Raja Kumar Murugesan
YOU?
Author Swipe
View article: Visual influence and consumer intent: A literature review on Instagram post dynamics in OTT marketing
Visual influence and consumer intent: A literature review on Instagram post dynamics in OTT marketing Open
In the rapidly evolving landscape of digital entertainment, Instagram has emerged as a dominant platform for Over-the-Top (OTT) content marketing, leveraging its visual affordances, influencer culture, and algorithmic amplification to shap…
View article: Fine-Grained Personalized Data Aggregation Scheme with High Quality and Privacy Protection
Fine-Grained Personalized Data Aggregation Scheme with High Quality and Privacy Protection Open
Mobile crowd sensing (MCS) frequently relies on truth discovery to aggregate noisy, conflicting reports into reliable estimates. Existing approaches often either risk exposing user data or overlook heterogeneous privacy needs and task-spec…
View article: The Impact of Social Media Influencers on Consumer Behavior and Purchase Decisions in the Clothing Brand Sector
The Impact of Social Media Influencers on Consumer Behavior and Purchase Decisions in the Clothing Brand Sector Open
View article: Improved lightweight node storage solutions in blockchain
Improved lightweight node storage solutions in blockchain Open
View article: Survey of Deep Learning and Machine Learning Approaches for Major Depressive Disorder Detection Using EEG Data
Survey of Deep Learning and Machine Learning Approaches for Major Depressive Disorder Detection Using EEG Data Open
Major depressive disorder (MDD) is a common mental health illness in which the affected person experiences chronic sadness and loses interest in activities. Traditionally, MDD is diagnosed using clinical examinations and self‐report questi…
View article: The Role of YouTube in Shaping Brand Identity: An Indian Perspective
The Role of YouTube in Shaping Brand Identity: An Indian Perspective Open
This research paper explores the pivotal role of YouTube in shaping brand identity within the Indian market, a landscape characterized by its cultural diversity and rapid digital transformation. With over 500 million active users, YouTube …
View article: Detecting student attention through electroencephalography signals: a comparative analysis of deep learning models
Detecting student attention through electroencephalography signals: a comparative analysis of deep learning models Open
In the landscape of educational technology, understanding and optimizing student attention is important to enhance student’s learning experience. This study explores the potential of using electroencephalography (EEG) signals for dis…
View article: Leveraging machine learning techniques for student’s attention detection: a review
Leveraging machine learning techniques for student’s attention detection: a review Open
With the advances of the internet and today's innovation, it has become conceivable to conduct teaching and learning activities remotely through the online platform. Existing research says that student’s attention state and learning result…
View article: A secure edge computing model using machine learning and IDS to detect and isolate intruders
A secure edge computing model using machine learning and IDS to detect and isolate intruders Open
View article: Deep convolutional neural network and IoT technology for healthcare
Deep convolutional neural network and IoT technology for healthcare Open
Background Deep Learning is an AI technology that trains computers to analyze data in an approach similar to the human brain. Deep learning algorithms can find complex patterns in images, text, audio, and other data types to provide accura…
View article: Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE
Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE Open
The expansion of the Internet of Things (IoT) and the Internet of Everything (IoE) has revolutionized the way we connect and interact with technology, introducing unprecedented convenience and functionality. However, adopting this also exp…
View article: A fake news detection solution in social media via crowdsourcing, blockchain technology, and artificial intelligence
A fake news detection solution in social media via crowdsourcing, blockchain technology, and artificial intelligence Open
With the exacerbation of the problem of fake news since the start of 2020's global pandemic, the authenticity of data and information now bears a greater weight with the new age of social distancing where the Internet became the standard n…
View article: ATTRIBUTE-BASED PROXY RE-ENCRYPTION WITH KEYWORD SEARCH ON PERSONAL HEALTH RECORD
ATTRIBUTE-BASED PROXY RE-ENCRYPTION WITH KEYWORD SEARCH ON PERSONAL HEALTH RECORD Open
Personal health records (PHRs) contain sensitive health information that needs to be protected from unauthorized access. At the same time, patients may need to share their PHRs with healthcare providers or researchers to receive appropriat…
View article: A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things Open
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices …
View article: Trust and Mobility-Based Protocol for Secure Routing in Internet of Things
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things Open
