A. Kousalya's research while affiliated with Sri Krishna College of Engineering and Technology and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (15)
With a rising incidence of product failure issues in the e-commerce sector, particularly for third-party vendors, pinpointing the root cause of these failures is critical. This paper introduces an innovative and secure architecture for product failure detection, adapted to the demands of Industry 4.0. The blockchain architecture leverages a Defensi...
Oral cancer is a main worldwide health problem accounting for 606,520 deaths in 2020, and it is most predominant in the middle-and low-income nations. Permitting computerization in identifying potentially malignant and malignant lesions in the oral cavity would possibly result in low-expense and early detection of the disease. The most important pu...
In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility are mandatory. The proposed design introduced a significantly better encryption strategy to ensure better protection of overall resource admis...
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Var...
Hand gestures are a type of nonverbal communication that can be applied to a variety of sectors, including deaf-mute communication, human–computer interaction (HCI), medical applications, robot control and home automation. Various strategies have been used in hand gesture research articles, including those based on instrumented sensor technology an...
MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection Syst...
Information access and retrieval from cloud resources in an Internet of Things (IoT) paradigm is a challenging task due to synchronization and availability issues. IoT devices and user equipment access resources in a ubiquitous manner irrespective of time and resource availability. To address the synchronization issues in resource availability and...
Eye state ID is a sort of basic time-arrangement grouping issue in which it is additionally a problem area in the late exploration. Electroencephalography (EEG) is broadly utilized in a vision state in order to recognize people perception form. Past examination was approved possibility of AI & measurable methodologies of EEG vision state arrangemen...
The validation in the spinal canal Magnetic Resonance (MR) picture was
fundamentally the revision of a variety of neurological illness, this mainly
outputs of malfunctioning in Central Nervous Function, similar to Multiple
Sclerosis (MS), wherein spinal canal deteriorate then also react in the
category to measure the assessment of the collisions of...
Software security has become a very critical part of our lives. A software developer who has a fundamental understanding of software security can have an advantage in the workplace. In the massive Equifax breach that occurred in 2017 that exposed data of roughly 140 million people, attackers exploited a vulnerability in Apache Struts, CVE-2017-5638...
Citations
... The purpose of OTA is to ensure safe and reliable operations over time. The Ethernet/IP standard, as specified in IEC 61158, and the Common Industrial Protocol (CIP) standard, as defined in IEC 61784, is applied for the Unified Diagnostic Services data element and its types within a service request-confirmation pair transmitted over the secure Transport Layer Security/TLS channel established between the diagnostic clients and servers located at the Eth/IP network [15,38]. ...
... RSA: RSA stands for Rivest-Shamir-Adleman and it is crucial to the protection of data in cloud computing because it provides one of the most effective means of performing cryptographic computations in such areas as key exchange, signatures, and secure transmissions. Here's an explanation of the role of RSA in cloud computing security and how it is effective[18]. ...
... The last phase is validation testing, which checks if the programme does what the user said it would. Instead of the system developer doing this test, the end user typically does it as part of a process known as "Alpha and Beta were testing" to detect bugs that only the end user can find [91][92][93][94][95]. If the final consumers are happy, then the project can be considered complete. ...
Reference: An Android-based Smart Bus Pass application
... There are many studies on text mining techniques for online reviews. Reference [14] used text mining to analyze feedback from online shopping reviews. Reference [15] proposed an easy-to-implement online review text analysis procedure through text mining for studying brand image and brand positioning. ...
... A hybrid approach proposed in [32] combined the definition of fuzzy logic with the learning ability of neural networks to detect routing attacks in WSNs. The success of this solution depends on the quality and quantity of training data, the creation of fuzzy rules, the neural network architecture and the starting point. ...
... (2) The smart glove recognition method. [5][6][7][8] Operators wear smart gloves equipped with flexible sensors, and the sensors transmit the detected pressure and strain signals to the controller for processing to control the equipment. This type of smart glove can detect many gestures, such as VIRDYN MHand, SmartGlove, SenseGlove Nova, etc., but these gloves are often equipped with various sensors, signal transmission devices, and even control boards. ...
... QoS+ combines QoS-based CH selection and hybrid cryptography using AES and ECC. Evaluation in NS2 shows QoS+ outperforming previous works in various scenarios, with notable excellence in CH efficiency and cluster member efficiency (Rathish et al. 2021). introduces DCAIDS, a clustering-based Intrusion Detection System (IDS) for MANETs. ...
... But with the help of this proposed work, anyone who has or does not have any knowledge about this field can simply know about security attacks and their implementation using this website. Also, the complete implementation in the backend is done on the CLI (command line interface) without the user having any knowledge about the terminal [12]. ...
... There is a need for a system model to provide long-term health data storage utilizing cloud resources. 5 IoT/Cloud security requirements and threat level problems may vary by the service acquired. 6 From the medical applications' point of view, medical data must be encrypted and sent to a cloud provider, and doctors will be served with a private key to access these medical data. ...