0% found this document useful (0 votes)
46 views8 pages

Cloud Data Backup & Recovery Solutions

Uploaded by

waelaljohani2143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views8 pages

Cloud Data Backup & Recovery Solutions

Uploaded by

waelaljohani2143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/368339722

A Secured Database Monitoring Method to Improve Data Backup and Recovery


Operations in Cloud Computing

Article · February 2023


DOI: 10.54646/bijcs.019

CITATIONS READS

86 1,574

3 authors, including:

Jaganathan Logeshwaran
Sri Eshwar College of Engineering
164 PUBLICATIONS 4,949 CITATIONS

SEE PROFILE

All content following this page was uploaded by Jaganathan Logeshwaran on 08 February 2023.

The user has requested enhancement of the downloaded file.


ISSN (online) 2583-455X

BOHR International Journal of Computer Science


2023, Vol. 2 , No. 1, pp. 1–7
https://doi.org/10.54646/bijcs.019
www.bohrpub.com

A Secured Database Monitoring Method to Improve Data Backup


and Recovery Operations in Cloud Computing

G. Ramesh1 , J. Logeshwaran2,∗ and V. Aravindarajan1


1 Department of Information Technology, KLN College of Engineering, Madurai, India
2 Department of ECE, Sri Eshwar College of Engineering, Coimbatore, India
∗ Corresponding author: drlogeshj@gmail.com

Abstract. In general, the company sometimes uses unregistered functions in database, which significantly improves
performance, but does not leave the possibility of recovery except for backup. That is, actions must be performed
immediately after passing the session. A queue problem is likely to cause data loss and downtime of about a week.
In modern conditions, this can lead to the bankruptcy of the company. It can be seen that backup systems have been
installed and configured, but despite this, they have not succeeded in restoring within the time frame specified in
the SLA. In this study, a secured database monitoring method was proposed to improve data backup and recovery
operations in cloud computing. In this proposed method, the backup speed is directly proportional to the amount of
data, while having at least 30% annual data growth. In 3–4 years, the data at least doubled, but for some companies,
this number is even higher, while the backup speed does not change. Those terms and those SLAs that were relevant
3–4 years ago now need to be at least doubled. At the same time, business requirements for data recovery (recovery
point objective/recovery time objective) continue to grow.
Keywords: Database, performance, recovery, backup, operating system, queue, downtime.

INTRODUCTION are associated with the loss of some part of the data. At
the same time, traditional backup tools allow you to restore
All the business processes of the company are being trans- data directly from the backup, but often you need to restore
ferred to information technology, and the paper primary the entire system [11–13]. If your database is 15 TB, this will
(copies and originals of documents, reports, scans, etc.) is take several days [14]. In a world where the master sheet
disappearing [1, 2]. Everything revolves around IT sys- disappears and everything is stored in IT systems, every
tems, and data loss literally means losing everything [3]. second creates data that we want to protect immediately,
There is no more room for error. In the cases we presented, the moment it is created. But this cannot be done using
all the time, companies were unable to function due to the classic backup systems [15, 16]. Each data have a certain
unavailability of data due to various circumstances [4, 5]. length of time, and these data exist all over the world in
This led to direct and indirect losses, for example, rep- one copy [17].
utational losses, when the company could not carry out The customers want to continue to protect their data
its main business process, which is not easy to measure from the moment it appears [18]. When you decide to
in monetary terms but in the long run does not cause restore from a backup, you often need to restore a day
less damage to the company [6–8]. We have reflected on earlier and then have the data retrieved somewhere else
our observations regarding recovery time objective. As a day later [19, 20]. As a rule, this is a long task for
your data grow, the actual recovery time must also grow, administrators that takes several days [21]. With a very
and the SLA requirements become stricter [9]. The point negative development of events, it can lead to the loss of
where the actual graph time equals the required time has very important information [22]. Of course, the problem
already been sent to most clients [10]. In fact, most errors is not limited to backup; it is about the construction of

1
2 G. Ramesh et al.

