A. Kousalya's research while affiliated with Sri Krishna College of Engineering and Technology and other places

Publications (15)

Article
Full-text available
With a rising incidence of product failure issues in the e-commerce sector, particularly for third-party vendors, pinpointing the root cause of these failures is critical. This paper introduces an innovative and secure architecture for product failure detection, adapted to the demands of Industry 4.0. The blockchain architecture leverages a Defensi...
Article
Full-text available
Oral cancer is a main worldwide health problem accounting for 606,520 deaths in 2020, and it is most predominant in the middle-and low-income nations. Permitting computerization in identifying potentially malignant and malignant lesions in the oral cavity would possibly result in low-expense and early detection of the disease. The most important pu...
Article
In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility are mandatory. The proposed design introduced a significantly better encryption strategy to ensure better protection of overall resource admis...
Article
Full-text available
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Var...
Article
Hand gestures are a type of nonverbal communication that can be applied to a variety of sectors, including deaf-mute communication, human–computer interaction (HCI), medical applications, robot control and home automation. Various strategies have been used in hand gesture research articles, including those based on instrumented sensor technology an...
Article
Full-text available
MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection Syst...
Article
Full-text available
Information access and retrieval from cloud resources in an Internet of Things (IoT) paradigm is a challenging task due to synchronization and availability issues. IoT devices and user equipment access resources in a ubiquitous manner irrespective of time and resource availability. To address the synchronization issues in resource availability and...
Article
Eye state ID is a sort of basic time-arrangement grouping issue in which it is additionally a problem area in the late exploration. Electroencephalography (EEG) is broadly utilized in a vision state in order to recognize people perception form. Past examination was approved possibility of AI & measurable methodologies of EEG vision state arrangemen...
Article
Full-text available
The validation in the spinal canal Magnetic Resonance (MR) picture was fundamentally the revision of a variety of neurological illness, this mainly outputs of malfunctioning in Central Nervous Function, similar to Multiple Sclerosis (MS), wherein spinal canal deteriorate then also react in the category to measure the assessment of the collisions of...
Chapter
Full-text available
Software security has become a very critical part of our lives. A software developer who has a fundamental understanding of software security can have an advantage in the workplace. In the massive Equifax breach that occurred in 2017 that exposed data of roughly 140 million people, attackers exploited a vulnerability in Apache Struts, CVE-2017-5638...

Citations

... The purpose of OTA is to ensure safe and reliable operations over time. The Ethernet/IP standard, as specified in IEC 61158, and the Common Industrial Protocol (CIP) standard, as defined in IEC 61784, is applied for the Unified Diagnostic Services data element and its types within a service request-confirmation pair transmitted over the secure Transport Layer Security/TLS channel established between the diagnostic clients and servers located at the Eth/IP network [15,38]. ...
... RSA: RSA stands for Rivest-Shamir-Adleman and it is crucial to the protection of data in cloud computing because it provides one of the most effective means of performing cryptographic computations in such areas as key exchange, signatures, and secure transmissions. Here's an explanation of the role of RSA in cloud computing security and how it is effective[18]. ...
... The last phase is validation testing, which checks if the programme does what the user said it would. Instead of the system developer doing this test, the end user typically does it as part of a process known as "Alpha and Beta were testing" to detect bugs that only the end user can find [91][92][93][94][95]. If the final consumers are happy, then the project can be considered complete. ...
... There are many studies on text mining techniques for online reviews. Reference [14] used text mining to analyze feedback from online shopping reviews. Reference [15] proposed an easy-to-implement online review text analysis procedure through text mining for studying brand image and brand positioning. ...
... A hybrid approach proposed in [32] combined the definition of fuzzy logic with the learning ability of neural networks to detect routing attacks in WSNs. The success of this solution depends on the quality and quantity of training data, the creation of fuzzy rules, the neural network architecture and the starting point. ...
... (2) The smart glove recognition method. [5][6][7][8] Operators wear smart gloves equipped with flexible sensors, and the sensors transmit the detected pressure and strain signals to the controller for processing to control the equipment. This type of smart glove can detect many gestures, such as VIRDYN MHand, SmartGlove, SenseGlove Nova, etc., but these gloves are often equipped with various sensors, signal transmission devices, and even control boards. ...
... QoS+ combines QoS-based CH selection and hybrid cryptography using AES and ECC. Evaluation in NS2 shows QoS+ outperforming previous works in various scenarios, with notable excellence in CH efficiency and cluster member efficiency (Rathish et al. 2021). introduces DCAIDS, a clustering-based Intrusion Detection System (IDS) for MANETs. ...
... But with the help of this proposed work, anyone who has or does not have any knowledge about this field can simply know about security attacks and their implementation using this website. Also, the complete implementation in the backend is done on the CLI (command line interface) without the user having any knowledge about the terminal [12]. ...
... There is a need for a system model to provide long-term health data storage utilizing cloud resources. 5 IoT/Cloud security requirements and threat level problems may vary by the service acquired. 6 From the medical applications' point of view, medical data must be encrypted and sent to a cloud provider, and doctors will be served with a private key to access these medical data. ...