Papers by Dr. Bhavana Raj K
Graph‐based content matching for web of things through heuristic boost algorithm
IET Communications
Arrangement and Accomplishment of Interconnected Networks with the Virtual Reality Twinning with the Inner Light of Cybernetics
2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)

Measuring the Determining Factors of Financial Development of Commercial Banks in Selected SAARC Countries
Journal of Database Management
Traditional banks face the issue of risk diversification, and it is dealt with when they evolve i... more Traditional banks face the issue of risk diversification, and it is dealt with when they evolve into financial institutions. So, the present study aims to investigate banking and off-balance sheet (OBS)-based risks and regulatory changes in certain age-old South Asian (SA) banks and finds the tenacity of the OBS in the long run. For these research goals, two estimates are applied: fixed effects (FE) and generalized method of moments (GMM). Using FE, the researchers estimate the realm and time for finding financial shocks and other time-related factors affecting the SA countries. The majority of findings reveal a constant market theory stating the performance of SA in assessing OBS-related risks. Banks in SA also seem to follow the market regulatory and TT in capital needs that will incentivize banks to take too much risk in off-balance sheet activities (OBSA). The research findings are practically applied to bank-related risks, pressure from regulatory restructuring, and dangers fro...

Blockchain in Trust with Reputation Management for Financial Stock Market Using Distributed Ledger Technology and Bayesian Theory Based on Fault Tolerance Model
Global Business Review
Blockchain, which is at the heart of bitcoin and other digital currencies, is a game-changing tec... more Blockchain, which is at the heart of bitcoin and other digital currencies, is a game-changing technology, particularly in the stock market and financial technology. These characteristics make blockchain adoption appealing for enhancing information security, privacy and reliability in a variety of scenarios. This article develops the trust with reputation-based management for the financial stock market. Here distributed ledger technology (DLT) has been integrated for implementing the ledger in which data is stored across a network of decentralized nodes. By this, proof-based ledger has been maintained with transparency, traceability and security. DLT here used is based on trust design in mitigating the malicious activities of the financial stock marketing technology. Then using Bayesian theory based on the fault tolerance (BDLT_FT) model has been used in improving the efficiency of DLT and financial technology. This acts as the protocol which reduces energy consumption and enhance ne...

Federate learning on Web browsing data with statically and machine learning technique
International Journal of Pervasive Computing and Communications
Purpose Federation analytics approaches are a present area of study that has already progressed b... more Purpose Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis. Design/methodology/approach Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a s...
Industry 4.0: Smart Manufacturing in Industries ‐ The Future
Machine Learning and Data Science

Computational Intelligence and Neuroscience
People are actively expressing their views and opinions via the use of visual pictures and text c... more People are actively expressing their views and opinions via the use of visual pictures and text captions on social media platforms, rather than just publishing them in plain text as a consequence of technical improvements in this field. With the advent of visual media such as images, videos, and GIFs, research on the subject of sentiment analysis has expanded to encompass the study of social interaction and opinion prediction via the use of visuals. Researchers have focused their efforts on understanding social interaction and opinion prediction via the use of images, such as photographs, films, and animated GIFs (graphics interchange formats). The results of various individual studies have resulted in important advancements being achieved in the disciplines of text sentiment analysis and image sentiment analysis. It is recommended that future studies investigate the combination of picture sentiment analysis and text captions in more depth, and further research is necessary for this...
Neural network-based optimisation of smart odometry classification in a self-governing robot for precise position and location estimation
International Journal of Engineering Systems Modelling and Simulation
Investigating the Impact of IoT on Business Performance
Turkish Online Journal of Qualitative Inquiry, Jul 23, 2021

Sustainability
Federated learning preserves the privacy of user data through Machine Learning (ML). It enables t... more Federated learning preserves the privacy of user data through Machine Learning (ML). It enables the training of an ML model during this process. The Healthcare Internet of Things (HIoT) can be used for intelligent technology, remote detection, remote medical care, and remote monitoring. The databases of many medical institutes include a vast quantity of medical information. Nonetheless, based on its specific nature of health information, susceptibilities to private information, and since it cannot be pooled related to data islands, Federated Learning (FL) offers a solution as a shared collaborative artificial intelligence technology. However, FL addresses a series of security and privacy issues. An adaptive Differential Security Federated Learning Healthcare IoT (DPFL-HIoT) model is proposed in this study. We propose differential privacy federated learning with an adaptive GBTM model algorithm for local updates, which helps adapt the model’s parameters based on the data characterist...
Investigation of E-voting system using face recognition using convolutional neural network (CNN)
Theoretical Computer Science

A novel framework for the automated healthcare disaster based on intellectual machine learning
World Journal of Engineering
Purpose The purpose of this paper used for catastrophe and pandemic preparedness was the craft of... more Purpose The purpose of this paper used for catastrophe and pandemic preparedness was the craft of machine learning calculations. ML is the latest globe learning technique to assist in the identification and remediation of medical care catastrophes. Design/methodology/approach To the greatest extent possible, countries are terrified about debacles and pandemics, which, all in all, are exceptionally improbable occurrences. When health emergencies arise on the board, several issues arise for the medical team because of the lack of accurate information from numerous diverse sources, which is required to be available by suitable professionals. Findings Thus, the current investigation’s main objective is to demonstrate a structure that is dependent on the incorporation of recent advances, the Internet of Things and large information and which can settle this issue by using machine learning (ML) in all stages of catastrophe and providing accurate and compelling medical care. Originality/va...
A theoretical study on managing the intangible component of the knowledge base of an organisation
International Journal of Intelligent Enterprise
Methods To Identify Facial Detection In Deep Learning Through The Use Of Real-Time Training Datasets Management
EFFLATOUNIA - Multidisciplinary Journal, Aug 10, 2021
The Grotesque Body and Socioeconomic Change in Harry Crews S Naked in Garden Hills
uga, May 1, 2015