the IT system as a whole, and the title in this case is so Table 1. The related issues and proposed suggestions.
important that it cannot be ignored [23, 24]. Unfortunately, Issues Proposed Suggestions
there are no cheap and quick options to check how well The IBS was misconfigured, Use Database Standby located
the backup was done [25]. Of course, this can be done and no test reconfigurations on a different queue. This will
with periodic test recoveries, but this is a very expensive were performed. allow some time to transition
operation in terms of human effort and IT resources [26]. It to the running data instance.
is the work of a separate team on a separate hardware [27]. There are no mechanisms for Database ZDLRA backup
Most of the customers do not do this. It often happens quick recovery in case of appliances will allow
disaster and redundant database restoration in a very
that everyone creates backups, but during restoration, it
systems. short period of time.
turns out that they could not have been done – despite
The number of attacks here Smart planning of backup
the outwardly correct operation of RMS, they cannot be was high because no clear DR and recovery processes can
restored [28, 29]. This happens for various reasons. This is plan was defined. avoid such huge losses and
best explained with an example [30]. A backup system is recover within a day.
a service subsystem of a data center and has the following
features:

• The backup process is not critical to solving IS prob- that this is only one part of your data protection strat-
lems. A failure of a backup system does not lead to egy [45]. A reserve parachute is not a silver bullet, as many
a reduction in the availability of critical information case studies prove that the approach to data protection
services [31]. must be comprehensive, so when developing it, we must
• The computational burden that the backup pro- consider where it will fit in the global strategy for data
cess creates is not beneficial to the provision of IS protection [46].
information services [32]. A system administrator maintains an inventory of
backup client computers, recording devices, and backup
Naturally, it was forgotten in the maintenance industry storage media and schedules backups. All this information
for many years. Thus, a part of the data is completely is contained in a special database stored on the backup
lost [33, 34]. It took several more days to completely recre- management server [47]. The management server instructs
ate the infrastructure services – no backups of operating the agent program installed on the client computer to start
systems, binaries, configurations, etc. [35]. All the missing backing up data according to the selected policy in accor-
information was collected from primary documents [36]. dance with the schedule or according to the operator’s
One of our customers used a SAP system with an Oracle command [48]. The agent program collects and transfers
database. The backup was carried out by inbuilt SAP tools the data to be backed up to the copy server specified by
with the help of huge vendors [37, 38]. Two different the management server [49]. The mechanism of action of
backup policies were configured: the first was file-based "snapshots" is different and can be implemented both in
and copied the data of operating and software systems, software on a production server and in hardware within
and the second was the database itself [39]. Since they were the array [50]. At the moment when the backup needs to
sent to the same system, an exclusion list was constructed be started, the agent program instructs the application to
and entered into the database [40]. The file policy takes this complete all transactions and save the cache memory [51].
list into account and does not allocate directories in the A fundamental challenge for any data center is implement-
database [41]. Due to the uniqueness of the architecture, ing a service level agreement between the IT department
the database backup policy ignored the list of exclusions and the business [52]. A key aspect of meeting business
and correctly copied the required data [42]. needs is the assurance of data security, so a data backup
and recovery system is an integrated infrastructure unit
RELATED WORKS of a properly organized data center’s data storage subsys-
tem [53]. This type of backup and recovery actually takes
An improper approach to the problem of backup is a a few seconds, which distinguishes this technology from
critical problem. Historically, the company or an integrator classical systems with foreign media [54]. The issues in the
built it. At the time of construction, it certainly met all existing systems and the proposed solutions are shown in
the requirements and performed its function perfectly [43]. Table 1.
Over the years, the enterprise IT landscape has changed. At
the same time, the backup system was simply adjusted as PROPOSED MODEL
the system evolved, and often no systematic approach was
followed, which would take into account the importance First, it is necessary to disconnect the backup and recovery
of system compliance with initial indicators in all sub- speed from the computer volume. Data storage systems,
sequent phases [44]. When developing a data protection application software, and RMS manufacturers recommend
system in your organization, you should take into account using some tools that can be used to solve this problem.
Secured Database Monitoring Method 3

