Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, network... more Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, networks, and data in developing areas. A collection of technologies and processes is at the core of cybersecurity. A network security system is a feature of network and computer (host) security. Cybercrime leads to billion-dollar losses. Given these crimes, the security of computer systems has become essential to reduce and avoid the impact of cybercrime. We propose the Logistics Decision Support Vector (LDSV) algorithm dealing with this problem. Initially, we collected the KDD Cup 99 dataset to create a network intrusion detection, such as penetrations or attacks, a prognosis model that varies between the "Non Malicious" and "Malicious" standard links. These method finds the cyber-attack category based on the behavior features. In the second step, data preprocessing should be cleaned from errors, and raw data should be converted into a prepared dataset. The third step is F...
International Journal of Electrical and Electronics Research
The detection of abnormal tumor region brain Magnetic Resonance Images (MRI) is complex task due ... more The detection of abnormal tumor region brain Magnetic Resonance Images (MRI) is complex task due to its similar structures between tumor and its surrounding regions. In this paper, Adaptive Neuro Fuzzy Inference System (ANFIS) classification method-based meningioma brain tumor detection is proposed. The proposed method consists of the following stages as preprocessing, transformation, feature extraction and classifications. The brain MR images are enhanced in preprocessing stage and this spatial domain image is converted into multi resolution image using Curvelet transform. The texture and statistical features are extracted from the transformed coefficients. These features are trained and classified by ANFIS classifier and further morphological operations are applied on the classified brain image to segment the tumor regions. This proposed meningioma tumor detection approach is analyzed in terms of sensitivity, specificity, Jaccard Similarity Index (JSI), Dice Similarity Index DSI) ...
International Journal on Recent and Innovation Trends in Computing and Communication
The wireless sensor network is the most significant largest communication device. WSN has been in... more The wireless sensor network is the most significant largest communication device. WSN has been interfacing with various wireless applications. Because the wireless application needs faster communication and less interruption, the main problem of jamming attacks on wireless networks is that jamming attack detection using various machine learning methods has been used. The reasons for jamming detection may be user behaviour-based and network traffic and energy consumption. The previous machine learning system could not present the jamming attack detection accuracy because the feature selection model of Chi-Squared didn’t perform well for jamming attack detections which determined takes a large dataset to be classified to find the high accuracy for jamming attack detection. To resolve this problem, propose a CNN-based quantum leap method that detects high accuracy for jamming attack detections the WSN-DS dataset collected by the Kaggle repository. Pre-processing using the Z-score Norma...
The software‐defined network (SDN) is one of the network architectures, in which the data plane a... more The software‐defined network (SDN) is one of the network architectures, in which the data plane and control plane is divided from each other, and the network can be handled using a sensibly centralized controller and this method is adopted to reconfigure the wireless sensor network automatically. In this article, to implement the SDN in MANET, in which control nodes can be chosen in SDN dynamically for the activation of MANET function to allocate the works to other mobile nodes to the base station. However, in the field of mobile ad hoc networks, the network lifetime, and battery lifetime is one of the major problems and the energy consumption can play a significant rule for the transmission of data in the SDN. Therefore, in this article, particle swarm optimization (PSO) based CGSR (cluster‐head gateway switch routing protocol) algorithm with fuzzy rules is proposed to increase the network lifetime of battery powered mobile nodes by reducing the energy consumptions of each node in ...
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
In cloud storage the data clients can remotely store their data and use on-demand high- quality a... more In cloud storage the data clients can remotely store their data and use on-demand high- quality applications. Data outsourcing users are reassured from the trouble of data storage and maintenance when users put their data in huge size on the cloud, the data integrity protection is a challenging one which enabling public audit for cloud data storage security. Users can ask an external inspection of third party to check the integrity of the out sourced data. However, in such a scheme, the malicious cloud might still forge valid authenticators later than the key-revelation time period if it obtains the current secret key of Data Client. In this paper, propose a prototype named Robust Key Revelation of public auditing for secure cloud storage, in which the security of cloud storage auditing not only earlier than but also later than the key revelation can be preserved. Formalized the definition and the security model of this new kind of cloud storage auditing and design a concrete scheme...
Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, network... more Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, networks, and data in developing areas. A collection of technologies and processes is at the core of cybersecurity. A network security system is a feature of network and computer (host) security. Cybercrime leads to billion-dollar losses. Given these crimes, the security of computer systems has become essential to reduce and avoid the impact of cybercrime. We propose the Logistics Decision Support Vector (LDSV) algorithm dealing with this problem. Initially, we collected the KDD Cup 99 dataset to create a network intrusion detection, such as penetrations or attacks, a prognosis model that varies between the "Non Malicious" and "Malicious" standard links. These method finds the cyber-attack category based on the behavior features. In the second step, data preprocessing should be cleaned from errors, and raw data should be converted into a prepared dataset. The third step is Feature Selection (FS) techniques often improve the feature selection process in an Intrusion Detection System (IDS) that is more convenient for using the mean of the Chi-square test (MAC) method. Finally, a classification is done to classify and detect the network intrusion detection based on LDSV for Cyber security. The proposed LDSV simulation is based on the Precision F-Measure, Recall, and Accuracy for the best result.
