scispace - formally typeset
P

P. Latha

Researcher at Government College

Publications -  23
Citations -  247

P. Latha is an academic researcher from Government College. The author has contributed to research in topics: Wireless sensor network & Software. The author has an hindex of 8, co-authored 23 publications receiving 207 citations. Previous affiliations of P. Latha include St. Joseph's College of Engineering & College of Engineering, Guindy.

Papers
More filters
Journal ArticleDOI

Maximizing the wireless sensor networks lifetime through energy efficient connected coverage

TL;DR: This paper proposes a novel Energy Efficient Connected Coverage (EECC) scheduling to maximize the lifetime of the WSN and outperforms similar scheduling algorithms found in the literature in an energy efficient way with the short execution time.

Classification of diseased plant leaves using neural network algorithms

TL;DR: In this article, the detected spot diseases in leaves are classified based on the diseased leaf types using various neural network algorithms, such as Feed Forward Neural Network (FFNN), Learning Vector Quantization (LVQ) and Radial Basis Function Networks (RBF).
Journal ArticleDOI

Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks

TL;DR: Simulation results show that the fuzzy based multi-attribute trust evaluation outperforms weighted summation basedMulti- attribute trust evaluation.
Proceedings ArticleDOI

Analysis of power quality problems in grid connected wind power plant

TL;DR: In this paper, the authors present a technical review of power quality problems associated with grid connected wind power plant and describes the Dynamic Voltage Restorer that injects voltage into the system with a view to enhance the network power factor while stabilizing the voltage and reducing the network losses.
Journal ArticleDOI

Smartphone Enabled Intelligent Surveillance System

TL;DR: The proposed intelligent surveillance system offers cost effective, storage effective, energy efficient, and secured solution as it uses the computation and communication capabilities of the smartphone and the storage capabilities of cloud.