Search Results - "N, Alangudi Balaji"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network by Alangudi Balaji, N., Sukumar, R., Parvathy, M.

    Published in Computers & electrical engineering (01-06-2019)
    “…Vehicular Ad hoc Network has vehicles communicating with processing units. The end devices need to be secured for transmitting data in authenticated mode…”
    Get full text
    Journal Article
  2. 2

    Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization by S, Senthil Pandi, D, Roja Ramani, A, Senthilselvi, S, Dhanasekaran, B, Kalpana, N, Alangudi Balaji

    Published in Computers & security (01-10-2024)
    “…•FLAME: Fuzzy-based lightweight authentication and management of encryption.•Utilizes fuzzy logic to assess security degree in IoT environments.•Artificial…”
    Get full text
    Journal Article
  3. 3

    Big Data Analytics in loT Challenges and Opportunities by Kirubakaran, S., Vidhya, R, Prlya, V. Kalai, D, ShyamPrakash, Dhotre, Sunita, Balaji, N. Alangudi

    “…The intricate interplay between Big Data analytics and the Internet of effects is explored in this paper. The focus of this exploration is the integration of…”
    Get full text
    Conference Proceeding
  4. 4

    Digital Signature for Content Authentication by Rai, Ashutosh Kumar, Singh, Manmohan, Sudheendramouli, H C, Panwar, Varij, Balaji, N. Alangudi, Kukreti, Ravish

    “…A digital signature is a mathematical method used to confirm the genuineness and safety of a digitally transmitted message or file. content, such as electronic…”
    Get full text
    Conference Proceeding
  5. 5

    Application of Bayesian Neural Networks for Indoor Temperature Time Series Forecasting by N, Ponnarasi, Prasad, DVSSSV, Jyothi Babu, A., Revathi, N., Kumar, Ashok, Balaji, N. Alangudi

    “…We analyze time series using Bayesian neural networks (BNNs) and provide a Monte Carlo calculation for BNN preparation. In choosing a BNN model, we also go…”
    Get full text
    Conference Proceeding
  6. 6

    An Architecture-based Self-Typing Service for Cloud Native Applications by Mandalapu, Srinivasa Rao, Sivamuni, Kalaimagal, D, Chitra Devi, Aswal, Upendra Singh, Sherly, S. Irin, Balaji, N. Alangudi

    “…This research study analyzes Kubow, a service that automatically adjusts to new circumstances, built on a modular framework for cloud-native applications. To…”
    Get full text
    Conference Proceeding
  7. 7

    Use of Machine Learning and Deep Learning Techniques to Predict Cases of Hospitalizations Caused by Dengue by Lalitha, T., H, Jagruthi, V, Laxmi, Bordoloi, Dibyhash, Balaji, N. Alangudi, Singh Rawat, Ramesh

    “…Dengue fever mosquito-borne disease viral global health crisis affecting tens of millions of people every year. Early prediction of hospitalizations caused by…”
    Get full text
    Conference Proceeding
  8. 8

    Binary northern goshawk optimization for feature selection on micro array cancer datasets by Umarani, S., Balaji, N. Alangudi, Balakrishnan, K., Guptha, Nageswara

    Published in Evolving systems (01-08-2024)
    “…Northern Goshawk Optimization (NGO) is a recently proposed swarm-based optimization method that hunts like a northern goshawk. However, while the approach…”
    Get full text
    Journal Article
  9. 9

    AI Based Security for Internet of Transportation Systems by Kousar, Heena, Fatima, Shaista, Ahmed, Syed Imran, Sajithra, S., Kushwaha, Sumit, Balaji, N.Alangudi

    “…The intelligent transportation systems (ITS) use a combination of sensors, cameras, and communication technologies to provide real-time data on traffic…”
    Get full text
    Conference Proceeding