Snapshots allow you to back up and restore data in seconds


Backup
with little or no impact on performance. This is done
through sequence, while being able to control SRK, and
Information
Recovery
should be part of its policy. Another solution may be to security
use various utility tools like Oracle Standby, DB2 HADR,
and MS SQL Always On. All of these tools allow you to
have a working copy of the production system, separated
from the original, which can be deployed immediately. It
Seamless Content
allows you to work immediately after failures. The second integration analysis
is to make it possible to restore only the data you need. Our
approach takes into account that when restoring a part of
the data, there is no need to copy the entire system, we can
Mobile data Contextual
restore the data we need at this time. This is achieved by access search
the ability to quickly deploy or use existing systems that
contain this data. As in the first case, the snapshot allows Figure 1. Important blocks of the proposed model.
you to solve this problem (you can quickly open a snapshot
on a neighboring server and extract the necessary data). It
also includes continuous data protection technologies, for Backup
example, Oracle Standby with Flashback. They allow you management
server

to quickly deploy a working copy of your data in a timely


manner.
If you need to get a logical volume, for example, a Centralized
row or a database table, these tools greatly simplify the Client
Backup Data copy
computers servers
task, allowing you to restore the necessary data without
System
restoring the entire copy. The third is to reduce the gap
between the origin of data and its protection. This can be
achieved in several ways, depending on the specifics of a
Administrator
particular case and the degree of importance of the data. Console

For example, for less critical systems, the time interval for
backups can be reduced to a few hours. In this case, we
Figure 2. Components of centralized backup system.
use snapshots. They can act as a restore point that can
be done once per hour. Some modern arrays handle these
processes very well and can store large numbers of system
snapshots. This is a great way out of a situation where you The fourth is to reduce hidden errors. There is only one
need to step back for a while. For more critical systems, way to make sure that the backup is working correctly –
there may be no time interval, and data must be protected try to restore it. This is the most perfect and rarely used
continuously. There are many solutions of this class, for method by our clients. But we offer a way out of this situa-
example, Oracle Standby with Flash Back, which allows tion. First, have easily recoverable instances of computers.
you to roll back the database for a while by recording This is again a story about snapshot and standby systems
all changes. You can use Oracle ZDLRA PAK, which will that can be quickly deployed and tested. It takes incom-
receive almost synchronously all changes in database, or parably less time and effort than "unpacking" an entire
general purpose software and hardware systems. They backup. Of course, this does not always help; but in case of
record all changes and allow you to restore to any point an emergency, at least it gives a little more confidence that
in time. Regular backups can be an indispensable tool in the data can be recovered by these means. Second, some
the event of major disasters or the need to recover data SRCs allow automated testing. At a specific point in time
from long ago. However, in the present situation, it is only on a schedule, you can run virtual machines in an isolated
a reserve parachute, used at the last moment. The proposed environment and use predefined algorithms to verify that
model has the following important blocks (Figure 1): data have actually been retrieved, that the application is
available, that it is consistent, and that it is responding
• Backup to the necessary requests. In this way, administrators can
• Recovery be relieved of long, routine tasks. A centralized backup
• Content analysis system has a multi-layered architecture, which includes the
• Contextual search following, as shown in Figure 2:
• Mobile data access
• Seamless integration with the cloud • A backup management server that can also
• Information security tasks incorporate the functions of a data copy server.
4 G. Ramesh et al.

• One or more data copy servers to which backup


devices are attached.
• Client computers that have backup agent programs
installed.
• Backup System Administrator Console.

The fifth was the backup system’s transparency. The


described integrated approach involves creating a complex
system using different technologies from different manu-
facturers. The task of making this system actually work,
with further changes and scaling possible, is not trivial and
can be tackled in two ways:

• The first way is that the customer is self-sufficient


and wants to implement the system. Here, as a coor-
dinator, we help create all the necessary processes,
create regulatory frameworks, create all the neces-
sary instructions and plans so that the customer’s IT
department can develop, and run the system in the
Figure 3. Comparison of data backup management.
right direction more independently. Then, transfer all
this practical basis of terms and tasks to the customer
in the form of functional organization of business
processes.
• The second option is when the customer is not sure
that the SRK system can be continuously maintained
in a combat condition; the solution is to partially
or fully outsource the system. We have clients who
successfully use this service as both SLA require-
ments and our engagement levels as an IT outsourcer
continue to increase.

Unfortunately, there is still no universal recipe for solving


the problem of data recovery under the current condi-
tions of constant system development and problems. Only
a combination of the above solutions and a systematic
approach will allow organizations to recover data at the
point of business need. Backup systems ensure the conti-
nuity of business processes.

RESULTS AND DISCUSSION Figure 4. Comparison of off-server copy management.

