VADIVELAN N

@tkrec.ac.in

PROFESSOR
Teegala Krishna Reddy Engineering College



                 

https://researchid.co/velancse

RESEARCH INTERESTS

Computer Networks

14

Scopus Publications

50

Scholar Citations

4

Scholar h-index

1

Scholar i10-index

Scopus Publications

  • A Novel CNN-TLSTM Approach for Dengue Disease Identification and Prevention using IoT-Fog Cloud Architecture
    S. N. Manoharan, K. M. V. Madan Kumar, and N. Vadivelan

    Springer Science and Business Media LLC


  • A proficient technique for recognizing the online digital signature in Project Registration System (PRS)
    R. Ravi Chakravarthi, C. Anna Palagan, Ravindra Ratilal Dharamshi, N. Vadivelan, and Shrikant Taware

    Springer Science and Business Media LLC


  • Detection of cyber attacks using machine learning
    N. Vadivelan, K. Bhargavi, Sarangam Kodati, and M. Nalini

    AIP Publishing

  • Secure internet of battlefield from malicious software using deep eigenspace learning
    K. Bhargavi, N. Vadivelan, Sarangam Kodati, and M. Nalini

    AIP Publishing


  • A border surveillance system to sense terrorist outbreaks
    N. Vadivelan, Mr. Shrikant Taware, Mr. R. Ravi Chakravarthi, Dr. C. Anna Palagan, and Sanjai Gupta

    Elsevier BV

  • Preserving mobile commerce IoT data using light weight SIMON block cipher cryptographic paradigm
    Shrikant Taware, R. Ravi Chakravarthi, C. Anna Palagan, Kumaresan Chandrasekaran, and N. Vadivelan

    Springer Science and Business Media LLC
    Internet of Things (IoT) data security is one of the critical ideas in data security as the data to be transferred should be made secure. In the field of mobile commerce is the high effect that it will have on a few parts of the regular life and behavior of potential clients. In this present examination, we focused to build up the IoT security in the field of mobile commerce utilizing new cryptographic strategies. Fundamentally the sensitive data are classified from the entire dataset to enhance the accuracy utilizing Feed Forward Back Propagation Algorithm (FFBN). At that point the security of sensitive data is upgraded by utilizing Light Weight Cryptography (LWC) which encodes the input sensitive data called encryption. To enhance the data privacy and secrecy, an imaginative security model is proposed for example Lightweight SIMON block cipher. This will encrypt the data alongside optimal key selection; this LWC upgrades the m commerce data security level in cloud. For key optimization, a meta-heuristic algorithm called Crow Search Algorithm (CSA) is introduced. The proposed SIMON-CSA accomplishes least time to generate key value to decrypt the data.

  • Heart disease prediction using hybrid fuzzy K-medoids attribute weighting method with DBN-KELM based regression model
    D. Shiny Irene, T. Sethukarasi, and N. Vadivelan

    Elsevier BV
    Automated prediction can be offered for further treatment to make effective and relieve the difficulties in the diagnosis of heart condition of patient. In this paper, a hybrid method is proposed combining FKMAW and DBNKELM based ensemble method to enhance medical diagnosis process. Firstly, the input attributes are weighed using a fuzzy k-medoids clustering based attribute weighting (FKMAW) method. Subsequently, the medical data classification performance is improved by applying the weighing method and the linearly separable dataset is obtained with the transformation of non-linearly separable dataset. With the weighted attributes, a regression model based heart disease prediction scheme is proposed combining Deep belief Network and Extreme learning machine (DBNKELM), in which Extreme learning machine is the top layer of the deep belief network to work as a regression model. The results demonstrate that FKMAW + DBNKELM achieved good performance in rectifying the problems in medical data classification for all the six datasets.

