Kannan Arputharaj

Kannan Arputharaj
Verified
Kannan verified their affiliation via an institutional email.
Verified
Kannan verified their affiliation via an institutional email.
  • PhD
  • Professor (Retd) at Anna University, Chennai

About

441
Publications
92,315
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,124
Citations
Introduction
I am a Retired Professor from the Department of Information Science and Technology, College of Engineering, Guindy Campus, Anna University, Chennai-25. Earlier I also worked as a Computer Programmer in Bhabha Atomic Research Centre, Mumbai-85. My Areas of Interest include DBMS, Artificial Intelligence, Data Science, and Information Security.
Current institution
Anna University, Chennai
Current position
  • Professor (Retd)
Additional affiliations
September 1991 - present
Anna University, Chennai
Position
  • Professor
August 1981 - March 1989
Bhabha Atomic Research Centre
Position
  • Programmer
Description
  • Software Development
Education
December 1993 - November 1999
Anna University, Chennai
Field of study
  • Intelligent Temporal Databases

Publications

Publications (441)
Article
Full-text available
Signature verification plays a critical role in various industries, including finance and document authentication. However, traditional verification techniques have limitations, such as a lack of robustness and an inability to effectively capture intricate patterns and relationships within the signature images. This paper introduces an innovative a...
Article
Full-text available
In Wireless Sensor Networks (WSNs), sensor nodes are placed to sense and collect data. Due to the energy constraint nature of WSN, optimising the energy during the data dissemination is a major concern. To solve this problem, data aggregation may be used to bring down the redundant transmission of packets in WSN. In most of the previously available...
Article
Secure routing and communication with confidentiality based on encryption of texts in multiple natural languages are challenging issues in wireless sensor networks which are widely used in recent applications. The existing works on Elliptic Curve Cryptography based secured routing algorithms are focused only on the encryption and decryption of sing...
Article
Full-text available
Design of effective algorithm for reliable and energy optimized secure routing protocol (SRP) for wireless sensor networks (WSNs) is a demanding design issue now. To handle this problem, we propose a trust and encryption-based SRP based on trust modelling with intrusion detection, elliptic curve cryptography (ECC), clustering, fuzzy rules and ant c...
Chapter
Routing Protocol for Low-Power and Lossy Networks (RPL) has been used in the Internet of Things (IoT) with Wireless Sensor Networks (WSNs), but it is does not give much focus to protect against routing attacks. Therefore, it is possible for an attacker to utilize the RPL routing system as an initial platform for devastating and crippling attacks on...
Article
Full-text available
Wireless Sensor Network (WSN) communication encounters security vulnerabilities, particularly with network traffic being susceptible to attacks during routing. The effective use of Deep Learning (DL) methods has been demonstrated in developing Intrusion Detection Systems (IDSs) to manage security attacks in Wireless Sensor Networks (WSN). Consequen...
Article
Full-text available
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a challenging issue due to the presence of an enormous volume of users including malicious users communicating wi...
Article
A clinical decision support system is a computer-based system that is designed to assist healthcare providers with clinical decision-making by analyzing electronic health records and other healthcare information systems to provide real-time support to clinicians at the point of care. A novel classification framework for clinical datasets in which t...
Article
Full-text available
Middle-box based attacks create serious functional defects in the devices such as firewalls, address translators, load balancers, server units, and other data inspecting devices. Middle-box based attacks are more severe than terminal node-based attacks. These attacks are mainly initiated to malfunction the internal events of middle-level devices. N...
Article
Full-text available
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link failures, and handover failures. UAVs can easily malfunction by external threats to create data loss, theft, si...
Chapter
Internet of Things is made up of sensor nodes that can sense the given environment, gather the data from environment and then communicates the data to the sink node and the internet through wireless communication. As it follows the routing protocols used in Wireless Sensor Networks, the Denial of Service (DoS) attacks including selective forwarding...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other...
Article
Full-text available
This paper presents the design of a novel dual‐band quasi‐Yagi antenna for on‐body communications. The proposed antenna is designed on 0.05 mm thin microwave laminate and is designed to cover the 2.45 and 3.5 GHz spectrum to meet the needs of on‐body Internet of Things networks. Microstrip to slot‐line transition is used for the excitation of the f...
Article
Full-text available
Recently, research into Wireless Body-Area Sensor Networks (WBASN) or Wireless Body-Area Networks (WBAN) has gained much importance in medical applications, and now plays a significant role in patient monitoring. Among the various operations, routing is still recognized as a resource-intensive activity. As a result, designing an energy-efficient ro...
Preprint
Full-text available
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link failures, and handover failures. UAVs can easily malfunction by external threats to create data loss, theft, si...
Article
Full-text available
Software maintenance is an imperative step in software development. Code smells can arise as a result of poor design as well as frequent code changes due to changing needs. Early detection of code smells during software development can help with software maintenance. This work focuses on identifying code smells on Java software using nanopatterns....
Article
Full-text available
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data transmission, several authentication schemes are proposed by various researchers. The most predominant schemes are b...
Article
Full-text available
A computer‐assisted diagnosis framework to examine computed tomography (CT) slices for diagnosing pulmonary emphysema is designed. Partitioning of lung tissues and regions of Interest (ROIs) from the CT slices is achieved using Spatial Intuitionistic Fuzzy C‐Means (SIFCM) clustering algorithm. Shape features, texture features, and run‐length featur...
Article
Full-text available
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as the next revolution of the Internet since it has provided vast improvements in day-to-day activities of humans...
Article
Classical cryptography is the process of hiding information and it manages the secret knowledge by encrypting the plain text message through the translation of it to an unintelligible message. Quantum cryptography is also hiding the plain text through encryption and it works based on the law of quantum physics for providing absolute security of dat...
Article
Full-text available
The Internet of Things (IoT) is an important and a major key component to support human life. Sensors are the sensing devices that play an important role in IoT to detect environmental conditions. The significance of IoT is increasing due to the increase in the things connected to the internet using Internet Protocol version-6 (IPv6). Low-Power and...
Article
In the field of marketing, many surveys were conducted to analyze the customer satisfaction on products in their online purchases. But the real view of customers about the product is mirrored in the customer’s online reviews (COR) given by them, while they purchase the product online. This paper is the one for analyzing and distinguishing the real...
Article
This study develops a clinical decision support system to assist physicians with monitoring Polycystic Ovarian Syndrome (PCOS). The proposed method uses a classification model with optimization techniques and machine learning algorithms. The existence of irrelevant features can deteriorate the performance of any classifiers. This work analyses the...
Article
Full-text available
Image compression is an important task in most applications to save the storage space and communication cost. In this direction, many researches proposed Block Truncation Coding models to compress the images. However, some limitations are present in the existing image compression algorithms since they do not identify the image block dependencies, p...
Article
Software developers find it difficult to select the specific detection rules for different smell types. A set of metrics, thresholds and labels constitutes a code smells detection rule. The generated rules must be optimized efficiently to ensure successful rule selection. The objective is to identify how rules are generated from the labeled data se...
Article
Full-text available
In this paper, we propose a new clustering, encryption and trust modeling based energy aware routing secured algorithm for performing secured data communication in Wireless Sensor Networks For this purpose, an Elliptic Curve Cryptography based encryption scheme is proposed in this work where the key generation scheme of Elliptic curve cryptography...
Article
The identification of Parkinson’s Disease (PD) is a necessary concern for reducing the occurrences of nervous disorders and brain death. The prediction of PD based on symptoms is depending on the body conditions of patients as the symptoms differ for every individual. Doctors preferably use ionized radiation-free MRI scans since they offer more pre...
Chapter
Cloud computing is the distributed collection of virtual computing devices which are used to store, process and outsource the data for the different vendors in dynamic manner. Data which is being the most valuable asset in cloud computing is vulnerable to security and privacy of data that is being shared and used in the cloud environment. Guarantee...
Article
In this paper, we propose a new clustering, encryption and trust modeling based energy aware routing secured algorithm for performing secured data communication in Wireless Sensor Networks For this purpose, an Elliptic Curve Cryptography based encryption scheme is proposed in this work where the key generation scheme of Elliptic curve cryptography...
Article
Full-text available
Personalized recommendation systems recommend the target destination based on user-generated data from social media and geo-tagged photos that are currently available as a most pertinent source. This paper proposes a tourism destination recommendation system which uses heterogeneous data sources that interprets both texts posted on social media and...
Article
A Computer-Aided Diagnosis (CAD) system to assist a radiologist for diagnosing pulmonary emphysema from chest Computed Tomography (CT) slices has been developed. The lung tissues are segmented from the chest CT slices using Spatial Fuzzy C-Means (SFCM) clustering algorithm and the Regions of Interest (ROIs) are extracted using pixel-based segmentat...
Preprint
Full-text available
Agriculture is the backbone for most of the countries in the globe including our India. Crop Yield influences a country's economy and common public. Water is the most important factor in agriculture, water requirements for different crops. Now availability of water is a big challenge everywhere because of the climate change, No proper rain fall. No...
Article
Classification is a data mining task, which plays a vital role in clinical diagnosis. Irrelevant features will reduce the classifier accuracy. Only a subset of features in a clinical dataset plays a key role in diagnosing the disease. Thus, selecting the relevant features and training the classifier will improve the classifier accuracy. Clinical da...
Article
Full-text available
One of the prominent applications of Internet of Things (IoT) in this digital era is the development of smart cities. In IoT based smart cities, the smart objects (devices) are connected with each other via internet as a backbone. The sensed data by the smart objects are transmitted to the sink for further processing using multi hop communication....
Article
Full-text available
Wireless sensor networks (WSN) with the Internet of Things (IoT) play a vital key concept while performing the information transmission process. The WSN with IoT has been effectively utilized in different research contents such as network protocol selection, topology control, node deployment, location technology and network security, etc. Among tha...
Chapter
Artificial neural networks (ANN) are widely used for classification, and the training algorithm commonly used is the backpropagation (BP) algorithm. The major bottleneck faced in the backpropagation neural network training is in fixing the appropriate values for network parameters. The network parameters are initial weights, biases, activation func...
Chapter
There are different types of healthcare simulations currently available varying from simulation of patient records in hospital emergency wards, specific disease level simulation of patient history to human resource management in clinical environments. Role of Machine Learning (ML)/Deep Learning (DL) models in such simulations is very significant an...
Article
Full-text available
Wireless Sensor Networks (WSNs) contain multiple wireless sensor nodes deployed around the geographical locations. The WSN used in military applications need more security and hence the deployment of trustworthy nodes and links in WSN provides more secure data transmission in Decentralized Military Sensor Networks (DMSNs). Moreover, the DMSNs work...
Chapter
In a Wireless Sensor Network (WSN), there are some energy constrained tiny sensor devices called nodes. These nodes can sense the environment, capture the data and routing them optimally to the base station. It is used in many applications including agriculture, medicine and transportation. However, the existing routing algorithms for WSN are not e...
Article
Full-text available
Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes that have been used to sense the physical parameters of the environment where it has been deployed. Data dissemination is an important activity performed in WSNs in order to administer and manage them. Gossiping makes the network to transmit the same data item multiple...
Article
A framework for Computer-Aided Diagnosis (CAD) to diagnose Cavitary TB and Miliary TB from chest Computed Tomography (CT) slices has been designed and implemented. The lung tissues from the CT slices are segmented using region-based Active Contour Model (ACM) and the Region of Interests (ROIs) labelled by an expert radiologist are extracted. Featur...
Article
Full-text available
In this paper, we propose a new cryptosystem based on matrix translation and Elliptic curve cryptography for developing a secure routing algorithm to provide energy efficient and secured data communications in Wireless Sensor Networks. Moreover, the newly proposed techniques are implemented by decomposing the process into the key generation phase,...
Preprint
Full-text available
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Network (SDN), Artificial Intelligence, Machine Learning and Cloud Computing. In 5G, secure data communication is a challenging issue due to the presence of enormous volume of users including malicious users communicating with l...
Chapter
Healthcare applications are diverse in nature and they are in critical need of compatible and understandable systems through which they can communicate effectively. A semantic framework for such disparate applications is very necessary so that the resultant seamless communication between them would boost up the patient information access and health...
Preprint
Full-text available
Classification of label-specific users’ diversified interests is the most formidable task in personalized news recommendation systems (PNRS). To bring personalization to PNRS, many remarkable features have to be considered from their user profile to classify their interest. In this paper, 13, 346 features are considered per user to classify their i...
Article
WSN plays a major role in the design of IoT system. In today’s internet era IoT integrates the digital devices, sensing equipment and computing devices for data sensing, gathering and communicate the data to the Base station via the optimal path. WSN, owing to the characteristics such as energy constrained and untrustworthy environment makes them t...
Article
Trust‐aware clustering plays a vital role in addressing the security issues faced by mobile ad‐hoc networks (MANETs). The trust worthiness of each participated node is to be estimated for ensuring the secure communications in MANETs. In this article, we propose a new trust‐based secure energy‐aware clustering (TSEAC) model to mitigate the malicious...
