Vanmathi Chandrasekaran

Vanmathi Chandrasekaran
  • Doctor of Philosophy
  • Associate Professor at Vellore Institute of Technology University

About

65
Publications
11,141
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
256
Citations
Current institution
Vellore Institute of Technology University
Current position
  • Associate Professor

Publications

Publications (65)
Article
Full-text available
For smart cities, predicting traffic flow is crucial to lower traffic jams and enhancing transportation efficiency. The smart city needs effective models, highly dependable networks, and data privacy for traffic flow prediction (Traff-FP). The majority of current research uses a central training mode and ignores privacy issue conveyed by distribute...
Article
Full-text available
Cyber-Physical Systems (CPSs), which integrate control, computing, and communication, are considered as next-generation intelligent systems.A major concern in CPS is to ensure security. If security is not ensured, then it leads to both property damage and casualties.Since CPS is closely associated with real life, it is a hot research area in presen...
Article
Full-text available
Visually, the environment is made up of a chaotic of irregular polygons. It is an important and intriguing issue in many fields of study to represent and comprehend the irregular polygon. However, approximating the polygon presents significant difficulties from a variety of perspectives. The method provided in this research eliminates the pseudo-re...
Article
Full-text available
The Intelligent Transport System (ITS) is very prominent due to its connection with the Internet of Things (IoT), which enhances passenger security and comfort. The Vehicular Ad-hoc Network (VANET) is a component of ITS. It manages the techniques used for routing and privacy in autonomous cars. The increasing number of autonomous cars has exceeded...
Article
Full-text available
Healthcare is a critical area where blockchain technology (BT) is being heralded as a potential game-changer for facilitating secure and efficient data sharing. The purpose of this review is to examine BT applications, performance challenges, and solutions in healthcare. To begin, This review paper explores popular blockchain networks for data exch...
Article
Full-text available
A growth of the uncontrollable cells in a body causes cancer, which is one among deadly diseases. It can be developed at any parts of human body that may comprise of numerous cellules. The most frequently occurring cancer type is referred to skin cancer that develops in uppermost layer of skin. Skin cancer is a hazardous type of cancer, which affec...
Article
Full-text available
The increasing amount of IoT devices increases the size of network traffic data, causing an increase in the incidence of security breaches in IoT networks. Cybercriminals have developed malware to compromise the security of sensitive data, among other cyber threats. In the presence of inadequate and robust security mechanisms, sensitive data is pro...
Article
Full-text available
Blockchain technology is rapidly transforming how businesses and individuals interact. Its inherent security features, including immutability, tamper-proofing, and verifiable data provenance, are driving its adoption across numerous sectors. The financial sector heavily influences blockchain for its tamper-proof nature, leading to the rise of crypt...
Article
Machine learning techniques commonly used for intrusion detection systems (IDSs face challenges due to inappropriate features and class imbalance. A novel IDS comprises four stages: Pre-processing, Feature Extraction, Feature Selection, and Detection. Initial pre-processing balances input data using an improved technique. Features (statistical, ent...
Article
The proliferation of Internet of Things (IoT) solutions has led to a significant increase in cyber-attacks targeting IoT networks. Securing networks and especially wireless IoT networks against these attacks has become a crucial but challenging task for organizations. Therefore, ensuring the security of wireless IoT networks is of the utmost import...
Article
Full-text available
Industry 4.0 integrates cyber systems, physical devices, and digital networks to automate the industrial process. Many sectors aim to adopt the best practices outlined in Industry 4.0. This indicates well for the future networking of an increasing number of devices. As crucial as intelligent automation is, it is essential that it be protected. The...
Chapter
Full-text available
The growing demand for having a conversation amongst people who come from different areas, across the globe, resulting from globalization, has led to the development of systems like machine translations. There are techniques like statistical models, Bayesian models, etc. that were used earlier for machine translations. However, with growing expecta...
Chapter
A human's words, facial expressions, gestures, tone of voice, and even keyboard force can all be used in conjunction with artificial intelligence technologies to perform emotion intelligence (EI) identification. The development of artificial emotional intelligence has made it possible for people and robots to interact in a manner that is more natur...
