Skip to main content

and
  1. No Access

    Article

    Dynamic service prioritization with predicted intervals for QoS-sensitive service migrations in MEC

    Service migrations in Multi-access Edge Compute (MEC) infrastructure are complex due to the geographically distributed infrastructure, limited availability of resources at the edge and heterogenous application...

    Saravanan Velrajan, V. Ceronmani Sharmila in Service Oriented Computing and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    Enhanced Dynamic Vehicle Detection and Tracking to Improve the Quality of Image Processing Using Deep Learning

    One of the most crucial duties in varied traffic scenarios is vehicle recognition and categorization. Vehicle detection is the first step in tracking and counting vehicles. This article uses a deep learning al...

    Ankireddy Priyanka, V. Ceronmani Sharmila in Data Science and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    Advanced Cyber Security Helpdesk Using Machine Learning Techniques

    Numerous amounts of cybercrimes and attacks are happening over the globe even in every ten minutes. A major number of people are being affected by these cybercrimes and attacks across the world. Hence, the var...

    V. Ceronmani Sharmila, E. Vishnu in Advances in Data and Information Sciences (2024)

  4. No Access

    Chapter and Conference Paper

    Blockchain-Based Supply Chain Management System for Secure Vaccine Distribution

    Vaccination is one of the best ways to stop or at least slow the spread of infectious illnesses. There are various logistical concerns raised by this medical technique. Millions of people worldwide participate...

    V. Ceronmani Sharmila, S. Nandhini in Advances in Data and Information Sciences (2024)

  5. No Access

    Chapter and Conference Paper

    Criminal Prevision with Weapon Identification and Forewarning Software in Military Base

    Nowadays, it is especially important to give good concern toward security in all sectors, especially in military areas, bank sectors, airports, railway stations, etc. We need security for all sectors as the wo...

    V. Ceronmani Sharmila, A. Vishnudev in Advances in Data and Information Sciences (2024)

  6. No Access

    Chapter and Conference Paper

    Advanced Persistent Threat Assessment

    Cybersecurity in the health sector is a critical issue, as the healthcare industry increasingly relies on technology to store, process, and transmit sensitive patient information. This research paper examines ...

    V. Ceronmani Sharmila, S. Aswin in Advances in Data and Information Sciences (2024)

  7. No Access

    Chapter and Conference Paper

    A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments

    In connection with Post-Quantum Cryptography (PQC), it is indispensable to upgrade cloud data security schemes and also key exchange schemes. The former is for data security while the latter is for secure key ...

    Mr. Shaik Mohammad Ilias, V. Ceronmani Sharmila in Intelligent Sustainable Systems (2023)

  8. No Access

    Chapter and Conference Paper

    A Virtual Machine Protection Framework Against Compromised Hypervisor in Cloud Computing

    Virtualization in cloud computing enables efficient management of physical resources leading to affordable cloud services but has security vulnerabilities. The existing solutions are at a different level of pr...

    S. Mahipal, V. Ceronmani Sharmila in Intelligent Systems and Sustainable Computing (2023)

  9. No Access

    Chapter and Conference Paper

    Tool-Based Approach on Digital Vulnerability Management Hub (VMH) by Using TheHive Platform

    Security of a system is a prime focus area for software development teams. Vulnerabilities are loopholes and flaws that enable anyone to exploit a system with ease. It has been a burden to perform security vul...

    V. Ceronmani Sharmila, M. Arvinth Sitharthaa in Advances in Data Science and Artificial In… (2023)

  10. No Access

    Chapter and Conference Paper

    Deterrence Pointer for Distributed Denial-of-Service (DDoS) Attack by Utilizing Watchdog Timer and Hybrid Routing Protocol

    Multiprocessor webwork is disciplined to an unrivaled amount and diversity of hacks, the preponderance of which is distributed denial of service. Throughout the time, there have been substantial studies of dis...

    Sandya J. K., Ashwanth S. in Advances in Data Science and Artificial In… (2023)

  11. No Access

    Article

    QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm

    In the 5G network, hosting services in multi-access edge compute (MEC) infrastructure is a crucial enabler to achieving the high bandwidth and low latency targets for various applications. When MEC infrastruct...

    Saravanan Velrajan, V. Ceronmani Sharmila in Journal of Network and Systems Management (2022)

  12. No Access

    Chapter and Conference Paper

    Analysing and Identifying Harm Propagation of Cyber Threats in Autonomous Vehicles and Mitigation Through ANN

    Connected and autonomous vehicle industry is fostering advancements in technologies such as artificial intelligence, machine learning, Internet of Things and Big data applications. Connected and autonomous veh...

    V. Ceronmani Sharmila, H. Mohamed Aslam in Smart Trends in Computing and Communicatio… (2022)

  13. No Access

    Chapter and Conference Paper

    Context-Aware Placement Applications of Industry 4.0 Using Connected Dominating Set in Fog Computing

    The Fourth Industrial Revolution (Industry 4.0) is achieved by deploying Internet of Things (IoT) device over industrial area due to communication latency, and geographical distribution of cloud-centric IOT de...

    V. Ceronmani Sharmila, N. P. Nandhakumar in Smart Trends in Computing and Communicatio… (2022)

  14. No Access

    Article

    Water management using genetic algorithm-based machine learning

    Water scarcity is the major problem presently being faced globally; it is to be managed in an efficient manner. The water management procedure is one of the techniques to condense necessary water. The objectiv...

    S. G. Gino Sophia, V. Ceronmani Sharmila, S. Suchitra, T. Sudalai Muthu in Soft Computing (2020)

  15. No Access

    Article

    Computer vision algorithms for dominant contact lens feature extraction using fuzzy-logic-based classifications

    Iris image recognition is an emerging approach for human identification but offers low reliability. An algorithm for dominant contact lens feature extraction based on an improved neighboring binary pattern (NB...

    S. G. Gino Sophia, V. Ceronmani Sharmila in Soft Computing (2020)

  16. No Access

    Article

    Zadeh max–min composition fuzzy rule for dominated pixel values in iris localization

    Iris detection fails at the iris localization stage pulling out of the sub-image from the original image; the objective of this paper is to realize the narrative approach for iris localization and to solve the...

    S. G. Gino Sophia, V. Ceronmani Sharmila in Soft Computing (2019)

  17. No Access

    Chapter and Conference Paper

    Morphological-Based Localization of an Iris Image

    Iris recognition is one of the reliable biometric techniques used for human identification purpose. It provides the unique information about a person with natural features such as both the left and right eye i...

    S. G. Gino Sophia, V. Ceronmani Sharmila in First International Conference on Artifici… (2019)

  18. No Access

    Chapter

    Implementation of Connected Dominating Set in Fog Computing Using Knowledge-Upgraded IoT Devices

    Wireless sensor networks (WSNs) have a worldwide attraction because of its increasing popularity. The key enablers for the Internet of Things (IoT) are WSN, which plays an important role in future by collectin...

    V. Ceronmani Sharmila, A. George in Knowledge Computing and Its Applications (2018)

  19. No Access

    Chapter and Conference Paper

    Implementation of Connected Dominating Set in Social Networks Using Mention Anomaly

    Social network sites (SNS) are open platform that allows users to create an account in public sites. Social network site contains more active users, who share the posts, messages, or valuable information in re...

    S. Nivetha, V. Ceronmani Sharmila in Artificial Intelligence and Evolutionary C… (2017)