10 results on '"Anbalagan, Sudha"'
Search Results
2. SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks
- Author
-
Anbalagan, Sudha, Kumar, Dhananjay, Raja, Gunasekaran, and Balaji, Alkondan
- Published
- 2019
- Full Text
- View/download PDF
3. SDN-Assisted Learning Approach for Data Offloading in 5G HetNets
- Author
-
Anbalagan, Sudha, Kumar, Dhananjay, Ghosal, Dipak, Raja, Gunasekaran, and V, Muthuvalliammai
- Published
- 2017
- Full Text
- View/download PDF
4. DTBV: A Deep Transfer-Based Bone Cancer Diagnosis System Using VGG16 Feature Extraction.
- Author
-
Suganeshwari, G., Balakumar, R., Karuppanan, Kalimuthu, Prathiba, Sahaya Beni, Anbalagan, Sudha, and Raja, Gunasekaran
- Subjects
BONE cancer ,FEATURE extraction ,CANCER diagnosis ,CONVOLUTIONAL neural networks ,SUPPORT vector machines - Abstract
Among the many different types of cancer, bone cancer is the most lethal and least prevalent. More cases are reported each year. Early diagnosis of bone cancer is crucial since it helps limit the spread of malignant cells and reduce mortality. The manual method of detection of bone cancer is cumbersome and requires specialized knowledge. A deep transfer-based bone cancer diagnosis (DTBV) system using VGG16 feature extraction is proposed to address these issues. The proposed DTBV system uses a transfer learning (TL) approach in which a pre-trained convolutional neural network (CNN) model is used to extract features from the pre-processed input image and a support vector machine (SVM) model is used to train using these features to distinguish between cancerous and healthy bone. The CNN is applied to the image datasets as it provides better image recognition with high accuracy when the layers in neural network feature extraction increase. In the proposed DTBV system, the VGG16 model extracts the features from the input X-ray image. A mutual information statistic that measures the dependency between the different features is then used to select the best features. This is the first time this method has been used for detecting bone cancer. Once selected features are selected, they are fed into the SVM classifier. The SVM model classifies the given testing dataset into malignant and benign categories. A comprehensive performance evaluation has demonstrated that the proposed DTBV system is highly efficient in detecting bone cancer, with an accuracy of 93.9%, which is more accurate than other existing systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Vision-Based Ingenious Lane Departure Warning System for Autonomous Vehicles.
- Author
-
Anbalagan, Sudha, Srividya, Ponnada, Thilaksurya, B., Senthivel, Sai Ganesh, Suganeshwari, G., and Raja, Gunasekaran
- Abstract
Lane detection is necessary for developing intelligent Autonomous Vehicles (AVs). Using vision-based lane detection is more cost-effective, requiring less operational power. Images captured by the moving vehicle include varying brightness, blur, and occlusion caused due to diverse locations. We propose a Vision-based Ingenious Lane Departure Warning System (VILDS) for AV to address these challenges. The Generative Adversarial Networks (GAN) of the VILDS choose the most precise features to create images that are identical to the original but have better clarity. The system also uses Long Short-Term Memory (LSTM) to learn the average behavior of the samples to forecast lanes based on a live feed of processed images, which predicts incomplete lanes and increases the reliability of the AV's trajectory. Further, we devise a strategy to improve the Lane Departure Warning System (LDWS) by determining the angle and direction of deviation to predict the AV's Lane crossover. An extensive evaluation of the proposed VILDS system demonstrated the effective working of the lane detection and departure warning system modules with an accuracy of 98.2% and 96.5%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. SPAS: Smart Pothole-Avoidance Strategy for Autonomous Vehicles.
- Author
-
Raja, Gunasekaran, Anbalagan, Sudha, Senthilkumar, Senbagapriya, Dev, Kapal, and Qureshi, Nawab Muhammad Faseeh
- Abstract
Autonomous Vehicles (AVs) are a significant part of Vehicular Adhoc NETwork (VANET) as they increase transportation accessibility. However, the presence of unpredictably sized potholes on road surfaces hampers the comfort and safety of autonomous navigation. Existing pothole avoidance mechanisms cannot dynamically adapt in unpredictable environments and do not comfort the traveler well in VANET. This paper proposes a novel Smart Pothole-Avoidance Strategy (SPAS) for safe navigation in a pothole-intensive environment. Potholes are avoided using the Deep Deterministic Policy Gradient (DDPG) algorithm as it performs best in continuous action space tasks and has a faster convergence speed. A Hybrid Recognition Model using the Speech and Gesture mechanism (HRM-SG) is proposed in this paper to collect the traveler’s real-time audio and visual feedback for the DDPG reward function. The received feedback aids in fine-tuning the model to avoid the pothole efficiently than the previous pothole. Traveler’s feedback is coupled with the vehicle’s sensor data and used to decide the time, speed, and angle at which lane change and speed change are executed. Finally, the SPAS continuously optimizes lane change parameters in VANET to achieve maximal traveler comfort during the operation. The result analysis indicates that SPAS achieves a 10-15% improvement in the accuracy of pothole avoidance, 10-12% higher comfort, and 8-10% faster convergence than the existing state-of-the-art techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Cybertwin-Driven Federated Learning Based Personalized Service Provision for 6G-V2X.
