Papers by Menaga D.
Bookmarks Related papers MentionsView impact
Frontier Scientific Publishing, 2023
Cancer disease caused a major death in worldwide. To prevent this, various cancer classification ... more Cancer disease caused a major death in worldwide. To prevent this, various cancer classification approaches are employed, which are mostly relied on clinical characteristics and histopathological characteristics. Deep learning-based classification models are very effective and accurate. As a result, this research established the Adam-based Deep Quantum Neural Network, which is the optimal deep learning-based cancer classification method. The information on gene expression is used to classify cancer. Using the Box-Cox transformation, which converts the data into a legible format, the data transformation procedure is carried out. Utilizing information gain, the features are chosen in order to choose the proper gene expression. Additionally, Deep QNN is used to classify cancer, and for better classification, which is trained via Adam optimization. The experimental result shows the developed model provide better classification result with respect to accuracy, true positive rate and true negative rate of 94.91%, 95.59% and 95.4%.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Evolutionary Intelligence(Springer), 2021
Now a day, privacy-preserved data mining is an important research topic that finds significant in... more Now a day, privacy-preserved data mining is an important research topic that finds significant information from the database while hiding sensitive information. Numbers of algorithms are presented for concealing sensitive information. This paper presents the privacy preserved association rule mining by constraint-based objective function and the genetic algorithm (GA). The proposed method uses the Frequent Pattern (FP)-Growth algorithm for mining the association rules from the database. At first, the FP-Growth algorithm extracts the FPs from the database by applying the support threshold and then, generates the association rules from the FPs by applying the confidence threshold. Then, the generated association rules are processed by the GA for producing the privacy preserved association rules while preserving the sensitive rules. Finally, the privacy preserved association rules are provided to the third party users. The performance of the proposed method is evaluated with the existing Particle Swarm Optimization (PSO) for the evaluation metrics' privacy and utility. The experimental results show that the proposed method mines the privacy preserved association rules from the database with the maximum privacy of 0.124 and the minimum utility of 0.0989 when compared to the existing method.
Bookmarks Related papers MentionsView impact
International Journal for Modern Trends in Science and Technology, 2019
This paper considers the development of a futuristic car, which would be of great help to the phy... more This paper considers the development of a futuristic car, which would be of great help to the physically disabled people. Since these cars will rely only on what the individual is thinking they will hence not require any physical movement on the part of the second person. The car integrates signals from a variety of sensors like video, weather monitor, anti-collision etc. it also has an automatic navigation system in case of emergency. The car works on the asynchronous mechanism of machine learning. It's a great advance of technology which will make the disabled, abled. The video and thermo gram analyzer continuously monitor activities outside the car. Once the driver(disabled) nears the car. The security system of the car is activated. Images as well as thermo graphic results of the driver are previously fed into the database of the computer. If the video images match with the database entries then the security system advances to the next stage. Here the thermo graphic image verification is done with the RFID tags which is useful for the identification of the image. Index Terms: EEG (electroencephalogram), RFID (radio frequency identification), LF-ASD (low frequency asynchronous switch design).
Bookmarks Related papers MentionsView impact
Journal of Ambient Intelligence and Humanized Computing, 2021
Deep learning has been paid great attention in several fields for the good reason, and their resu... more Deep learning has been paid great attention in several fields for the good reason, and their results achieved were not before possible. In deep learning, the models are trained based on huge labelled dataset and the neural network architectures consist of several layers. Still, the methods suffer to achieve expected higher performance and introduce poor classification accuracy. Towards improving the classification performance, this paper introduces the deep learning networks for the cancer classification application. The main aim is to develop the optimized model for classification application. Accordingly, the input data is pre-processed using Log transformation for converting the data to its uniform value range. Then, the feature selection is done based on Wrapper approach to select the important features for classifying the cancer. Once the features are selected, the cancer classification is performed using Deep Recurrent Neural Network (Deep RNN), which is trained by the proposed Fractional-Atom Search Algorithm (Fractional-ASO). The Fractional-ASO is designed by integrating Fractional Calculus with Atom Search Optimization (ASO). The performance of the Fractional-ASO-based Deep RNN is evaluated in terms of accuracy, True Positive Rate (TPR) and True Negative Rate (TNR). The proposed Fractional-ASO -based Deep RNN method achieves the maximal accuracy of 92.87%, maximal TPR of 92.87%, and the maximal TNR of 93.48% using colon dataset.
