Gurulakshmanan, Gurumoorthi
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Efficient and robust disaster recovery system using cloud-based algorithms with data integrity Gurulakshmanan, Gurumoorthi; Amarnath, Raveendra Nandhavanam
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp388-396

Abstract

Incorporating cloud-based algorithms for disaster recovery (DR), it explores data replication, failover, virtual machine (VM) migration, and consistency algorithms. These algorithms play a pivotal role in safeguarding data and system continuity during unforeseen disruptions. Data replication ensures redundancy, failover algorithms swiftly transition to backup resources, VM migration facilitates resource optimization, and consistency algorithms maintain data integrity. Leveraging cloud technology enhances the effectiveness of these algorithms, providing robust DR solutions critical for business continuity in today's digital landscape. The recent growth in popularity of internet services on a massive scale has also raised the demand for stable underpinnings. Despite the fact that DR for big data is frequently overlooked in security research, the majority of existing approaches use a narrow, endpoint-centric approach. The significance of DR strategies has grown as cloud storage has become the norm for more data. But traditional cloud-centric DR techniques may be expensive, thus less expensive alternatives are being sought. There is persistent concern in the information technology (IT) community about whether or not cloud service providers (CPs) can guarantee data and service continuity in the event of a disaster.
Cloud-based machine learning algorithms for anomalies detection Amarnath, Raveendra N; Gurulakshmanan, Gurumoorthi
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp156-164

Abstract

Gradient boosting machines harnesses the inherent capabilities of decision trees and meticulously corrects their errors in a sequential fashion, culminating in remarkably precise predictions. Word2Vec, a prominent word embedding technique, occupies a pivotal role in natural language processing (NLP) tasks. Its proficiency lies in capturing intricate semantic relationships among words, thereby facilitating applications such as sentiment analysis, document classification, and machine translation to discern subtle nuances present in textual data. Bayesian networks introduce probabilistic modeling capabilities, predominantly in contexts marked by uncertainty. Their versatile applications encompass risk assessment, fault diagnosis, and recommendation systems. Gated recurrent units (GRU), a variant of recurrent neural networks, emerges as a formidable asset in modeling sequential data. Both training and testing are crucial to the success of an intrusion detection system (IDS). During the training phase, several models are created, each of which can recognize typical from anomalous patterns within a given dataset. To acquire passwords and credit card details, "phishing" usually entails impersonating a trusted company. Predictions of student performance on academic tasks are improved by hyper parameter optimization of the gradient boosting regression tree using the grid search approach.