeme...
Research
Full-text available
Efficient resource allocation through Virtual Machine placement in a cloud data center is the ever-growing demand. Due to the variability in the cloud environment Virtual Machine, placement techniques must be optimized continuously. In this paper, we propose a Modified Particle Swarm Optimization (PSO) algorithm to get the Best Virtual Machine-Phys...
Article
Full-text available
Breast Cancer is the most often identified cancer among women and a major reason for the increased mortality rate among women. As the diagnosis of this disease manually takes long hours and the lesser availability of systems, there is a need to develop the automatic diagnosis system for early detection of cancer. The advanced engineering of natural...
Article
Full-text available
In this information age, the decision-makers have been able to access enormous quantities of data, and every day a massive stock of petabytes and zeta bytes of data is generated using today's digital services and modern technology such as the Web, social networking sites, internet of things and cloud computing. Machine learning techniques for the i...
Article
Full-text available
IaaS is a service model where the cloud providers offer different resources such as processor cores, memory, and storage on demand by its customers. The cloud service provider will host a cloud data center with multiple Virtual machines running on various physical Machines using virtualization technology. The virtual machine placement is always an...
Article
Full-text available
Nowadays, due to the sophistication of attacking techniques used by attackers it is becoming very difficult to protect sensitive data. This threat increases exponentially when the data is in transmission in an insecure network such as internet where the data is passed on many devices which are not under the control of the sender of this sensitive i...

Network

Cited By