Khaja Mannan

Khaja Mannan


How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2017
6 Research Items
4 Citations
Deep learning, Machine learning, edge computing , quantum computing, multimedia webmining
Skills and Expertise
Additional affiliations
March 2019 - present
Sumathi Reddy institute of Technology for women
  • Professor (Assistant)
  • Along with teaching , Myself mentor the students in their academic projects . Presently working on an innovative method which can be used to identify the object (person, vehicle) and permit its access within its range(enter or exit the area)
August 2016 - August 2020
opjs university
Field of study
  • computer science


Publications (6)
Conference Paper
Full-text available
Hydroelectricity is electricity produced by the generators that are pushed by the water movement. This is one of the widely used sustainable power. One of the major advantages of the hydro power after constructing the plant is wastage is not created.22% of the word power is generated by hydroelectricity, which constitutes around about 78% of power...
Conference Paper
World population is increasing day-by-day, based on the population the vehicles are increasing and due to increase in population and increase of vehicles on the roads controlling of traffic is a tough job for the people who control the traffic. The traffic is heavy at the junctions and due to heavy traffic at the junctions becoming more problem for...
Conference Paper
In every part of our life, we are expecting some sort of good result based on our experiences or through the information about that particular similarly a prediction is generated after extracting a large volume of information which is used for analysis. Prediction of results is the important aspect is necessary to make a sustainable decision throug...
Conference Paper
Today, the current trend is utilizing the smart devices that provide comfort and security to the users. Now-a-days, most of the devices are developed with in-built advanced security provisions such as fingerprints, face recognition along with the traditional security provisions such as password and drawing a pattern. Almost all the smart phones hav...
Conference Paper
The two key high-class data science methods are deep learning and big data analytics, where big data plays a crucial role as both private and public agencies gather extremely voluminous usable data even though it may have problems such as cyber security, national intelligence, marketing, identification of fraud, etc. The vast volume of data is rout...
Conference Paper
In this busy world, there is an estimation of 3.5 exabytes of information data been generated in a single day and the data is shared on more than 10 million computing devices. As We, human beings are wholeheartedly dependent on the digital based computing devices for knowledge sharing by means of text and image information for each and every commot...


Cited By