Jayapandian N.

Jayapandian N.
  • B.Tech.,M.E.,Ph.D.,
  • Professor (Associate) at Christ University

About

108
Publications
22,269
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
764
Citations
Introduction
Jayapandian N. currently i am working as Assistant Professor at the Department of Computer Science and Engineering, Christ University, Bangalore. My Research Profile Page https://jayapandian.weebly.com . My research area is Network and Data Security.
Current institution
Christ University
Current position
  • Professor (Associate)

Publications

Publications (108)
Article
Full-text available
This research aims to enhance lung cancer prediction using advanced machine learning techniques. The major finding is that integrating graph convolutional networks (GCNs) with graph attention networks (GATs) significantly improves predictive accuracy. The problem addressed is the need for early and accurate detection of lung cancer, leveraging a da...
Article
Full-text available
Cooperation among mobile nodes during the routing process is indispensable for attaining reliable data delivery between the source and destination nodes in the Mobile ad hoc networks (MANETs). This cooperation between mobile nodes sustains the performance of the network especially when they are been deployed for handling an emergency scenario like...
Conference Paper
The adoption of cloud computing has transformed how businesses manage their workloads, offering flexibility and efficiency. This study introduces a novel model that leverages trust mechanisms to ensure secure workload execution within heterogeneous cloud environments. The primary objective of this research was to enhance efficiency by reducing both...
Conference Paper
In recent years, the digital evolution of education has significantly shaped the landscape of learning, steering it away from traditional classroom settings towards more agile e-learning platforms. This shift has underscored the urgency for comprehensive online examination systems, tailored to meet the unique challenges and demands of virtual educa...
Conference Paper
Parking space identification is a crucial component in the development of intelligent transportation systems and smart cities. Accurate detection of parking spaces in urban areas can significantly improve traffic management, reduce congestion, and enhance overall parking efficiency. This proposed model is focuses on enhancing the accuracy of parkin...
Conference Paper
Virtual mouse technology has revolutionized human computer interaction, allowing users to interact with digital environments without physical peripherals. The concept traces back to the late 1970s, and over the years, it has evolved with significant advancements in computer vision, motion tracking, and gesture recognition technologies. In recent ti...
Conference Paper
This research article aims to explore the prediction and analysis of recessions, with a particular focus on Gross Domestic Product (GDP). The study examines the impact of recessions on different countries, namely India, USA, Germany, China, and Bangladesh, while also considering the influence of the COVID-19 pandemic on these nations in relation to...
Conference Paper
Poverty is known to be the mother of all crimes, and a vast percentage of people in India live below the poverty line. In India, the crime rate is rapidly rising. The police officers must spend a significant amount of time and personnel to identify suspects and criminals using current crime investigation. In this research, the method presented for...
Conference Paper
In today's world, weather forecasting is essential for decision-making in a variety of fields, including agriculture, transportation, and disaster preparedness. It's not simple to make weather predictions. Today, both in business and academia, data analytics is growing in importance as a tool for decision-making. The adoption of data-driven concept...
Conference Paper
Games have always been a popular form of entertainment and with the advancements in technology, the integration of Artificial Intelligence (AI) in gaming has revolutionized the gaming industry. This research article aims to explore the various applications of AI in gaming and its impact on the industry and player experience. Unlike the typical stra...
Conference Paper
In the field of medical science, applications that are particularly used for diagnostic purposes, are used in the detection of brain tumors since detecting an error in MRI scanning is becoming a major task for radiologists and requires a lot of their focus. Flaws that are prevalent during tumor detection must be taken care of to avoid further compl...
Conference Paper
Enigma is a relatively new and emerging field that has the potential to bring significant benefits to the way contracts are executed and managed. The integration of Artificial Intelligence (AI) into smart contract technology can automate repetitive tasks, reduce the need for human intervention, improve decision-making, and provide transparency and...
Conference Paper
The main objective of this research is to use machine learning algorithms to locate people stranded by an earthquake or other big disasters. Disasters are often unpredictable, they can result in significant economic loss, and the survivors may struggle with despair and other mental health issues. The time, the victim’s precise location, the possibl...
Conference Paper
This research aims to understand how groups of agents can make decisions collectively without relying on a central authority. The research could focus on developing algorithms and models for distributed problem solving, such as consensus-reaching and voting methods, or for coordinating actions among agents in a decentralized manner. The research co...
Conference Paper
Agile is a well-known project management approach that has been used for many years. It places a strong emphasis on client satisfaction, adaptability, and teamwork. Agile was first developed as a software development approach, but it has now been modified for application in other sectors including marketing and finance. The Agile Manifesto, which w...
