Ambika N.

Ambika N . is a MCA, MPhil, Ph.D. in computer science. She completed her Ph.D. from Bharathiar university in the year 2015. She has 16 years of teaching experience and presently working for St.Francis College, Bangalore. She has guided BCA, MCA and M.Tech students in their projects. Her expertise includes wireless sensor network, Internet of things, cybersecurity. She gives guest lectures in her expertise. She is a reviewer of books, conferences (national/international), encyclopaedia and journals. She is advisory committee member of some conferences. She has many publications in National & international conferences, international books, national and international journals and encyclopaedias. She has some patent publications (National) in computer science division.

Publications

Building Business Models with Machine Learning
Ambika N., Vishal Jain, Cristian González García, Dac-Nhuong Le. © 2025. 330 pages.
Organizations worldwide grapple with the complexities of incorporating machine learning into their business models while ensuring sustainability. Decision-makers, data...
Early Damage Direction in a Structural Health Monitoring Environment
N. Ambika. © 2024. 14 pages.
Probabilistic FFS assessments are carried out by integrating damage detection data gathered from inspections and permanently installed monitoring systems. After a negative...
Systematic Tracking of Insurance Fraud Detection
N. Ambika. © 2024. 9 pages.
The work prevents the creation of duplicate insurance policies, and a validation procedure must be carried out. It determines whether an insurance policy is still in effect by...
Machine Learning and Virtual Reality: Enabling Safety in Social Media Websites
N. Ambika. © 2024. 17 pages.
The study focuses on data produced by social media users. It applies the El Saddik communication structure between a digital twin and a physical twin to the setting of...
Quantum Computing in Healthcare: A Review
N. Ambika. © 2024. 16 pages.
This research examined national elections' impact on crash risks of individual stocks listed in the Indonesia Stock Exchange. The study used national elections as a proxy for...
Enhanced Security in Blockchain-Based Cyber Physical Systems
N. Ambika. © 2024. 20 pages.
Consortium blockchain provides pooled trust for the proposed method. It uses a unique certificateless authentication method based on the multi-signature scheme to guarantee...
Fortifying Cloud Storage Using Hash Code
N. Ambika. © 2024. 20 pages.
The data owner has complete control over it under the previous paradigm. Data owners set smart contracts. In smart contracts, the data owner stores data hash. On data, Ethereum...
Application of VUCA in Business Transactions
N. Ambika. © 2024. 19 pages.
Business transactions are a fundamental part of any business or organization, and they play a crucial role in tracking and managing financial activities, maintaining...
Enhanced Smart Irrigation Using Sensors: A Statistical Case Study
N. Ambika, Krishnan Rajamany. © 2024. 19 pages.
The working of the framework is completed by coordinating soil dampness sensor, passive infrared sensor (PIR), and water siphon along with the Arduino board. The job of the dirt...
A Reliable Hybrid Blockchain-Based Authentication System for IoT Network
Ambika N.. © 2023. 12 pages.
IoT is an assembly of equipment of different calibers and functionality working towards a single goal. A blockchain is a computerized record that contains the whole history of...
A Reliable Blockchain-Based Image Encryption Scheme for IIoT Networks
Ambika N.. © 2023. 16 pages.
IoT is used in industrial setup to increase security and provide ease to the user. The manual efforts decrease in this environment. The previous work concentrates on capturing...
A Reliable IDS System Using Blockchain for SDN-Enabled IIoT Systems
Ambika N.. © 2023. 17 pages.
The internet of things is the technology that aims to provide a common platform to the devices of varying capabilities to communicate. Industrial internet of things (IIoT)...
Securing Autonomous Robot Systems
Ambika N.. © 2023. 11 pages.
The previous work is two versatile 3D methodologies for independent horticultural UAVs to find impact-free ideal ways in time with the interaction costs in various conditions...
Smart System Engineering- Digital Twin
Ambika N.. © 2023. 14 pages.
The pragmatic model works in an open ecosystem with entrance to GPS knowledge. The proposal has four phases. Tier 1 is the legendary implicit model produced during upfront...
Speedy Management of Data Using MapReduce Approach
Ambika N.. © 2023. 12 pages.
The previous contribution utilizes two assignments in practical programming: Map and Reduce. MapReduce is another preparing structure. Hadoop is its open-source execution on a...
Structure Implementation of Online Streams
Ambika N.. © 2023. 12 pages.
The previous contribution is rank-based monitoring and sampling methodology. It is based on data growth. It instantly discovers the mean variations in a means when only an...
Augmented Reality Enabling Better Education
Ambika N.. © 2023. 22 pages.
Training is a significant part of every medical services framework. Patients should be trained in their arranged methodology. The medical services experts should be prepared for...
Secure IoT-Based Physical Training Network
Ambika N.. © 2023. 11 pages.