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and features. Among various RPL security solutions, a trust-bas…
View article: A Clustering Algorithm for Evolving Data Streams Using Temporal Spatial Hyper Cube
A Clustering Algorithm for Evolving Data Streams Using Temporal Spatial Hyper Cube Open
As applications generate massive amounts of data streams, the requirement for ways to analyze and cluster this data has become a critical field of research for knowledge discovery. Data stream clustering’s primary objective and goal are to…
View article: Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security
Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security Open
In the 1970s, roaming interconnections for cellular networks were designed for a few trusted parties. Hence, security was not a major concern. Today, the SS7 (Signaling System no. 7) solution that is several decades old is still used for m…
View article: A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing Open
Edge computing provides an agile data processing platform for latency-sensitive and communication-intensive applications through a decentralized cloud and geographically distributed edge nodes. Gaining centralized control over the edge nod…
View article: A Data Quarantine Model to Secure Data in Edge Computing
A Data Quarantine Model to Secure Data in Edge Computing Open
Edge computing provides an agile data processing platform for latency-sensitive and communication-intensive applications through a decentralized cloud and geographically distributed edge nodes. Gaining centralized control over the edge nod…
View article: A Comparative Analysis of Machine Learning Algorithms for Intrusion\n Detection in Edge-Enabled IoT Networks
A Comparative Analysis of Machine Learning Algorithms for Intrusion\n Detection in Edge-Enabled IoT Networks Open
A significant increase in the number of interconnected devices and data\ncommunication through wireless networks has given rise to various threats,\nrisks and security concerns. Internet of Things (IoT) applications is deployed\nin almost …
View article: A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks Open
A significant increase in the number of interconnected devices and data communication through wireless networks has given rise to various threats, risks and security concerns. Internet of Things (IoT) applications is deployed in almost eve…
View article: Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security
Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security Open
The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entir…
View article: A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in IoT Data
A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in IoT Data Open
Anomaly detection has gained considerable attention in the past couple of years. Emerging technologies, such as the Internet of Things (IoT), are known to be among the most critical sources of data streams that produce massive amounts of d…
View article: A Study on Activity Recognition Technology for Elderly Care
A Study on Activity Recognition Technology for Elderly Care Open
View article: Review of Data Integrity Attacks and Mitigation Methods in Edge Computing
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing Open
View article: A first approximation to the modeling of vapor plume evolution in laser welding
A first approximation to the modeling of vapor plume evolution in laser welding Open
International audience
View article: Influence maximization diffusion models based on engagement and activeness on instagram
Influence maximization diffusion models based on engagement and activeness on instagram Open
An influencer is an impactful content creator on social media. The emergence of influencers led to increased influencer marketing. The task of picking the right influencers is widely studied through influence maximization (IM). Existing IM…
View article: An analysis and prediction model of outsiders percentage as a new popularity metric on Instagram
An analysis and prediction model of outsiders percentage as a new popularity metric on Instagram Open
In this research, a new Instagram popularity metric was defined, i.e. outsiders percentage (OP) of a post. Outsiders are non-followers who liked a user’s post. It was found that OP is the most effective metric if compared to engagement rat…
View article: Classification of instagram fake users using supervised machine learning algorithms
Classification of instagram fake users using supervised machine learning algorithms Open
On Instagram, the number of followers is a common success indicator. Hence, followers selling services become a huge part of the market. Influencers become bombarded with fake followers and this causes a business owner to pay more than the…
View article: A Proposed Web Based Real Time Brain Computer Interface (BCI) System for Usability Testing
A Proposed Web Based Real Time Brain Computer Interface (BCI) System for Usability Testing Open
Hallway testing, Remote Usability testing, Expert review, Automated expert review and A/B testing are the methods commonly used for Usability testing. However, there is no reliable system that integrates Brain Computer Interface (BCI) into…