@ifet.ac.in
Associate Professor, Department of Computer Science and Engineering
IFET College of Engineering
Artificial intelligence, Machine Learning
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
S. Usharani and K. Dhanalakshmi
Springer Science and Business Media LLC
Rajakumaran Gayathri, Shola Usharani, Miroslav Mahdal, Rajasekharan Vezhavendhan, Rajiv Vincent, Murugesan Rajesh, and Muniyandy Elangovan
MDPI AG
This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface. The effectiveness of the proposed framework is validated through experimental simulations on the Amazon Web Service (AWS) platform, which shows a significant reduction in attack probabilities and delays. The integration of IoT and cloud technologies is a powerful combination that can deliver customized and critical solutions to major business vendors. However, ensuring the confidentiality and security of data among IoT devices, storage, and access to the cloud is crucial to maintaining trust among internet users. This paper demonstrates the importance of implementing robust security measures to protect IoT devices in the cloud environment and highlights the potential of the proposed solution in protecting against DDoS and false data injection attacks.
Shola Usharani, Gayathri Rajakumaran, Anjana Devi Nandam, and Mohamed Ibrahim
IOP Publishing
Abstract Huge volumes of data have flowed in recent years of healthcare research to follow a few factors of a person and inform the guardian in the event of a patient’s emergency. This necessitates the creation of a single platform where consumers may monitor data in real time. This study discusses an interoperable health monitoring system. The module provides the essential chance for patients to obtain all-day service, which may be documented by the doctor and can be notified in the event of an emergency. When a patient requires regular check-ups or long-term home care, this platform comes in handy. It may be accomplished utilizing market sensors and includes monitoring devices that allow patients to be monitored without having to visit a doctor. Because it eliminates the need for data transcription and copying by humans. Because it reduces the need for human data transcription and copying, interoperability helps make patient data more secure. When computer systems are set up for optimum interoperability, with databases and other applications communicating and exchanging information, employees will be more productive. XMPP is an integrating platform for IoT available in open source for uploading instant messaging using generic XML data processing. The XMPP protocols are free and there are several implementations in the form of clients, servers, server components, and code libraries. The work is demonstrated using the XMPP interoperable IoT communication protocol for the health monitoring system..
Gayathri Rajakumaran, Shola Usharani, Christie Vincent, and M Sujatha
IOP Publishing
Abstract In the digitized era, the role of smart mechanisms plays a vital role and one among them is the segregation of waste. To make use of proper disposal and waste management techniques, the segregation of wastes is essential. In the existing systems, drones are used for identifying waste using image processing, and deep learning and use GPS, and GSM methods to identify and send locations to the authorities. The enhancement achieved is to analyze and implement waste segregation with the help of image classification and multi-object detection. Waste management may therefore be done more efficiently with an accuracy of 95% with a mean average of 87.4% which in turn helps significantly to reduce labor costs.
Shola Usharani, Telugu Puneeth, Karthikeyan Sugavanan, and Sivakumar Depuru
IEEE
This research study proposes a solution to solve the pressing issue of food waste and hunger, which are two global problems that have grown significantly in recent years. According to the Food and Agriculture Organization (FAO), more than 1.3 billion tons of food are wasted every year, accounting for one-third of all food produced for human consumption. Meanwhile, the World Health Organization (WHO) reports that 20% of the global population is struggling with severe food scarcity. To address this issue, this research study proposes the development of a mobile application that allows people, restaurants, and cafes to provide leftover food to those in need, bridging the gap between food waste and hunger. This paper plans to integrate NGOs into the app to facilitate the delivery of food to the needy. Additionally, this paper proposes adding a novel feature to the proposed project, a "food quality tester" using Arduino and sensors. This feature will ensure that the food delivered is healthy and hygienic by allowing the delivery agent to test the quality of the food picked up from restaurants, cafes, and households. The proposed solution has the potential to reduce food waste and alleviate hunger, thereby contributing to sustainable development goals. The development of this mobile application can be seen as an innovative approach towards addressing the global issue of food waste and hunger, and hope to receive support and collaboration from various stakeholders.
Ninaf Rajesh Topale, Shola Usharani, Gayathri, Rajarajeswari S, Sivakumar Depuru, and Sivanaga Prasad Shola
IEEE
The 21st century is dominated by artificial intelligence. AI is already dominating in medical domain like automated surgeries and medical chat bots. Healthcare is one of the important domains and it is continuously involved from technology point of view. Automation is one of the biggest challenges in this domain. AnuVaidya is trying to handle and work on this challenge. The AnuVaidya would basically resemble a prototype which would try to enhance and automate the communication between the patient and doctor. The AnuVaidya will work as a companion for doctor, it analyses the conversation between patient and doctor and predict the disease. There are some advance modes in AnuVaidya like depthness of anesthesia identification and classification. AnuVaidya will implement some inbuilt modules from scratch to increase time and accuracy. NLP will be helpful for deeply analyzing the conversation between doctor and patient. Deep learning would be useful for modern use cases like anesthesia depth classification. AnuVaidya focus on accuracy and make the machine learning and deep learning more accurate for anethesia monitoring system of about 87%. Research limitations- Use of cloud computing in AnuVaidya.