Wearables are used by sports professionals to guide their pupils. They drop their suggestions which are later accessed by the students. The previous investigation was about the...
Enhancing Traceability in Food Supply Chains Using Blockchain and IoT Technologies
N. Ambika. © 2023. 19 pages.
The work centers around a connected viewpoint intended for the problematic information interface between blockchain and IoT for further developing information provenance and...
Enhanced Assistive Technology on Audio-Visual Speech Recognition for the Hearing Impaired
N. Ambika. © 2023. 11 pages.
People who have difficulty hearing can use speech recognition software to communicate differently. The task is audio-visual speech recognition for better lip-reading...
Machine Learning Suggesting Marketing Mix
N Ambika. © 2023. 13 pages.
The marketing mix is a crucial component of a company's marketing strategy that connects the business to the market. Three major global drivers exist: environmental changes...
Early Detection of Security Holes in the Network
N. Ambika. © 2023. 19 pages.
The previous method that has been suggested is to increase the automatic closing of security holes in networks that are vulnerable. This process is the amalgamation of various...
Advanced Associated Defence in a Cloud IoT Environment
Ambika N.. © 2022. 10 pages.
IoT is a dispersed stage that bolsters the improvement of disseminated IoT applications. Subsequently, it gives an IoT computerization framework that encourages both the...
Reliable Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT
Ambika N.. © 2022. 13 pages.
The work utilizes an alliance blockchain, where a lot of foreordained hubs control the agreement convention. Different devices can produce information and send the information to...
Secure Privacy-Oriented Location-Aware Network
Ambika N.. © 2022. 17 pages.
IoT is an amalgamation of diverse devices. The system aims to overcome the infrastructure of the devices. The instruments communicate with each other to accomplish a task. The...
Minimum Prediction Error at an Early Stage in Darknet Analysis
Ambika N.. © 2022. 13 pages.
The previous work adopts an evolving methodology in neural system. The chapter is a new darknet transactions summary. It is a system administration structure for real-time...
An Augmented Edge Architecture for AI-IoT Services Deployment in the Modern Era
Ambika N.. © 2022. 17 pages.
The previous proposal gains prognostic and regulatory examination. It uses boundary-based AI procedures to accomplish its task. It analyzes its received transmission utilizing a...
Secure and Reliable Knowledge-Based Intrusion Detection Using Mobile Base Stations in Smart Environments
Ambika N.. © 2021. 14 pages.
Wireless sensor nodes are low cost tiny devices deployed in unsupervised environment. These devices require some kind of security mechanism to tackle different kinds of attacks....
Improved Cross-Layer Detection and Prevention of Sinkhole Attack in WSN
Ambika N.. © 2021. 14 pages.
Sensors are tiny devices deployed to monitor any object of interest. As these devices are unsupervised, they are liable to get compromised. The chapter suggests to minimize...
TDSJ-IoT: Trivial Data Transmission to Sustain Energy From Reactive Jamming Attack in IoT
Ambika N.. © 2021. 13 pages.
Internet of things aids in providing a common platform for the devices of different caliber and platform to communicate with each other. These devices complete their doings with...
A Reliable Hybrid Blockchain-Based Authentication System for IoT Network
Ambika N.. © 2021. 15 pages.
IoT is an assembly of equipment of different calibers and functionality working towards a single goal. A blockchain is a computerized record that contains the whole history of...
A Reliable Blockchain-Based Image Encryption Scheme for IIoT Networks
Ambika N.. © 2021. 17 pages.
IoT is used in industrial setup to increase security and provide ease to the user. The manual efforts decrease in this environment. The previous work concentrates on capturing...
An Improved Authentication Scheme for Wireless Sensor Network Using User Biometrics
Ambika N.. © 2021. 15 pages.
Sensors are tiny devices deployed in an unsupervised environment. These devices monitor the readings, process them, and transmit them to the predefined destination. The internet...
Reliable Medchain Management System
Ambika N.. © 2021. 16 pages.
The internet of things, popularly known as IoT, is intelligent sensors working together to accomplish a task. These devices are used in innumerable applications, and they are...
A Reliable IDS System Using Blockchain for SDN-Enabled IIoT Systems
Ambika N.. © 2021. 22 pages.
The internet of things is the technology that aims to provide a common platform to the devices of varying capabilities to communicate. Industrial internet of things (IIoT)...
Methodical IoT-Based Information System in Healthcare
Ambika N.. © 2020. 23 pages.
Elderly monitoring has become essential to provide comfort and flexible life for the aged. Internet of things is a field that aids in providing accurate information through...
Reinstate Authentication of Nodes in Sensor Network
Ambika N.. © 2020. 18 pages.
Transmitting data using the wireless medium provides a greater opportunity for the adversary to introduce different kinds of attacks into the network. Securing these monitoring...