Preprint
Full-text available
Drone internet of things (IoT) is a new computer system idea that describes future technological deployments using diverse drone/node communication methods in 5G-oriented networks. It has emerged in recent years. Sophisticated 5G networks are constantly updating the information of users in data sharing with quick adoption of advanced computing. Sec...
Article
A high level of glucose in the blood over a long period creates diabetes disease. Undiagnosed diabetes may trigger other complications such as cardiovascular disease, nerve damage, renal failure, and so on. There are many factors age, blood pressure, food habits, lifestyle changes are some of the reasons for diabetes. With increasing cases of diabe...
Chapter
This paper is concerned to deliver a safe healthcare system through IoMT. Protecting patient information and preventing device/gadget takeover is the key to enabling the safe delivery of healthcare. A significant issue is that a considerable number of the machine-to-machine (M2M) conventions utilized today are characteristically uncertain, leaving...
Chapter
Communicating our requirement is mandatory and challenging too in cross lingual domain. Natural Language Processing (NLP) has gained attraction among industry personnel, academicians and researchers. NLP deals with the inherent challenges involved in knowledge sharing with machine learning and data analytics. Although Machine learning (ML) and Deep...
Article
Full-text available
In today’s trend consumers are very much concern about the quality of the product in turn, Industries are all working on various methodologies to ensure the high quality in their products. Most of consumers judge the quality of the product based on the certification obtained for the product. In Earlier days, the quality is measured and validated on...
Article
Full-text available
Internet usage became increasingly ubiquitous. The concern regarding security and privacy has become essential for Internet users. As the usage of the Internet increases the number of cyber‐attacks also increases substantially. Intrusion detection is one of the challenging aspects of network security. Efficient intrusion detection is crucial for ev...
Article
Full-text available
Urbanization affects the quality of the air, which has drastically degraded in the past decades. Air quality level is determined by measures of several air pollutant concentrations. To create awareness among people, an automation system that forecasts the quality is needed. The COVID-19 pandemic and the restrictions it has imposed on anthropogenic...
Patent
Full-text available
The Visually Impaired People has to move in the highly dense society without the help of others. In real world situation, they have to overcome more obstacles, hurdles and traffic while they navigate indoor and outdoor. Even more sophisticated technology cannot aid those peoples for their convenience, navigation and utility. The number of visual im...
Article
Satellite Image Processing has always been a good domain to carry out researches. This is mainly due to the probability of the vast nature of the domain. There are many Image fusions and segmentation methods are available in the area of Satellite Image Processing. The presented research work proposes the image fusion method to inter twined the high...
Conference Paper
The reversible data hiding hides the secret data into an image and the secret data, the original image is recovered without data loss. In this paper, we proposed a reversible steganographic method using repeat accumulate coding. The secret information is embedded using compression codes. This paper presents a dual tree repeat accumulate coding base...
Article
Information security is one of the mos t importantprocesses and methodologies which have to be consi deredwhen any information is communicated secretly betweentwo parties. Cryptography and steganography are the twoimportant practices used for this purpose. Cryptographychanges the secret message into unintelligible text; how-ever, it reveals the exi...
Article
Steganography plays an important role in information sharing. In this paper a wavelet based image steganography using Haar wavelet and an N-ary notation is proposed. The high and middle frequency coefficients are selected based on the Shannon entropy value to identify the best sub band for data hiding. Peak signal to noise ratio and Structure simil...
Data
Though there are several advancements in technology, only a very few of them are concentrated on predicting and detecting natural disasters such as Earthquake, Tsunami and etc. But using technology in these areas would save lives by warning people about the disaster at an earlier time and will be very helpful. The existing methodologies are capable...
Data
Weather is a state of the atmosphere that it is cold or hot, dry or wet, stormy or quiet and cloudy or clear. Generally weather defines the day-today temperature and precipitation activity. Meanwhile climate is a term that is the average atmospheric conditions over a period of time. Weather is assumed to mean the earth's weather when used without q...
Research
Full-text available