S. Usharani and K. Dhanalakshmi
IEEE
Real-time multimedia applications provide visual and audible services collaborated with the cloud platform for heterogeneous user requirements. Multi-source information storage and fusion satisfy the user demands through the applications. Contrarily, replication is a common issue demanding high space and time, increasing computation and retrieval time. For addressing the retrieval issues in replicated image storage, this article introduces a Divergent Feature-induced Extension (DFIE) method for large cloud platforms. The proposed method identifies the divergences alone in the input features correlated with the stored ones, in different feature extracted instances. In the feature divergent analysis, the deep recurrent learning paradigm is utilized. The iterations are used for identifying non-correlating features and their deviation for verifying non-replicable images. The process pursues region-based segmentation for a feature and edge-based divergence and similarity identification. The proposed method’s performance is analyzed using the metrics detection accuracy, complexity, and computing time.
Shola Usharani, Gayathri, Rajarajeswari S, D. S. Kishore, and Sivakumar Depuru
IEEE
Unlike the developed countries, there are several problems faced by the Indian farmers. One of the major problems dealt by the Indian farmers is the trespassing of animals into their agricultural fields. Animal Trespassing is a common phenomenon especially in farmlands near forest and hilly areas. There are a lot of cases where animals trespassed the farmlands and had destroyed the crops, causing great losses and distress to farmers. The most affected where poor farmers, who depend completely on farming for their income. This being a threat to many farmers, considering the loss that they would incur. Many of the farmers are dependent on government’s compensation, where getting compensation from government is a highly tiring and tedious process, and also in most of the cases the compensation paid by the government would be much lesser when compared to the losses suffered by the farmers. So, in order to prevent such animal trespasses, farmers use few traditional methods like bursting crackers, building trenches, building electrical fences, etc., where the efficiency is low and also the animals are harmed. So, there is a need for an innovative animal trespass prevention system that is efficient and also not harmful for the animals. With the rapid growth and penetration of technology, it is easy and cost efficient to use the existing modern techniques in technology to deal with animal trespass into the farmland. Considering the growth of IoT technology and its compatibility with agricultural use cases makes it one of the best options to build agricultural tools and devices. The Proposed work is based on IoT Technology, which is a cost-effective Arduino based IoT prototype that would enable the end user (The Farmer) to protect and monitor his/her cropland remotely using various sensors and IoT hardware modules to deal with the problems of animal trespassing into the fields, with better efficiency, without harming the animals and hence prevent any major losses. It is a combination of many individual hardware components and modules integrated together. The project detects animal motion with the help of a PIR sensor, if animal motion is detected, a pair of parallelly placed Ultrasonic sensors look up for the presence of animal within a particular zone near to the border of the farmland, if an animal is detected in the zone, then the buzzer makes noise to chase away the animal, and the GSM Module sends an alert message to the user (Farmer) about the animal trespass. The Farmer can request for the photos of the field whenever required and this is highly helpful in knowing the field situation better, during an animal trespass, as he can see live photos captured from the field, and the photos are sent to him/her via Telegram. The ESP32 Camera Module is completely responsible for executing the image capturing task, where it captures the field image, sends it to the user (Farmer), and also captures the field image and stores a local backup in the SD card mounted to it. The project prototype that is built is functioning completely normal as per the sequence of functions mentioned above and the test run results are obtained as expected.
