{"title":"HUNHODRL: Energy efficient resource distribution in a cloud environment using hybrid optimized deep reinforcement model with HunterPlus scheduler.","authors":"Senthilkumar Chellamuthu, Kalaivani Ramanathan, Rajesh Arivanandhan","doi":"10.1080/0954898X.2025.2480294","DOIUrl":null,"url":null,"abstract":"<p><p>This study aims to enhance the educational security and legitimacy by overcoming the problem of real-time student signature verification. The issue is raised from the growing issue about identity theft and academic fraud in schools, which compromises the validity of tests and other academic evaluations. To overcome these problems, the paper presents a deep learning-based method for signature verification made possible by employing the cutting-edge Convolutional Neural Networks (CNNs). The proposed method utilizes a VGG19 architecture trained and adjusted to handle the unique characteristics of student signatures. Initially, the procedure is pre-processing the image, after the key signature features are extracted. After passing these characteristics across VGG19 network, the signature's authenticity is classified as either unreliable or malicious nodes. The proposed method offers a flexibility and scalability for various educational settings with its capacity to manage both batch and individual processing. The model's efficacy is demonstrated by experiment with accuracy, precision, and recall values, which surpasses the existing techniques. The method ensures dependable performance under circumstances by illustrating resilience to several kinds of noise and distortion. The proposed deep learning model results pay a way for addressing the issue of student signature verification, enhancing the academic institutions' security and legitimacy.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-26"},"PeriodicalIF":1.1000,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network-Computation in Neural Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/0954898X.2025.2480294","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
This study aims to enhance the educational security and legitimacy by overcoming the problem of real-time student signature verification. The issue is raised from the growing issue about identity theft and academic fraud in schools, which compromises the validity of tests and other academic evaluations. To overcome these problems, the paper presents a deep learning-based method for signature verification made possible by employing the cutting-edge Convolutional Neural Networks (CNNs). The proposed method utilizes a VGG19 architecture trained and adjusted to handle the unique characteristics of student signatures. Initially, the procedure is pre-processing the image, after the key signature features are extracted. After passing these characteristics across VGG19 network, the signature's authenticity is classified as either unreliable or malicious nodes. The proposed method offers a flexibility and scalability for various educational settings with its capacity to manage both batch and individual processing. The model's efficacy is demonstrated by experiment with accuracy, precision, and recall values, which surpasses the existing techniques. The method ensures dependable performance under circumstances by illustrating resilience to several kinds of noise and distortion. The proposed deep learning model results pay a way for addressing the issue of student signature verification, enhancing the academic institutions' security and legitimacy.
期刊介绍:
Network: Computation in Neural Systems welcomes submissions of research papers that integrate theoretical neuroscience with experimental data, emphasizing the utilization of cutting-edge technologies. We invite authors and researchers to contribute their work in the following areas:
Theoretical Neuroscience: This section encompasses neural network modeling approaches that elucidate brain function.
Neural Networks in Data Analysis and Pattern Recognition: We encourage submissions exploring the use of neural networks for data analysis and pattern recognition, including but not limited to image analysis and speech processing applications.
Neural Networks in Control Systems: This category encompasses the utilization of neural networks in control systems, including robotics, state estimation, fault detection, and diagnosis.
Analysis of Neurophysiological Data: We invite submissions focusing on the analysis of neurophysiology data obtained from experimental studies involving animals.
Analysis of Experimental Data on the Human Brain: This section includes papers analyzing experimental data from studies on the human brain, utilizing imaging techniques such as MRI, fMRI, EEG, and PET.
Neurobiological Foundations of Consciousness: We encourage submissions exploring the neural bases of consciousness in the brain and its simulation in machines.