Conference Paper
Initially, Artificial Intelligence (AI) models were centralized. This resulted in various challenges. To overcome this challenge, the decentralized or distributed frameworks were developed. Recent advancements in blockchain technology and cryptography have accelerated the decentralization process. Decentralized Artificial Intelligence (DAI) is gain...
Conference Paper
Online websites that recommend books, music, movies, and other media are becoming increasingly prevalent because of collaborative filtering. This online websites are using many algorithms to provide the better recommendation to attract the customer. Bayesian statistics, which is based on Bayes' theorem, is a technique for data analysis in which obs...
Conference Paper
In this era, Machine Learning is transforming human lives in a very different way. The need to give machines the power to make decisions or giving the moral compass is a big dilemma when humanity is more divided than it has ever been. There are two main ways in which law and AI interact. AI may be subject to legal restrictions and be employed in co...
Chapter
Border security is a process which measures the border management ideas by a country or set of countries to wage against unspecific and unauthorized travel or trade across the country borders, to bound non-legal deport, various crimes combat, and foreclose dangerous criminals from entering in the country. A system will help in keeping a check on th...
Chapter
Cancer is one of the most fatal diseases in the world and the leading cause for most deaths worldwide. Diagnosing cancer early has become the need of the day for doctors and researchers as it allows them to categorize patients as high-risk and low-risk categories which will eventually help them in correct diagnosis and treatment. Machine learning i...
Article
Liver cirrhosis is the diffuse and advanced phase of liver disease. Several morphological methods are used for imaging modalities. But, these modalities are biased and lack in higher detection accuracy. Hence, this work introduces automated cirrhosis liver disease classification using an optimized hybrid deep learning model. In this work, Magnetic...
Article
Full-text available
span lang="EN-US">The increasing demand for the hardware, software and infrastructure is playing a big role in the information technology domain towards the need of customer’s specific requirements. Cloud computing is a major backbone for providing such services over the internet. It includes the services such as applications, storage, network, sca...
Conference Paper
Artificial intelligence or machine learning as a domain started as a distinct domain marketplace for enthusiasts. Over an extended period of time, this has evolved into an industry with boundless potential. This is the focal point of a plethora of technologies like real-time analytics, deep learning in computer science. It’s inherent to various cus...
Conference Paper
The Metaverse is a huge project undertaken by Facebook in order to bring the world closer together and help people live out their dreams. Even handicapped can travel across the world. People can visit any place and would be safe in the comfort of their homes. Meta (Previously Facebook) plans to execute this by using a combination of AR and VR (Augm...
Conference Paper
The COVID-19 pandemic has had vast effects on the concept of education as a whole. During the pandemic, students had no access to physical teaching practices, which had been adapted worldwide as the principal way of education since the 1800's. Due to the restrictions imposed to garner safety from the spread of the virus, this methodology had to be...
Conference Paper
Artificial Intelligence has a high potential to solve many real-world problems. In the recent years researchers are dealing with one of the biggest complications in biology, which is protein folding. With the assistance of technology, we can foresee how proteins fold from a chain of amino acids into 3D shapes that do life's errands. There are mainl...
Conference Paper
Sales forecasting is crucial in the food industry, which experiences high levels of food sales and demand. The industry has concentrated on a well-known and established statistical model. Due to modern technologies, it has gained tremendous appeal in improving market operations and productivity. The main objective is to find the most accurate algor...
Conference Paper
The Internet of Things (IoT) shall be merged firmly and interact with a higher number of altered embedded sensor networks. It provides open access for the subsets of information for humankind's future aspects and on-going pandemic situations. It has changed the way of living wirelessly, with high involvement and COVID-related issues that COVID pati...
Conference Paper
This research work has studied about the utilization of machine learning algorithms in bioinformatics. The primary purpose of studying this is to understand bioinformatics and different machine algorithms which are used to analyze the biological data present with us. This research study discusses about different machine learning approaches like sup...
Conference Paper
The rapid advancement of cloud technology has resulted in the emergence of many cloud service providers. Microsoft Azure is one among them to provide a flexible cloud computing platform that can scale business to exceptional heights. It offers extensive cloud services and is compatible with a wide range of developer tools, databases, and operating...
Chapter
The goal of this research is to discover the various potential for the educational system using artificial intelligence (AI). The world today is dealing with AI in different sectors. This study specifically looked into the prospects for acquiring efficient and high-quality education for each student, automating administrative tasks, including regul...
Chapter
Cloud computing is the latest technology that has a significant influence on everyone’s life. During the COVID-19 crisis, cloud computing aids cooperation, communication, and vital Internet services. The pandemic situation made the people switch to online mode. The technology helped to bridge the gap between the work space and personal space. A qui...
