Shitharth
Shitharth
Home
Skills
Experience
Achievements
Certifications
Publications
Gallery
Contact
CV
Light
Dark
Automatic
chapter
Artificial Neural Networks for Data Processing: A Case Study of Image Classification
An Artificial Neural Network (ANN) is a data processing paradigm inspired by the way organic nervous systems, such as the brain, …
Jayaraj Ramasamy
,
R. N. Ravikumar
,
Shitharth Selvarajan
Cite
DOI
URL
Implementation of Internet of Things With Blockchain Using Machine Learning Algorithm: Enhancement of Security With Blockchain
In recent days, all networks are connected by internet and all people around the world are able to control things in their remote …
Hariprasath Manoharan
,
Abirami Manoharan
,
Shitharth Selvarajan
,
K. Venkatachalam
Cite
DOI
URL
A Novel Trust Evaluation and Reputation Data Management Based Security System Model for Mobile Edge Computing Network
In recent years, Mobile Edge Computing (MEC) has arisen as a new computing platform that pushes computational power to the edge of the …
Gouse Baig Mohammed
,
Shitharth Selvarajan
,
G. Sucharitha
Cite
DOI
URL
Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things
The security concerns surrounding edge computing have been in the forefront as the technology has become increasingly popular. There is …
Shitharth Selvarajan
,
Gouse Baig Mohammed
,
Jayaraj Ramasamy
,
R. Srivel
Cite
DOI
URL
“Palisade”—A Student Friendly Social Media Website
Nithin Katla
,
M. Goutham Kumar
,
Rohithraj Pidugu
,
Shitharth Selvarajan
Cite
DOI
URL
Classification of Normal and Anomalous Activities in a Network by Cascading C4.5 Decision Tree and K-Means Clustering Algorithms
Cascades of information are a phenomena where individuals take a new action or thought because of their influence. As such technique is …
Gouse Baig Mohammad
,
Shitharth Selvarajan
,
P. Dileep
Cite
DOI
URL
An Authentication Model with High Security for Cloud Database
The cloud computing standards are gaining an increased research interest due to various benefits they offer. Though there are so many …
Krishna Keerthi Chennam
,
Rajanikanth Aluvalu
,
Shitharth Selvarajan
Cite
DOI
URL
Data Security in Cloud Computing Using Abe-Based Access Control
Business organizations and individual users are using cloud storage for storing their data and files. Cloud storage is managed by cloud …
Rajanikanth Aluvalu
,
V. Uma Maheswari
,
Krishna Keerthi Chennam
,
Shitharth Selvarajan
Cite
DOI
URL
IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network
Industry control systems (ICS) are considered as one of the inevitable systems in this contemporary smart world. In that supervisory …
Shitharth Selvarajan
,
N. Satheesh
,
B. Praveen Kumar
,
K. Sangeetha
Cite
DOI
URL
Predicting Epidemic Outbreaks Using IOT, Artificial Intelligence and Cloud
All COVID-19 affected countries putting their efforts to deal with the outspread of this death-dealing disease in terms of …
Shitharth Selvarajan
,
Gouse Baig Mohammad
,
K. Sangeetha
Cite
DOI
URL
Cite
×