Investigation on the Faculty S Status Quo of the Standardized Training for Residents of Traditional Chinese Medicine in Beijing
Medical Education Management, Apr 20, 2019
Background and Objectives: Vision impairments and related blindness are major public health probl... more Background and Objectives: Vision impairments and related blindness are major public health problems. The prevalence of eye disease and barriers to optimal care markedly vary among different geographic areas. In the Abruzzo region (central Italy), an epidemiological surveillance on the state of ocular health in the population aged over 50 years was performed in 2019. Materials and Methods: Participants were sampled to be representative of the region's inhabitants. Data were collected through a telephone interview and an eye examination. Prevalence of cataract, glaucoma, retinopathy, and maculopathy was assessed. The Cohen's kappa (k) was used to measure the agreement between the presence of eye disease and awareness of the disease by the participants. Results: Overall, 983 people with a mean age of 66.0 ± 9.5 years were included in the study. The prevalence of cataracts, glaucoma, maculopathy, and retinopathy was 52.6%, 5.3%, 5.6%, and 29.1%, respectively. Among the total of the affected people, those aware of their condition were 21.8% (k = 0.12, slight agreement) for cataract, 65.4% (k = 0.78, substantial agreement) for glaucoma, 7.1% (k = 0.10, slight agreement) for maculopathy, and 0% for retinopathy (k = -0.004, agreement lower than that expected by chance). Refractive defects were corrected in the vast majority of participants. Conclusion: In the Abruzzo region, about two thirds of citizens aged 50 years or over suffer from cataract, glaucoma, retinopathy, or maculopathy, which are recognized as leading causes of blindness. Many people with eye disease do not know they have it. These data can be used by clinicians and policymakers to undertake clinical, political, and social actions.
Using Blockchain Technology to Create a Secure Digital Voting System
Design Engineering, Jun 6, 2021

Data Security and Sensitive Data Protection using Privacy by Design Technique
EAI/Springer Innovations in Communication and Computing, 2020
Adhering to internationally accepted data privacy principles in every new data analytics initiati... more Adhering to internationally accepted data privacy principles in every new data analytics initiative ensures compliance with virtually all current government or industry-mandated data privacy regulations and enables the business to extract maximum financial benefit from available data assets without violating the trust between the organization and its customers. Privacy by design is a fundamentally important approach to achieving compliance with GDPR, HIPAA, and other data privacy or data protection regulations. This paper outlines how organizations can save time and money while improving data security and regulatory compliance and dramatically reduce the risk of a data breach or expensive penalties for noncompliance. What privacy by design means? Why it’s so important? and how to implement it within any organization, using data protection and data access control technologies. Build it in from the beginning to facilitate better regulatory compliance, reduce risk, reduce operating costs, shorten development times, improve customer trust and loyalty, and gain more open access to sensitive and regulated data for business benefit—without violating generally accepted privacy principles. The big change is Big Data. All the more explicitly, how organizations will use Big Data analytics to boost these developing data resources – driven by their profound enthusiasm to augment their assets and better contend in the market. While organizations have down to earth motivations to take advantage of their consistently developing perception space, they additionally have a squeezing need to implant in these frameworks improved security assurances. We outline in this paper just such an example – how an advanced Big Data sensemaking technology was, from the ground up, engineered with privacy-enhancing features. Some of these features are so critical to accuracy that the team decided they should be mandatory – so deeply baked-in they cannot be turned off. This paper demonstrates how privacy and responsibility can be advanced in this new age of Big Data analytics.

European Journal of Business and Management, 2017
This research paper tries to assess the various types of risks prevalent in the banking sector us... more This research paper tries to assess the various types of risks prevalent in the banking sector using VaR (Value-at-Risk) model – a Risk assessment tool. As Value – at- Risk measures the probability that an asset is valued below a certain value during a particular time, a probabilistic approach is used to find the profitability. A comparative analysis is performed among the sample banks. Both the conventional methods and the new methods are used to evaluate the risk profile of the banks. The likelihood of occurrence of a particular value for an asset gives us the magnitude of risk involved in the corresponding asset of the bank. The VaR values which depend on market rates which are calculated for portfolios of various banks thus enabling us to differentiate various risk management practices prevalent among Indian Banks and a Foreign Bank. Factors which help in mitigating the risk are analyzed and their tolerance levels are put forth. Depending upon the confidence levels and consideri...
Management Studies to Develop the Smart Cities on Real Life Situations by Using IOT
Urban Economics & Regional Studies eJournal, 2021
We developed the management activities to study the current scenario of IOT usage in Public Trans... more We developed the management activities to study the current scenario of IOT usage in Public Transport Management. It trades and organizations usages are for automobile accommodations to promote or interconnect to community. Maximum industries try to promote to bull marketplace by deliberately employing a commercial in the car/other vehicle accommodations, to broaden the chance to see to spectators. One of the most important developments of PM Modi government is development of Smart Cities. The key area of study is IOT. In terms of context, the study focuses on Public Transport of Smart Cities with management sytem.
Uploads
Papers by Dr. Bhavana Raj K