Balamanigandan Ramachandran

Balamanigandan Ramachandran
Saveetha University · CSE Department

About

29
Publications
28,908
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
363
Citations
Introduction

Publications

Publications (29)
Article
Full-text available
As the demand for robust and secure biometric authentication systems continues to rise, this research presents "SmartIris ML," a cutting-edge approach that harnesses the power of machine learning to enhance multi-biometric iris recognition. Leveraging the unique and distinct features of the iris, our system integrates multiple modalities through a...
Chapter
Countless sensors embedded in IoT devices produce an ocean of data. The quality of IoT services depends on this information; hence, its accuracy is critical. Unfortunately, noise, collision, unreliable network connectivity, failed equipment, and manual system shutdown are all common causes of missing and partial values in IoT data. The use of predi...
Chapter
The term “Internet of Things” (IoT) refers to interacting with commonplace items that are networked together through wireless sensors. This fast-developing technology has the potential to enhance the standard of treatment that patients receive greatly. Many wearable devices are used in the e-healthcare system to monitor vital signs, such as a patie...
Article
Full-text available
The Wireless Sensor Network (WSN) facilities were advanced in several digital wireless applications. However, managing the energy feature constraints is the main concern for maintaining optimal WSN performance. The clustering methods with other energy optimal protocols were implemented in the past, but the problems still do not end because of the m...
Article
The development of reliable stock market models has enabled investors to make better-informed decisions. Investors may be able to locate companies that offer the highest dividend yields and lower their investment risks by using a trading strategy. The degree to which stock prices are significantly correlated, however, makes stock market analysis mo...
Article
Full-text available
This work presents a deep learning (DL) based approach to defect identification in continuous systems. The Tennessee Eastman Procedure was chosen as a use case for this study because it involves a dispersed network of sensors throughout a manufacturing facility. To improve detection quality for fault diagnosis, a hybrid DL approach is presented to...
Article
Full-text available
Nowadays, energy-efcient data transmission is one of the biggest challenges in Wireless Sensor Networks (WSNs). Therefore, various routing protocols were developed to mini�mize energy consumption to fnd the shortest path in the WSN. However, they face issues due to delays and energy consumption. Thus, this article has developed a novel hybrid Ch...
Article
Full-text available
Decentralized wireless networks that may connect without a central hub are named Mobile Ad-hoc Networks (MANET). Attacks and threats of the most common kind can easily penetrate MANETs. Malware, APTs, and Distributed Denial of Service (DDoS) assaults all work together to make Internet services less reliable and less secure. Existing methods have be...
Article
The Internet of Things (IoT) is a massive network connecting various devices and computer systems. This technology makes prototyping and distributing cutting-edge software and services easier. Through specifically created healthcare networks, the IoT makes it simple to link digital and tangible devices. Disputes continue to arise in the industry du...
Article
Full-text available
This analysis implements a strategic review on cloud computing environment confidentiality and privacy approaches. In an IT sector, the recently discovering phenomenal technology is the Cloud Computing (CC) as it has a capability of accessing data anytime from to anywhere. There is a rapid improvement in cloud computing process. Large organizations...
Article
Full-text available
The integration of virtual reality (VR), augmented reality (AR), and mixed reality (MR) in urological practices and medical education has led to modern training systems that are cost-effective and with an increased expectation toward surgical performance and outcomes. VR aids the user in interacting with the virtual environment realistically by pro...
Article
Full-text available
A Mobile Ad-hoc Network constructed with lot of remote computational gadgets associated as a group that works with lack of setup plus restricted source of energy. Energy source is the important constraint in ad-hoc system. The lifetime of the device will indeed be extended by properly reducing the strength requirement towards associations. This art...
Article
Full-text available
A Wireless Sensor Network may often consist of hundreds of distributed sensors. Our goal is to formulate wireless sensor networks (WSNs) fault identification problem in terms of pattern classification and to introduce a newly developed algorithm, neighbor node hidden conditional algorithm (NHCA) to determine the unknown path through which packets a...
Article
Full-text available
Nowadays, cloud storage services increased the popular for data storage in the cloud and retrieve from any location without any time limitations. In recent days one of the most important demands required in cloud is secured data transmission in un-trusted cloud applications. Due to user’s data security, the encrypted data is stored in cloud server...
Article
Full-text available
During the last decade internet users, researchers and industries have focused on the cloud based technologies. Cloud technology is a distributed and scalable service model and in this model service providers offer the services depending on the cloud users. Security in cloud is a challenge for the service providers , data owners and the service req...
Article
Security and privacy concernsare shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Security has become the greatest obstacle and booming revolution in Cloud Computing, which occupies the top...

Network

Cited By