- Author
-
Prathiba, Sahaya Beni, Raja, Gunasekaran, Anbalagan, Sudha, Gurumoorthy, Sugeerthi, Kumar, Neeraj, and Guizani, Mohsen
- Subjects
REINFORCEMENT learning ,WIRELESS Internet ,INTERNET traffic ,EDGE computing ,QUALITY of service ,TOLL roads - Abstract
The rapid growth of Autonomous Vehicle (AV) technology and the integration of edge computing grasp new challenges along with the ever-increasing mobile internet traffic and services. Tackling such challenges through customized edge computing services is the critical research in 6G Vehicle-to-Everything (6G-V2X) communication. V2X contributes detailed information about the current navigation of vehicles, automatic payments for toll roads, parking fees and other services. With the countless, unique, and personalized service requirements of AVs over computation-intensive applications, exploring the edge resources for the excellent Quality of Service (QoS) provision is the greatest concern. This paper proposes a Federated Learning and edge Cache-assisted Cybertwin (FLCC) framework for personalized service provision in 6G-V2X. Integration of cybertwin in 6G enables the connectivity of the physical system to the digital realm, allowing for adequate instantaneous wireless access. The FLCC jointly considers the edge cooperation and optimizations through the proposed Federated Multi-agent Deep Reinforcement Learning based (FM-DRL) algorithm. The FM-DRL algorithm balances the FLCC’s learning accuracy. It minimizes the time and cost by taking the factors such as cybertwin association, training data batch size, and bandwidth. Finally, caching is performed using the Federated Reinforcement Learning-based Edge Caching (FREC) algorithm to obtain the desired datasets required that train the model for providing personalized 6G-V2X services for the AVs. Numerical studies and simulation results reveal that the proposed system outperforms the baseline learning approaches by 17.6%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Energy-Efficient End-to-End Security for Software-Defined Vehicular Networks.
- Author
-
Raja, Gunasekaran, Anbalagan, Sudha, Vijayaraghavan, Geetha, Dhanasekaran, Priyanka, Al-Otaibi, Yasser D., and Bashir, Ali Kashif
- Abstract
One of the most promising application areas of the industrial Internet of Things (IIoT) is vehicular ad hoc networks (VANETs). VANETs are largely used by intelligent transportation systems to provide smart and safe road transport. To reduce the network burden, software-defined networks (SDNs) act as a remote controller. Motivated by the need for greener IIoT solutions, this article proposes an energy-efficient end-to-end security solution for software-defined vehicular networks (SDVNs). Besides, SDN's flexible network management, network performance, and energy-efficient end-to-end security scheme plays a significant role in providing green IIoT services. Thus, the proposed SDVN provides lightweight end-to-end security. The end-to-end security objective is handled in two levels: 1) in roadside unit (RSU)-based group authentication scheme, each vehicle in the RSU range receives a group ID–key pair for secure communication; and 2) in private collaborative intrusion detection system (p-CIDS), the SDVN detects the potential intrusions inside the VANET architecture using collaborative learning that guarantees privacy through a fusion of differential privacy and homomorphic encryption schemes. The SDVN is simulated in NS2 and MATLAB, and results show increased energy efficiency with lower communication and storage overhead than existing frameworks. In addition, the p-CIDS detects the intruder with an accuracy of 96.81% in the SDVN. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. Efficient and Secured Swarm Pattern Multi-UAV Communication.
- Author
-
Raja, Gunasekaran, Anbalagan, Sudha, Ganapathisubramaniyan, Aishwarya, Selvakumar, Madhumitha Sri, Bashir, Ali Kashif, and Mumtaz, Shahid
- Subjects
- *
WIRELESS mesh networks , *ADVANCED Encryption Standard , *COMMUNICATION patterns , *DRONE aircraft , *ALGORITHMS , *GLOBAL Positioning System - Abstract
Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with an enormous number of applications. Mini UAVs are developed in order to compensate the performance constraints imposed by larger UAVs during emergency situations. Multiple mini autonomous UAVs require communication and coordination for ubiquitous coverage and relaying during deployment. Multi-UAV coordination or swarm optimization is required for reliable connectivity among UAVs, due to its high mobility and dynamic topology. In this paper, a Secured UAV (S-UAV) model is proposed which takes the location of the UAVs as inputs to form a Wireless Mesh Network (WMN) among multiple drones with the help of a centralized controller. After WMN formation, efficient communication takes place using A* search, an intelligent algorithm that finds the shortest communication path among UAVs. Further, the S-UAV model utilizes cryptographic techniques such as Advanced Encryption Standard (AES) and Blowfish to overcome the security attacks efficiently. Simulation results show that the S-UAV model offers higher throughput, reduced power consumption and guaranteed message transmission with reduced encryption and decryption time. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. SP-CIDS: Secure and Private Collaborative IDS for VANETs.
- Author
-
Raja, Gunasekaran, Anbalagan, Sudha, Vijayaraghavan, Geetha, Theerthagiri, Sudhakar, Suryanarayan, Saran Vaitangarukav, and Wu, Xin-Wen
- Abstract
Vehicular Ad hoc NETworks (VANETs) serve as the backbone of Intelligent Transportation Systems (ITS), providing passengers with safety and comfort. However, VANETs are vulnerable to major threats that affect data privacy and network services either from an individual or distributed attacker. In this paper, a Secure and Private-Collaborative Intrusion Detection System (SP-CIDS) is proposed to detect network attacks and to mitigate security concerns. In SP-CIDS, a Distributed Machine Learning (DML) model based on the Alternating Direction Method of Multipliers (ADMM) is used, which leverages the potential of vehicle-to-vehicle collaboration in the learning process to improve the storage efficiency, accuracy, and scalability of the IDS. However, there are significant data privacy concerns possible in such collaboration, where a CIDS can act as a malicious system that has access to the intermediate stages of the learning process. Additionally, the SP-CIDS system uses Differential Privacy (DP) technique to address the aforementioned data privacy risk associated with the DML-based CIDS. The SP-CIDS system is evaluated with logistic regression, naïve bayes, and ensemble classifiers. Simulation results substantiate that a private ensemble classifier secures the training data with DP and also achieves 96.94% accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.