Verified @gmail.com
ASSOCIATE PROFESSOR, DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
IFET COLLEGE OF ENGINEERING, VILLUPURAM
B.E. in ECE
M.Tech in Applied Electronics
Ph.D. pursuing in Network Security
Published more than 10 research articles in SCI, Scopus indexed journals.
B.E. in ECE
M.Tech in Applied Electronics
Ph.D. pursuing in Network Security
Network Security, Cloud computing, Antenna
TO ENHANCE SECURITY IN CLOUD COMPUTING AND ITS SERVICES
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
S. Kannan, Prabakaran. D, Dhenesh Kumar. S, and Sivaram. S
ICRTEC 2023 - Proceedings: IEEE International Conference on Recent Trends in Electronics and Communication: Upcoming Technologies for Smart Systems, Published: 2023
IEEE
The demand for power is increasing daily due to an increase in industrial and household energy requirements and consumption. The non-renewable energy generation is considered to be dirty power as it requires oil, gas, coal and reactive substance like uranium for power generation. The non-renewable power generation pollutes the environment and is considered to be more harmful to people making the government and researchers to concentrate on the renewable method of power generation. Wind energy can be harvested round the clock as the wind will be available all time than the availability of sunlight which controls solar power. This paper proposed a novel deep learning-based convolution neural networks (CNN) for forecasting wind power generation one day ahead. The forecasting efficiency is compared with the benchmarking methodologies of Machine learning algorithms and the Root Mean Square Error (RMSE) of the proposed method is determined to be 0.629 which is considered to be efficient for the wind power generation process.
K. Suresh Kumar, D. Prabakaran, R. Senthil Kumaran, and I. Yamuna
Intelligent Green Technologies for Sustainable Smart Cities, Pages: 291-315, Published: 23 August 2022
Wiley
P Harineeshwari. and D Prabakaran.
IEEE International Conference on Data Science and Information System, ICDSIS 2022, Published: 2022
IEEE
A wireless devices has an consecutive generation renovation to provide a higher and impressive service. The current 5G generation is the only one with the ability and power to communicate at extremely high speeds. Because they are now required for reliable 5G Wi-Fi connectivity, wide-band antennas with high gain have displaced traditional narrow bandwidth antennas with low gain. The next era, 6G, is projected to assist a large number of information site visitors in managing the increase in connection of Wi-Fi device. As a result, a significant amount of bandwidth will be aimed, and a greater benefit will be required. In order to satisfy the demand of information quotes and bandwidth utilization of conversation systems, maximum of the research studies results in the invent of new designs that fulfill the necessities of the future era verbal exchange. In this paper H-Shaped antenna that contains microstrip feed line is proposed. Among various substrates Polyimide dielectric substrate provides improved performance. The loss tangent and relative permittivity of the polyimide substrate are 3.5 and 0.0027, respectively. Computer software technology (CST) software is used to model the proposed system. The suggested H-shape antenna is shown, together with simulated results for gain, VSWR, return loss, directivity, and radiation pattern.
Gayathri Baskaran, K Saundariya, D Prabakaran, and R Senthilkumaran
2022 IEEE Delhi Section Conference, DELCON 2022, Published: 2022
IEEE
Web Development is evolving exponentially today at business purpose. Nowadays, there is an increasing need for handyman services and requires a simpler and more accessible way of storing and managing the required information about the Handyman website in the Admin panel and while using PHP/Python/Ajax, there is a blocking of data from the server-side and it takes multiple loading which makes the website with bad user interaction. This project proposed an administration panel for Household services. The purpose of this web design is to provide a non-blocking environment using Node JS to improve the quality of its working process. It is designed with React JS in front-end development, which makes faster response to the browser, SEO friendly. For security purposes, JWT is proposed in order to secure the data from unknown members by setting the Token. Also, a work analysis of the designed web application is presented and demonstrated in this paper.