The proposed database monitoring method (DMM) was


compared with the existing storage backup and recov- Off-server copy management: Providing a quick way
ery strategy (SBRS), Distributed Data Backup and Recov- to access the data needed for recovery is essential. The
ery Method (DDBRM), Automation of Disaster Recovery method described is off-site (in other words, keeping
and Security (ADRS), and control and communication copies off-site). Two methods are used to organize this
management (CCM) process. It has been writing data to removable media and
physically moving it. In this case, you need to take care of
Data backup management: Events may have undesirable the means to provide the press quickly in case of failure.
consequences for the IT infrastructure and business in The comparison of off-server copy management is shown
general; for example, a fire in a building, the breakthrough in Figure 4.
of the central heating battery in the server room, or casual
theft of equipment and components. One of the ways Storage device management: The advantage of this
to avoid data loss in such situations is to store backups method is the ability to organize without difficulty. The
in a location away from the central area of the server downside is the difficulty of retrieving the media, the
equipment. The comparison of data backup management need to transfer the information to storage, and the risk of
is shown in Figure 3. damaging the media in transit. They are copying data to
Secured Database Monitoring Method 5

Figure 5. Comparison of storage device management. Figure 7. Comparison of data copy management.

area and that measures are in place to prevent unautho-


rized persons from reading the data, for example, by using
an encryption system, entering a nondisclosure agreement,
and so on. The comparison of data copy management is
shown in Figure 7.
If removable media is involved, the data on it must also
be encrypted. In this case, the marking system should not
help the attacker analyze the data. It is necessary to use a
faceless numbering scheme to indicate the carriers of the
names of the changed files.

CONCLUSION
To automate backup processes, special software is used
that controls the process of creating backups and the
recovery process and allows you to work with various
Figure 6. Comparison of server-less copy management. data carriers, including tape devices. What data should be
stored, where, and on which bandwidth? Additional fea-
tures of centralized backup software allow you to restore
another location over a network channel. The comparison individual characters and database tables without restor-
of storage device management is shown in Figure 5. ing the entire volume of data. Writing backups to tape
Server-less copy management: This method uses a VPN allows you to organize remote storage of backups and the
tunnel over the Internet. The advantage is that there is protection of critical data in the event of a disaster. Using
no need to transport the information somewhere; the tape media to store archival copies allows data to be read
disadvantage is the need to use a sufficiently wide channel 50 years after it was written. It will only be effective if done
(as a rule, it is costly) and protect the transmitted data regularly. If data change frequently, replication should also
(e.g., using the same VPN). Compression algorithms or be frequent. Therefore, rather than copying data manually,
deductive technology can significantly reduce the diffi- many prefer to use specialized software to automate this
culty in converting large amounts of data. The comparison process. Any computer has many risks that can lead to
of server-less copy management is shown in Figure 6. hardware failure and loss of important data. In the business
sector, this is even worse because the loss of business data
Data copy management: Separately, security measures results in huge losses and lost customers. When choosing a
should be taken when organizing data storage. First, it is backup program, it wants to make sure that you can easily
necessary to ensure that the data carriers are in a protected restore the data it wants.
6 G. Ramesh et al.

