Papers by JAYANTHI KANNAN
Journal of emerging technologies and innovative research, Feb 1, 2019
nternational journal of communication networks and information security, Dec 31, 2022
Recommender system provides the significant suggestion towards the effective service offers for t... more Recommender system provides the significant suggestion towards the effective service offers for the vast range of big data. The Internet of Things (IoT) environment exhibits the value added application services to the customer with the provision of the effective collection and processing of information. In the extension of the IoT, Internet of Medical Things (IoMT) is evolved for the patient healthcare monitoring and processing. The data collected from the IoMT are stored and processed with the cognitive system for the data transmission between the users. However, in the conventional system subjected to challenges of processing big data while transmission with the cognitive radio network. In this paper, developed a effective cognitive 5G communication model with the recommender model for the IoMT big data processing. The proposed model is termed as Ranking Strategy Internet of Medical Things (RSIoMT). The proposed RSIoMT model uses the distance vector estimation between the feature variables with the ranking. The proposed RSIoMT model perform the recommender model with the ranking those are matches with the communication devices for improved wireless communication quality. The proposed system recommender model uses the estimation of direct communication link between the IoMT variables in the cognitive radio system. The proposed RSIoMT model evaluates the collected IoMT model data with the consideration of the four different healthcare datasets for the data transmission through cognitive radio network. Through the developed model the performance of the system is evaluated based on the deep learning
International journal of engineering research and technology, 2020
CRC Press eBooks, May 15, 2024
International journal of engineering research and technology, Jul 30, 2018
Electronics, Mar 16, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Security doesn't begin and end with the enterprise. In a world of uncertainty, with growing t... more Security doesn't begin and end with the enterprise. In a world of uncertainty, with growing turbulence in many regions, it makes sense to ensure our home and office is safe. In our paper we are going to discuss about Cyber Crimes and the use of Free and Open Source Software's to Detoxify Cyber Crime Attacks in an End User Perspective. Protecting our personal Information and Cyber security is a demanding task for all web users. Protecting our laptop and desktop computers by installing and updating anti-virus security software will prevent Spreading of malwares. Preventing unauthorized devices connecting to our computers and disabling the Autorun functionality will prevent spreading of viruses among devices like USB, computers and through network. To ensure protection and to avoid Cyber-attacks end users need to know the available free services and software's to reengineer the effectiveness of Information to Detoxify Cyber Crime Attacks. Cyber hacker's causes damage to personal Data, loss of money, dissatisfaction, business and financial losses. End Users need to implement appropriate preventive measures to protect their Personal Data from any such damages.
Computer systems science and engineering, 2022
Gene expression refers to the process in which the gene information is used in the functional gen... more Gene expression refers to the process in which the gene information is used in the functional gene product synthesis. They basically encode the proteins which in turn dictate the functionality of the cell. The first step in gene expression study involves the clustering usage. This is due to the reason that biological networks are very complex and the genes volume increases the comprehending challenges along with the data interpretation which itself inhibit vagueness, noise and imprecision. For a biological system to function, the essential cellular molecules must interact with its surrounding including RNA, DNA, metabolites and proteins. Clustering methods will help to expose the structures and the patterns in the original data for taking further decisions. The traditional clustering techniques involve hierarchical, model based, partitioning, density based, grid based and soft clustering methods. Though many of these methods provide a reliable output in clustering, they fail to incorporate huge data of gene expressions. Also, there are statistical issues along with choosing the right method and the choice of dissimilarity matrix when dealing with gene expression data. We propose to use a modified clustering algorithm using representatives (M-CURE) in this work which is more robust to outliers as compared to K-means clustering and also able to find clusters with size variances.
Computer systems science and engineering, 2022
Social Science Research Network, 2022
International Journal of Communication Networks and Information Security (IJCNIS)
Recommender system provides the significant suggestion towards the effective service offers for t... more Recommender system provides the significant suggestion towards the effective service offers for the vast range of big data. The Internet of Things (IoT) environment exhibits the value added application services to the customer with the provision of the effective collection and processing of information. In the extension of the IoT, Internet of Medical Things (IoMT) is evolved for the patient healthcare monitoring and processing. The data collected from the IoMT are stored and processed with the cognitive system for the data transmission between the users. However, in the conventional system subjected to challenges of processing big data while transmission with the cognitive radio network. In this paper, developed a effective cognitive 5G communication model with the recommender model for the IoMT big data processing. The proposed model is termed as Ranking Strategy Internet of Medical Things (RSIoMT). The proposed RSIoMT model uses the distance vector estimation between the feature ...