Chapter
The main objective of this chapter is to enhance security system in network communication by using machine learning algorithm. Cyber security network attack issues and possible machine learning solutions are also elaborated. The basic network communication component and working principle are also addressed. Cyber security and data analytics are two...
Article
The prevailing COVID-19 situation has brought in temporary and permanent changes in the attitude and lifestyle of people. Starting from Hand sanitizers and face masks, it extends to online classrooms and work from home culture. In case of visiting hospitals and medications, people with pre-existing medical conditions and minor health issues tend to...
Conference Paper
In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. Thi...
Article
Through Wireless Sensor Networks (WSN) formation, industrial and academic communities have seen remarkable development in recent decades. One of the most common techniques to derive the best out of wireless sensor networks is to upgrade the operating group. The most important problem is the arrangement of optimal number of sensor nodes as clusters...
Chapter
We live in a period when historical fiction has become current reality. With our future being automated, using AI on a daily basis will only get more convenient. Making military weapons to detect, monitor, and engage a human being with attacks may all be done in the privacy of one's own garden. There is a plethora of AI software out there that can...
Chapter
In recent years, diseases and disaster have become more unpredictable. The advent of technology has not only making our lives easier but also technology-dependent. Nevertheless, the natural disasters cause great adversity by disrupting considerable human lives. Also, the disasters obstruct and affect many industries and services either directly or...
Conference Paper
Full-text available
Rapid growth in technological development, the use of the internet has grown many folds. Along with it, the sharing of privacy information in networks creates ownership issues. In order to create a high level of security for sharing private information, the concept of steganography is introduced along with encryption based invisible watermarking te...
Article
Full-text available
The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest...
Article
Reviewing and buying the right goods from online websites is growing day by day in today's fast internet environment. Numerous goods in the same label are available to consumers. It is thus a difficult job for consumers to pick up the correct commodity at a decent price under different market conditions. Therefore, it is important for owners of onl...
Chapter
Cryptocurrency has developed as a new mode of money exchange since it has become easier, faster and safer. The first cryptocurrency was introduced in 2009 and since then, the growth rate of cryptocurrency has been increasing drastically. As of 2020, the cryptocurrency exchange all over the world has exceeded 300%. The researchers face many challeng...
Chapter
Full-text available
The quick advancement of Web-based applications has led to a huge amount of information being scanned and gathered for business examination or scholarly research purposes, which may disregard individual protection. Organizations, industries and individuals data are at stake. In this paper, utilizing on the Web Personal Health Record (PHR) as contex...
Preprint
Full-text available
Through Wireless Sensor Networks (WSN) formation, industrial and academic communities have seen remarkable development in recent decades. One of the most common techniques to derive the best out of wireless sensor networks is to upgrade the operating group. The most important problem is the arrangement of optimal number of sensor nodes as clusters...
Conference Paper
Computing paradigms are introduced for solving complex problems by analyzing, designing and implementing by complex systems. Computing can be defined as the effective use of computer or computer technology to solve tasks that are goal oriented. Computing is used in development of producing scientific studies, building intelligent systems, channelin...
Conference Paper
The modern world healthy body depends on the number of calories consumed, hence monitoring calorie intake is necessary to maintain good health. At the point when your Body Mass Index is somewhere in between from 25 to 29. It implies that you are conveying overabundance weight. Assuming your BMI is more than 30, it implies you have obesity. To get i...
Conference Paper
The upsurge in fuel prices are pointing out the fact that, the deficiency of conventional form of natural resources and building dams can never fulfill the demand of the growing population and it is exponentially increasing the electricity demand. Electricity is a day-to-day component, which is utilized for lighting, running appliances, machines. M...
Conference Paper
This article summarizes the benefits, safety hazards, and limitations of owning a self-driving vehicle. Finding a way to use an SDV(Self Driving Vehicle) is minimizing the risk for an accident is important for public and road safety. The actual rate of accidents for self-driving vehicles are lower than that for regular vehicles since the total numb...
Preprint
Full-text available
Wireless Sensor Network (WSN) is known to be a highly resource constrained class of network where energy consumption is one of the prime concerns. The existing system of LTDC has more drawbacks in network routing optimization lifetime and energy level improvement needed. In this research, a cross layer design methodology was adopted to design an en...
Article
Full-text available
The use of the internet in this modern era is increased many fold. The communications between different peers take place in digital form. While sharing the messages between different recipients, the confidentiality of the messages is very important. For creating the high level of security while sharing the secret messages, the cryptographic algorit...