Bookmarks Related papers MentionsView impact
Biomedical Engineering: Applications, Basis and Communications, 2020
Cancer is one of the most common dreadful diseases prevailing worldwide, and patients with cancer... more Cancer is one of the most common dreadful diseases prevailing worldwide, and patients with cancer are rescued only when the cancer is detected at a very early stage. Early detection of cancer is appropriate as in the fourth stage, but the chance of survival is limited. The symptoms of cancers are rigorous, and therefore, all the symptoms should be studied properly before the diagnosis. Thus, an automatic prediction system is necessary for classifying the tumor, i.e. malignant or benign tumor. Over the past few years, cancer classification is increased rapidly, but there is no general technique to find novel cancer classes (class discovery) or to assign tumors to known classes. Accordingly, this survey analyzes distinct cancer classification techniques. Thus, this review article provides a detailed review of 50 research papers presenting the suggested cancer classification techniques, like Deep learning-based techniques .
Bookmarks Related papers MentionsView impact
American Scientific Publishers, 2020
Security of the data is also concerned with the privacy of the data since the data or the informa... more Security of the data is also concerned with the privacy of the data since the data or the information can be easily disclosed. Data sharing also plays a key role in security. Recently, patterns are disclosed using associative rule mining and the sensitive information are one of the imposing threats to the security aspects in data mining. Preserving the data as well as the privacy of the user using several PPDM approaches leads to provide authorized access for such sensitive information. The security threats for preserving privacy are provided by developing a sanitization process. The sanitization process is considered to be one of the biggest challenges in the mining of data. In this paper, different approaches such as GA-based and PSO based algorithms are surveyed and analyzed for preserving the privacy of data..The purpose of data sanitization and the use of Bio-Inspired algorithms such as Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) are discussed.
Bookmarks Related papers MentionsView impact
International Journal of Advanced Science and Technology, 2020
In the 21 st century, as the number of people using computers have increased, intelligent and per... more In the 21 st century, as the number of people using computers have increased, intelligent and persistent forms of cyber threats have been damaging the organizations' cyber assets and missions. Hackers have improved their skill set to such a level that they can remotely gain access over even the defense secrets of the Government. The most common thing an attacker does is try to figure out the logical and physical structure of the company's Active Directory (AD). To overcome this problem we analyze current Cyber Kill Chain (CKC) models that explain the adversarial behavior to perform advanced persistent threat (APT) attacks, and propose a cyber kill chain model that can be used in view of an APT attack. Using the cyber kill chain model we have built MalviDect, a Python based Antivirus Application which detects the virus attack on the system and also responds to the attack using a nuke virus (stealth virus). This application can also be applied in Government organizations such as DRDO to immediately stop the exposure of secret documents.
Bookmarks Related papers MentionsView impact
IET Information Security , Feb 20, 2018
Privacy preserving data mining (PPDM) is a well-known research area, which can analyse the databa... more Privacy preserving data mining (PPDM) is a well-known research area, which can analyse the database ensuring privacy such that it does not expose the confidential details. This study proposes a technique of secret key generation for privacy preserving using the least lion optimisation algorithm (LLOA). The proposed algorithm involves two stages: rule mining and secret key generation for the sanitisation. Initially, whale optimisation algorithm mines the association rules for the input database and validates the rules with the newly formulated fitness function. An algorithm, LLOA is developed by modifying the lion optimisation algorithm (LOA) with the inclusion of least mean square (LMS) which generates a secret key to provide privacy in mining. With the secret key, LLOA converts the original database into the sanitised database. Then, the algorithm optimally selects a secret key such that the sanitised database hides sensitive information by the utilisation of two factors, namely, privacy factor and utility factor, in its objective function. From the results, it can be shown that the LLOA technique attains the privacy of 84.36, 83.74, and 82.46%; and utility of 81.37, 83.96, and 81.37%, for chess, T10I4D100K, and retail datasets.
Bookmarks Related papers MentionsView impact
Books by Menaga D.
