Rajendra Prasath

ORCID: 0000-0002-0826-847X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Advanced Text Analysis Techniques
  • Advanced Authentication Protocols Security
  • Data Mining Algorithms and Applications
  • User Authentication and Security Systems
  • Semantic Web and Ontologies
  • Web Data Mining and Analysis
  • Text and Document Classification Technologies
  • Natural Language Processing Techniques
  • Artificial Intelligence in Healthcare
  • Network Security and Intrusion Detection
  • Information Retrieval and Search Behavior
  • Interconnection Networks and Systems
  • Blockchain Technology Applications and Security
  • Sentiment Analysis and Opinion Mining
  • Imbalanced Data Classification Techniques
  • Advanced Malware Detection Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • AI-based Problem Solving and Planning
  • Energy Load and Power Forecasting
  • Neural Networks and Applications
  • Music and Audio Processing
  • Distributed systems and fault tolerance
  • Wireless Body Area Networks
  • Cryptography and Data Security

Indian Institute of Information Technology Sri City
2017-2024

Amrita Vishwa Vidyapeetham
2024

Tongji University
2024

CMR University
2019-2023

Indian Institute of Information Technology Allahabad
2018-2023

Indian Institute of Management Tiruchirappalli
2022

Orthopaedic Research Group
2022

Anna University, Chennai
2019

Norwegian University of Science and Technology
2010-2018

NTNU Samfunnsforskning
2017

With rapid technological growth, security attacks are drastically increasing. In many crucial Internet-of-Things (IoT) applications such as healthcare and defense, the early detection of plays a significant role in protecting huge resources. An intrusion system is used to address this problem. The signature-based approaches fail detect zero-day attacks. So anomaly-based particularly AI tools, becoming popular. addition, imbalanced dataset leads biased results. Machine Learning (ML) models,...

10.1109/cict59886.2023.10455720 article EN 2022 IEEE 6th Conference on Information and Communication Technology (CICT) 2023-12-15

Increasing use of electronic healthcare (eHealth) services demands efficient and secure solutions. Such solutions need to ensure the prevention unauthorized access patient data provide faster response. Fog computing is a viable solution responses in eHealth systems. Key distribution authentication play major role providing security data. Existing centralized architectures are susceptible single-point-of-compromise, that is, entire system vulnerable when authority keys unexpectedly revealed...

10.1109/jiot.2023.3242903 article EN IEEE Internet of Things Journal 2023-02-07

Abstract In this article, the combined magnetohydrodynamic heat, momentum and mass (species) transfer in external boundary layer flow of Casson nanofluid from an isothermal sphere surface with convective condition under applied magnetic field is studied theoretically. The effects Brownian motion thermophoresis are incorporated model presence both heat nanoparticle conditions. governing partial differential equations (PDEs) transformed into highly nonlinear, coupled, multi-degree non-similar...

10.1515/nleng-2018-0016 article EN cc-by Nonlinear Engineering 2019-01-28
Coming Soon ...