Conference Paper
Artificial intelligence played a vital role in brings revolutionary changes in the field of perfumery. It is much evident with events including the success of Philyra, exhibitions showcasing the ideas of this concept. Machine learning made it user friendly and more comfortable for the users by means of suggestive interaction. Machine learning also...
Article
Full-text available
Wireless sensor networks are significantly used for data sensing and aggregating dusts from a remote area environment in order to utilize them in a diversified number of engineering applications. The data transfer among the sensor nodes is attained through the inclusion of energy efficient routing protocols. These energy efficient routing necessita...
Chapter
Full-text available
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is...
Chapter
Full-text available
The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working...
Chapter
Full-text available
The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage,...
Article
Full-text available
Cloud computing is dealing with large amount of data during data communication. This data processing is named as big data. The big data is growth of the demand in accessing the storage, computation and communication. This big data has the major defects. A raising issue in emerging big data is cost minimization. The architecture of big data ranges o...
Conference Paper
Full-text available
The Internet of Things (IoT) has been gaining attention in various disciplines ranging from agriculture, health, industries and home automation. When a pandemic first breaks out early detection, isolating the infected, and tracing the contacts are the most important challenges. IoT protocols like Radio-frequency identification (RFID), Wireless Fide...
Article
Full-text available
With an increasing number of web users, the data traffic generated by these users generates tremendous network traffic which takes a long time to connect with the web server. The main reason is, the distance between the client making requests and the servers responding to those requests. The use of the CDN (content delivery network) is one of the s...
Chapter
Threat characterization is critical for associations, as it is an imperative move towards execution of data security. Vast majority of the current threat characterizations recorded threats in static courses without connecting risks to information system zones. The aim of this paper is to represent each threat in different areas of the information s...
Article
Full-text available
Virtual Machine Placement in Cloud Computing is to allocate the Virtual Machine (VM) (user request) to suitable Physical Machine’s (PM) so that the wastage of resources is reduced. Allocation of appropriate VM’s to suitable and effective PM’s will lead the service provider to be a better competitor with more available resources for affording a gre...
Chapter
Full-text available
The recent cloud computing sector has introduced multiple cloud service provider, which provides cloud storage to the consumers through a wireless or device less method of storing data. However, it has been difficult for the consumers to choose providers who are more secured and cheaper at the same time. Recently, there have been lot of security is...
Chapter
Geospatial data is processed using a geographical information system, geospatial data is mainly of two kind’s vector and raster data. Vector data largely includes point data and arcs whereas raster data is the used to represent surfaces. This data is processed and the insights are used for demographical analysis, geological studies, map route optim...
Article
Full-text available
The world wide web (WWW) plays a significant role in information sharing and distribution. In web-based information access, the speed of information retrieval plays a critical role in shaping the web usability and determining the user satisfaction in accessing webpages. To deal with this problem, web caching is used. The problem with the present we...
Chapter
Full-text available
Encryption and storing important information is one of the risky and most challenging tasks. It is the need of the hour in today’s fast growing technological transformations that the world is undergoing. A simple Enterprise network is the communication backbone of any organization. It mostly provides better information storage and efficient retriev...
Chapter
Full-text available
In recent years, Cloud Computing is emerging as a torrid research area for both academicians and industrialists. It provides effective ways to handle and store the data in advanced system processing applications. Furthermore, it also leverages a radical change in the way the users access and use the available resources. Despite the hype, it also ha...
Chapter
Full-text available
Framework figuring has turned into genuine distinctive to old supercomputing situations for creating parallel applications that bridle huge process assets. In any case, the quality acquired in building such parallel Framework mindful applications is over the ordinary parallel registering conditions. It tends to issues like asset disclosure, heterog...
Chapter
Full-text available
Grid computing the job scheduling is the major issue that needs to be addressed prior to the development of a grid system or architecture. Scheduling is the user’s job to apropos resources in the grid environment. Grid computing has got a very wide domain in its application and thus induces various research opportunities that are generally spread o...
Chapter
Full-text available
Internet of Things (IOT) started as a niche market for hobbyists and has evolved into a huge industry. This IoT is convergence of manifold technologies, real-time analytics, machine learning and Artificial Intelligence. It has given birth to many consumer needs like home automation, prior device fault detection, health appliances and remote monitor...
Chapter
Full-text available
