Gunasekaran Raja
YOU?
Author Swipe
View article: Banks Regulatory Reporting Compliance – Swap Data Reporting: Key Challenges and Solution
Banks Regulatory Reporting Compliance – Swap Data Reporting: Key Challenges and Solution Open
In the aftermath of the 2008 global financial crisis, financial regulators across jurisdictions introduced sweeping reforms to improve transparency and risk management in over-the-counter (OTC) derivatives market. One of the cornerstone re…
View article: Cross-cultural Amalgamation Influencing Personalities Across Timeline in the novel ‘The Sicilian’ by Mario Puzo
Cross-cultural Amalgamation Influencing Personalities Across Timeline in the novel ‘The Sicilian’ by Mario Puzo Open
Revenge is a dish that tastes its best when it is cold”, says Maria Puzo in his work The Godfather. Here in this we are about to discuss two characters' personalities across time. The Kings of Norman regime and an Italian revolutionary or …
View article: Prediction of electric vehicle charging demand using enhanced gated recurrent units with RKOA based graph convolutional network
Prediction of electric vehicle charging demand using enhanced gated recurrent units with RKOA based graph convolutional network Open
Accurate forecasting of traffic patterns plays a crucial role in the effective management and planning of urban transportation infrastructure. In particular, predicting the availability of electric vehicle (EV) charging stations is essenti…
View article: UGEN: UAV and GAN-Aided Ensemble Network for Post-Disaster Survivor Detection Through ORAN
UGEN: UAV and GAN-Aided Ensemble Network for Post-Disaster Survivor Detection Through ORAN Open
Post-disaster scene understanding frameworks are increasingly crucial in Search And Rescue (SAR) operations. Unmanned Aerial Vehicles (UAVs) provide an efficient means to carry out the task of scene understanding due to the higher altitude…
View article: Advanced Decision Making and Motion Planning Framework for Autonomous Navigation in Unsignalized Intersections
Advanced Decision Making and Motion Planning Framework for Autonomous Navigation in Unsignalized Intersections Open
Autonomous vehicle navigation relies heavily on integrating sensor data, perception, path planning, localization, and vehicle control. However, existing research often treats these components in isolation, particularly at unsignalized inte…
View article: DQN Approach for Adaptive Self-Healing of VNFs in Cloud-Native Network
DQN Approach for Adaptive Self-Healing of VNFs in Cloud-Native Network Open
The transformation from physical network function to Virtual Network Function (VNF) requires a fundamental design change in how applications and services are tested and assured in a hybrid virtual network. Once the VNFs are onboarded in a …
View article: DTBV: A Deep Transfer-Based Bone Cancer Diagnosis System Using VGG16 Feature Extraction
DTBV: A Deep Transfer-Based Bone Cancer Diagnosis System Using VGG16 Feature Extraction Open
Among the many different types of cancer, bone cancer is the most lethal and least prevalent. More cases are reported each year. Early diagnosis of bone cancer is crucial since it helps limit the spread of malignant cells and reduce mortal…
View article: Vision-Based Ingenious Lane Departure Warning System for Autonomous Vehicles
Vision-Based Ingenious Lane Departure Warning System for Autonomous Vehicles Open
Lane detection is necessary for developing intelligent Autonomous Vehicles (AVs). Using vision-based lane detection is more cost-effective, requiring less operational power. Images captured by the moving vehicle include varying brightness,…
View article: Optimization of 5G/6G Telecommunication Infrastructure through an NFV-Based Element Management System
Optimization of 5G/6G Telecommunication Infrastructure through an NFV-Based Element Management System Open
Network Function Virtualization (NFV) is an enabling technology that brings together automated network service management and corresponding virtualized network functions that use an NFV Infrastructure (NFVI) framework. The Virtual Network …
View article: Ztmp: Vim Based Zero Touch Management Platform for On-Boarding of Cloud-Native Vnf
Ztmp: Vim Based Zero Touch Management Platform for On-Boarding of Cloud-Native Vnf Open
View article: Deep Learning Based Attack Detection in IIoT using Two-Level Intrusion Detection System
Deep Learning Based Attack Detection in IIoT using Two-Level Intrusion Detection System Open
The Industrial Internet of Things (IIoT), also known as Industry 4.0, has brought a revolution in the production and manufacturing sectors as it assists in the automation of production management and reduces the manual effort needed in aud…
View article: Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV
Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV Open
The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires efficient resource man…
View article: A Hybrid Glowworm Swarm Optimization for Enhancing the Lifespan of Wireless Sensor Networks
A Hybrid Glowworm Swarm Optimization for Enhancing the Lifespan of Wireless Sensor Networks Open
The special features of smart grid technology includes regular metering communication, renewable power incorporation, allotment computerization and whole scrutinizing and organization of complete power grid. Little micro-electrical automat…
View article: Multimedia Computational Offloading for 5G Mobile Edge Computing
Multimedia Computational Offloading for 5G Mobile Edge Computing Open
