Videos by Prof. Dr.J.R. Arun kumar
Abou the Security Issues and Challenges
7 views
Cyber Security
Fundamentals of Cyber Security
Research Ideas in Cyber Security
How to become a... more Cyber Security
Fundamentals of Cyber Security
Research Ideas in Cyber Security
How to become an ethical Hackers
Techniques in Cyber Security 1 views
Papers by Prof. Dr.J.R. Arun kumar

International Journal of Innovative Technology and Exploring Engineering, 2020
Coffee grading is the main procedure in producing homogenous local commercial fair system of pric... more Coffee grading is the main procedure in producing homogenous local commercial fair system of pricing in the market and export. Grading coffee is a difficult task during the inspection, because it requires training and experience of the experts. In order to tackle grading difficulties in coffee producing industries and corporates have been employed and trained experts. Even if, those experts do not work effectively due to tiredness, costly, time consuming, inconsistency, bias and other factors. Digital image processing techniques based on automatically extracted features have been explored to classify Ethiopian coffee to corresponding quality grade labels. Samples of those coffee beans were taken from Yirgacheffe Coffee Farmers’ Cooperative Union. On average, 228 images were taken from each of three grade values or levels (grade 1, grade 2 and grade 3). The total number of images taken was 684 containing 6138 coffee beans. To extract coffee bean features and build a classification mo...
Suggesting an agent based design methodology for condition monitoring of high voltage apparatus
... [Online]. Available: http://jade.cselt.it/. [6] Fabio Bellifemine, Giovanni Caire, Dominic Gr... more ... [Online]. Available: http://jade.cselt.it/. [6] Fabio Bellifemine, Giovanni Caire, Dominic Greenwood, "Developing Multi-Agent Systems with JADE", John Wiley & Sons Ltd, 2007. ... [11] Victoria M. Catterson, Euan M. Davidson, Stephen DJ McArthur, “Issues in Integrating Existing Multi ...
Suggesting an agent based design methodology for condition monitoring of high voltage apparatus
... [Online]. Available: http://jade.cselt.it/. [6] Fabio Bellifemine, Giovanni Caire, Dominic Gr... more ... [Online]. Available: http://jade.cselt.it/. [6] Fabio Bellifemine, Giovanni Caire, Dominic Greenwood, "Developing Multi-Agent Systems with JADE", John Wiley & Sons Ltd, 2007. ... [11] Victoria M. Catterson, Euan M. Davidson, Stephen DJ McArthur, “Issues in Integrating Existing Multi ...

Journal of Science, Computing and Engineering Research (ISSN: 2708-1079), 2020
The ordinary information get to control framework is to keep up the specific sharing composite Pe... more The ordinary information get to control framework is to keep up the specific sharing composite Personal Health Information Records (PHIRs)in health center, operations from different health centers in cloud major research looks into in the present IT. A PHIR administration license a patient to making, overseeing, and controlling the individual wellbeing information in one spot through the web, which has made the extra room, recovery, and appropriation of the clinical data progressively effective. Uncommonly, every patient is secure the full control of clinical records and can impart the wellbeing information to an enormous scope of clients with social insurance donors and relatives. Because of the significant expense of building and keep up secured and specific server, numerous PHIR administrations are redistributed to make accessible by client from specialist organizations. Decentralized server farms the emission of CO2 is high and nature get spoiled and polluted by making reusable datacenters the data's or information's can shared through the PHIR's. By this we can keep away from the high emission of CO2, the adaptability; accessibility and similarity are increments according to Moore's law. To share the cutting edge data's from other server farm information with reusable asset and e-Health Care Service in ethiopian health center.