The main objective of this chapter is to enhance security system in network communication by using machine learning algorithm. Cyber security network attack issues and possible machine learning solutions are also elaborated. The basic network communication component and working principle are also addressed. Cyber security and data analytics are two...
Chapter
Full-text available
The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage,...
Chapter
“Internet of Things” is now a subject that is increasingly growing on both the job and modern devices. It is a concept that maybe not just get the potential to influence how we live but in addition how we work. Intelligent systems in IoT machines in many cases are used by various events; consequently, simultaneous information collection and process...
Conference Paper
The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and softwar...
Conference Paper
Many computing applications are being developed and applied in almost every aspect of life and in every discipline. With increasing number of problems and complexities, there is requirement for more computational power, faster speed and better results. To overcome these computational barriers, quantum computers, which are based on principles of qua...
Article
Full-text available
Internet of Things (IoT) is one of the promising technologies that are developing quickly in various fields such as automation, safety and health. It is a heterogeneous network that links various physical devices. It consists of a variety of vulnerabilities due to its heterogeneous nature. It makes a different level of security issues. Distributed...
Conference Paper
Full-text available
Internet of Things is fasted booming sector. This technology is evolved in various fields. The frequent updates in concerning the progress of Skyscraper fire or high-rise fire it is essential for us to ensure effective and safe firefighting. Since high-rise fire is typically inaccessible by ground vehicles due to some constraints or parameters. Due...
Chapter
Full-text available
Big data is an often misunderstood business term in the modern world. Multiple devices are connected to the internet and a democratization of available technologies. The data is generated almost exponential rate. This data is generated in large quantities, at a high speed and belongs to myriad categories. Coupled with advances in storage and proces...
Chapter
Full-text available
The Internet of Things (IoT) is an imagines unavoidable, associated, and hubs connecting independently while offering a wide range of administrations. Wide conveyance, receptiveness and moderately high handling intensity of IoT objects made them a perfect focus for digital assaults. Additionally, the same number of IoT center points is assembling a...
Chapter
Full-text available
The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is...
Chapter
Full-text available
The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working...
Conference Paper
Full-text available
In the recent years, there has been a boom in the number of connected devices due to developments in the field of Internet of things. This has also increased the requirements of security specification. The proposed method is introducing a secure information transmission system by using Blockchain technology. Blockchain is a relatively new technolog...
Article
Full-text available
The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services. Identifying common checkoff data both files storing them only once. Deduplication can yield cost savings by increasing the utility of a given amount of s...
Article
Full-text available
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple numbers of tasks are allocated to multiple numbers of processors for simultaneous processing. From the given list, t...
Conference Paper
Cloud Computing is a type of Distributed Computing, it has added advantages when compared to Cluster and Grid Computing then provides an economical and efficient solution for sharing group resource among cloud users nowadays it is a challenging issue so they introducing multi owner scheme (MOS) for data sharing by supporting dynamic groups efficien...
Article
Full-text available
Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The advantage of cloud computing includes reduced cost, re-provisioning of resources etc. The cloud network makes use of standard en...
Conference Paper
Full-text available
Educational institutions trying to find the ways to handle their resources in a efficient manner. It is discussed in the following content that cloud computing is find to be the solution for that problem. Since cloud computing helps the Educational establishments to manage their resources in an cost efficient manner. Educational institutions are hi...
Conference Paper
Full-text available
Online shopping is one of the biggest concerns now a day's which helps the user to feel easier to shop anything from their home. It makes it feel easier as it provide verity of product at an affordable price to the customers. Not only that customer can compare the features, lifetime of the product, various brand products with the picture of that pr...
Article
Full-text available
The Government set aside several relief schemes for people, who are affecting in natural disasters like earthquakes, floods, cyclones and so on. The relief funds aided for the people those who are suffering in disaster. Initially, this endowment is helpful for surfers to get their basic necessary services. The benefits of this fund are transacted t...
Article
Full-text available
Cloud computing is emerging technology; it has Stored more amount of data. When accessing the technology, it has to face many problems like load balancing, task scheduling. The main problem is physical host in cloud data center are so overloaded. While it happens, the datacenter has imbalanced. In existing implementation approaches load balancing c...

Questions

Question (1)
Question
Hi.. Currently I am working COVID data security issues. Is there any free dataset is available in internet?

Network

Cited By