Academic Press, 2021
Artificial intelligence (AI) is the wide branch of computer science that is specifically concerne... more Artificial intelligence (AI) is the wide branch of computer science that is specifically concerned with smart machines capable to perform specific tasks based on human intelligence. Some of the tasks include speech recognition, translation between languages, visual perception, and decision-making. The machines with strong AI can able to act and think like a human being, and the strong machine can effectively learn from experience. The weak AI can only respond to certain situations, as it cannot think for themselves. The major purpose of using AI is that it reduced human casualties in dangerous workspaces, natural disasters, car accidents, and wars. It is the field of study that explains and emulates the intelligent behavior in terms of computational processes. It is the process of making intelligent machines especially intelligent computer programs. It can effectively understand and build intelligent agents or entities.
Bookmarks Related papers MentionsView impact
IGI Global, 2020
Multimedia application is a significant and growing research area because of the advances in tech... more Multimedia application is a significant and growing research area because of the advances in technology of software engineering, storage devices, networks, and display devices. With the intention of satisfying multimedia information desires of users, it is essential to build an efficient multimedia information process , access, and analysis applications, which maintain various tasks, like retrieval, recommendation, search, classification, and clustering. Deep learning is an emerging technique in the sphere of multimedia information process, which solves both the crisis of conventional and recent researches. The main aim is to resolve the multimedia-related problems by the use of deep learning. The deep learning revolution is discussed with the depiction and feature. Finally, the major application also explained with respect to different fields. This chapter analyzes the crisis of retrieval after providing the successful discussion of multimedia information retrieval that is the ability of retrieving an object of every multimedia.
Bookmarks Related papers MentionsView impact
Conference Presentations by Menaga D.
IEEE 5th International Conference on Science, Technology, Engineering and Mathematics [ICONSTEM 2K19] held at Jeppiaar Engineering College on 14th to 15th March 2019, 2019
This paper goes for making open-source book audio software to assemble a book reader with raspber... more This paper goes for making open-source book audio software to assemble a book reader with raspberry pi controls. Here in this paper, we present the Pi Book reader which can peruse a genuine book out loud and furthermore turn the pages of the book. The general procedure of the undertaking includes Image to Text change and afterward Text to Speech transformation. The picture to content change is done with the assistance of OCR [Optical Character Recognition]. The Optical Character Recognition Technology can be utilized to change over different sorts of reports like pictures, checked records and PDF documents. The OCR calculation includes different stages like Scanning, Pre-processing, Feature Extraction, Classification and Recognition. At long last, E-Speak voice order programming is utilized to change over the acquired content from OCR into discourse direction. This changed over discourse is perused so anyone might hear by a speaker associated with the Raspberry Pi. The programming language that we have utilized is python. This undertaking is down to earth and of extraordinary use for the outwardly hindered.
Bookmarks Related papers MentionsView impact
AICTE Sponsored Virtual Conference on Integration of Advanced Technologies on Infustry 4.0 (ICIATI) held on 12th and 13th June organised by KCG College of Technology, 2020
Medical Emergencies in times of catastrophe is a difficult issue to overcome due to harsh climati... more Medical Emergencies in times of catastrophe is a difficult issue to overcome due to harsh climatic conditions which causes severe roadblocks thereby restricting people’s communication to a shorter radius. People cannot travel long distances in search of hospitals or meet with a doctor and get the treatment that they require. Therefore, our main goal is to overcome this issue and connect the patients to the doctors during a catastrophe. Android is a popular computing platform based on the Linux operating system. Android has effectively become the world’s most popular operating system. For this system an Android application is developed using Android Studio and Google Maps v2 Android API. This Android application provides the facility to book a Doctor’s Appointment in the medical emergencies in times of catastrophe. The patient will book the appointment through his/her mobile phone. The doctor will come to know the number of patients he has to attend the whole day. The system will save patients as well as doctor’s time. It will save the receptionist’s paperwork. The system will prove to be useful for doctors as he can check his appointments whenever and from wherever he wants from his mobile phone. This paper will give the detailed flow of how the application works and how it differs from previous applications tackling similar issues.
Keywords— Android, online appointment, doctor-patient interaction
Bookmarks Related papers MentionsView impact
Teaching Documents by Menaga D.