2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)
Electronics
The network security and cloud environment have been playing vital roles in today’s era due to in... more The network security and cloud environment have been playing vital roles in today’s era due to increased network data transmission, the cloud’s elasticity, pay as you go and global distributed resources. A recent survey for the cloud environment involving 300 organizations in North America with 500 or more employees who had spent a minimum of USD 1 million on cloud infrastructure, as per March 2022 statistics, stated that 79% of organizations experienced at least one cloud data breach. In the year 2022, the AWS cloud provider leads the market share with 34% and a USD 200 billion cloud market, proving important and producing the motivation to improve the detection of intrusion with respect to network security on the basis of the AWS cloud dataset. The chosen CSE-CIC-IDS-2018 dataset had network attack details based on the real time attack carried out on the AWS cloud infrastructure. The proposed method here is the hybrid deep learning based approach, which uses the raw data first to ...
International Journal of Communication Networks and Information Security (IJCNIS)
In today's competitive business environment, exponential increase of multimodal content resul... more In today's competitive business environment, exponential increase of multimodal content results in a massive amount of shapeless data. Big data that is unstructured has no specific format or organisation and can take any form, including text, audio, photos, and video. Many assumptions and algorithms are generally required to recognize different emotions as per literature survey, and the main focus for emotion recognition is based on single modality, such as voice, facial expression and bio signals. This paper proposed the novel technique in multimodal sentiment sensing with emotion recognition using artificial intelligence technique. Here the audio and visual data has been collected based on social media review and classified using hidden Markov model based extreme learning machine (HMM_ExLM). The features are trained using this method. Simultaneously, these speech emotional traits are suitably maximised. The strategy of splitting areas is employed in the research for expression...
International Journal of Computer Applications
Climate change and pests" attacks have a high impact on the healthy harvest in our country. A far... more Climate change and pests" attacks have a high impact on the healthy harvest in our country. A farmer can ensure the healthy production of his labor if he accurately and timely detects plant diseases. Earlier, disease detection was a manual job and it was impractical also. Now with the advancement of technology various Machine Leaning and Deep Leaning technologies are on a verge of replacing manual labor for leaf disease detection. Plant leaf disease detection using leaf images has now become a hot topic for many researchers. Here we have analyzed the model"s efficiency in various research papers which has incorporated Machine learning (ML) or Deep Learning (DL) technique. Some papers used only Image segmentation for leaf disease detection but these models were quite inefficient and inaccurate but managed to differentiate infected parts from healthy leaves. However, Image segmentation in combination with either machine learning or deep learning models improves leaf disease detection. Image segmentation helps in segmenting the infected part of the leaf from large data set and then feeds this result to aMachine Learning or Deep Learning model. The large data set usually has high noise. Hence, prepossessing also plays a vital role in the prediction of disease.
2022 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)
Malware is a term that describes malicious software that is used to infect individual computers o... more Malware is a term that describes malicious software that is used to infect individual computers or an entire system. Malware is one of the most significant security risks that exists today on the Internet. Currently, the volume of malware is increasing at a quicker rate each year, posing a serious global security issue. Detecting malware with traditional signature-based methods is becoming more and more difficult because all modern malware applications have a lot of different layers to hide from detection or use side mechanisms to automatically upgrade to a newer version at short intervals to avoid detection by any antivirus software. In this study, we define malware and malware types in general, as well as a novel machine learning-based approach for detecting malware that is both effective and efficient, which we describe in detail in the following sections.
2021 6th International Conference on Communication and Electronics Systems (ICCES)
In today's world, the data storage is getting increased due to (i) business and banking infor... more In today's world, the data storage is getting increased due to (i) business and banking information, (ii) personalized data, (iii) research improvements on the field of data retrieval, pattern and future prediction over the retrieved data, (iv) improvement in machine learning algorithms, (v) social media and (vi) higher e-mail transactions. If the information value is higher, then that increases possibility and attracts hacker towards the available or transacted information. This clearly says that the field area of research is very much in need to focus and further improvement towards authentication security. The authentication security can be provided by using some devices like (i) finger print sensor, (ii) face recognition devices, etc., but these leads to additional cost and additional device dependent which reduces the ease approach of authentication. When the authentication mechanism need to be improved without any additional sensors then the password entering scheme will come into the picture and this password entering mechanism can be researched and improved better. This leads to the found, bag of password approach. In the bag of password technique, the major issue found is on the end user side to remember multiple passwords for authentication purpose. This issue is been addressed by making the uniform distribution passwords and reducing probability of every password occurrence at least once. As a result here for the proposed technique, the best programmatic language will be selected from the three trending programming languages like PHP, Python and Java to implement and recommending those based on various aspects for authentication mechanism.
Uploads
Papers by JAYANTHI KANNAN