Shitharth
Shitharth
Home
Skills
Experience
Achievements
Certifications
Publications
Gallery
Contact
CV
Light
Dark
Automatic
article-journal
Deep Conviction Systems for Biomedical Applications Using Intuiting Procedures With Cross Point Approach
The production, testing, and processing of signals without any interpretation is a crucial task with time scale periods in …
Hariprasath Manoharan
,
Shitharth Selvarajan
,
Ayman Yafoz
,
Hassan A. Alterazi
,
Mueen Uddin
,
Chin-Ling Chen
,
Chih-Ming Wu
Cite
URL
Design of Soccer League Optimization Based Hybrid Controller for Solar-Battery Integrated UPQC
Nowadays, integration of renewable energy source like solar, wind etc in the grid is encouraged to reduce the losses and meet the …
Koganti Srilakshmi
,
Nakka Srinivas
,
Praveen Kumar Balachandran
,
Jonnala Ganesh Prasad Reddy
,
Sravanthy Gaddameedhi
,
Nagaraju Valluri
,
Shitharth Selvarajan
Cite
DOI
URL
Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications
Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation …
J. Divakaran
,
S. K. Prashanth
,
Gouse Baig Mohammad
,
Shitharth Selvarajan
,
Sachi Nandan Mohanty
,
C. Arvind
,
K. Srihari
,
Venkatesa Prabhu Sundramurthy
Cite
DOI
URL
Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation
There can be many inherent issues in the process of managing cloud infrastructure and the platform of the cloud. The platform of the …
Manikandan Thirumalaisamy
,
Shajahan Basheer
,
Shitharth Selvarajan
,
Sara A. Althubiti
,
Fayadh Alenezi
,
Gautam Srivastava
,
Jerry Chun-Wei Lin
Cite
DOI
URL
Perception Exploration on Robustness Syndromes With Pre-processing Entities Using Machine Learning Algorithm
The majority of the current-generation individuals all around the world are dealing with a variety of health-related issues. The most …
Pravin R. Kshirsagar
,
Hariprasath Manoharan
,
Shitharth Selvarajan
,
Hassan A. Alterazi
,
Dilbag Singh
,
Heung-No Lee
Cite
URL
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). …
Hassan A. Alterazi
,
Pravin R. Kshirsagar
,
Hariprasath Manoharan
,
Shitharth Selvarajan
,
Nawaf Alhebaishi
,
Gautam Srivastava
,
Jerry Chun-Wei Lin
Cite
DOI
URL
Probabilistic Framework Allocation on Underwater Vehicular Systems Using Hydrophone Sensor Networks
This article emphasis the importance of constructing an underwater vehicle monitoring system to solve various issues that are related …
Pravin R. Kshirsagar
,
Hariprasath Manoharan
,
Shitharth Selvarajan
,
Abdulrhman M. Alshareef
,
Dilbag Singh
,
Heung-No Lee
Cite
DOI
URL
Three-phase service level agreements and trust management model for monitoring and managing the services by trusted cloud broker
Cloud computing is an environment where everything is provided as a service based on demand. It follows pay as per the used model in …
Muralidharan C
,
Mohamed Sirajudeen Y
,
Shitharth Selvarajan
,
Nawaf Alhebaishi
,
Rayan H. Mosli
,
Hassan Haes Alhelou
Cite
DOI
URL
Impact of Big Data Analysis on Nanosensors for Applied Sciences Using Neural Networks
In the current-generation wireless systems, there is a huge requirement on integrating big data which can able to predict the market …
Shitharth Selvarajan
,
Pratiksha Meshram
,
Pravin R. Kshirsagar
,
Hariprasath Manoharan
,
Vineet Tirth
,
Venkatesa Prabhu Sundramurthy
Cite
DOI
URL
Integrated Machine Learning Model for an URL Phishing Detection
The problem of phishing attacks in enterprise is next issue rising in wide scale and complexity, as phishers use email phishing via …
Gouse Baig Mohammad
,
Shitharth Selvarajan
,
Puranam Revanth Kumar
Cite
URL
«
»
Cite
×