  • Assessing network parameters by web real-time communications
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    In the context of networks where assurance of information delivery is a prime user requirement, it becomes essential to estimate the key performance indicators and carry out a proactive analysis to ascertain if the current network conditions would meet the Quality of Service requirement of particular service. In this project the key is to carry out a QoS aware transmission of Voice, Video and Data over an IP network for ensuring delivery assurance with requisite service specific QoS. An integrate GUI to be deployed at both the sender and the receiver will be developed and this will act as first front end for the transmission and the measurements. An ‘active and collaborative tool based or a passive tool based approach’ will be used for measurement of network KPI whereas ‘COTS (Commercial off the shelf)/FOSS (Free and Open source)/freely downloadable or a custom developed utility/tools’ would be used for generation of traffic.

  • Minimizing energy consumption based on neural network in clustered wireless sensor networks
    N. Vadivelan, A. Ramamurthy, and P. Padmaja

    American Scientific Publishers
    Wireless sensor networks were organized with the collections of sensor nodes for the purpose of monitoring physical phenomenon such as temperature, humidity and seismic events, etc., in the real world environments where the manual human access is not possible. The major tasks of this type of networks are to route the information to sink systems in the sensor network from sensor nodes. Sensors are deployed in a large geographical area where human cannot enter such as volcanic eruption or under the deep sea. Hence sensors are not rechargeable and limited with battery backup; it is very complicated to provide the continuous service of sending information to sink systems from sensor nodes. To overcome the drawback of limited battery power, this paper proposes the concept of minimizing energy consumption with the help of neural networks. The modified form of HRP protocol called energy efficient HRP protocol has been implemented in this paper. Based on this concept, the workload of cluster head is shared by the cluster isolation node in order to increase the lifetime of the cluster head node. Also cluster monitoring node is introduced to reduce the re-clustering process. The implementation procedure, algorithm, results and conclusions were proved that the proposed concept is better than the existing protocols.

  • Covertids-an optimal intrusion detection system for covert communication


  • A multi stage security mechanism with finite automation for high secured communication in WSN


RECENT SCHOLAR PUBLICATIONS

  • Improved bald eagle search optimization with entropy-based deep feature fusion model for breast cancer diagnosis on digital mammograms
    P Ashwini, N Suguna, N Vadivelan
    Multimedia Tools and Applications, 1-19 2023

  • A novel CNN-TLSTM approach for Dengue disease identification and prevention using IoT-fog cloud architecture
    SN Manoharan, KMVM Kumar, N Vadivelan
    Neural Processing Letters 55 (2), 1951-1973 2023

  • Retraction Note to: Preserving mobile commerce IoT data using light weight SIMON block cipher cryptographic paradigm
    S Taware, RR Chakravarthi, CA Palagan, K Chandrasekaran, ...
    Journal of Ambient Intelligence and Humanized Computing 14 (Suppl 1), 137-137 2023

  • A proficient technique for recognizing the online digital signature in Project Registration System (PRS)
    R Ravi Chakravarthi, C Anna Palagan, RR Dharamshi, N Vadivelan, ...
    Soft Computing 27 (3), 1673-1684 2023

  • A Study of Deep Learning Techniques for Predicting Breast Cancer Types
    P Ashwini, N Suguna, N Vadivelan
    International Conference on Intelligent Systems and Sustainable Computing 2022

  • Automated Skin Disease Detection Using Machine Learning Techniques
    K Bhargavi, N Vadivelan, S Kodati, CV Phani Krishna, KP Reddy
    Innovations in Signal Processing and Embedded Systems: Proceedings of 2022

  • Secure internet of battlefield from malicious software using deep eigenspace learning
    K Bhargavi, N Vadivelan, S Kodati, M Nalini
    AIP Conference Proceedings 2405 (1) 2022

  • Detection of cyber attacks using machine learning
    N Vadivelan, K Bhargavi, S Kodati, M Nalini
    AIP Conference Proceedings 2405 (1) 2022

  • A border surveillance system to sense terrorist outbreaks (Retraction of Vol 94, art no 107355, 2021)
    N Vadivelan, S Taware, RR Chakravarthi, CA Palagan, S Gupta
    COMPUTERS & ELECTRICAL ENGINEERING 99 2022

  • Security from phishing attack on internet using evolving fuzzy neural network
    P Ashwini, N Vadivelan
    CVR Journal of Science and Technology 20 (1), 50-55 2021

