S. Muthurajkumar
YOU?
Author Swipe
View article: An intelligent IDS using bagging based fuzzy CNN for secured communication in vehicular networks
An intelligent IDS using bagging based fuzzy CNN for secured communication in vehicular networks Open
Internet of Vehicles consists of vehicular nodes that communicate with each other for making intelligent transportation systems, where cyber physical attacks are increasing continuously. Intrusion Detection System (IDS) is able to provide …
View article: Chaotic gradient based optimization with fuzzy temporal optimized CNN for heart failure prediction
Chaotic gradient based optimization with fuzzy temporal optimized CNN for heart failure prediction Open
Heart failure is a leading cause of premature death, especially among individuals with a sedentary lifestyle. Early and accurate detection is essential to prevent the progression of this situation. However, many existing prediction systems…
View article: A scheme of opinion search & relevant product recommendation in social networks using stacked DenseNet121 classifier approach
A scheme of opinion search & relevant product recommendation in social networks using stacked DenseNet121 classifier approach Open
Traditional methods have resulted in lower-quality search results with a lower accuracy rate. This problem is addressed and a recommended technique using deep learning methods is provided with the goal of improving prediction quality. Via …
View article: Decentralized Web Hosting Service Using IPFS and Ethereum Blockchain
Decentralized Web Hosting Service Using IPFS and Ethereum Blockchain Open
On the Internet, web applications are served from a centralized location i.e., server, for higher maintainability. However, in the centralized architecture, if there is an occurrence of server failure or crash, the web applications cannot …
View article: Data Fault Detection Using Minimum Redundancy Maximum Relevance in Combination with Support Vector
Data Fault Detection Using Minimum Redundancy Maximum Relevance in Combination with Support Vector Open
Wireless Sensor Network (WSN) refers to a network of devices that can communicate the informa- tion gathered from a monitored field through wireless links. WSNs measures environmental conditions like temperature, sound, pollution levels, h…
View article: Referee report. For: Automated segmentation of endometriosis using transfer learning technique [version 2; peer review: 1 approved]
Referee report. For: Automated segmentation of endometriosis using transfer learning technique [version 2; peer review: 1 approved] Open
View article: Referee report. For: Automated segmentation of endometriosis using transfer learning technique [version 1; peer review: 1 approved]
Referee report. For: Automated segmentation of endometriosis using transfer learning technique [version 1; peer review: 1 approved] Open
View article: Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks
Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks Open
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Network (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a c…
View article: An Efficient Privacy-Preserving Ranked Keyword Search Method
An Efficient Privacy-Preserving Ranked Keyword Search Method Open
The keyword searching algorithm plays a vital role in cloud computing Architecture. Here, the searching technique is applied as a tool to encrypted data set which is outsourced. This technique works well, by either directed on multi keywor…
View article: Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud
Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud Open
Security of data stored in the cloud databases is a challenging and complex issue to be addressed due to the presence of malicious attacks, data breaches and unsecured access points. In the past, many researchers proposed security mechanis…
View article: A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge
A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge Open
The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM).The goal is to protect the privacy of stored data at edge d…
View article: Region based Facial Expression Recognition using Gradient Directions
Region based Facial Expression Recognition using Gradient Directions Open
Facial Expression Recognition (FER) has gained significant importance in the research field of Affective Computing in different extents. As a part of the different dimensional thinking, aiming at improving the accuracy of the recognition s…
View article: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks Open
Intrusion detection systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known types of attacks. However, it neglects to recog…
View article: Data Storage and Retrieval with Deduplication in Secured Cloud Storage
Data Storage and Retrieval with Deduplication in Secured Cloud Storage Open
The Cloud Storage can be depicted as a service model where raw or processed data is stored, handled, and backed-up remotely while accessible to multiple users simultaneously over a network. Few of the ideal features of cloud storage is rel…
View article: Secured Storage for Cloud Based Relational Database Management Systems
Secured Storage for Cloud Based Relational Database Management Systems Open
The Cloud database system is a new trend which anticipated to reshape all developments in computer technology.The data outsourced may be confidential which results in encryption of the documents.The proposed system applies encryption techn…
View article: Secured Temporal Log Management Techniques for Cloud
Secured Temporal Log Management Techniques for Cloud Open
Log Management has been an important service in Cloud Computing. In any business, maintaining the log records securely over a particular period of time is absolutely necessary for various reasons such as auditing, forensic analysis, eviden…