Santosh Kumar

ORCID: 0000-0002-1560-1664
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Energy Harvesting in Wireless Networks
  • Chaos-based Image/Signal Encryption
  • Context-Aware Activity Recognition Systems
  • Indoor and Outdoor Localization Technologies
  • Privacy-Preserving Technologies in Data
  • Advanced Steganography and Watermarking Techniques
  • Data Quality and Management
  • IoT and Edge/Fog Computing
  • Quantum-Dot Cellular Automata
  • Cooperative Communication and Network Coding
  • Wireless Networks and Protocols
  • Advanced Memory and Neural Computing
  • Genomics and Phylogenetic Studies
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Digital Media Forensic Detection
  • Online Learning and Analytics
  • Smart Agriculture and AI
  • IoT-based Smart Home Systems
  • Traffic Prediction and Management Techniques
  • Face and Expression Recognition

University of Memphis
2006-2024

International Institute of Information Technology
2023-2024

Galgotias University
2023-2024

Amrita Vishwa Vidyapeetham
2024

Spicer Adventist University
2023

Chandigarh University
2023

National Health Systems Resource Centre
2022

Ministry of Health and Family Welfare
2022

Shri Ramswaroop Memorial University
2021

Hindustan Institute of Technology and Science
2019-2020

In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barriers stealthy wireless sensors. this paper, we develop theoretical foundations for laying of We define the notion k-barrier coverage a belt region using propose efficient algorithms which one quickly determine, after deploying sensors, whether is covered. Next, establish optimal deployment pattern achieve when sensors...

10.1145/1080829.1080859 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2005-08-28

Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors sleep for most their lifetime. On other hand, surveillance kind applications require guaranteed k-coverage protected region at all times. As a result, determining appropriate number deploy that achieves both goals simultaneously becomes challenging problem. In this paper, we consider three kinds deployments sensor network on unit square - √n...

10.1145/1023720.1023735 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2004-09-26

It is well-known that placing disks in the triangular lattice pattern optimal for achieving full coverage on a plane. With emergence of wireless sensor networks, however, it now no longer enough to consider alone when deploying network; connectivity must also be con-sidered. While moderate loss can tolerated by applications fatal. Moreover, since sensors are subject unanticipated failures after deployment, not have network just connected, should k-connected (for k > 1 ). In this paper, we...

10.1145/1132905.1132921 article EN 2006-05-22

The decreasing cost along with rapid progress in next-generation sequencing and related bioinformatics computing resources has facilitated large-scale discovery of SNPs various model nonmodel plant species. Large numbers genome-wide availability make them the marker choice partially or completely sequenced genomes. Although excellent reviews have been published on sequencing, its associated challenges, applications genetic studies, a comprehensive review connecting these three intertwined...

10.1155/2012/831460 article EN International Journal of Plant Genomics 2012-11-22

Mobile health technology has great potential to increase healthcare quality, expand access services, reduce costs, and improve personal wellness public health. However, mHealth also raises significant privacy security challenges.

10.1109/mc.2016.185 article EN Computer 2016-06-01

Project ExScal (for extreme scale) fielded a 1000+ node wireless sensor network and 200+ peer-to-peer ad hoc of 802.11 devices in 13km by 300m remote area Florida, USA during December 2004. In comparison with previous deployments, the application is relatively complex its networks are largest ones either type to date. this paper, we overview key requirements ExScal, corresponding design hardware/software platform application, some results our experiments.

10.1109/rtcsa.2005.47 article EN 2006-10-11

10.1007/s11276-006-9856-0 article EN Wireless Networks 2006-10-23

Global barrier coverage that requires much fewer sensors than full coverage, is known to be an appropriate model of for movement detection applications such as intrusion detection. However, it has been proved given a sensor deployment, can not locally determine whether the deployment provides global making impossible develop localized algorithms, thus limiting its use in practice.

10.1145/1287853.1287862 article EN 2007-09-09

Global barrier coverage, which requires much fewer sensors than full is known to be an appropriate model of coverage for movement detection applications such as intrusion detection. However, it has been proved that given a sensor deployment, can not locally determine whether the deployment provides global making impossible develop localized algorithms, thus limiting its use in practice. In this paper, we introduce concept local address limitation. Motivated by observation movements are...

10.1109/tmc.2009.147 article EN IEEE Transactions on Mobile Computing 2009-08-25

Deriving the critical density (which is equivalent to deriving radius or power) achieve coverage and/or connectivity for random deployments a fundamental problem in area of wireless networks. The probabilistic conditions normally derived, however, have limited appeal among practitioners because they areoften asymptotic, i.e., only make high probability guarantees limit large system sizes. Such are not very useful practice since deployment regions always finite. Another major limitation most...

10.1145/1287853.1287863 article EN 2007-09-09

To make a network last beyond the lifetime of an individual sensor node, redundant nodes must be deployed. What sleep-wake-up schedule can then used for so that redundancy is appropriately exploited to maximize lifetime? We develop optimal solutions both problems case when wireless are deployed form impenetrable barrier detecting movements. In addition being provably optimal, our algorithms work nondisk sensing regions and heterogeneous regions. Further, we provide solution more difficult...