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), 2021
Due to the rapid urbanization and industrialization, lots of waste is generated but not properly ... more Due to the rapid urbanization and industrialization, lots of waste is generated but not properly disposed. Domiciliary wastes are also dumped either in the public places or waste land leading to various pollutions. This leads to the growth of micro-organisms which cause harmful diseases. These wastes are picked up and segregated manually by sanitation workers which may later affect their health. This paper presents a smart waste segregation model that can distinguish and separate the waste into degradable, non-degradable and also high radioactive and low radioactive waste materials. The automated waste segregator uses sensors as well as visual servoing and deep capsule network learning technologies so that human intervention is completely avoided. It ensures accurate segregation of waste into categories like paper, plastic, metal, non-metal and uncategorizable wastes. These waste products are further sent for recycling or incinerated without eliminating any hazardous gases into the atmosphere. This model is extremely beneficial during pandemic situations for contactless waste segregation as well as in safe handling of hospital waste.
2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022
Agriculture based advisory services and climatic information are more considerable in providing a... more Agriculture based advisory services and climatic information are more considerable in providing assistance for pastoralists and small farmers to manage climatic changes and risks factors to be adopted during changes. Moreover, there is some gap in providing climatic information that significantly addresses the requirement of pastoralists and farmers. Huge farmers rely over indigenous knowledge where experiences and indicators are utilized to forecast and observe weather conditions. When this prediction is inbuilt and implemented by many farmers, documentations, coordinators and so on for predicting weather, it should be accurate and reliable manner. This work concentrates on building a weather predictor system for farmers to identify the velocity flow that is needed during farming. This model includes Naives equation for performing this velocity prediction. The outcomes demonstrate that pastoralists and farmers utilize combination of biological and meteorological indications to predict weather conditions. Henceforth, it seems to be more crucial in providing assistance to enhance access to climatic information in various regions of India in vulnerable and poor resource communities.
Journal of Advanced Research in Applied Sciences and Engineering Technology
Agriculture is an essential part of our country and is only necessary for its development. The pr... more Agriculture is an essential part of our country and is only necessary for its development. The problem here is leaf spot disease, which significantly affects the growth of food production. Food production is considered one of the most important in our nation. We must detect it early and bring it under control. It is important to analyze one of the versions of leaf disease in its development. The existing system of machine learning could not give the proper prediction result of the lead disease prediction and classification. Various plant diseases affect leaf areas, and leaf areas have some black marks. Black marks are one type of leaf disease in plants. Find out the disease levels and accuracy. One standard learning method of deep learning classification has been used to classify leaf disease prediction. Here pre-processing and feature extraction using CNN and feature extraction and type using the RNN-based LSTM method are used. The data has been found in the Kaggle dataset; the tot...
Software Defined Networking (SDN) is a smart architecture which enables a network to be controlle... more Software Defined Networking (SDN) is a smart architecture which enables a network to be controlled in a centralized manner. It plays a vital role in several real-time applications and has three planes- the data plane, control plane and application plane. The architecture of SDN is simple and is inbuilt with a centralized controller at the control plane. SDN operates efficiently on Mobile Adhoc NETworks (MANET) in various environments and applications. Due to the mobility of nodes, several research issues are faced by SDN-MANET. Some of the challenges include a large overhead and less packet delivery ratio. To overcome these challenges, a Hybrid Improved Whale optimization with Particle Swarm Optimization algorithm (HIW-PSO) is proposed with Directed Acyclic Graphs (DAG) topology. This algorithm enhances the data transmission by reducing the energy hole issue. The Directed Acyclic Graphs (DAG) topology is constructed by calculating the polynomial-time for lining of all participant no...
2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022
The recent technologies that try to offer huge improvement in spectral efficiency, data rate, tra... more The recent technologies that try to offer huge improvement in spectral efficiency, data rate, transmission efficiency; throughput and improves scalability for next generation is huge Multiple Input Multiple Output (MIMO) system. This may show advantages in enormous MIMO based on propagation environment. Moreover, owing to stationary properties of MIMO, channel characterization is not more appropriate for spatial domain. Dynamic adoption is not attained in 2D channels with more possibilities and considerable 5G network capacity enhancements. Here, channel characterization of MIMO is considered and simulated.
Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, network... more Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, networks, and data in developing areas. A collection of technologies and processes is at the core of cybersecurity. A network security system is a feature of network and computer (host) security. Cybercrime leads to billion-dollar losses. Given these crimes, the security of computer systems has become essential to reduce and avoid the impact of cybercrime. We propose the Logistics Decision Support Vector (LDSV) algorithm dealing with this problem. Initially, we collected the KDD Cup 99 dataset to create a network intrusion detection, such as penetrations or attacks, a prognosis model that varies between the "Non Malicious" and "Malicious" standard links. These method finds the cyber-attack category based on the behavior features. In the second step, data preprocessing should be cleaned from errors, and raw data should be converted into a prepared dataset. The third step is F...
International Journal of Electrical and Electronics Research
The detection of abnormal tumor region brain Magnetic Resonance Images (MRI) is complex task due ... more The detection of abnormal tumor region brain Magnetic Resonance Images (MRI) is complex task due to its similar structures between tumor and its surrounding regions. In this paper, Adaptive Neuro Fuzzy Inference System (ANFIS) classification method-based meningioma brain tumor detection is proposed. The proposed method consists of the following stages as preprocessing, transformation, feature extraction and classifications. The brain MR images are enhanced in preprocessing stage and this spatial domain image is converted into multi resolution image using Curvelet transform. The texture and statistical features are extracted from the transformed coefficients. These features are trained and classified by ANFIS classifier and further morphological operations are applied on the classified brain image to segment the tumor regions. This proposed meningioma tumor detection approach is analyzed in terms of sensitivity, specificity, Jaccard Similarity Index (JSI), Dice Similarity Index DSI) ...
International Journal on Recent and Innovation Trends in Computing and Communication
The wireless sensor network is the most significant largest communication device. WSN has been in... more The wireless sensor network is the most significant largest communication device. WSN has been interfacing with various wireless applications. Because the wireless application needs faster communication and less interruption, the main problem of jamming attacks on wireless networks is that jamming attack detection using various machine learning methods has been used. The reasons for jamming detection may be user behaviour-based and network traffic and energy consumption. The previous machine learning system could not present the jamming attack detection accuracy because the feature selection model of Chi-Squared didn’t perform well for jamming attack detections which determined takes a large dataset to be classified to find the high accuracy for jamming attack detection. To resolve this problem, propose a CNN-based quantum leap method that detects high accuracy for jamming attack detections the WSN-DS dataset collected by the Kaggle repository. Pre-processing using the Z-score Norma...
The software‐defined network (SDN) is one of the network architectures, in which the data plane a... more The software‐defined network (SDN) is one of the network architectures, in which the data plane and control plane is divided from each other, and the network can be handled using a sensibly centralized controller and this method is adopted to reconfigure the wireless sensor network automatically. In this article, to implement the SDN in MANET, in which control nodes can be chosen in SDN dynamically for the activation of MANET function to allocate the works to other mobile nodes to the base station. However, in the field of mobile ad hoc networks, the network lifetime, and battery lifetime is one of the major problems and the energy consumption can play a significant rule for the transmission of data in the SDN. Therefore, in this article, particle swarm optimization (PSO) based CGSR (cluster‐head gateway switch routing protocol) algorithm with fuzzy rules is proposed to increase the network lifetime of battery powered mobile nodes by reducing the energy consumptions of each node in ...
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
In cloud storage the data clients can remotely store their data and use on-demand high- quality a... more In cloud storage the data clients can remotely store their data and use on-demand high- quality applications. Data outsourcing users are reassured from the trouble of data storage and maintenance when users put their data in huge size on the cloud, the data integrity protection is a challenging one which enabling public audit for cloud data storage security. Users can ask an external inspection of third party to check the integrity of the out sourced data. However, in such a scheme, the malicious cloud might still forge valid authenticators later than the key-revelation time period if it obtains the current secret key of Data Client. In this paper, propose a prototype named Robust Key Revelation of public auditing for secure cloud storage, in which the security of cloud storage auditing not only earlier than but also later than the key revelation can be preserved. Formalized the definition and the security model of this new kind of cloud storage auditing and design a concrete scheme...
Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, network... more Nowadays, we are moving towards cybersecurity against digital attacks to protect systems, networks, and data in developing areas. A collection of technologies and processes is at the core of cybersecurity. A network security system is a feature of network and computer (host) security. Cybercrime leads to billion-dollar losses. Given these crimes, the security of computer systems has become essential to reduce and avoid the impact of cybercrime. We propose the Logistics Decision Support Vector (LDSV) algorithm dealing with this problem. Initially, we collected the KDD Cup 99 dataset to create a network intrusion detection, such as penetrations or attacks, a prognosis model that varies between the "Non Malicious" and "Malicious" standard links. These method finds the cyber-attack category based on the behavior features. In the second step, data preprocessing should be cleaned from errors, and raw data should be converted into a prepared dataset. The third step is Feature Selection (FS) techniques often improve the feature selection process in an Intrusion Detection System (IDS) that is more convenient for using the mean of the Chi-square test (MAC) method. Finally, a classification is done to classify and detect the network intrusion detection based on LDSV for Cyber security. The proposed LDSV simulation is based on the Precision F-Measure, Recall, and Accuracy for the best result.