Journal of Science, Computing and Engineering Research (ISSN: 2708-1079), 2020
The backbone of this research is to design and developed an effective cloud environment for prete... more The backbone of this research is to design and developed an effective cloud environment for pretending and protection of portable client device information put away in the cloud. Portable gadgets, for example, advanced mobile phones or tablets that are fundamentally more restricted than PCs as far as memory, processors, secured operating system, and accessible system data transmission bandwidth because of that all information migrate in to cloud environment. A portable client may go about as an information owner will demand key from the cloud administrator, scrambles the information and afterward it transfers the information in the cloud. In the cloud secured encryption is finished. Certificate Authority Based Encryption (CABE) approach is utilized for security and adaptability. Frequent monitoring is accomplished for Privacy, Security, trustworthiness and accessibility.
Journal of Science, Computing and Engineering Research (ISSN: 2708-1079), 2020
In categorized sensor network deployment, many applications uses different sensor nodes and commu... more In categorized sensor network deployment, many applications uses different sensor nodes and communicate with sensor nodes. In WSN peer-to-peer sensor network consists of hundreds to several thousand sensor nodes connect locally with neighboring nodes and send data over the network. However, sensor networks meet challenges to provide security using Symmetric public key cryptosystem. Sensor networks are also vulnerable to several node attacks by an adversary. For this reason, message authentication schemes are required to prevent such node attacks from an attacker. This paper focuses on scalable Message authentication scheme, it is proposed based on Blue Fish Cryptography (BFC). The message authentication scheme proposed also provides source assurance of security.

Journal of Science, Computing and Engineering Research (ISSN: 2708-1079), 2020
In Wireless Sensor Networks arrange is the technique for transferring new code or modifying the r... more In Wireless Sensor Networks arrange is the technique for transferring new code or modifying the reasonableness of existing code. For security reasons, each code update ought to be authenticated to ignore unauthenticated from mounting malignant code with in the Wireless Sensor Networks. Totally existing reinventing conventions depend on the incorporated technique wherein single the base station has the position to inductee rewrite the programming. On the other hand, it is required and some of the time required for different approved system clients to simultaneously and straightforwardly reinvent sensor nodes while excluding the base station, which is referenced to as disseminated reconstructing of program. The system vender can even allot distinctive reinventing benefits to various clients Very as of late, a novel ensured and appropriated reconstructing program convention named Enhanced Secure Dynamic Authorized Secured protocol (EDASP) has been proposed, which is the principal exertion of its sort. Alternately, right now, distinguish a trademark configuration deficiency in the client preprocessing period of EDASP and approve that it is defenseless to a pantomime assault by which an enemy can basically imitate any approved client to finish reinventing. Thusly, we propose a straightforward adjustment to fix the perceived security issue without losing any highlights of. The Node c Enhanced Dynamic Authorized Secured protocol order calculation is utilized to sort the sensor hub before transmitting the code picture. Every single client need to confirm the sensor in its benefit list before sending the code picture

Journal of Science, Computing and Engineering Research (ISSN: 2708-1079), 2020
Cancer classification is very important in the field of bioinformatics for diagnosis of cancer ce... more Cancer classification is very important in the field of bioinformatics for diagnosis of cancer cells. Accurate prediction of cancer is very important for providing better treatment and to avoid the additional cost associated with wrong therapy. In recent years for classifying the cancer numbers of methods have been exist. The main objective is to find the smallest set of genes by using machine learning algorithms. The proposed method initially uses Naive Bayes classifier with great flexibility. However, the Naive Bayes is not suitable for the classification of large datasets because of significant computational problems. The Naive Bayes combined with the mid k-means clustering (Km-Naive Bayes) is a fast algorithm developed to accelerate both the training and the prediction of Naive Bayes classifiers by using the cluster centers obtained from the k-means clustering. The new techniques namely weighted Mid K-means-Naive Bayes is implemented to improve accuracy and to reduce misclassification and noise arising from irrelevant genes. The proposed algorithm was evaluated with different classifier algorithms which were applied on the same database. The experimental results achieved the proposed Mid K-means-Naive Bayes classification accuracy has 88.8%
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enable... more Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.
Information Assurance is defined as the set of measures intended to protect and defend informatio... more Information Assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. These measures are planned and executed by the Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.
Jeyalakshmi Publication, 2017
Linux administarion Commads
Information Assurance and Security
Teaching Documents by Prof. Dr.J.R. Arun kumar
Uploads
Videos by Prof. Dr.J.R. Arun kumar
Fundamentals of Cyber Security
Research Ideas in Cyber Security
How to become an ethical Hackers
Techniques in Cyber Security
Papers by Prof. Dr.J.R. Arun kumar
Teaching Documents by Prof. Dr.J.R. Arun kumar