Papers by Ms.Sangeerani Devi A
2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Nov 10, 2022
2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)

Journal of Physics: Conference Series, 2021
Blockchain’s decentralized characteristic is recognized as a potential technology to deliver secu... more Blockchain’s decentralized characteristic is recognized as a potential technology to deliver secure and safe resources. However, the existing blockchain networks cannot fulfil the transaction given the limited bandwidth for practical application demand. In this article, the cubic design of the conventional public blockchain is strengthened with the Directed Graph Probabilistic model. In the current structure, blocks of the lightweight structure are ordered in grades and width. We develop protocols to position newly created blocks in order to make them more effective and secure. It increases confidentiality and time for authentication of transactions in contrast with standard blockchain protocols and enjoys the accuracy and liveliness of blockchain. This paper introduces two potential methods for targeting opposition parties and we also show that the procedure against them is safe and stable. Experiments will generate three hundred inputs every second that is 64 times the output of B...

Journal of Physics: Conference Series, 2021
One of several traditional megaprojects is underground construction, given its long building time... more One of several traditional megaprojects is underground construction, given its long building time high building expense and possible risks. In tunnel engineering, trench boring devices are generally used to increase work performance and safety. During the tunnelling process, system has recorded vast volumes of tracking data to ensure building safety. The processing of vast real-time surveillance data also lacks successful techniques, and, in many situations, it must be performed manually that pose possible safety hazards. This paper suggests an approach for hybrid data mining (DM) to automatically process the TBM data for real-time tracking. Three separate DM strategies are merged in order to improve the operation of mining also to help security management. The sequential pattern method is executed to remove connections between TBM parameters in order to give people the expertise needed for an irregular on-site judging. A random forest model is built to identify training data in ord...

International Journal of Engineering and Advanced Technology, 2019
Recognizing savagery in recordings through CCTV is basic for requirement and investigation of rec... more Recognizing savagery in recordings through CCTV is basic for requirement and investigation of reconnaissance cameras with the plan of keeping up open wellbeing. Moreover, it will be an incredible device for securing kids and help guardians settles on a superior educated choice about their children. However, this can be a difficult drawback since detecting certain nuances with no human administration isn't entirely technical however also a conceptual problem.So, our idea is to use computer vision to develop an automated technique in detecting the violent behavior/street crime criminals through surveillance cameras installed in cities and towns. When the surveillance cameras detect the abnormal behavior, it captures the scene and generates an alert by sending the captured image to the nearby police station. Further, the CCTV cameras using Cloud trigger the near-by cameras to track the particular target and its location.

2021 10th International Conference on Internet of Everything, Microwave Engineering, Communication and Networks (IEMECON), 2021
The world of data analytics has changed forever because to the advent of big data. Data that was ... more The world of data analytics has changed forever because to the advent of big data. Data that was deemed useless just a few years ago is now seen as a valuable resource. In today's world, big data is being used widely for the discovery of new information in virtually every industry. And one of these sectors is the communication industry. Because of the development of modern technologies, data gathering has been easier, but this also brings with it a serious risk: the risk of compromising people's privacy. Individual private data must be protected from prying eyes thanks to privacy preservation. Comparative study has been done on many research methodologies such as privacy preservation mechanisms, k-anonimity, 1-diversity, t-closeness and various cryptographic algorithms has been analyzed and their performance measures on security issues has been surveyed.
Uploads
Papers by Ms.Sangeerani Devi A