REFERENCES [17] Ramesh, G., Aravindarajan, V., Logeshwaran, J., Kiruthiga, T., &
Vignesh, S. (2022). Estimation analysis of paralysis effects for human
[1] Adhikari, N., Logeshwaran, J., & Kiruthiga, T. The Artificially nervous system by using Neuro fuzzy logic controller. Neuro
Intelligent Switching Framework for Terminal Access Provides Quantology, 20(8), 3195–3206.
Smart Routing in Modern Computer Networks. BOHR International [18] Ampera, D., & Fibriasari, H. (2021). Implementation of Cloud Com-
Journal of Smart Computing and Information Technology, 3(1), 45–50 puting System in Learning System Development in Engineering
[2] Zhang, Y., Xu, C., & Muntean, G. M. (2021, December). A Novel Dis- Education Study Program. International Journal of Education in
tributed Data Backup and Recovery Method for Software Defined- Mathematics, Science, and Technology (IJEMST), 9(4), 728–740.
WAN Controllers. In 2021 IEEE Global Communications Conference [19] Logeshwaran, J., Ramkumar, M., Kiruthiga, T., & Sharanpravin,
(GLOBECOM) (pp. 01–06). IEEE. R. (2022). The role of integrated structured cabling system (ISCS)
[3] Gopi, B., Logeshwaran, J., Gowri, J., & Kiruthiga, T. (2022). The for reliable bandwidth optimization in high-speed communication
moment probability and impacts monitoring for electron cloud network. ICTACT Journal on Communication Technology, 13(01),
behavior of electronic computers by using quantum deep learning 2635–2639.
model. NeuroQuantology, 20(8), 6088–6100. [20] Jeslin, J. G., & Kumar, P. M. (2022). Implementing an Efficient Data
[4] Wang, Q. (2021, December). Cloud Data Backup and Recovery Deduplication Framework for Cloud Storage. Indian J. Comput. Sci.
Method Based on the DELTA Compression Algorithm. In 2021 Eng, 13, 136–144.
IEEE International Conference on Industrial Application of Artificial [21] Logeshwaran, J., Rex, M. J., Kiruthiga, T., & Rajan, V. A. (2017,
Intelligence (IAAI) (pp. 183–188). IEEE. December). FPSMM: Fuzzy probabilistic based semi morkov model
[5] J. Logeshwaran (2022, October). The Topology configuration of among the sensor nodes for realtime applications. In 2017 Inter-
Protocol-Based Local Networks in High speed communication net- national Conference on Intelligent Sustainable Systems (ICISS)
works. In Multidisciplinary Approach in Research, Vol. 15, pp. 78–83. (pp. 442–446). IEEE.
[6] Yao, L. (2022). Feasibility Study Report on Cloud Technology of [22] Zhao, J., Zhang, L., & Zhao, Y. (2022). Informatization of Accounting
High-Performance Self-Service Database. In Innovative Computing Systems in Small-and Medium-Sized Enterprises Based on Artificial
(pp. 1315–1323). Springer, Singapore. Intelligence-Enabled Cloud Computing. Computational Intelligence
[7] Ramesh, G., Logeshwaran, J., & Aravindarajan, V (2022). The Perfor- and Neuroscience, 2022.
mance Evolution of Antivirus Security Systems in Ultra dense Cloud [23] Raja, S., Logeshwaran, J., Venkatasubramanian, S., Jayalakshmi, M.,
Server Using Intelligent Deep Learning. BOHR International Journal Rajeswari, N., Olaiya, N. G., & Mammo, W. D. (2022). OCHSA:
of Computational Intelligence and Communication Network, 1(1), Designing Energy-Efficient Lifetime-Aware Leisure Degree Adaptive
15–19. Routing Protocol with Optimal Cluster Head Selection for 5G Com-
[8] Jin, D., & Wang, Q. (2021, January). CDP backup and recovery munication Network Disaster Management. Scientific Programming,
method for ensuring database consistency. In 2021 IEEE International 2022.
Conference on Power Electronics, Computer Applications (ICPECA) [24] Shaik, V., & Natarajan, K. (2021). Asynchronous Method of Oracle:
(pp. 722–728). IEEE. A Cost-Effective and Reliable Model for Cloud Migration Using
[9] Ramesh, G., Logeshwaran, J., Gowri, J., & Ajay Mathew (2022). Incremental Backups. In Data Science and Security (pp. 417–427).
