Efficient soil condition monitoring with IoT enabled intelligent farming solution

K Sudharson, B Alekhya, G Abinaya… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Intelligent farming offers real-time variable adjustment and development rate analysis to
enhance crop growth and support farmer efforts. In this project, we'll create a reliable …

Hybrid Quantum Computing and Decision Tree-Based Data Mining for Improved Data Security

K Sudharson, NS Usha, G Babu… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data mining and quantum computing have become potent methods for analyzing massive
datasets and gaining insightful conclusions. However, conventional techniques for data …

Quantum-Resistant Wireless Intrusion Detection System using Machine Learning Techniques

K Sudharson, C Rohini, AM Sermakani… - 2023 7th …, 2023 - ieeexplore.ieee.org
This paper proposes a novel and implementable hybrid algorithm for wireless intrusion
detection systems (WIDS) that combines machine learning techniques with a new post …

Enhanced Security Technique for Adhoc Transmission Using Hyper Elliptic Curve

K Sudharson, SP Panimalar, C Ambhika… - 2023 7th …, 2023 - ieeexplore.ieee.org
The popular cryptosystem technology with a realistic way to a highly secure and a smaller
encryption bit size is known as Hyper Elliptical Curve Cryptography (HECC). The key …

[HTML][HTML] Developing a reliable route protocol for mobile self-organization networks

S Li, B Gong - High-Confidence Computing, 2023 - Elsevier
Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are
widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks …

Dermatec: Transformative AI-Driven Platform for Comprehensive Skin Disease Monitoring and Dermatologist Recommendations

K Sudharson, KS Essakki… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Dermatec, a pioneering healthcare research initiative, utilizes advanced machine-learning
methods to address chronic dermatological conditions. Integrating robust data …

Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

C Subba Reddy - Computers, Materials & Continua, 2023 - ir.vignan.ac.in
Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and
creating new messages or existing message modifications. The attacker on another node …

Enhancing Web Security: An Advanced Automated Kitterman Tool for Comprehensive Network Vulnerability Detection

R Sasikumar, CS Anita, D Rajalakshmi… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Strong security is essential in the ever-changing world of web applications to ward off
potential dangers. To identify various network vulnerabilities like Cross-Site Scripting …

[PDF][PDF] Collaborative Attackers Detection and Route Optimization by Swarm Intelligent-based Q-learning in MANETs.

A Kavitha, VS Meenakshi - … Journal of Intelligent Engineering & Systems, 2024 - inass.org
Mobile Adhoc Networks (MANETs) are vulnerable to various attacks such as Black Hole
Attack (BHA), Gray Hole Attack (GHA), and Wormhole Attacks (WHA). While researchers …

Untrustworthy Mobile node isolation by belief factor in autonomous mobile network

K Dhivya, K Premkumar, K Balasaranya… - … conference on edge …, 2023 - ieeexplore.ieee.org
An Autonomous Mobile Network (AMN) is a wireless network in which no structure is
accessible. AMN has significantly assisted in many applications recently. The AMN is often …