M. Murugesan
YOU?
Author Swipe
View article: Optimizing Solar Panel Systems using Machine Learning and Ant Colony Optimization
Optimizing Solar Panel Systems using Machine Learning and Ant Colony Optimization Open
In this study, the optimization of solar panel systems is investigated using machine learning algorithms and Ant Colony optimization. The performance of ML models, such as Artificial Neural Network, Support Vector Machine, Decision Tree, a…
View article: Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos
Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos Open
Automatic anomaly activity detection is difficult in video surveillance applications due to variations in size, type, shape, and objects' location. The traditional anomaly detection and classification methods may affect the overall segment…
View article: Virtual Machine Consolidation for Stochastic Load Balancing in Cloud Data Center Management
Virtual Machine Consolidation for Stochastic Load Balancing in Cloud Data Center Management Open
Cloud computing is able to managing a massive quantity of growing work for the use of enterprise clients in a specified way Virtualization, which makes assumptions the network resources and makes it simple to control, is an important enabl…
View article: Threats and Emerging Developments in Cyber Security
Threats and Emerging Developments in Cyber Security Open
Cyber security plays a significant role in science. Data or information security is one of the crucial issues facing the world, when there is discussion about the rapidly growing cyber-crimes, the government and many corporations are takin…
View article: Securing ATM Transactions using Face Recognition
Securing ATM Transactions using Face Recognition Open
The implementation of ATM machines comes with the issue of being accessed by illegitimate users with valid authentication code.This project provides service to the user only when the user is legitimate or the user is verified by the legiti…
View article: Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection
Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection Open
The cloud security is one of the essential roles in cloud, here we can preserve our data into cloud storage. More and more clients would like to keep their data to PCS (public cloud servers) along with the rapid development of cloud comput…
View article: Phishing Detection Using Visual Cryptography
Phishing Detection Using Visual Cryptography Open
Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting sufferer for burglary, financial gain and other criminal activities. The first …
View article: AN EFFICIENT DEDUPLICATION MECHANISM FOR BIG DATA ANALYSIS IN CLOUD ENVIRONMENTS
AN EFFICIENT DEDUPLICATION MECHANISM FOR BIG DATA ANALYSIS IN CLOUD ENVIRONMENTS Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …