Suseendran G.VELS INSTITUTE OF SCIENCE, TECHNOLOGY & ADVANCED STUDIES (VISTAS), CHENNAI. · INFORMATION TECHNOLOGY
Suseendran G.
M.Sc.,M.Phil.,Ph.D., Computer Science
About
149
Publications
98,165
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,072
Citations
Introduction
Dr.G.Suseendran received his M.Sc., Information Technology and M.Phil., degree from Annamalai University, Tamil Nadu, India and Ph.D., degree in Information Technology-Mathematics from Presidency College, University of Madras, Tamil Nadu, India. In additional qualification, he has obtained DOEACC ‘O’ Level AICTE Ministry of Information Technology and Honor Diploma in Computer Programming. He is currently working as Assistant Professor in Department of Information Technology, School of Computing Sciences, Vels Institute of Science, Technology & Advanced Studies (VISTAS), , Chennai, Tamil Nadu, India which is well known University. He has years of teaching experience in both UG and PG Level. His research interests include Ad-hoc networks, Data Mining, Cloud Computing, Image Processing
Additional affiliations
July 2015 - present
Vels Institute of Science, Technology & Advanced Studies (VISTAS
Position
- Professor (Assistant)
Description
- Dr.G.Suseendran received his M.Sc., Information Technology and M.Phil., degree from Annamalai University, Tamil Nadu, India and Ph.D., degree in Information Technology-Mathematics from Presidency College, University of Madras, Tamil Nadu, India.
Education
July 2009 - May 2015
Publications
Publications (149)
The innovation proposed is a Wi-Fi-based cost-effective water surface cleaner. In India, water contamination has been growing rampant, leading to the issue of the availability of clean water. This innovation is fundamentally useful because it can filter pollutants, such as waste-water trash, plastics, and trash on coastal water surface. These conta...
A smart transportation system relies on connected environments and cloud systems for ease of operation and assisted routing. Smart vehicles understand the environment through multi-sensor, network, and pervasive systems for gaining useful information. The problem arises with the absence of useful information in explicit scenarios where heterogeneou...
In the laundry list of problems faced by farmers across the world, lack of modern technology and mechanization for water and crop management is identified to be imperative to cope with the rapid population growth across the world and to improve the yield. The world is witnessing the increasing scarcity of water for years due to an increase in the p...
5G is expected to bring tremendous advancement in wireless cellular network by providing faster speed, high capacity and low latency. It has widely been adopted in various parts of the world and is expected to bring a noteworthy revolution in major industries and overall economies. Although 5G service providers are promising integrity, confidential...
The control of impulsive chaotic system based on T–S fuzzy model is investigated. The asymptotic mean square stability criterion is designed. A robust supervisory control is proposed. When fuzzy based impulsive chaotic systems are subjected to system uncertainties and external disturbance, the supervisory control can induce the convergence speed of...
The recent development in data mining in various fields and firms, for example, hospital, medicinal research, banking, government firm attracted many users. Data examination can be done in numerous possible ways quickly. But for the data examination in semi-structured datasets like XML format, json is little tricky than standard datasets. The easy...
We can find a massive demand for systems that retrieve video with a query as image or video since the text-based retrieval system (text, images, video) was obsolete and the content-based video retrieval oriented. For many applications, ‘it is essential for retrieving videos from the extensive database with image and video query for content linking...
The paper addresses research in the area of software testing, which has a critical part of performing in software quality assurance. It becomes very inefficient for a tester to re-execute massive number of test cases again and again for small variations. The proposed artificial neural network with the genetic algorithm-based case suite prioritizati...
Right off the bat, the ideas and arrangement about imagined information mining innovation expounds in this paper, data mining at that point the innovation and regression analysis technology and the visualization data, what’s more, are talked about; finally, the use of data mining addressed in combination with sliding bearing wear coefficient testin...
During the big data era, there is a continuous occurrence of developing the learning of imbalanced data gives a pathway for the research field along with data mining and machine learning concepts. In recent years, Big Data and Big Data Analytics having high eminence due to data exploration by many of the applications in real-time. Using machine lea...
Multimedia applications and platforms are widely being accepted in industry, business, and academia as an alternative to classical communication equipment and techniques. Applications and platforms like distance learning, video conferencing, instant messaging, on-demand entertainment and group collaborations are the general usage areas. Advancement...
For Smart Cattle Monitoring using IoT sensors, it is required to accurately predict the illness of cattle, well in advance and take the necessary actions. It is also necessary to ensure failure-free, stable and energy-efficient communications. Hence in this paper, a SmartCattle Health Monitoring System with reliable communications using IoT sensors...
This article presents a new scheme for data optimization in IoT assister sensor networks. The various components of IoT assisted cloud platform are discussed. In addition, a new architecture for IoT assisted sensor networks is presented. Further, a model for data optimization in IoT assisted sensor networks is proposed. A novel Membership inducing...
Service-oriented architecture has changed the way that web applications are designed. Today users are more inclined towards online products and services to save time, energy, and cost. However existing frameworks for online purchasing have certain drawbacks and one of the foremost is ‘trust’. Hence the struggle is to build such a system trust that...
In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evoluti...
Title : Cloud Computing And Big Data: A Comprehensive Analysis
Journal Name : Journal of Critical Review, Vol.7(14), 2020,pp185-189 ,
Doi : 10.31838/jcr.07.14.32
Url : http://www.jcreview.com/index.php?mno=13208
This paper I have published based on my earlier research work. Interested can go through this paper.
Reference
1. Mahalakshmi, B., an...
CALL FOR BOOK CHAPTERS
Book Title: Convergence of Artificial Intelligence with Blockchain Technologies: Challenges and Opportunities
Publisher: World Scientific
Note: “The Chapters in the Edited Book will be sent for Indexing with Scopus and Web of Science by the Publisher”
The Internet plays an important role in the modern world. With the increasing usage of internet and web-based applications, various enterprises turn to big data solutions to cope up with the changing demand. In this big data era, data is the most valuable entity as it is mainly used by businesses for future prediction and decision making. With a su...
In today's modern business climate, upgrading is important, the infrastructure of information technology includes the hardware, software, services management and maintenance used by the support of IT operations and managing a corporate IT infrastructure can be a substantial task requiring specific skills and knowledge. The IT tickets are the generi...
MANET and VANET are emerging technology in the current trend for research. VANETs are a subclass of MANETs. In MANET, nodes are connected by wireless channels in-network and each node acts as a router and as host. One of the scenarios of MANET is Vehicular ad-hoc networks (VANET). For communication in VANET, the vehicles interacting between themsel...
Secured transmission is an important concern in today's Internet world in the field of information technology. Recent technological developments in the computer networks have made digital data transmission a popular task and digital images are no exception. Visual Secret Sharing is a process of encrypting an image secret in "n" cipher images termed...
A tumor is a mass of tissue that becomes crazy of the customary powers that control development Brain tumors are an irregular and uncontrolled multiplication of cells. An auxiliary or metastatic mind tumor happens when malignant growth cells reach out to the cerebrum from the essential disease in an alternate part of the body. The imaging assumes a...
Customer complexity is a main issue and for large companies is the main problem. Considering the immediate impact on firms 'earnings, companies are trying to change strategies to calculate customer concerns. Consequently, it is very important to find a way to solve this problem by differentiating the factors that increase the client's depression. T...
In IoT environments, sensor nodes often need to transfer a massive quantity of identified data to the doorway in a petite duration. Therefore the door needs to usually validate the collaborating strategies in every period. But traditional security methods which involve cryptographic operations and privacy protections are not applicable in IoT netwo...
In this paper, we determine a data mining techniques on agricultural land for soil erosion monitoring. We used the spatial data and pattern mining tool used herein the time series of satellite images. The first thing we use in time series of satellite images is to get the input images and it is processed and spatial mining is used. Pattern mining w...
Novel Coronavirus (2019-nCoV) or Human Corona-virus (HCoV) could be a new coronavirus that belongs to Be-tacoronaviruses type Human Coronaviruses, just like the Middle East Respiratory Syndrome (MERS) coronavirus and Severe Acute Respiratory Syndrome (SARS) coronavirus. Wu-han, the capital city of Hubei province, China recorded the initial cases of...
Of late, the data mining has appeared on the arena as an ideal form of knowledge discovery crucial for the purpose of providing appropriate solutions to an assortment of issues in a specified sphere. In this regard, the classification represents an effective method deployed with a view to locating several categories of anonymous data. Further, the...
In IoT sensor networks, in the course of statistics accumulation, the statistics severance and stowage overhead may perhaps be augmented. Likewise, the dependability and steadiness of radar information need to be mentioned. Therefore in this research, Reliable and Consistent Data Collection Framework for IoT sensor networks is aimed. In this agenda...
Neediness is a significant issue India is confronting, which relies upon agribusiness as the principle monetary action. Various partners have included themselves in boosting rural profitability, Autoregressive integrated moving average (ARIMA) models were used for determining the domestic animals value with the information given by FAOSTAT. Domesti...
Image fusion plays an important role in computer vision, medical imaging, robotics, remote sensing and satellite imagery. Image fusion is a method or a process in which it produce all relevant information in a single image by combining two or more input images. The final image or final output contains more information than a single image. Hyperspec...
This paper proposes the application of various types of highlight extractors method to perceive the airplane utilizing the satellite picture. Acknowledgment of article (Aircraft) in a picture dependent on the mix of highlight extractors which contain non-subsampled contourlet change and SPIHT change notwithstanding the relationship on shape examina...
Now a day's research works on agriculture field have been widely implemented and it is the department that shows rapid growth. This improved growth has shaken its hands to technology for extreme growth. Man, free system for food processing unit like classification based on variety, quality and other aspects. This paper expresses about seed classifi...
Feature extraction is an essential problem to be solved in medical image analysis as it extracts distinctive features and thereby enhances the diagnosis for detecting breast cancer. Usually, for detecting Breast cancer, of the many available techniques, two prominent techniques namely Bilateral Perona-Malik Diffusion Filtering (henceforth BPDF) and...
In recent years the traditional financial industries have motivated for a new technology of financial technology (FinTech) clinch embraced with internet of things (IoT). The requirements of FinTech and IoT need to be integrated into new business environment. Several companies are affected because of the financial-level investments. So, there is a n...
Nowadays, speech recognition is becoming a more useful technology in computer applications. Many interactive speech-aware applications exist in the field. In order to use this kind of easy way of communication technique into the computer field, speech recognition technique has to be evolved. The computer has to be programmed to accept the voice inp...
This book covers both basic and high-level concepts relating to the intelligent computing paradigm and data sciences in the context of distributed computing, big data, data sciences, high-performance computing and Internet of Things.
It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure and p...
Detection of any abnormalities in the human is a big challenge faced by many of the field experts. One such challenge is to detect the Breast Cancer. The prime mottobehind in making this paper is to detect the breast cancer with the help of breast images in an advanced and appropriate way. In this study, an attempt is made in such a way by applying...
As time-series data are eventually large the discovery of knowledge from these massive data seems to be a challenge issue. The similarity measure plays a primary role in time series data mining, which improves the accuracy of data mining task. Time series data mining is used to mine all useful knowledge from the profile of data. Obviously, we have...
Zika virus a mosquito borne flavivirus disease, which is spreading hastily across all over the world. Nearly 95 countries are infected with Zika, Aedes aegypti Mosquitoes is the source of spreading the virus. Microcephaly, myelitis, Guillain-Barre Syndrome and neuropathy are the causes of ZVD. Miscarriages and preterm birth also possible also occur...
Data mining procedures are colossally regarded in the examination field of cultivating. The cultivating factors atmosphere, deluge, soil, pesticides, and fertilizers are the basic careful perspective to raise the age of yields. The key piece of agribusiness is Soil for yield creating. Examination of soil is a basic bit of soil asset the administrat...
Kidney disease is one of the real general medical issues these days. Ceaseless ailments prompt to horribleness and mortality in India and furthermore in the low pay and center nation. The interminable infections on record is 60% of death all through the around the world. 80% of unending malady passing overall additionally happen in low and center p...
The growing demand for an efficient approach to classify time series data is bringing forth numerous research efforts in data mining field. Popularly known applications like business, medical and meteorology and so on, typically involves majority of data type in the form of time series. Hence, it is crucial to identify and scope out the potential o...
Over the last decade heart disease has significantly increased and it has emerged to be the primary reason behind the mortality in people living in many nations across the world. The computer-assisted systems act as a tool for the doctors in the prediction and diagnosis of heart disease. In the medical domain, Data Mining yields a variety of techni...
In IoT sensor systems, the existing scheduling approaches fail to satisfy the varying Quality-of-Service (QoS) requirements of heterogeneous applications and their demands. This paper proposes a priority based adaptive scheduling algorithm (PASA) for IoT sensor systems. Unlike the existing scheduling techniques, the proposed PASA considers the requ...
Image steganography based on various methods like LSB method of hiding data image to cover images are most common method for secret communication. There are many steg-analysis algorithms available for to detect hidden data in an image. There are many existing cryptography methods for image encryption like DES, AES, RSA, etc. but these are of less s...
ASR (Automatic Speech Recognition) systems are responsible for transforming a speech signal in the form of sequence-of-words which can be utilized for both text-based communication as well as device controlling purposes. Aim of analyzing ASR systems arises in order to simulate human judgment of the systems performance for computing their usefulness...
According to the Centers for Disease Control (CDC), heart disease is the leading cause of death in most of the country. This research includes Artificial Intelligence (AI) and soft computing techniques to resolve the complexity and performance improvement over conventional methods. The preliminary process is to gather heart data base in real word e...
Cloud computing significant plays a major role in all the sectors. The use of cloud resource is increasing rapidly. Since a small organization to higher the need of cloud is increasing on demand basis even for the individual too. Hence the data is stored in cloud server through some service providers from smaller to larger concern the threat on dat...
Approximate string matching has many applications in Natural Language Processing. This paper provides a comparison of various algorithms for approximate string matching. Most of the algorithms are based on the edit distance between characters in the two strings. It also covers the challenges in using these algorithms for the purpose of text retriev...
This paper manages a totally one of a kind non-obtrusive logical analytic methodology bolstered connection of nasal cycle musicality with 3 spiral heartbeats. In Siddha prescription, one in all the ordinary Asian country frameworks of medications especially in south India this standard is extra-normal and fundamental for beginning screening in the...
Fuzzy Decision Making (FDM) combination rule can be used to improve the real time prediction in cloud. Needs the dynamic approach in day to day to monitor the traffic and notify the illegal problems into system administrator. This type of approach is known as HNIDS (Hybrid Network Intrusion Detection System). So our model HNIDS is introduce the FDM...
The enhancement of HNIDS security prevents the malicious attacks from inside and outside cloud. The intrusion by the malicious attackers in real time cloud networks has major problems for security credentials. The new attacks are identified in cloud networks are not enough to handle the critical situations. The multi-tenant/ small industries are us...
Security in mobile ad hoc environment is the most concerned research issue which is focused in the proposed research methodology by introducing authenticated routing based attack injection and detection framework using genetic fuzzy rule based system (AR-AIDF-GFRS). This assures both the successful detections of attacks present in the environment a...