Papers by Palanivel Kuppusamy
Advances in systems analysis, software engineering, and high performance computing book series, Jun 30, 2023
Advances in computational intelligence and robotics book series, Jun 16, 2023
Computing Technology Research Journal
Integrating deep learning with learning management systems can result in intelligent course mater... more Integrating deep learning with learning management systems can result in intelligent course material and high accuracy without any manual intervention. This paper reviews factors that influence deep learning in education, and hence this article aims to achieve deep learning on a large scale in the smart education system with a deep learning model to predict. The proposed model can reduce development and maintenance costs, reduce risks, and facilitate communication between stakeholders.
Advances in educational technologies and instructional design book series, Feb 17, 2023
Proceedings of International Conference on Deep Learning, Computing and Intelligence
Des systemes et un procede pour effectuer une etude de marche sur des repondants a l'aide de ... more Des systemes et un procede pour effectuer une etude de marche sur des repondants a l'aide de dispositifs mobiles. Les donnees relatives au comportement des repondants mobiles sont exploitees pour la mise en oeuvre d'applications d'etude de marche plus efficaces telles que des enquetes. L'utilisation d'un comportement d'un repondant mobile permet a une entreprise d'etude de marche de mettre en oeuvre une etude de marche liee specifiquement a ce comportement. Les applications d'etude de marche peuvent etre transmises a un repondant mobile a l'aide de differents mecanismes tels que des messages push, des messages textes, des messages SRS, des courriels, etc. De plus, les repondants mobiles peuvent telecharger et installer une application qui leur permet d'acceder rapidement aux application d'etude de marche et de transmettre les donnees d'etude de marche.
In this paper three tier perspectives of the educational data warehousing has been proposed to ab... more In this paper three tier perspectives of the educational data warehousing has been proposed to abstract ontologies from structural metadata of relational databases which are the resultant of ETL processing as well as generating reports from the data refined from the ETL Processing .With the help of ontologies it is able to find the connotative semantic association, then intellect these relations to get exact ETL rules which can be used to direct the ETL processes and assist the performing of DWH project and generating the reports to facilitate the administrative nontechnical persons to make decisions and forecast the future of the academic organization accordingly.
International Journal of Computer Trends and Technology, 2020
Digital transformation is all set to change the face of education towards the coming decade. Alon... more Digital transformation is all set to change the face of education towards the coming decade. Along with technology, the transformation is bound to be a parallel shift across learning. Today, technology like the Internet of Things, augmented reality, artificial intelligence, blockchain, cloud technology, mobile internet, machine learning, deep learning, etc. have the potential to add significant business value. These technologies play a major role to shift from traditional education to smart education. Smart education is one of the main segments with the biggest impact in the smart environment. The objective of this research is to study the emerging technologies that are used to design smart education system. With these emerging technologies, education is becoming an intelligent, institutive and ubiquitous. The emerging technologies increase the effectiveness and enhancing the efficiency of smart education.
Journal of Computing and Information Technology
Peer to Peer Information Exchange (PIE) is a technique to improve the data availability using dat... more Peer to Peer Information Exchange (PIE) is a technique to improve the data availability using data present within the peers in the network. Network Coding (NC) which gives a set of combined data dissemination procedure to improves the transmission efficiency of the network. These two techniques are merged in such a way that the PIE can be performed in much improved way. But immense problem concerned with the technique is that the performance degrades gradually with increase in the number of peers in the network. Clustering approach is proved to be more efficient for solving the scalability issues in large networks. Thus in this paper, we have presented a detailed study on the techniques like PIE, NC and clustering from the view of their requirement, merits and demerits and performance improvement on their combine usage. In this paper, we have also provided a distant view of Co-operative P2P Information Exchange (cPIE) which incorporates clustering technique in the existing PIE with ...
This article provides an up-to-date survey of secure delegation authentication protocol. Portable... more This article provides an up-to-date survey of secure delegation authentication protocol. Portable devices play a major role in our daily routine life. For portable communication Systems authentication is needed to provide data security and user privacy. A secure delegation based authentication protocol is used to provide authentication, Ellipctical curve cryptography is used for authentication in portable communication systems.It will restricts Denail Of service attacks.Reduces computational cost while authenticating a communication session. User Unlink ability is achievied.In this paper we propose a protocol with the help of quantum cryptography using quantum key distribution mechanism for detecting eavesdropping by the third party.
Web service composition is a network technology with the aim of merging information commencing fr... more Web service composition is a network technology with the aim of merging information commencing from more than one resource into a solitary web application. This practice affords extraordinary type of masterpiece application that aims to incorporate data from manifold facts providers depending on the consumer’s demand. In accumulation, composition results in web service may expose isolation sensitive information or personalized data. When imposing a traditional privacy preserving model and negotiation, the composition service data would suffer from the problem of privacy attacks. In this paper we propose a new dynamic privacy model, by designing anonymization techniques for protecting the composition results from privacy attacks before the final result is returned by the mediator. Here, we use e-Epidemiological Scenario in which patient’s details are prevented from privacy attacks. We use this model for managing the trustworthiness of Web services involved in web service compositions...
"Web applications are becoming the dominant way to provide access to online services and als... more "Web applications are becoming the dominant way to provide access to online services and also a valuable target for security attacks. As the use of web applications for critical services has increased, the sophistication of attacks against these applications has grown as well. To protect web applications several intrusion detection systems have been proposed. In this paper, several techniques which are meant for detection of web application related attacks and their advantages and disadvantages are presented. Furthermore, the common web application attacks which are vulnerable to the web application are discussed. Finally, this study concludes with an analysis of challenges to overcome for the detection of web application attack that still remain to be resolved. "
Web services are software components designed to support interoperable machine-to-machine interac... more Web services are software components designed to support interoperable machine-to-machine interaction over a network. The adoption of web services as a delivery mode in business has fostered a new paradigm shift from the development of monolithic applications to the dynamic setup of business process. Service users are not knowledgement about all the different types of web services. Hence, Web Service Recommender System (WSRS) is needed to provide quality of service to the users. These web service recommendation systems use collaborative filtering algorithm to deliver the most relevant data for the given queries. In this paper, we include investigating the correlation between different QoS properties, and detecting malicious users with inaccurate QoS information. Service-oriented computing (SOC) enables organizations and individual users to discover openly-accessible capabilities realized as services over the Internet. We also introduce a web service recommender system that proactive...
wireless sensors having limited capabilities, because of these factors sensors possess huge attac... more wireless sensors having limited capabilities, because of these factors sensors possess huge attacks like sinkhole, worm hole, Sybil, flooding, etc. a lot of research work already done, but no one implemented secure routing protocol to mitigate all these attacks. Some proposals came on security of wireless sensor network which controlled only one or two attacks. We proposed Secure Routing in Cluster based Wireless Sensor Networks (SRECWSN) with access control mechanism, which has developed on Elliptic Curve Cryptography. Cluster topology is suitable for low power devices like sensors and provides efficient secure routing. Compare to RSA, Elliptic Curve Cryptography gives great security and it takes less memory.
International Journal of Engineering Science
Abstract: Service Versioning is a hot topic that has generated a broad range of guidance from a v... more Abstract: Service Versioning is a hot topic that has generated a broad range of guidance from a variety of sources. Several Web services standardization efforts are underway but none of them address the problem of service versioning. Service versioning with metadata in e-learning ...
Uploads
Papers by Palanivel Kuppusamy