Hybrid deep learning neural system for brain tumor detection

K Sudharson, AM Sermakani… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Image classification is among the most important responsibilities in medical visual
assessment and is typically the first and foremost basic progression in numerous medical …

[PDF][PDF] Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography.

B Murugeshwari, D Selvaraj… - … Automation & Soft …, 2023 - cdn.techscience.cn
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique
that protects the privacy of individual data while mining those data. The most significant task …

Efficient soil condition monitoring with IoT enabled intelligent farming solution

K Sudharson, B Alekhya, G Abinaya… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Intelligent farming offers real-time variable adjustment and development rate analysis to
enhance crop growth and support farmer efforts. In this project, we'll create a reliable …

[PDF][PDF] Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET.

SN Pari, K Sudharson - Computer Systems Science & …, 2023 - cdn.techscience.cn
A self-contained connection of wireless links that functions without any infrastructure is
known as Mobile Ad Hoc Network (MANET). A MANET's nodes could engage actively and …

Secure android location tracking application with privacy enhanced technique

D Dhinakaran, MR Khanna… - 2022 fifth …, 2022 - ieeexplore.ieee.org
In today's world, tracking the position of an Android device has become a must. There have
been a slew of effective retrieval strategies, such as Google's Find My Device, but they fall …

[PDF][PDF] Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation.

B Murugeshwari, S Rajalakshmi… - … Systems Science & …, 2023 - cdn.techscience.cn
Imagine numerous clients, each with personal data; individual inputs are severely corrupt,
and a server only concerns the collective, statistically essential facets of this data. In several …

Secure Authentication scheme using CEEK technique for Trusted Environment

K Sudharson, M Akshaya, M Lokeswari… - 2022 International …, 2022 - ieeexplore.ieee.org
Distributed computing is imperative to move the IT area forward, yet cloud information
security is essential. Unfortunately, the veracity of cloud information is at serious risk …

[PDF][PDF] Secure and energy concise route revamp technique in wireless sensor networks

SMU Sankar, MS Christo… - … Automation and Soft …, 2023 - cdn.techscience.cn
Energy conservation has become a significant consideration in wireless sensor networks
(WSN). In the sensor network, the sensor nodes have internal batteries, and as a result, they …

[PDF][PDF] An enhanced trust-based secure route protocol for malicious node detection

SN Pari, K Sudharson - Intelligent Automation & Soft …, 2023 - pdfs.semanticscholar.org
The protection of ad-hoc networks is becoming a severe concern because of the absence of
a central authority. The intensity of the harm largely depends on the attacker's intentions …

[PDF][PDF] Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes.

SM Sankar, ST Revathi… - … Systems Science & …, 2023 - researchgate.net
An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over a
wireless link to a target node, direct or indirect, through a series of nodes. ASN becomes a …