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), 2021
Due to the rapid urbanization and industrialization, lots of waste is generated but not properly ... more Due to the rapid urbanization and industrialization, lots of waste is generated but not properly disposed. Domiciliary wastes are also dumped either in the public places or waste land leading to various pollutions. This leads to the growth of micro-organisms which cause harmful diseases. These wastes are picked up and segregated manually by sanitation workers which may later affect their health. This paper presents a smart waste segregation model that can distinguish and separate the waste into degradable, non-degradable and also high radioactive and low radioactive waste materials. The automated waste segregator uses sensors as well as visual servoing and deep capsule network learning technologies so that human intervention is completely avoided. It ensures accurate segregation of waste into categories like paper, plastic, metal, non-metal and uncategorizable wastes. These waste products are further sent for recycling or incinerated without eliminating any hazardous gases into the atmosphere. This model is extremely beneficial during pandemic situations for contactless waste segregation as well as in safe handling of hospital waste.
2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022
Agriculture based advisory services and climatic information are more considerable in providing a... more Agriculture based advisory services and climatic information are more considerable in providing assistance for pastoralists and small farmers to manage climatic changes and risks factors to be adopted during changes. Moreover, there is some gap in providing climatic information that significantly addresses the requirement of pastoralists and farmers. Huge farmers rely over indigenous knowledge where experiences and indicators are utilized to forecast and observe weather conditions. When this prediction is inbuilt and implemented by many farmers, documentations, coordinators and so on for predicting weather, it should be accurate and reliable manner. This work concentrates on building a weather predictor system for farmers to identify the velocity flow that is needed during farming. This model includes Naives equation for performing this velocity prediction. The outcomes demonstrate that pastoralists and farmers utilize combination of biological and meteorological indications to predict weather conditions. Henceforth, it seems to be more crucial in providing assistance to enhance access to climatic information in various regions of India in vulnerable and poor resource communities.
Journal of Advanced Research in Applied Sciences and Engineering Technology
Agriculture is an essential part of our country and is only necessary for its development. The pr... more Agriculture is an essential part of our country and is only necessary for its development. The problem here is leaf spot disease, which significantly affects the growth of food production. Food production is considered one of the most important in our nation. We must detect it early and bring it under control. It is important to analyze one of the versions of leaf disease in its development. The existing system of machine learning could not give the proper prediction result of the lead disease prediction and classification. Various plant diseases affect leaf areas, and leaf areas have some black marks. Black marks are one type of leaf disease in plants. Find out the disease levels and accuracy. One standard learning method of deep learning classification has been used to classify leaf disease prediction. Here pre-processing and feature extraction using CNN and feature extraction and type using the RNN-based LSTM method are used. The data has been found in the Kaggle dataset; the tot...
Software Defined Networking (SDN) is a smart architecture which enables a network to be controlle... more Software Defined Networking (SDN) is a smart architecture which enables a network to be controlled in a centralized manner. It plays a vital role in several real-time applications and has three planes- the data plane, control plane and application plane. The architecture of SDN is simple and is inbuilt with a centralized controller at the control plane. SDN operates efficiently on Mobile Adhoc NETworks (MANET) in various environments and applications. Due to the mobility of nodes, several research issues are faced by SDN-MANET. Some of the challenges include a large overhead and less packet delivery ratio. To overcome these challenges, a Hybrid Improved Whale optimization with Particle Swarm Optimization algorithm (HIW-PSO) is proposed with Directed Acyclic Graphs (DAG) topology. This algorithm enhances the data transmission by reducing the energy hole issue. The Directed Acyclic Graphs (DAG) topology is constructed by calculating the polynomial-time for lining of all participant no...
2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022
The recent technologies that try to offer huge improvement in spectral efficiency, data rate, tra... more The recent technologies that try to offer huge improvement in spectral efficiency, data rate, transmission efficiency; throughput and improves scalability for next generation is huge Multiple Input Multiple Output (MIMO) system. This may show advantages in enormous MIMO based on propagation environment. Moreover, owing to stationary properties of MIMO, channel characterization is not more appropriate for spatial domain. Dynamic adoption is not attained in 2D channels with more possibilities and considerable 5G network capacity enhancements. Here, channel characterization of MIMO is considered and simulated.
Uploads
Papers by sahaya sheela