Systematic Review on Software Application Under-distributed Denial of Service Attacks for Group Websites

DMV Rao, SS Vellela, K Basha Sk… - Dogo Rangsang …, 2023 - papers.ssrn.com
The Internet is constantly under serious threat from distributed denial of service (DDoS)
attacks. In order to overload victim resources, modern DDoS attacks are moving up to the …

Credit Investigation and Comprehensive Risk Management System based Big Data Analytics in Commercial Banking

M VenkateswaraRao, SS Vellela… - 2023 9th …, 2023 - ieeexplore.ieee.org
The banking industry has experienced significant transformations in terms of how effectively
they function and provide services over the past few decades. The banking services …

Multi-agent personalized recommendation system in e-commerce based on user

N Vullam, SS Vellela, V Reddy, MV Rao… - … on Applied Artificial …, 2023 - ieeexplore.ieee.org
As more sectors began to switch from conventional business models to e-commerce in
response to the general trend toward mobile Internet use, the scale of e-commerce grew …

Cloud-hosted concept-hierarchy flex-based infringement checking system

SS Vellela, K Basha Sk, K Yakubreddy - … Research Journal in …, 2023 - papers.ssrn.com
Unlike competing online Infringement solutions, Infringement is copy-paste elimination
software. Infringement is the illegal use of another person's words or ideas without …

A cloud-based smart IoT platform for personalized healthcare data gathering and monitoring system

SS Vellela, VL Reddy, D Roja, GR Rao… - 2023 3rd Asian …, 2023 - ieeexplore.ieee.org
Several technological and informational technologies are currently develo** quickly and
profoundly altering our contemporary way of life. The Internet of Things (IoT) has become …

Design And Implementation of An Integrated IOT Blockchain Framework for Drone Communication

SS Priya, SS Vellela, V Reddy… - 2023 3rd …, 2023 - ieeexplore.ieee.org
As more data is transmitted and processed, as it moves from its infancy to full maturity, the
Internet of Things (IoT) has the possibility of develo** quite quickly. This is because …

Prediction And Analysis Using A Hybrid Model For Stock Market

N Vullam, K Yakubreddy, SS Vellela… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Success in optimising AI-related solutions has been greatly enhanced by the use of deep
learning (AI). The stock market, trade execution tactics, and portfolio optimization are just …

Qos-Aware Video Streaming Based Admission Control And Scheduling For Video Transcoding In Cloud Computing

V Reddy, KB Sk, D Roja - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Power and other computing resources can be stored and processed in cloud computing
environments. Depending on the features of the clients' devices, video streams, whether …

A Novel Approach to Human Iris Recognition And Verification Framework Using Machine Learning Algorithm

S Davuluri, S Kilaru, V Boppana… - … and Informatics (IC3I …, 2023 - ieeexplore.ieee.org
The component of a computer system that is in responsibility of user security is one of the
most important modules. It was demonstrated that simple logins and passwords are easy for …

Novel and Secure Protocol for Trusted Wireless Ad-hoc Network Creation

KB Sk, SS Vellela, K Yakubreddy… - Khader Basha Sk …, 2023 - papers.ssrn.com
In order to share the initial data and the secret keys that will be used to encrypt the data, a
secure protocol is presented in this research for spontaneous wireless ad hoc networks that …