K. Radha - IEEE Xplore Author Profile

Showing 1-2 of 2 results

Results

Because cybersecurity is continually changing, it’s crucial to have effective, adaptable defenses. This paper demonstrates a novel computer security method. This is done via blockchain technology, enhanced cryptography, threat intelligence integration, machine learning-based strangeness detection, and behavioral analysis. After carefully comparing our solution to others, we feel it is the best way...Show More
An electroencephalogram that was captured with electrodes placed can easily get contaminated with a variety of artifacts. Here is a comparative of various electroencephalogram (EEG) de-noising techniques. Three alternative techniques are used to eliminate five different kinds of noise, and also the outcomes are evaluated. These three methods are just the Least Mean Square (LMS) technique, the Conn...Show More