Skip to main content

and
  1. No Access

    Article

    TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms

    Software-defined networks (SDN) offer a centralized administration programming interface to govern the network infrastructure. It overtook conventional networks by creating a configurable link between the cont...

    K. Muthamil Sudar, P. Deepalakshmi, Ashish Singh in Cluster Computing (2023)

  2. No Access

    Chapter and Conference Paper

    An Exemplary Template Matching Techniques for Counterfeit Currency Detection

    In recent years, a lot of illegal fake notes have been created, and printed without any permission from the government. This leads to great loss for the government by using these fake notes. Currency plays a m...

    P. Nagaraj, V. Muneeswaran in Second International Conference on Image P… (2022)

  3. No Access

    Chapter and Conference Paper

    Sentiment Analysis on Diabetes Diagnosis Health Care Using Machine Learning Technique

    Sentiment analysis is a natural language processing technique that extricated data from the text to identify the positive and negative polarity of information. This work aims at analyzing sentiments in healthc...

    P. Nagaraj, P. Deepalakshmi, V. Muneeswaran in Congress on Intelligent Systems (2022)

  4. No Access

    Chapter and Conference Paper

    Risk Prediction of Lung Disease Using Deep Learning Approach

    The present medical services are remaining as a significant perspective for each human, so that there is a need to offer clinical types of assistance that remains effectively accessible to everyone. The fundam...

    C. Harinath Reddy, B. V. Koushik Kumar in Second International Conference on Image P… (2022)

  5. No Access

    Chapter and Conference Paper

    Flow-Based Detection and Mitigation of Low-Rate DDOS Attack in SDN Environment Using Machine Learning Techniques

    Software Defined Networks (SDN) have become more efficient and popular by having effective controller. Centralized controller makes the decision to handle traffic in data plane by analyzing the entire network....

    K. Muthamil Sudar, P. Deepalakshmi in IoT and Analytics for Sensor Networks (2022)

  6. No Access

    Chapter and Conference Paper

    Implementation of Automatic Soil Moisture Dearth Test and Data Exertion Using Internet of Things

    Water is a very inestimable resource and a driving force in irrigation. Optimal use of water is a need of the hour. Efficient irrigation watering helps in water conservation, getting better crop yields, reduce...

    P. Nagaraj, V. Muneeswaran in Emerging Technologies in Data Mining and I… (2021)