The management and reduction of digital noise in video image Springer, Singapore.
processing by using transmission based noise elimination scheme. [25] Ramesh, G., Logeshwaran, J., & Rajkumar, K. (2022). The smart con-
ICTACT Journal on image and video processing, 13(1), 2797–2801. struction for image preprocessing of mobile robotic systems using
[10] Adee, R., & Mouratidis, H. (2022). A Dynamic Four-Step Data Secu- neuro fuzzy logical system approach. NeuroQuantology, 20(10),
rity Model for Data in Cloud Computing Based on Cryptography 6354–6367
and Steganography. Sensors, 22(3), 1109. [26] Belgacem, A. (2022). Dynamic resource allocation in cloud comput-
[11] Jasmine, J., Yuvaraj, N., & Logeshwaran, J. (2022, April). DSQLR- ing: analysis and taxonomies. Computing, 104(3), 681–710.
A distributed scheduling and QoS localized routing scheme for [27] Gopi, B., Ramesh, G., & Logeshwaran, J. (2022). An innovation
wireless sensor network. In Recent trends in information technology for energy release of nuclear fusion at short distance dielectrics in
and communication for industry 4.0, Vol. 1, pp. 47–60. semiconductor model. ICTACT Journal On Microelectronics, 8(3),
[12] Jing, F., Huang, D., Wang, Y., Lv, X., & Du, Q. (2021, September). 1430–1435.
Remote Sensing Data Backup and Recovery System for Power [28] Zhou, J., & Zou, W. (2021, June). Construction and application
Industry. In 2021 IEEE Intl Conf on Parallel & Distributed Process- of Wenhua education cloud based on Huawei FusionSphere. In
ing with Applications, Big Data & Cloud Computing, Sustainable 2021 IEEE International Conference on Artificial Intelligence and
Computing & Communications, Social Computing & Networking Computer Applications (ICAICA) (pp. 477–481). IEEE.
(ISPA/BDCloud/SocialCom/SustainCom) (pp. 1717–1723). IEEE. [29] Logeshwaran, J. (2021, December). AICSA - an artificial intelligence
[13] Logeshwaran, J., Adhikari, N., Joshi, S. S., Saxena, P., & Sharma, A. cyber security algorithm for cooperative P2P file sharing in social
(2022). The deep DNA machine learning model to classify the tumor networks. ICTACT Journal on Data Science and Machine Learning,
genome of patients with tumor sequencing. International Journal of 3(1), 251–253.
Health Sciences, 6(S5), 9364–9375 [30] Chang, D., Li, L., Chang, Y., & Qiao, Z. (2021). Cloud computing
[14] Ravimaran, S., & Sathish, A. (2021). Robust Security With Strong storage backup and recovery strategy based on secure IoT and spark.
Authentication in Mobile Cloud Computing Based on Trefoil Mobile Information Systems, 2021.
Congruity Framework. Journal of Organizational and End User [31] Logeshwaran, J., Malik, J. A., Adhikari, N., Joshi, S. S., & Bishnoi, P.
Computing (JOEUC), 33(6), 1–28. (2022). IoT-TPMS: An innovation development of triangular patient
[15] Logeshwaran, J., Ramkumar, M., Kiruthiga, T., & Sharan Pravin, R. monitoring system using medical internet of things. International
(2022, February). SVPA - the segmentation based visual processing Journal of Health Sciences, 6(S5), 9070–9084
algorithm (SVPA) for illustration enhancements in digital video [32] Wang, F., Wang, H., & Xue, L. (2021, March). Research on data
processing (DVP). ICTACT Journal on Image and Video Processing, security in big data cloud computing environment. In 2021 IEEE
12(3), 2669–2673. 5th Advanced Information Technology, Electronic and Automation
[16] Smara, M., Aliouat, M., Harous, S., & Pathan, A. S. K. (2022). Robust- Control Conference (IAEAC) (Vol. 5, pp. 1446–1450). IEEE.
ness improvement of component-based cloud computing systems. [33] Gopi, B., Ramesh, G., & Logeshwaran, J. (2022). The fuzzy logical
The Journal of Supercomputing, 78(4), 4977–5009. controller based energy storage and conservation model to achieve
Secured Database Monitoring Method 7

