- Data Mining Algorithms and Applications
- Data Management and Algorithms
- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- Algorithms and Data Compression
- Anomaly Detection Techniques and Applications
- Cloud Data Security Solutions
- Rough Sets and Fuzzy Logic
- Cryptography and Data Security
- Security in Wireless Sensor Networks
- Time Series Analysis and Forecasting
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Distributed and Parallel Computing Systems
- Cloud Computing and Resource Management
- QR Code Applications and Technologies
- Chaos-based Image/Signal Encryption
- Customer churn and segmentation
- Advanced Chemical Sensor Technologies
- User Authentication and Security Systems
- solar cell performance optimization
- Hate Speech and Cyberbullying Detection
- Advanced Data Storage Technologies
- Internet of Things and AI
SRM Institute of Science and Technology
2019-2024
Vellore Institute of Technology University
2017-2024
University of Madras
2024
Karpagam Academy of Higher Education
2024
REVA University
2023
Swami Vivekanand College of Pharmacy
2020
National Aerospace Laboratories
2020
Sri Venkateswara University
2004-2019
Madurai Medical College
2011-2012
The world has seen various diseases in different variants, numerous pandemics the twentieth century like covid-19. Fly infections are fundamental driver of contaminations. An epidemic known as COVID-19 been declared, and it had a significant impact on society global economy. diagnosis Covid19 or non-Covid-19 cases early detection at correct separation lowest cost stages disease is one major problems current coronavirus pandemic. To address this problem, proposed Deep learning Design covid19...
The search for the periodicity in time-series database has a number of application, is an interesting data mining problem.In real world dataset are mostly noisy and rarely perfect periodicity, this problem not trivial.Periodicity very common practice time series algorithms, since it more likely trying to discover signal with no limit.We propose algorithm uses FP-tree finding symbol, partial full series.We designed complexity as O (kN), where N length input sequence k periodic pattern.We have...
Cloud computing emerging filed process large task to handle the resources. From an application perspective, study of scheduling mechanisms for data transfer in cloud environments is performed poorly.Unbalanced leads traffic load, loss energy and hardware controls failure. In addition, resident's devices are not considered reduce power consumption delay. So, Internet things (IoT) rules current trends Internet. The huge number (objects), which associated with Internet, produces a amount...
Traditional methodologies for routing in media streaming is challenging because packets are not retransmitted when there loss or corruption of packets. Thus throughput, packet rate delay guaranteed. Providing multipath every transmission helps meeting efficient load balancing metrics. Software defined networking (SDN) approach used to configure the network topology and increase performance monitoring. Controller act as a centralized management device which monitors overlay network. It reacts...
The periodicity search in longest common subsequences multiple strings has a number of application, is an interesting data mining problem. Periodicity very practice subsequence algorithm. This work introduces new parallel algorithm for finding strings. Few existing algorithms lacks poor scalability, all pattern, and symbol, partial full periodicity. We designed the using FP-tree most substring sources. introduce Constraint Based Periodic Pattern Mining (CBPPM) algorithm, which takes O( kN )...
The main challenge of problem lies in the perception Cognitive Radio technology is to discover licensed empty spectrum pattern. efficient model needed for allocation among and unlicensed users wireless improve extraction rate collision rate. To hole paging bands, stirred by FP mining technique proposed an enumeration approach, namely Constraint Based Frequent Periodic Pattern Mining (CBFPP). algorithm uses TRIE-like data structure with constraints. CBFPP predicts periodic occupancy holes...
Frequent pattern mining has been a widely used in the area of discovering association and correlations among real data sets. However, interesting correlation relationship huge number co-occurrence patterns are complicated, majority them superfluous or uninformative. Mining large pile useless information is extraordinarily useful real-time applications. In this study, we propose technique uses FP-tree for frequent correlated periodic from transactional database. The analysis time measure tend...
Artificial intelligence is taking over all the platforms and applications making them more user friendly intelligent gives application a human like behaviour thinking. AI being used everywhere now-a-days because that use are able to learn improve require less maintenance. This paper “Home automation using smart assistant” voice command-based assistant coded python Natural Language Processing NLP can respond queries responds voice-based commands of user. Using this Assistant users send emails...