B.S. Kiruthika Devi
YOU?
Author Swipe
View article: Single and multi-crop species disease detection using ITSO based gated recurrent multi-attention neural network
Single and multi-crop species disease detection using ITSO based gated recurrent multi-attention neural network Open
Diseases of crop plants pose a serious danger to agricultural output and progress. Predicting the onset of a disease outbreak in advance can help public health officials better manage the pandemic. Precision agriculture (PA) applications r…
View article: CROA-based feature selection with BERT model for detecting the offensive speech in Twitter data
CROA-based feature selection with BERT model for detecting the offensive speech in Twitter data Open
Online hate speech has flourished on social networking sites due to the widespread availability of mobile computers and other Web knowledge. Extensive research has shown that online exposure to hate speech has real-world effects on margina…
View article: Securing Cloud Using Intrusion Detection Systems: A Review
Securing Cloud Using Intrusion Detection Systems: A Review Open
Cloud computing consists of technologies like distributed computing, grid computing, virtualization, utility computing, network computing, and the web. There are several threats in the cloud, such as man-in-the-middle attacks, port scans, …
View article: Artificial Intelligence Based Fake News Detection Techniques
Artificial Intelligence Based Fake News Detection Techniques Open
Fake news on social media platforms is increasing rapidly, so many people are becoming victims of this news without their interference. It is a big challenge for us to detect who is spreading fake news. Fake news spreads faster nowadays th…
View article: An Analysis of Intelligent Parking System Using Artificial Intelligence for IoT Applications
An Analysis of Intelligent Parking System Using Artificial Intelligence for IoT Applications Open
Nowadays, it has become a tedious task to control the traffic caused by the unplanned parking system. Many manual parking systems are used these days, which always don’t provide accuracy. There is a huge wastage of fuel and time in the man…
View article: A Detailed Investigation on Forest Monitoring System for Wildfire Using IoT
A Detailed Investigation on Forest Monitoring System for Wildfire Using IoT Open
The world’s forests cover one-third of the planet’s land surface, and it is necessary to sustain life with this geography. There is enough food, water, and energy for us to live off of them. Forest fires have recently surpassed all other f…
View article: A Study on Security Schemes in Blockchain Technology
A Study on Security Schemes in Blockchain Technology Open
Block-chain is widely praised as an astounding advancement because of its recent development in security. Many believe that information stored in a block-chain is secure because of its decentralization and cryptographic methods. Consensus …
View article: A Review on Intelligent Health Care System Using Learning Methods
A Review on Intelligent Health Care System Using Learning Methods Open
All organizations that are striving for healthy living must establish and maintain updated diet regimens. A health care recommendation system uses data to give medical advice. Machine Learning analyses data to predict future requests and i…
View article: Artificial Intelligence Based System for Securing Computer Networks: A Survey
Artificial Intelligence Based System for Securing Computer Networks: A Survey Open
The security of computer networks is crucial in today’s computer systems. A number of software technologies are now being developed in order to impose high levels of protection against harmful attacks. Because of their potential to detect …
View article: A Review on IoT Applications in Smart Agriculture
A Review on IoT Applications in Smart Agriculture Open
Farming plays an important role in the survival of human civilization. As our forefathers have taught us, agriculture has a long-evolutionary history that one can learn from. The Internet of Things (IoT) is used to improve crop yields. IoT…
View article: A Survey on IoT Based Intrusion Detection System and Its Security for Smart Homes
A Survey on IoT Based Intrusion Detection System and Its Security for Smart Homes Open
As more devices are connected to the internet to broaden their operational capabilities and pave the way for the Internet of Things, technology is advancing daily in the modern world (IOT). With their IOT connectivity, these IOT devices ex…
View article: AN IMPROVED SECURITY FRAMEWORK IN HEALTH CARE USING HYBRID COMPUTING
AN IMPROVED SECURITY FRAMEWORK IN HEALTH CARE USING HYBRID COMPUTING Open
Cloud computing is a new category of service that gives each customer access to a large-scale computing network. Since most cloud computing platforms provide services to a large number of people who aren't considered to be trustworthy, var…
View article: Adaptive Learning and Automatic Filtering of Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environment
Adaptive Learning and Automatic Filtering of Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environment Open
Distributed Denial of Service (DDoS) attacks has become the most powerful cyber weapon to target the businesses that operate on the cloud computing environment. The sophisticated DDoS attack affects the functionalities of the cloud service…
View article: Symmetric Measure of Network Traffic using Packet Ratio and Packet Symmetry
Symmetric Measure of Network Traffic using Packet Ratio and Packet Symmetry Open
Flood attacks on a network occur when attackers send a very high volume of traffic to a system. This leads to an exhaustion of resources of the targeted system. Such a system or infrastructure under attack won't be able to cope up with the…
View article: A Comparative Analysis of Security Methods for DDoS Attacks in the Cloud Computing Environment
A Comparative Analysis of Security Methods for DDoS Attacks in the Cloud Computing Environment Open
Cloud security is of the major concern in the deployment and protection of cloud deployment models. In this paper, detailed investigations on the recent DDoS attacks and comparative analysis of the various DDoS security solutions in the cl…