Due to the tremendous growth of smartphone users with their massive usage of faster response, delay sensitive applications lead to high traffic demands, still not yet been met by current researchers. Thus, the ever-increasing computational…
View article: Timeline Improvement of Hierarchical Clustering Algorithms for Wireless Sensor Networks
Timeline Improvement of Hierarchical Clustering Algorithms for Wireless Sensor Networks Open
Wireless sensor networks have a wide range of practical and useful applications.Since a wireless sensor network is driven by batteries, energy consumption is a critical factor to determine the life of the network.The energy of the nodes ar…
View article: ICoAC 2019 Programme Schedule
ICoAC 2019 Programme Schedule Open
View article: Editorial: special issue on “Evolution of information and communication technology towards 5G: New Emerging Areas, technologies, protocols, and applications”
Editorial: special issue on “Evolution of information and communication technology towards 5G: New Emerging Areas, technologies, protocols, and applications” Open
View article: SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks
SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks Open
The data traffic that is accumulated at the Macro Base Station (MBS) keeps on increasing as almost all the people start using mobile phones. The MBS cannot accommodate all user’s demands, and attempts to offload some users to the nearby sm…
View article: A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario
A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario Open
Millions of devices are going to participate in 5G producing a huge space for\nsecurity threats. The 5G specification goals require rigid and robust security\nprotocol against such threats. Quantum cryptography is a recently emerged term\n…
View article: ICoAC 2018 Programme Schedule
ICoAC 2018 Programme Schedule Open
View article: Quality of Service Provisioning for Heterogeneous Services in Cognitive Radio-Enabled Internet of Things
Quality of Service Provisioning for Heterogeneous Services in Cognitive Radio-Enabled Internet of Things Open
IEEE The Internet of Things (IoT) is a network of interconnected objects, in which every object in the world seeks to communicate and exchange information actively. This exponential growth of interconnected objects increases the demand for…
View article: Smart Polyhouse Farming using IoT Environment
Smart Polyhouse Farming using IoT Environment Open
<p>A Polyhouse is a building where plants are grown. Polyhouses are often used for growing flowers, vegetables, fruits, and tobacco plant. Basic factors affecting plant growth are sunlight, water content in soil, temperature, etc. Th…
View article: A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE
A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE Open
The growing popularity of multimedia applications, pervasive connectivity,\nhigher bandwidth, and euphoric technology penetration among the bulk of the\nhuman race that happens to be cellular technology users, has fueled the\nadaptation to…
View article: Improving neural machine translation for morphologically rich languages
Improving neural machine translation for morphologically rich languages Open
Machine Translation aims to provide a seamless communication and interaction, thereby overcoming human language barriers. Recently, Neural Machine Translation (NMT) approaches have been very successful and achieve state-of-the-art performa…
View article: QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks
QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks Open
Increasing demands for high-speed broadband wireless communications with voice over long term evolution (LTE), video on demand, multimedia, and mission-critical applications for public safety motivate 4th-generation (4G) and 5G communicati…
View article: Network Coding With Buffer Scheme In Multicast For Broadband Wireless Network
Network Coding With Buffer Scheme In Multicast For Broadband Wireless Network Open
Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability …
View article: Network Coding With Buffer Scheme In Multicast For Broadband Wireless Network
Network Coding With Buffer Scheme In Multicast For Broadband Wireless Network Open
Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability …
View article: Cooperative Cross Layer Topology For Concurrent Transmission Scheduling Scheme In Broadband Wireless Networks
Cooperative Cross Layer Topology For Concurrent Transmission Scheduling Scheme In Broadband Wireless Networks Open
In this paper, we consider CCL-N (Cooperative Cross Layer Network) topology based on the cross layer (both centralized and distributed) environment to form network communities. Various performance metrics related to the IEEE 802.16 network…
View article: An Automated Way of Baking Process for Moisture Sensitive Components
An Automated Way of Baking Process for Moisture Sensitive Components Open
The objective of my project is to the new technology termed as “baking process” to remove the moisture content available in the particular electronics devices which is used in Rea time industrial application. In Industries there are certai…
View article: Automatic EB Billing Using GSM Technique
Automatic EB Billing Using GSM Technique Open
Now a day the energy meter monitoring and taking the readings needs lot of manual power .It is also an urgent problem that the household wants to solve it because, the accuracy and real time of meter data copy affects the power system info…