10.1109/tmc.2010.78 article EN IEEE Transactions on Mobile Computing 2010-05-10

With increasing popularity of media enabled hand-helds, the need for high data-rate services mobile users is evident. Large-scale Wireless LANs (WLANs) can provide such a service, but they are expensive to deploy and maintain. Open WLAN access-points (APs), on other hand, no new deployments, offer only opportunistic with guarantees short term throughput. In contrast, carefully planned sparse deployment roadside WiFi provides an economically scalable infrastructure quality service assurance...

10.1109/infcom.2010.5461937 article EN 2010-03-01

Tracking of movements such as that people, animals, vehicles, or phenomena fire, can be achieved by deploying a wireless sensor network. So far only prototype systems have been deployed and hence the issue scale has not become critical. Real-life deployments, however, will at large achieving this prohibitively expensive if we require every point in region to covered (i.e., full coverage), case deployments. In paper therefore propose new model coverage, called trap scales well with deployment...

10.1109/infcom.2009.5061915 article EN 2009-04-01

The problem of sleep wakeup has been extensively studied for the full coverage model, where every point in deployment region is covered by some sensor. Since sleep-wakeup NP-Hard this several heuristics exist. For model barrier coverage, however, sensors are deployed to form an impenetrable detecting moving objects (a flagship application wireless sensor networks), design optimal algorithm open. In paper, we solve open proposing algorithms not only often-used case equal lifetime but also...

10.1109/broadnets.2007.4550452 article EN 2007-01-01

Vehicular Internet access via open WLAN points (APs) has been demonstrated to be a feasible solution provide opportunistic data service moving vehicles. Using an in situ deployment, however, such does not worst-case performance guarantees due unpredictable intermittent connectivity. On the other hand, that tries cover every point entire road network with APs (full coverage) is very practical prohibitive deployment and operational cost. In this paper, we introduce new notion of coverage for...

10.1109/infcom.2009.5062241 article EN 2009-04-01

Although potential exists for patient-reported outcome measures to assess disease impact, Quality of life evaluation is not widely used in clinical settings. Limited literature on the patients’ quality with oral potentially malignant diseases. Objectives: To evaluate how Oral Potentially Malignant Disorders (OPMDs) affect different realms quality-of-life QoL, shedding light variations QoL depending seriousness disease. Methods: This cross-sectional study included 70 patients through...

10.54393/pjhs.v6i1.2383 article EN Pakistan Journal of Health Sciences 2025-01-31

10.22271/27069109.2025.v7.i3a.372 article EN International Journal of History 2025-03-01

Majority of papers in the area wireless sensor networks (WSNs) have an element energy-efficiency and associated with it analysis network lifetime. Yet, there is no agreement on how to analyze lifetime a WSN. As result, errors are frequently made both sides. Some underestimate by order magnitude, while others end up overestimating significant factor. This paper presents first step towards standardizing WSNs. We focus WSNs deployed for always-on applications, where problem power management...

10.1109/mahss.2005.1542797 article EN 2005-12-13

Although random deployment is widely used in theoretical analysis of coverage and connectivity, evaluation various algorithms (e.g., sleep-wakeup), it has often been considered too expensive as compared to optimal deterministic patterns when deploying sensors real-life. Roughly speaking, a factor log n additional are needed if deployment. This may be an illusion however, since all real-life large-scale deployments strategies result some randomness, two prime sources being placement errors...

10.1109/infcom.2009.5062254 article EN 2009-04-01

All U.S. transit agencies receiving FTA Urbanized Area Formula Program funding under Section 5307 (Section 15) report service consumption statistics (revenue passenger miles and unlinked trips) to the National Transit Database. Passenger is an incentive-based element that generates millions of dollars annually for New York City (NYCT). Originally, 15 random sample data were collected by surveyors gathering destination information, followed manual distance calculation based on judgment likely...

10.3141/2110-16 article EN Transportation Research Record Journal of the Transportation Research Board 2009-01-01

Vehicular Internet access via open WiFi points (APs) has been demonstrated to be a feasible solution provide opportunistic data service moving vehicles. Using an in situ deployment, however, such does not performance guarantees due unpredictable intermittent connectivity. On the other hand, that tries cover every point entire road network with APs (a full coverage) is very practical prohibitive deployment and operational costs. In this paper, we introduce new notion of coverage for mobile...

10.1109/tnet.2011.2170218 article EN IEEE/ACM Transactions on Networking 2011-10-13

It has become essential to protect vital infrastructures from cyber threats in an age where technology permeates every aspect of our lives. This article examines how machine learning and cybersecurity interact, providing a thorough overview this dynamic synergy might strengthen the defence critical systems services. The hazards public safety national security cyberattacks on including electricity grids, transportation networks, healthcare are significant. Traditional methods have failed keep...

10.1051/e3sconf/202449102025 article EN cc-by E3S Web of Conferences 2024-01-01
Coming Soon ...