A. Balachandar, S. Usharani, P. Manju Bala, and P.V. Akshaya
IEEE
WSNs characterize, analyse, and send data to Gomorrah using non-contact detectors. WSN excels in surveillance, remote monitoring, healthcare, home robotics, artificial robotics, and battle communication. Detector bumps are untouchable. Wireless sensor networks send Sodom detector data. Technology difficulties WSN deployment. Underfunding creates technological challenges. Signal and battery life are resources. Battery-powered WSNs compute, monitor, and transmit multi-hop. WSN detector knot energy consumption matters. Long-term WSN reliability requires cluster-based routing techniques. Detector bumps cluster. Cluster Heads (CH) run each cluster. WSN gateway bumps let clusters talk across hops. This predicts the quickest way from the source knot to Gomorrah and reduces communication output from the route’s numerous hops. Selecting CH and GW bumps may minimize detector bump energy consumption and extend WSN life. Cluster-grounded routing is difficult without secure CH/GW bumps. Based on residual energy, angle, and sink distance, REAS carefully identifies CH and GW bumps (Residual Energy Aware Angle- grounded routing protocol for Cluster- grounded Wireless Sensor Networks). REAS uses setup and steady-state for data transfer. Initialization classifies and optimizes CMs, CHs, and GW bumps. Stable control modules (CMs) provide data to "Gomorrah". REAS is evaluated for end-to-end quiescence, energy efficacy, packet delivery rate, and residual energy. NS2 interpretation2.34 breaks REAS. ARPEES, SEECH, and REAS are compared by varying the number of cycles (Scalable Energy Effective Clustering scale). REAS surpasses ARPEES and SEECH in simulated end-to-end quiescence, residual energy, continuity, packet delivery rate, energy effectiveness, and efficiency.
S. Asha, Shola Usharani, and Sarvottam Ola
Springer Nature Singapore
P. Manju Bala, S. Usharani, R. Rajmohan, T. Ananth Kumar, and A. Balachandar
Springer International Publishing
M. Pavithra, R. Rajmohan, T. Ananth Kumar, S. Usharani, and P. Manju Bala
Wiley
S. Usharani, P. Manju Bala, T. Ananth Kumar, R. Rajmohan, and M. Pavithra
Wiley
S. Usharani, R. Rajmohan, P. Manju Bala, D. Saravanan, P. Agalya, and D. Raghu Raman
IEEE
Facing death by soldiers is happening all the time. They never wriggle out of their responsibility. They fight in utmost hard places in territories, on peaks and foothills, in savannahs and jungles. Their role in protecting the borders of our uncertain terrestrial is exceptional. They sacrifice their life for the nation. There are many conflicts concerning the soldier’s health. Integrated Implementation of Hybrid Deep Learning approach would be convenient for armed forces engaged in various operations in warrior activities. The nano GPS tracing (Global Positioning Systems) will be placed on soldier. Soldier health monitoring model embedded and interfaced with mobile computing, health devices and health care networking facilities. In the control scheme, the soldier’s uniform will be mountedwith smart sensors. Sensors data obtained by the detectors connected to the soldiers is processed by a modified machine learning algorithm such as Autoencoder and long short-term memory structure (AUTO-LSTM). This research implies a computationalintelligence system that can understand both individual events and the changes among two distinct accomplishments of short length and the squat amount for medical applications. In this research, an autoencoder for collecting attributes for classification obtained by detectors. The LTSM system is then used to collect further substantial extended period relationships among datasets to enhance data analysis accuracy further. The experimental outcomes designate that the suggested resolution will help escalation the classification accuracy up to 97 per cent and thefinding accuracy for transformations greater than 90 per cent that are larger than that of several current related frameworks.
Shola UshaRani
Springer Singapore
S. Usharani, P. Manju Bala, R. Rajmohan, T. Ananth Kumar, and M. Pavithra
Springer International Publishing
P. Manju Bala, S. Usharani, T. Ananth Kumar, R. Rajmohan, and M. Pavithra
Springer International Publishing
S. Usharani, S. Prithivi, S. Sharmila, P. Manju Bala, T. Ananth Kumar, and R. Rajmohan
IEEE
Medical appointments and consultations are needed in order for a doctor to access, evaluate, study, and diagnose a patient with such a disease or illness. Several studies have been completed in this region, with some enabling a patient to schedule an appointment with a specialist doctor and the main stream of these study only interacting with the appointment. That prompted the researcher to investigate real-time patient choice, in which a patient simply selects a date and time, and the system assigns a doctor who is accessible at the moment and date, as well as handling patient setting a date with physicians. In addition, the device includes a live video appointment with a doctor. Additionally, portable wide range of application used in a few fields to cut down on time handling in capacities and incorporating a few fields. The combination of clinical fields and portable applications is studied and presented in this paper. Furthermore, the effectiveness and influence of flexible applications in the testing and examination of human services frameworks are depicted. This paper illustrates use of such Android devices in the development of mobile apps.
R. Inba, D. Raghu Raman, S. Jayalakshmi, D. Saravanan, and S. Usharani
IEEE
Nowadays online ordering systems play a vital role in every one's life. An online ordering system can be defined as software that allows customers to view and order multiple items over the internet. The main objective of an Online store is to ensure customer and vendor satisfaction. Instead of a customer being confined to Restaurants, Super Markets, Pharmacy around their home or one that only attracts nearby residents, customers can now discover new Online stores. Connecting new customers to online retailers is one of the industry's greatest advantages, and it also encourages customers to be a bit more curious and find a new location. In present days, we have many applications for online ordering. But the online ordering app has only one or two categories with food. We have implemented an app for online ordering which allows customers to order multiple categories like food, grocery, medicinal items, fruits and vegetables on the same platform.