Article
Full-text available
Trust management is an important aspect to enhance pattern and increase the secured packet transmission in Wireless Sensor Networks (WSNs). The kernel of the trust management is estimation of trust. If a trust prediction model is not enough to withstand against the malicious nodes from the network it affects performance as well as energy consumptio...
Article
Full-text available
Abstract: Security of data stored in the cloud databases is a challenging and complex issue to be addressed due to the presence of malicious attacks, data breaches and unsecured access points. In the past, many researchers proposed security mechanisms including access control, intrusion detection and prevention models, Encryption based storage meth...
Article
Full-text available
Wireless sensor networks consist of many tiny sensor nodes which are deployed in various geographical locations for sensing the normal spectacles and also to transmit the collected information to the base station which is also named destination node through multiple nodes present in the network. Most of the existing heuristics algorithms used for f...
Article
Clinical time series data contain large set of time-stamped data points that describe the patient’s health. The observations of these data points are done at irregular intervals and hence knowledge mining turns challenging. To overcome this, there is a need to reduce the dimension (length) of time series data into smaller representations with minim...
Article
In current world, the Mobile Cloud Computing (MCC) will undergo a dramatic upgrade with integrating of mobile cloud resources in small regions to provide a better MCC service. This paper considers the MCC resource availability problem in integrated mobile cloud environment to optimization resources availability with a better effectiveness, accuracy...
Article
Full-text available
In this paper, we propose an enhanced security framework for securing the cloud users data in the cloud environment. This new security framework consists of access control methodology, encryption/decryption technique and digital signature algorithms. Here, a new Elliptic Curve Cryptography based key generation algorithm is proposed for generating h...
Article
Full-text available
Error rate is a challenging parameter to be met for most of the recommendation systems where there is a high probability of item movement among the data clusters. In social networking applications, it is often necessary to produce apt user recommendations where ant-based clustering techniques provide best optimal solutions to the clustering problem...
Article
Class imbalance and the presence of irrelevant or redundant features in training data can pose serious challenges to the development of a classification framework. This paper proposes a framework for developing a Clinical Decision Support System (CDSS) that addresses class imbalance and the feature selection problem. Under this framework, the datas...
Article
A novel classification framework for clinical decision making that uses an Extremely Randomized Tree (ERT) based feature selection and a Diverse Intensified Strawberry Optimized Neural network (DISON) is proposed. DISON is a Feed Forward Artificial Neural Network where the optimization of weights and bias is done using a two phase training strategy...
Article
Full-text available
In this world of science and technology, the Internet of Things [IoT] plays a predominant role in the wide range of sectors such as communications. Without communication, no movement exists. Thereby, IoT plays a vital key role in medical science for connectivity establishment in faster space regulation. IoT has several roles in many streams like sm...
Article
Full-text available
Mobile Ad-hoc NETworks (MANETs) are the self-configuring network consisting of mobile nodes communicating via radio waves. These networks do not have any centralized controlling mechanism and designated routers. All the nodes in the network can be either a communication end point or a router. Therefore, MANETs are more vulnerable to attacks. Black...
Article
Full-text available
Social networks build and maintain relationships between individuals. Sentiment analysis is important in social network analysis for extracting user’s interest from product preferences based on reviews to determine whether it is positive, negative or neutral review. Moreover, sentiment analysis is used to predict the sentiment of users on specific...
Article
Pulmonary emphysema is a condition characterized by the destruction and permanent enlargement of the alveoli of the lungs. The destruction of gas-exchanging alveoli causes shortness of breath followed by a chronic cough and sputum production. A Computer-Aided Diagnosis (CAD) framework for diagnosing pulmonary emphysema from chest Computed Tomograph...
Article
Rapid introduction of new diseases and the severity improvement of existing dead diseases due to the bad food habits and lacking of awareness over the health conscious food items those are available in the market. The Internet of Things (IoT) gets more attention for reducing the disease severity by knowing the current status of their disease accord...
Article
Full-text available
Congestion-free routing of packets across a Wireless Sensor Network (WSN) is an important issue to be addressed for quick response applications such as disaster management, healthcare systems, traffic control, etc. The existing routing algorithms have been developed by mainly considering hop-count leading to a gap in addressing congestion problem i...