K Saundariya, M Abirami, Kumaran R Senthil, D Prabakaran, B Srimathi, and G Nagarajan
2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, Pages: 180-183, Published: 13 May 2021
IEEE
In recent days, there is a rapid increase in the need for handyman services around the world. If any issue is unfortunately encountered in the home, some issues may be hectic and people can’t be repaired on their own, people are busy with their schedule, hence they need workers to maintain and repair their homes. It is tough to find workers offline at the correct time and cost. Therefore, this online website makes it easier to book your own workers at the correct time and cost, it makes the workers available in just one click at your doorstep. Handyman workers have a separate login to showcase themselves by adding the works and skills they have. It also helps the professionals to gain opportunities and money based on their work. There are several categories and services, on the time of users’ login for the need for the services, the workers are listed based on location and cost with their name and contact. Creating a website using React JS makes it faster, boosts productivity, and is SEO friendly. MongoDB is a schema-less database and with ease of scale-out, hence it is easier to manage data. With this, a user can avoid delay and difficulty.
D. Prabakaran and S. Sriuppili
Journal of Physics: Conference Series, ISSN: 17426588, eISSN: 17426596, Volume: 1717, Published: 9 January 2021
IOP Publishing
Abstract In this digital world, there are many applications to secure and legalize their data and all of these emissions by various techniques and there are many algorithms and methods to process their data. Some extensive method used is biometric authentication and voice recognition is better, since it paves the convenient manner to the user and it merely acquires the voice from the user. Also the background noise is in crisis with Mel Frequency Cepstrum Coefficient (MFCC) which is recognition algorithm where overcome by other tools such as smoothening filter etc. The main focus of this project is to investigate the feature extraction scheme.
Prabakaran. D and Shyamala Ramachandran
2021 IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2021, Published: 2021
IEEE
Authentication is the crucial process of verifying and permitting the right user to access cloud services. The cloud service security proves to be fragile by the brute force efforts of hackers. To revamp the durability of authentication process, integrating the security factors has been exhorted. One such factor is the secure key extracted from the authenticated user’s voiceprint. This paper proposes a model for enhancing the signal to noise ratio of the MFCC algorithm to extract the secure key from the user voiceprint. The proposed method is highly rigid against the voice duplication attacks preventing unauthorized user to access by duplicating the authorized user’s voice print.
Prabakaran D and Sheela K
2021 IEEE Mysore Sub Section International Conference, MysuruCon 2021, Pages: 249-254, Published: 2021
IEEE
The wireless sensor network is the emerging technology with spatially placed electronic sensors to measure the vital parameters. The necessity of monitoring the patient”s critical parameters of physical parameter., psychological activities drives to the development of wireless health care sensor network. The evolution of Wireless Healthcare Sensor Network (WHSN) had eased the monitoring process of patient round the clock. Despite of benefits leading the Wireless Healthcare Sensor Network to the peak of performance., certain vital parameters like network agility and security of the network still remains as a concern. The security aspect of the Wireless Healthcare Sensor Network (WHSN) is a biggest challenge., as the attackers tends to access the details of the patients illegally and may sometimes leads to masquerade the data being transferred. To overcome this concern and to provide a high level of security to the sensitive health care data., this paper proposes a novel methodology to provide rigid authentication using Elliptical Curve Cryptography (ECC). The ECC-based CPABE secured framework for WBAN without the operation of bilinear pairing. The result shows that there is reductions in cipher text size, reduces the computational cost, and also secure transferring of information.
D. Prabakaran and Shyamala Ramachandran
Computers, Materials and Continua, ISSN: 15462218, eISSN: 15462226, Pages: 1781-1798, Published: 2021
Computers, Materials and Continua (Tech Science Press)
The rise of the digital economy and the comfort of accessing by way of usermobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and manymore cloud server attacks over and over again. These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat. This research paper, propose a framework with a base of Elliptical Curve Cryptography (ECC) to perform secure financial transactions throughVirtual PrivateNetwork (VPN) by implementing strongMulti-Factor Authentication (MFA)using authentication credentials and biometric identity. The research results prove that the proposed model is to be an ideal scheme for real-time implementation. The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users.
International Journal of Scientific and Technology Research, eISSN: 22778616, Pages: 2018-2022, Published: December 2019
D. Prabakaran and R. Shyamala
2019 Proceedings of the 3rd International Conference on Computing and Communications Technologies, ICCCT 2019, Pages: 221-231, Published: February 2019
IEEE
In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.