N. Sangeetha, S. Jayalakshmi, D. Raghu Raman, D. Saravanan, and S. Usharani
IEEE
There is also an intermediary individual, called a broker, who contacts the buyer and the seller in the Indian traditional land registry scheme. Brokers shall ensure the land/property is registered by a registered office and the sale and purchase between the parties is completed subsequently. This paper analyses and predicts the data with regression algorithms by machine-learning method. It can be used without the dealer to sell or purchase the land with high security. Machine learning is used most commonly to evaluate certain functionality that we can analyze in this project. A scope economy means that manufacturing one commodity decreases the cost to produce another commodity. Whenever a wide variety of items or services are produced simultaneously, efficiency gains are more value for an enterprise than a smaller range of stuff or individual outputs. In this instance, the long-term minus total expense of a company, institution or economy decreases because of the performance of supplementary commodities. Size savings, for example, led to corporate success by assembly line manufacturing in the 20th century. The price trailing of the ground depends on the atmosphere and the potential forecast, depending on position and the last increase in the specifics of the soil, which enables us to monitor the prices.
A. Balachandar, E. Santhosh, A. Suriyakrishnan, N. Vigensh, S. Usharani, and P. Manju Bala
IEEE
Near or far vision impairment affects at least 2.2 billion people worldwide. Vision deficiency may have been avoided in at least 1 billion, or almost half of these cases. The leading causes of vision impaired and blindness are uncorrected refractive errors and falls. The majority of people with vision impaired and blindness are over the age of 50 years. Still, vision loss can distress persons of all ages. Vision impaired positions a giant overall financial burden with the yearly worldwide charges of yield losses associated with vision impaired from uncorrected shortsightedness and presbyopia alone estimated to be US $ 244 billion and US $ 25.4 billion. So these problems are overcome by the assistance of Yolo V3, we proposed a scheme. The multi-view object tracking (MVOT) system is used in this proposed system to address multiple cameras monitoring a neighborhood from various angles and recording videos. They contain complementary material, and by combining the knowledge contained in the videos, a powerful and accurate framework can be developed. This is the role of cameras with various settings that correspond to each other. Each segmented group of objects in one view is mapped to the corresponding group in another view using the Yolo V3 algorithm. These agreeing sets corresponded to blob gatherings, which allow data to be exchanged between cameras. These images are transformed into voice output after they are captured by the camera. As a result, visually impaired people gain more and can more readily identify which object is present within the images. As a result, for multi-view artefacts, we present a two-pass regression method.
S Usharani, P Manju Bala, and M Martina Jose Mary
IOP Publishing
Abstract A ransomware is a unique class of malware which has gotten extremely famous in digital crooks to corkscrew cash. It categorizes the client confines by accessing their machines (PCs, cell phones and IoT gadgets) unless the payoff is paid. Consistently, security specialists report numerous types of ransomware assaults, including ransomware families. User’s data will be collected at the time of dynamic process. The collected data will be in crypto ransomware type from that we can extract features like IP address, file length, URL. We will do dynamic analyse of the presently data with the antecedent data. Using machine learning algorithm (by combining Random Forest, Gradient Tree Boosting and Support Vector machine algorithm) we can classify the data as benign or ransomware. The achievement rate of classification using machine learning algorithm is 98.45% with false rate 0.01.The proposed achievement rate will be compared among linear regression, navie Bayes and adaboost algorithm. Gandcrab ransomware-Version, algorithm is to be identified.
P. Manju Bala, S. Usharani, and V. Abarna
IOP Publishing
Abstract Remote sensor systems are conveyed in dense regions wherever the sensor nodes are physically seized by intruders. As several nodes take care of the entire group area, the captured nodes are repeated. To rectify this attack, a response was provided. Be that as it may, because of the absence of improvements in the device size, these structures have low efficiency to recognize the clone hubs quickly. In order to quickly locate the clone hubs, an expansion calculation is generated in this paper with the improved LEACH called NI-LEACH convention which is utilized to limit the group by taking the vitality of every hub and the minimum range of clusters. In addition to this protocol, an IDS (Intrusion Detection System) calculation is designed and generated by doling out screen hubs in the remote sensor organization to identify replication assaults. Reenactment findings show that in remote sensor networks the new calculation is straightforward and powerful to implement. With a high probability proportion, a harmful centre can be reliably detected and established and ideal throughput can also be achieved all the while.The limit of the method is expanded definitely byconsuming this calculation against the clone hub assault byintruders.