scispace - formally typeset
Search or ask a question
Author

E. Sathiyamoorthy

Bio: E. Sathiyamoorthy is an academic researcher from VIT University. The author has contributed to research in topics: Cloud computing & Service provider. The author has an hindex of 6, co-authored 21 publications receiving 83 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The experimental results demonstrate that FTHDPS is much efficient to provide a reliable and accurate recommendation to the heart patients, by using Fourier transformation and machine learning technique to predict the chronic heart diseases effectively.
Abstract: Recently, using of the intelligent technologies in the field of clinical decision making is increased rapidly to improve the lifestyles of patients and to help for reducing the workload and cost concerned in their healthcare. Heart diseases are one of the primary causes of death. However, if the diseases are identified at the early stage, the rate of death can be decreased. Thus, the disease identification process has become a matter of concern. An efficient medical recommendation system has been proposed in this paper, namely Fourier transformation-based heart disease prediction system (FTHDPS) by using Fourier transformation and machine learning technique to predict the chronic heart diseases effectively. Here, the input sequences rely on the patient’s time series details or data, which are crumbled by Fourier transformation for extracting the frequency information. In FTHDPS, a bagging model is utilized for predicting the conditions of the patients in advance to produce the absolute recommendation. In FTHDPS, three classifiers are used, namely artificial neural network, Naive Bayes and support vector machine, and real-life time series chronic heart disease data are used to evaluate the proposed model. The experimental results demonstrate that FTHDPS is much efficient to provide a reliable and accurate recommendation to the heart patients.

23 citations

Journal ArticleDOI
TL;DR: This paper proposes an agent based model that would secure the users data over the cloud and implemented various algorithms to provide a secured system.

14 citations

Journal ArticleDOI
TL;DR: This paper identifies the best feature selection algorithm to select the important and useful features from the network dataset by identifying the optimal feature selection methods for intrusion detection.
Abstract: The Intrusion Detection System (IDS) deals with the huge amount of network data that includes redundant and irrelevant features causing slow training and testing procedure, higher resource usage and poor detection ratio. Feature selection is a vital preprocessing step in intrusion detection. Hence, feature selec-tion is an essential issue in intrusion detection and need to be addressed by selec-ting the appropriate feature selection algorithm. A major challenge to select the optimal feature selection methods can precisely calculate the relevance of fea-tures to the detection process and the redundancy among features. In this paper, we study the concepts and algorithms used for feature selection algorithms in the IDS. We conclude this paper by identifying the best feature selection algorithm to select the important and useful features from the network dataset.

10 citations

Journal ArticleDOI
TL;DR: This paper has proposed the Strong and Encrypted Session ID to prevent the session hijack attacks in web applications and tested the integrity of the session ID of length 32, 92 and 212 characters in a web application.
Abstract: Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking attack. Session Hijack attack is easy to execute and difficult to detect. Wireless networks do not have specific boundary regions for the packets to be transferred. As the data packets are transferred in air, the chances of sniffing the network packets by the hackers or attackers are high by using the network sniffing tools. In this paper, we have proposed the Strong and Encrypted Session ID to prevent the session hijack attacks in web applications. Session ID is generated and the generated Session ID is encrypted, using a Secret Key Sharing algorithm and decrypted at the client side. We have tested the integrity of the session ID of length 32, 92 and 212 characters in a web application. Attacks are executed to capture the session ID of a web application. Our experimental results proved that 212 characters encrypted session ID completely prevents the session hijack attacks in web applications of wireless networks.

9 citations

Journal ArticleDOI
TL;DR: An Ontology-based Multi-Agent Model Intrusion Detection System (OMAMIDS) for detecting web service attacks achieves high detection rate and accuracy and lower false positive rate than the existing techniques.
Abstract: Web service plays a significant role in the Internet applications. According to the current researchers, the web services are highly prone to the cyber-attacks. The Intrusion Detection System (IDS)...

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with variousMachine learning techniques in detecting intrusive activities and future directions are provided for attack detection using machinelearning techniques.
Abstract: Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this paper, a detailed investigation and analysis of various machine learning techniques have been carried out for finding the cause of problems associated with various machine learning techniques in detecting intrusive activities. Attack classification and mapping of the attack features is provided corresponding to each attack. Issues which are related to detecting low-frequency attacks using network attack dataset are also discussed and viable methods are suggested for improvement. Machine learning techniques have been analyzed and compared in terms of their detection capability for detecting the various category of attacks. Limitations associated with each category of them are also discussed. Various data mining tools for machine learning have also been included in the paper. At the end, future directions are provided for attack detection using machine learning techniques.

398 citations

Journal ArticleDOI
TL;DR: A smart healthcare system is proposed for heart disease prediction using ensemble deep learning and feature fusion approaches and obtains accuracy of 98.5%, which is higher than existing systems.

379 citations

Journal ArticleDOI
TL;DR: This survey provides a comprehensive discussion of all aspects of MAS, starting from definitions, features, applications, challenges, and communications to evaluation, and a classification on MAS applications and challenges is provided.
Abstract: Multi-agent systems (MASs) have received tremendous attention from scholars in different disciplines, including computer science and civil engineering, as a means to solve complex problems by subdividing them into smaller tasks. The individual tasks are allocated to autonomous entities, known as agents. Each agent decides on a proper action to solve the task using multiple inputs, e.g., history of actions, interactions with its neighboring agents, and its goal. The MAS has found multiple applications, including modeling complex systems, smart grids, and computer networks. Despite their wide applicability, there are still a number of challenges faced by MAS, including coordination between agents, security, and task allocation. This survey provides a comprehensive discussion of all aspects of MAS, starting from definitions, features, applications, challenges, and communications to evaluation. A classification on MAS applications and challenges is provided along with references for further studies. We expect this paper to serve as an insightful and comprehensive resource on the MAS for researchers and practitioners in the area.

290 citations

Journal ArticleDOI
TL;DR: In this paper, the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical vulnerabilities, attacks, and defenses for TBS and WBS.
Abstract: Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for user authentication and identification. However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood. While the current literature is cognizant of those differences, there is no effective work that summarizes the factors where TBS and WBS differ, namely, their modality characteristics, performance, security, and privacy. To bridge the gap, this article accordingly reviews and compares the key characteristics of modalities, contrasts the metrics used to evaluate system performance, and highlights the divergence in critical vulnerabilities, attacks, and defenses for TBS and WBS. It further discusses how these factors affect the design considerations for WBS, the open challenges, and future directions of research in these areas. In doing so, the article provides a big-picture overview of the important avenues of challenges and potential solutions that researchers entering the field should be aware of. Hence, this survey aims to be a starting point for researchers in comprehending the fundamental differences between TBS and WBS before understanding the core challenges associated with WBS and its design.

52 citations

Journal ArticleDOI
TL;DR: This study proposes a new classification from the point of view of Cloud Computing, based on the reference architecture proposed by the National Institute of Standards and Technology and the different responsibilities of each of the roles that participate in the Cloud Computing paradigm as identified in the architecture: Provider, Consumer, Broker, Carrier and Auditor.

52 citations