Smart vehicles are trending worldwide network connecting all the smart objects during travelling. Whenever those smart things being connected over to each other which are not only restricted vehicles. With consistently expanding urban populace and quickly growing urban areas, issues in regards to vehicle security has been expanding at an exponentia...
Data
Transportation is a major problem domain in logistics, and so it represents a substantial task in the activities of many companies. In some market sectors, transportation means a high percentage of value added to goods. As per this day there is no deterministic approach invented which will give the best result and solves the problem of Vehicle rout...
Data
Any machine as we know is something that decreases human effort and increases comfort. Technology has been embedding into our daily usage appliances for a decent time now. We are surrounded by a number of intelligent systems who have been in a continuous run to increase our comfort using the best technologies available. Smart Home automation in one...
Article
Information security is one of the most important processes and methodologies which have to be considered when any information is communicated secretly between two parties. Cryptography and steganography are the two important practices used for this purpose. Cryptography changes the secret message into unintelligible text; however, it reveals the e...
Article
Full-text available
In this paper a reversible data hiding (RDH) algorithm for medical images is proposed. This algorithm specifically based on histogram modification in hybrid domain. The idea of this algorithm is that a histogram is created from the differences between each pixel and its neighbours. A 2D DWT haar transform is performed to convert cover image into a...
Data
Machine learning now-a-days becoming too obligatory, so that we use it in wide range of applications like predicting next words in keyboard to space related computing. In reinforcement machine learning which depends only on the rewards it gained previously, handle only interactive situations and never knew about the factors that influence in gainin...
Data
The quality is one of the primary destinations of numerous programming associations which help one to convey programming items that meet as well as surpass client desires. In Programming designing programming quality and programming measurements are one of the most dynamic research regions. Programming quality model is one of the essential places,...
Article
Full-text available
Information security is the one of the most important,crucial part of any digital communication and one of the largest issues faced in the digital world. Securing information from unauthorized access,modification and destruction,maintain the confidentiality and integrity of the data. Though many security techniques exist to secure information,well...
Article
The reversible data hiding hides the secret data into an image and the secret data, the original image is recovered without data loss. In this paper, we proposed a reversible steganographic method using repeat accumulate coding. The secret information is embedded using compression codes. This paper presents a dual tree repeat accumulate coding base...
Data
The objective of the paper is to present a conceptual model of a micro controller based equipment which will monitor the crop. Analyzing the climatic data allows us to provide real-time information about the state of crop both in quality and quantity, with the possibility of early warning on alarm situations so that timely interventions can be plan...
Data
Quality of all substances like metals and other materials needs to be verified in advance for industrial use. Traditional system to defect and deficiency detection uses only grey level method to classify defects but due to its low productivity it is not worthy. With the help of image processing algorithm we have proposed a system to detect as well...
Data
This paper proposes an energy efficient street light control system using sensors. These days, energy consumption is at a great high which is a problem since energy is being depleted and will impact the future generations. In this system, the principle used is sensing the motion of automobile passing from a particular road for turning on the street...
Article
Full-text available
This paper proposes an energy efficient street light control system using sensors. These days, energy consumption is at a great high which is a problem since energy is being depleted and will impact the future generations. In this system, the principle used is sensing the motion of automobile passing from a particular road for turning on the street...
Article
This paper comprises of the construction of smart network for home network devices near future. Internet is a fastest growing technology in the world and it's almost dominates in all aspects of life and daily needs. The world will move towards a new era of networking called as home based networks in the future, in which one can establish a smart ne...
Article
Full-text available
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible only to the intended receiver and not to any intruders or unaut...

Network

Cited By