M. Rajesh

ORCID: 0000-0003-0003-473X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • COVID-19 diagnosis using AI
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • Security in Wireless Sensor Networks
  • Infrared Thermography in Medicine
  • Data Mining Algorithms and Applications
  • Smart Grid Energy Management
  • IoT-based Smart Home Systems
  • Advanced Image Fusion Techniques
  • COVID-19 impact on air quality
  • Wireless Networks and Protocols
  • Blockchain Technology Applications and Security
  • Land Use and Ecosystem Services
  • Cloud Computing and Resource Management
  • Internet of Things and AI
  • Smart Systems and Machine Learning
  • Artificial Intelligence in Healthcare
  • Remote Sensing and Land Use
  • Energy Harvesting in Wireless Networks
  • Parallel Computing and Optimization Techniques

Sanjivani Super Speciality Hospitals
2020-2024

Fraunhofer Institute for Industrial Engineering
2023

Gokula Krishna College of Pharmacy
2021

Vels University
2018-2020

St. Peter's Institute of Higher Education and Research
2016-2017

Sathyabama Institute of Science and Technology
2016

Texas Instruments (United States)
2004

Coronavirus Disease 19 (COVID-19) is a highly infectious viral disease affecting millions of people worldwide in 2020. Several studies have shown that COVID-19 results severe acute respiratory syndrome and may lead to death. In past research, greater number diseases has been caused by exposure air pollution for long periods time. This article investigates the spread as result applying linear regression machine learning method based edge computing. The analysis this investigation on death...

10.1145/3424222 article EN ACM Transactions on Internet Technology 2021-07-22

Abstract Piezoelectric Energy Harvesting Systems play a vital role in energizing microelectronic devices with the low‐frequency operation. Here, novel piezoelectric energy harvesting device has been developed for low power electronic devices. The consists of cantilever poles projecting outwards and cantilevers one end is connected to wind‐catcher, another torsional spring. signifies its application placed inwards crystal stack. When wind strikes, vortex created windcatcher, which oscillates...

10.1049/rpg2.12119 article EN IET Renewable Power Generation 2021-02-23

Wireless ad hoc networks are an emerging multi-hop communication system among mobiles to deliver data packets. The special characteristics of wireless make the link between unreliable. To handle high mobility and environmental obstacles, most physical routing protocols do not consider stable links during packet transmission, which leads higher delay dropping in network. In this paper, we propose path observation-based protocol named POPR for WANET. proposed incorporates relative distance,...

10.1504/ijwmc.2016.10002152 article EN International Journal of Wireless and Mobile Computing 2016-01-01

10.17654/cs016120019 article EN Advances in Computer Science and Engineering 2016-08-10

In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent any application. this paper, we investigate an emerging class systems where does not rely on network location. Rather, based attributes that are external to the topology relevant When combined with dense deployment nodes, kind named data enables in-network processing aggregation, collaborative signal processing, similar problems. These approaches...

10.13005/ojcst/901.04 article EN Oriental journal of computer science and technology 2016-03-17

10.1007/s11277-020-07336-9 article EN Wireless Personal Communications 2020-04-13

Organizing and maintaining the big data are two major concerns which have led to many challenges for organization. The main objective of this research work is give an overall idea about organizing Big with High performance. MapReduce one commonly used techniques analyze a large volume in efficient manner. A common overview implementation MapReducing technique on Biomedical Data has been discussed paper algorithm. Discussion performance analysis being will open doors further activities...

10.17485/ijst/2016/v9i31/83451 article EN Indian Journal of Science and Technology 2016-08-23

Purpose Corona Virus Disease 2019 (COVID-19) is a deadly virus named after severe acute respiratory syndrome coronavirus 2; it affects the system of human and sometimes leads to death. The COVID-19 mainly attacks person with previous lung diseases; major cause diseases exposure nitrogen dioxide (NO2) for longer duration. NO2 gaseous air pollutant caused as an outcome vehicles, industrial smoke other combustion processes. Exposure long-term risk cardiovascular fatality. This paper aims...

10.1108/ijpcc-08-2020-0115 article EN International Journal of Pervasive Computing and Communications 2020-11-13

Wireless ad hoc networks are an emerging multi-hop communication system among mobiles to deliver data packets. The special characteristics of wireless make the link between unreliable. To handle high mobility and environmental obstacles, most physical routing protocols do not consider stable links during packet transmission, which leads higher delay dropping in network. In this paper, we propose path observation-based protocol named POPR for WANET. proposed incorporates relative distance,...

10.1504/ijwmc.2016.081164 article EN International Journal of Wireless and Mobile Computing 2016-01-01

Summary Cloud computing is a promising technology that provides ubiquitous and on‐demand network access to shared pool of configurable devices. However, the security major challenge in cloud environment due data sharing via internet stored cloud. In computing, there are various issues such as confidentiality, integrity, authentication. Among these issues, integrity play significant role techniques were proposed secure this paper, an efficient RSA algorithm overcome problem by applying Cuckoo...

10.1002/cpe.4845 article EN Concurrency and Computation Practice and Experience 2018-10-25

Retraction: “Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs” by authors Subbiah Balaji, Mohammad S. Obaidat, Sriram Suthir, Manoharan Rajesh Koneri Chandrasekaran Suresh, IET Netw. 2021;1–7. https://doi.org/10.1049/ntw2.12026. The above article, published online on 5 May 2021 Wiley Online Library (wileyonlinelibrary.com), has been retracted agreement between the journal Editor-in-Chief,...

10.1049/ntw2.12026 article EN cc-by IET Networks 2021-05-05

We define a consistently neighbor detection layer for mobile ad-hoc networks and present two algorithms that implement this as service with varying progress guarantees. Our are implemented atop an abstract MAC [13], which deals the lower level details of collision contention. Specifically, we first describe basic region-based protocol weak Informally speaking, does not guarantee communication links when nodes move quickly across region boundaries. To overcome limitation, technique uses black...

10.1109/cesys.2016.7889967 article EN 2016-10-01
Coming Soon ...