Article
Full-text available
Many agricultural activities can be highly enhanced by using sensor networks and data mining techniques. One of these activities is the regulation of the quantity of water in cultivated fields. Moreover, wireless sensor network have become a more emerging technology in precision agriculture during the recent years. The important issue in the design...
Article
Full-text available
In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced...
Research
Graph labeling
Article
Full-text available
Intrusion Detection Systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known type of attacks. However, it neglects to recognize the new sort of attacks which are introduced by malicious users leading to vulnerability and information lo...
Article
Full-text available
Internet of Things is a distributed collection of smart devices, where the smart device communicates with each other using Device to Device (D2D communication. Due to the resource constraint nature of IOT, the lightweight communication protocol is needed. Message Querying Telemetry Transport (MQTT) is one of the lightweight communication protocol w...
Article
Full-text available
In Wireless Sensor Network (WSN), the lifetime optimization based on minimal energy consumption and security are the crucial issues for the effective design of protocols to perform multi-hop secure routing. In order to address these issues, we propose a new routing protocol called Secured Quality of Service (QoS) aware Energy Efficient Routing Prot...
Article
Co-operative co-evolution approach solves problems by breaking them into subproblems. The proposed framework for Clinical Decision Support System (CDSS) uses a co-operative coevolution approach which treats Feature Selection (FS) and Instance Selection (IS) as independent subproblems. FS and IS remove less relevant features and instances, respectiv...
Chapter
Congestion control is an important factor for performance improvement in wireless sensor networks (WSNs). Congestion occurs due to various reasons including a variation in the data rate between incoming and outgoing links, buffer size, flooding attacks and multiple inputs and minimum output capability. Various outcomes of congestion in sensor netwo...
Chapter
In this article, a classification framework that uses quantum-behaved particle swarm optimization neural network (QPSONN) classifiers for diagnosing a disease is discussed. The neural network used for classification is radial basis function neural network (RBFNN). For training the RBFNN K-means clustering algorithm and quantum-behaved particle swar...
Chapter
Full-text available
Biomedical industries produce an enormous amount of medical data day by day which requires a huge storage space and processing power. Cloud computing provides enough space to store this huge amount of data. Cloud computing technology offers the required scalability with computing power through cloud service providers. In this scenario, medical data...
Book
Abstract: Biomedical industries produce an enormous amount of medical data day by day which requires a huge storage space and processing power. Cloud computing provides enough space to store this huge amount of data. Cloud computing technology offers the required scalability with computing power through cloud service providers. In this scenario, me...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) is a collection of tiny nodes which are widely deployed in a given environment to sense the natural phenomenon and send the sensed information to via control station using multi hop communication. The advantages of the WSNs are their cost efficient and effective communication in unattended environments. Most of the e...
Article
Full-text available
In information retrieval systems, the location information can be collected by using Global Positioning Systems for providing Location Based Services (LBS) to the information system users. The LBS can be either person-oriented or device-oriented. In the person-oriented approach, the LBS focuses on the location of the user and the user can control t...
Article
Full-text available
The security of data communicated through wireless networks is a challenging issue due to the presence of malicious and unauthenticated users whose intention is either to disrupt the communication or to know context of the data communicated to perform data theft and prevent the communication made by genuine users. To address this problem, a new sec...
Article
Full-text available
Wireless Sensor Networks (WSNs) is a distributed collection of tiny wireless nodes which forms an ad hoc network dynamically to sense the natural phenomenon and sent it to the control station. Due to the resource constrained nature of WSN, maximizing the nodes life time is main and challenging issue. In this paper, Fitness Function based Routing Pr...
Article
Full-text available
Chronic renal syndrome is defined as a progressive loss of renal function over period. Analysers have make effort in attempting to diagnosis the risk factors that may affect the retrogression of chronic renal syndrome. The motivation of this project helps to develop a prediction model for level 4 CKD patients to detect on condition that, their esti...
Article
Full-text available
A framework for clinical diagnosis which uses bioinspired algorithms for feature selection and gradient descendant backpropagation neural network for classification has been designed and implemented. The clinical data are subjected to data preprocessing, feature selection, and classification. Hot deck imputation has been used for handling missing v...
Article
Full-text available
A cognitive radio network has the capability to detect the channels present in wireless spectrum automatically so that it is possible to perform concurrent communication. The major challenges in cognitive radio networks are relay selection and effective sharing of spectrum. Moreover, when the number of secondary users or relay nodes is augmented in...

Network

Cited By