IoT-Based solution for paraplegic sufferer to send signals to physician via internet

L Srinivasan, D Selvaraj, D Dhinakaran… - arXiv preprint arXiv …, 2023 - arxiv.org
We come across hospitals and non-profit organizations that care for people with paralysis
who have experienced all or portion of their physique being incapacitated by the paralyzing …

Outsourced analysis of encrypted graphs in the cloud with privacy protection

D Selvaraj, SM Sankar, D Dhinakaran… - arXiv preprint arXiv …, 2023 - arxiv.org
Huge diagrams have unique properties for organizations and research, such as client
linkages in informal organizations and customer evaluation lattices in social channels. They …

Preserving data confidentiality in association rule mining using data share allocator algorithm

D Dhinakaran, PM Prathap - arXiv preprint arXiv:2304.14605, 2023 - arxiv.org
These days, investigations of information are becoming essential for various associations all
over the globe. By and large, different associations need to perform information …

Assistive system for the blind with voice output based on optical character recognition

D Dhinakaran, D Selvaraj, SM Udhaya Sankar… - … : Proceedings of ICICC …, 2022 - Springer
Everyone deserves to live freely, even those who are impaired. In recent decades,
technology has focused on empowering disabled people to have as much control over their …

Ensuring privacy of data and mined results of data possessor in collaborative ARM

D Dhinakaran, PM Joe Prathap - Pervasive Computing and Social …, 2022 - Springer
The usage of the data mining (DM) technique has rapidly increased in the recent era. Most
organizations utilize DM for forecasting their goals and for predicting various possibilities of …

[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.

B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …

Automatic waste management based on IoT using a wireless sensor network

G Gomathy, P Kalaiselvi, D Selvaraj… - … conference on edge …, 2022 - ieeexplore.ieee.org
Improper waste disposal causes hazard to human health and environmental pollution while
causing a desire for a successful and significant series of waste materials. However, due to …

[PDF][PDF] Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET.

SN Pari, K Sudharson - Computer Systems Science & …, 2023 - cdn.techscience.cn
A self-contained connection of wireless links that functions without any infrastructure is
known as Mobile Ad Hoc Network (MANET). A MANET's nodes could engage actively and …

Secure android location tracking application with privacy enhanced technique

D Dhinakaran, MR Khanna… - 2022 fifth …, 2022 - ieeexplore.ieee.org
In today's world, tracking the position of an Android device has become a must. There have
been a slew of effective retrieval strategies, such as Google's Find My Device, but they fall …

[PDF][PDF] Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation.

B Murugeshwari, S Rajalakshmi… - … Systems Science & …, 2023 - cdn.techscience.cn
Imagine numerous clients, each with personal data; individual inputs are severely corrupt,
and a server only concerns the collective, statistically essential facets of this data. In several …