maximum energy efficiency in modern 5g communication. ICTACT Communication: A Review. In 2019 Third International conference
Journal on Communication Technology, 13(3), 2774–2779. on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)
[34] Tiwari, P. K., Pandey, S. K., Thamba Meshach, W., Parashar, J., Kumar, (pp. 51–55). IEEE.
A., Altuwairiqi, M., & Krah, D. (2022). Improved Data Security in [44] Raja, S., & Rajan, A. J. (2022). A Decision-Making Model for Selection
Cloud Environment for Test Automation Framework and Access of the Suitable FDM Machine Using Fuzzy TOPSIS. 2022.
Control for Industry 4.0. Wireless Communications and Mobile [45] Ramesh, G., Logeshwaran, J., Aravindarajan, V., & Feny Thachil.
Computing, 2022. (2022). Eliminate the interference in 5g ultra-wide band communi-
[35] Sekar, G., Sivakumar, C., & Logeshwaran, J. (2022). NMLA: The cation antennas in cloud computing networks. ICTACT Journal On
Smart Detection of Motor Neuron Disease and Analyze the Health Microelectronics, 8(2), 1338–1344.
Impacts with Neuro Machine Learning Model. NeuroQuantology, [46] Raja, S., Rajan, A. J., Kumar, V. P., Rajeswari, N., Girija, M., Modak,
20(8), 892–899. S., Kumar, R. V., & Mammo, W. D. (2022). Selection of Additive
[36] Peng, X., Song, Y., Yuan, K., Guo, X., Lu, Z., & Liu, J. (2022, Manufacturing Machine Using Analytical Hierarchy Process. 2022.
October). UCloudStack-A Private Cloud Platform for Lightweight [47] Gopi, B., Logeshwaran, J., Gowri, J., & Aravindarajan, V. (2022).
Delivery. In 2022 IEEE 7th International Conference on Smart Cloud The Identification of quantum effects in electronic devices based
(SmartCloud) (pp. 184–189). IEEE. on charge transfer magnetic field model. NeuroQuantology, 20(8),
[37] Ramkumar, M., Logeshwaran, J., & Husna, T. (2022). CEA: Certifi- 5999–6010.
cation based encryption algorithm for enhanced data protection in [48] Venkatasubramanian, S., Raja, S., Sumanth, V., Dwivedi, J. N., Sathi-
social networks. In Fundamentals of Applied Mathematics and Soft aparkavi, J., Modak, S., & Kejela, M. L. (2022). Fault Diagnosis Using
Computing, Vol. 1, pp. 161–170. Data Fusion with Ensemble Deep Learning Technique in IIoT. 2022.
[38] Perri, D., Simonetti, M., Tasso, S., Ragni, F., & Gervasi, O. (2021, [49] Vaniprabha, A., Logeshwaran, J., Kiruthiga, T., & Krishna Bikram
September). Implementing a scalable and elastic computing envi- Shah (2022). Examination of the Effects of Long-term COVID-19
ronment based on cloud containers. In International Conference on Impacts on Patients with Neurological Disabilities Using a Neuro
Computational Science and Its Applications (pp. 676-689). Springer, machine Learning Model. BOHR International Journal of Neurology
Cham. and Neuroscience, 1(1), 21–28.
[39] Logeshwaran, J., & Karthick, S. (2022, April). A smart design of a [50] Nasurudeen, T. F. K., Shukla, V. K., & Gupta, S. (2021, June). Automa-
multi-dimensional antenna to enhance the maximum signal clutch tion of Disaster Recovery and Security in Cloud Computing. In
to the allowable standards in 5G communication networks. ICTACT 2021 International Conference on Communication information and
Journal on Microelectronics, 8(1), 1269–1274. Computing Technology (ICCICT) (pp. 1–6). IEEE.
[40] Shareef, T. H., Sharif, K. H., & Rashid, B. N. (2022). A Survey [51] Gopi, B., Logeshwaran, J., & Kiruthiga, T (2022). An Innovation in the
of Comparison Different Cloud Database Performance: SQL and Development of a Mobile Radio Model for a Dual-Band Transceiver
NoSQL. Passer Journal of Basic and Applied Sciences, 4(1), 45–57. in Wireless Cellular Communication. BOHR International Journal
[41] Logeshwaran, J. (2022, March). The control and communication of Computational Intelligence and Communication Network, 1(1),
management for ultra dense cloud system using fast Fourier algo- 20–25.
rithm. ICTACT Journal on Data Science and Machine Learning, 3(2), [52] Saravanakumar, K., & Logeshwaran, J. (2016, February). Auto-
281–284. Theft prevention system for underwater sensor using lab view.
[42] Subramani, R., Kaliappan, S., Arul, P. V, Sekar, S., Poures, M. V. De, International Journal of Innovative Research in Computer and
Patil, P. P., & Esakki, E. S. (2022). A Recent Trend on Additive Man- Communication Engineering, 4(2), 1750–1755.
ufacturing Sustainability with Supply Chain Management Concept, [53] Sutharasan, M., & Logeshwaran, J. (2016, May). Design intelligence
Multicriteria Decision Making Techniques. 2022. data gathering and incident response model for data security using
[43] Logeshwaran, J., & Shanmugasundaram, R. N. (2019, December). honey pot system. International Journal for Research & Development
Enhancements of Resource Management for Device to Device (D2D) in Technology, 5(5), 310–314.

View publication stats

You might also like