C. Vanmathi
YOU?
Author Swipe
View article: A hybrid parallel convolutional spiking neural network for enhanced skin cancer detection
A hybrid parallel convolutional spiking neural network for enhanced skin cancer detection Open
View article: Blockchain integration in healthcare: a comprehensive investigation of use cases, performance issues, and mitigation strategies
Blockchain integration in healthcare: a comprehensive investigation of use cases, performance issues, and mitigation strategies Open
Healthcare is a critical area where blockchain technology (BT) is being heralded as a potential game-changer for facilitating secure and efficient data sharing. The purpose of this review is to examine BT applications, performance challeng…
View article: The Role of Blockchain in Transforming Industries Beyond Finance
The Role of Blockchain in Transforming Industries Beyond Finance Open
Blockchain technology is rapidly transforming how businesses and individuals interact. Its inherent security features, including immutability, tamper-proofing, and verifiable data provenance, are driving its adoption across numerous sector…
View article: An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model
An Efficient Intrusion Detection System to Combat Cyber Threats using a Deep Neural Network Model Open
The proliferation of Internet of Things (IoT) solutions has led to a significant increase in cyber-attacks targeting IoT networks. Securing networks and especially wireless IoT networks against these attacks has become a crucial but challe…
View article: Securing the Skies: Cybersecurity Strategies for Smart City Cloud using Various Algorithams
Securing the Skies: Cybersecurity Strategies for Smart City Cloud using Various Algorithams Open
As smart cities continue to evolve, their reliance on cloud computing technologies becomes increasingly apparent, enabling the seamless integration of data-driven services and urban functionalities. However, this transformation also raises…
View article: Development of Novel Privacy User based Authentication Approach on Internet of Drones in Wireless Communication
Development of Novel Privacy User based Authentication Approach on Internet of Drones in Wireless Communication Open
Drone internet of things (IoT) is a new computer system idea that describes future technological deployments using diverse drone/node communication methods in 5G-oriented networks. It has emerged in recent years. Sophisticated 5G networks …
View article: Bio-Inspired PSO for Improving Neural Based Diabetes Prediction System
Bio-Inspired PSO for Improving Neural Based Diabetes Prediction System Open
A high level of glucose in the blood over a long period creates diabetes disease. Undiagnosed diabetes may trigger other complications such as cardiovascular disease, nerve damage, renal failure, and so on. There are many factors age, bloo…
View article: An Authentication Approach in SDN-VANET Architecture With Rider-Sea Lion Optimized Neural Network for Intrusion Detection
An Authentication Approach in SDN-VANET Architecture With Rider-Sea Lion Optimized Neural Network for Intrusion Detection Open
View article: A Study and Analysis of Machine Learning Techniques in Predicting Wine Quality
A Study and Analysis of Machine Learning Techniques in Predicting Wine Quality Open
In today’s trend consumers are very much concern about the quality of the product in turn, Industries are all working on various methodologies to ensure the high quality in their products. Most of consumers judge the quality of the product…
View article: COVID19: Forecasting Air Quality Index and Particulate Matter (PM2.5)
COVID19: Forecasting Air Quality Index and Particulate Matter (PM2.5) Open
Urbanization affects the quality of the air, which has drastically degraded in the past decades. Air quality level is determined by measures of several air pollutant concentrations. To create awareness among people, an automation system th…
View article: A novel dyadic multiresolution wavelet image steganography using N-ary
A novel dyadic multiresolution wavelet image steganography using N-ary Open
Steganography plays an important role in information sharing. In this paper a wavelet based image steganography using Haar wavelet and an N-ary notation is proposed. The high and middle frequency coefficients are selected based on the Shan…