Evaluating principles of food dynamics, nutrient proportions, holistic individuality, the law of ... more Evaluating principles of food dynamics, nutrient proportions, holistic individuality, the law of opposites, food combining, and more. Therapeutic benefits and limitations of several alternative diet approaches, including: modern diets (intermittent fasting, macrobiotics), food combining (colourtherapy/rainbow diet), high protein diets (Ketogenic, Paleo), Vegetarian approaches (plantbased/vegetarian/vegan variations, fruitarian, raw food), as well as cleansing and detoxification diets (caffeine, alcohol, and nicotine detoxes, juice fasts). Food dynamics refers to the complex interactions that influence the production, distribution, consumption, and regulation of food within society. Evaluating the principles of food dynamics requires a multidisciplinary approach, encompassing agriculture, economics, public health, environmental sustainability, and social equity. These principles guide how food systems operate, impact human health, and affect the environment.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Ayurveda-Basic Concepts Ayurveda is an ancient medicine system of the Indian subcontinent. It is ... more Ayurveda-Basic Concepts Ayurveda is an ancient medicine system of the Indian subcontinent. It is said to have originated in India about 5000 years back. The word Ayurveda is a conjugation of two Sanskrit words 'ayus', meaning 'life' and 'veda', meaning 'science', thus ayurveda literally means the 'science of life'. Unlike other medicinal systems, Ayurveda focuses more on healthy living than treatment of diseases. The main concept of Ayurveda is that it personalizes the healing process. According to Ayurveda, the human body is composed of four basics-the dosha, dhatu, mala and agni. There is immense significance of all these basics of the body in Ayurveda. These are also called the 'Mool Siddhant' or the 'basic fundamentals of Ayurvedic treatment'. Dosha The three vital principles of doshas are vata, pitta and kapha, which together regulate and control the catabolic and anabolic metabolism. The main function of the three doshas is to carry the byproduct of digested foods throughout the body, which helps in building up the body tissues. Any malfunction in these doshas causes disease. Dhatu Dhatu can be defined as one, which supports the body. There are seven tissue systems in the body. They are as Rasa, Rakta, Mamsa, Meda, Asthi, Mjja and Shukra which represent the plasma, blood, muscle, fat tissue, bone, bone marrow and semen respectively. Dhatus only provide the basic nutrition to the body and it helps in the growth and structure of mind. Mala Mala means waste products or dirty. It is third in the trinity of the body i.e. doshas and dhatu. There are three main types of malas, e.g. stool, urine and sweat. Malas are mainly the waste products of the body so their proper excretion from the body is essential to maintain the proper health of the individual. There are mainly two aspects of mala i.e. mala and kitta. Mala is about waste products of the body whereas kitta is all about the waste products of dhatus. Agni All kinds of metabolic and digestive activity of the body takes place with the help of the biological fire of the body called Agni. Agni can be termed as the various enzymes present in the elementary canal, liver and the tissue cells. The Body Matrix Life in Ayurveda is conceived as the union of body, senses, mind and soul. The living man is a conglomeration of three humours (Vata, Pitta & Kapha), seven basic tissues (Rasa, Rakta, Mansa, Meda, Asthi, Majja & Shukra) and the waste products of the body such as faeces, urine and sweat. Thus the total body matrix comprises of the humours, the tissues and the waste products of the body. The growth and decay of this body matrix and its constituents revolve around food which gets processed into humours, tissues and wastes. Ingestion, digestion, absorption, assimilation and metabolism of food have an interplay in health and disease which are significantly affected by psychological mechanisms as well as by bio-fire (Agni). Panchamahabhutas According to Ayurveda all objects in the universe including human body are composed of five basic elements (Panchamahabhutas) namely, earth, water, fire, air and vacuum (ether). There is a balanced condensation of these elements in different proportions to suit the needs and requirements of different structures and functions of the body matrix and its parts. The growth and development of the body matrix depends on its nutrition, i.e. on food. The food, in turn, is composed of the above five elements, which replenish or nourish the like elements of the body after the action of
Bookmarks Related papers MentionsView impact
Introduction to the principles of nutrition; Basics of nutrition including; micronutrients (vitam... more Introduction to the principles of nutrition; Basics of nutrition including; micronutrients (vitamins and minerals), the energy-yielding nutrients (Carbohydrates, Lipids and Proteins), metabolism, digestion, absorption and energy balance. Lipids: their functions, classification, dietary requirements, digestion & absorption, metabolism and links to the major fatal diseases, heart disease and cancer.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Uploads
Papers by Menaga D.
Books by Menaga D.
Conference Presentations by Menaga D.
Keywords— Android, online appointment, doctor-patient interaction
Teaching Documents by Menaga D.
Keywords— Android, online appointment, doctor-patient interaction