Bala Subramanian - Academia.edu (original) (raw)

Bala Subramanian

Uploads

Papers by Bala Subramanian

Research paper thumbnail of Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business

International Journal of Database Management Systems, 2010

Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of ... more Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof several ongoing researches Conventional Web Servers and its Intrusion Detection System might not be able to detect such attacks. So we implement a Cloud Data Server with Session Controller Architecture using Redundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code using MD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined by traditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Management using My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. The CDS using the Virtual Controller controls and monitors the Connections and modifications of the page so as to prevent malicious users from hacking the website. In the proposed approach an activity analyzer takes care of intimating the administrator about possible intrusions and the counter measures required to tackle them. The efficiency ratio of our approach is 98.21% compared with similar approaches.

Research paper thumbnail of A Comprehensive Analysis of Medical Image Segmentation using Deep Learning

International Journal of Scientific Research and Review, 2019

Image segmentation has created important advances in recent years. Recent work construct to a gre... more Image segmentation has created important advances in recent years. Recent work construct to a great extent with respect to Deep Learning techniques that has brought about groundbreaking enhancement within the accuracy of segmentation. As a result of image segmentations are a midlevel illustration, they need a potential to create major contribution over the wide field of visual understanding from image classification and interactive pursuit. Medical image segmentation is a sub area of image segmentation that has many essential applications inside the prospect of medical image evaluation and diagnostic. In this paper, distinct strategies of medical image segmentation could be classified forthwith their sub techniques and sub fields. This paper presents useful approaches into the field of medical image segmentation using Deep Learning and attempt to summarize the long term scale of work.

Research paper thumbnail of Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business

Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of ... more Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof several ongoing researches Conventional Web Servers and its Intrusion Detection System might not be able to detect such attacks. So we implement a Cloud Data Server with Session Controller Architecture using Redundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code using MD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined by traditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Management using My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. The CDS using the Virtual Controller controls and monitors the Connections and modifications of the page so as to prevent malicious users from hacking the website. In the proposed approach an activity analyzer takes care of intimating the administrator about possible intrusions and the counter measures required to tackle them. The efficiency ratio of our approach is 98.21% compared with similar approaches.

Research paper thumbnail of Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business

International Journal of Database Management Systems, 2010

Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of ... more Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof several ongoing researches Conventional Web Servers and its Intrusion Detection System might not be able to detect such attacks. So we implement a Cloud Data Server with Session Controller Architecture using Redundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code using MD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined by traditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Management using My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. The CDS using the Virtual Controller controls and monitors the Connections and modifications of the page so as to prevent malicious users from hacking the website. In the proposed approach an activity analyzer takes care of intimating the administrator about possible intrusions and the counter measures required to tackle them. The efficiency ratio of our approach is 98.21% compared with similar approaches.

Research paper thumbnail of A Comprehensive Analysis of Medical Image Segmentation using Deep Learning

International Journal of Scientific Research and Review, 2019

Image segmentation has created important advances in recent years. Recent work construct to a gre... more Image segmentation has created important advances in recent years. Recent work construct to a great extent with respect to Deep Learning techniques that has brought about groundbreaking enhancement within the accuracy of segmentation. As a result of image segmentations are a midlevel illustration, they need a potential to create major contribution over the wide field of visual understanding from image classification and interactive pursuit. Medical image segmentation is a sub area of image segmentation that has many essential applications inside the prospect of medical image evaluation and diagnostic. In this paper, distinct strategies of medical image segmentation could be classified forthwith their sub techniques and sub fields. This paper presents useful approaches into the field of medical image segmentation using Deep Learning and attempt to summarize the long term scale of work.

Research paper thumbnail of Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business

Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of ... more Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof several ongoing researches Conventional Web Servers and its Intrusion Detection System might not be able to detect such attacks. So we implement a Cloud Data Server with Session Controller Architecture using Redundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code using MD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined by traditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Management using My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. The CDS using the Virtual Controller controls and monitors the Connections and modifications of the page so as to prevent malicious users from hacking the website. In the proposed approach an activity analyzer takes care of intimating the administrator about possible intrusions and the counter measures required to tackle them. The efficiency ratio of our approach is 98.21% compared with similar approaches.

Log In