  • Preserving mobile commerce IoT data using light weight SIMON block cipher cryptographic paradigm
    S Taware, RR Chakravarthi, CA Palagan, K Chandrasekaran, ...
    Journal of Ambient Intelligence and Humanized Computing 12, 6081-6089 2021

  • Heart disease prediction using hybrid fuzzy K-medoids attribute weighting method with DBN-KELM based regression model
    DS Irene, T Sethukarasi, N Vadivelan
    Medical Hypotheses 143, 110072 2020

  • Machine Learning Algorithm Based Bandwidth Prediction for Internet Usage
    J Rajaram, M Nalini, N Vadivelan
    Journal of Computational and Theoretical Nanoscience 17 (8), 3749-3753 2020

  • Minimizing energy consumption based on neural network in clustered wireless sensor networks
    N Vadivelan, A Ramamurthy, P Padmaja
    Journal of Computational and Theoretical Nanoscience 16 (2), 496-502 2019

  • AN INTELLIGENT APPROACH TO DETECT COVERT ATTACK AND PROVIDE A SECURED COMMUNICATION FOR WIRELESS SENSOR NETWORKS
    N VADIVELAN
    2017

  • Anomaly Detection model for Covert Intrusion Detection
    N Vadivelan, S Anbu
    International Journal of Engineering Research and Technology. 3 (12), 350-353 2015

  • Covert IDS- An Optimal Intrusion detection system for Covert communication
    N Vadivelan, S Anbu
    International Journal of Applied Engineering Research. 10 (9), 24105-24112 2015

  • Intrusion Detection for WSN using Automata Theory
    N Vadivelan, S Anbu
    Australian Journal of Basic and Applied Sciences 9 (20), 90-95 2015

  • A Multi Stage Security Mechanism with Finite Automation for High Secured Communication in WSN
    N Vadivelan, S anbu
    International Journal of Applied Engineering Research 10 (6), 14727-14738 2015

  • EPESOS: An Enhanced Web Search Algorithm for Query Process
    A Patil, N Vadivelan, P Ashwini


MOST CITED SCHOLAR PUBLICATIONS

  • Heart disease prediction using hybrid fuzzy K-medoids attribute weighting method with DBN-KELM based regression model
    DS Irene, T Sethukarasi, N Vadivelan
    Medical Hypotheses 143, 110072 2020
    Citations: 22

  • A novel CNN-TLSTM approach for Dengue disease identification and prevention using IoT-fog cloud architecture
    SN Manoharan, KMVM Kumar, N Vadivelan
    Neural Processing Letters 55 (2), 1951-1973 2023
    Citations: 8

  • Detection of cyber attacks using machine learning
    N Vadivelan, K Bhargavi, S Kodati, M Nalini
    AIP Conference Proceedings 2405 (1) 2022
    Citations: 6

  • Security from phishing attack on internet using evolving fuzzy neural network
    P Ashwini, N Vadivelan
    CVR Journal of Science and Technology 20 (1), 50-55 2021
    Citations: 4

  • Preserving mobile commerce IoT data using light weight SIMON block cipher cryptographic paradigm
    S Taware, RR Chakravarthi, CA Palagan, K Chandrasekaran, ...
    Journal of Ambient Intelligence and Humanized Computing 12, 6081-6089 2021
    Citations: 4

  • Intrusion Detection for WSN using Automata Theory
    N Vadivelan, S Anbu
    Australian Journal of Basic and Applied Sciences 9 (20), 90-95 2015
    Citations: 2

  • A Multi Stage Security Mechanism with Finite Automation for High Secured Communication in WSN
    N Vadivelan, S anbu
    International Journal of Applied Engineering Research 10 (6), 14727-14738 2015
    Citations: 2

  • Secure internet of battlefield from malicious software using deep eigenspace learning
    K Bhargavi, N Vadivelan, S Kodati, M Nalini
    AIP Conference Proceedings 2405 (1) 2022
    Citations: 1

  • Minimizing energy consumption based on neural network in clustered wireless sensor networks
    N Vadivelan, A Ramamurthy, P Padmaja
    Journal of Computational and Theoretical Nanoscience 16 (2), 496-502 2019
    Citations: 1