Rajeev Shorey

ORCID: 0000-0003-3664-6527
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • Advanced Wireless Network Optimization
  • Network Traffic and Congestion Control
  • Wireless Communication Networks Research
  • Bluetooth and Wireless Communication Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Simulation Techniques and Applications
  • Advanced Queuing Theory Analysis
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced MIMO Systems Optimization
  • Traffic control and management
  • IoT and Edge/Fog Computing
  • Mobile Agent-Based Network Management
  • Distributed and Parallel Computing Systems
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Green IT and Sustainability
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Big Data and Business Intelligence
  • ICT Impact and Policies
  • Energy Efficient Wireless Sensor Networks
  • Stochastic Gradient Optimization Techniques

Sardar Vallabhbhai National Institute of Technology Surat
2025

Indian Institute of Technology Delhi
2002-2024

University of Delhi
2023

NIIT University
2011-2022

Analytical Services
2020

Tata Consultancy Services (India)
2015-2019

Harvard University
2015

General Motors (India)
2006-2013

NIIT (India)
2011-2013

IBM Research - India
2001-2006

Owing to the absence of any static support structure, ad-hoc networks are prone link failures. The 'shortest path seeking' routing protocols may not lead stable routes. consequent route failures that ensue, degradation system throughput. This paper suggests a protocol wherein selection is done on basis an intelligent residual lifetime assessment candidate Schemes for performance enhancement with TCP and non-TCP traffic in proposed. backed by simulations ns show excellent adaptation...

10.1109/icc.2000.853783 article EN 2002-11-07

Emerging technologies such as Bluetooth are expected to become a ubiquitous solution for providing short range, low power, cost, pico-cellular wireless connectivity. is master driven time division duplex (TDD) system that supports an asynchronous channel data traffic well synchronous channels voice traffic. Data applications running over http, ftp and real audio will need transport layer protocols TCP UDP send packets the links. In this paper we study several schemes designed improve...

10.1109/infcom.2001.916788 article EN 2002-11-13

In this paper, we address the applicability of Blockchain technology to ensure security data transmitted and received by nodes in an Internet Things (IoT) network. We propose a consensus model that is suitable for resource constrained devices. also implementing IoT on top model. simulate our proposed understand its feasibility.

10.1109/comsnets.2018.8328273 article EN 2018-01-01

Motivated by the emerging standards for indoor pico-cellular wireless systems, such as Bluetooth, we propose and study scheduling policies master driven time division duplex (TDD) networks. In these networks, frequency band is divided into slots, each end (i.e., or slave) takes turns in using slots. a slave transmits packets reverse slot only after polls forward (by sending data to it). The conventional round robin do not perform well systems they are suited tight coupling of...

10.1109/vetecs.2000.851218 article EN 2002-11-07

We propose and study data scheduling segmentation reassembly (SAR) policies in Bluetooth. In such systems, the conventional as round robin perform poorly they are not suited to tight coupling of uplink-downlink result slot wastage unfairness. Scheduling Bluetooth is complex due (i) reserved slots for voice traffic, and, (ii) variable sized packets. The reservation at regular intervals results non-contiguous TDD available data. two new that utilize information about size head-of-the-line...

10.1109/momuc.1999.819516 article EN 2003-01-22

In this paper, we aim to address the major problem of correct image attribution for photos being uploaded on stock photo websites and peer-to-peer sharing marketplaces, ensuring that original photographers are rightfully recognized credited their works. There now millions royalty-free images shared every week websites. is a discontent among graphics designers who share such regarding widespread malpractice where others try take credit benefit from author's work. This happens when someone...

10.1109/comsnets.2019.8711440 article EN 2019-01-01

TCP/IP is the standard networking protocol on Internet and also most widely used. Due to these reasons, its use over mobile ad-hoc networks a certainty. Ad-hoc are prone link failures due mobility. TCP unable distinguish between losses route congestion. As result, throughput degrades significantly when nodes move. It therefore essential study how performs networks. We have used simulations in cmu extension ns analyse performance of Tahoe set routing protocols including signal stability...

10.1109/vetecs.2000.851686 article EN 2002-11-07

Physically Unclonable Functions (PUFs) have proved to be an effective and low-cost measure against counterfeiting by providing device authentication secure key storage services. Memory-based PUF implementations are attractive option due the ubiquitous nature of memory in electronic devices requirement minimal (or no) additional circuitry. Dynamic Random Access Memory-- (DRAM) based PUFs particularly advantageous their large address space multiple controllable parameters during response...

10.1145/3105915 article EN ACM Transactions on Embedded Computing Systems 2017-12-06

The rampant increase in the number of available cyber attack vectors and frequency attacks necessitates implementation robust cybersecurity systems. Malicious websites are a significant threat to cybersecurity. Miscreants hackers use malicious for illegal activities such as disrupting functioning systems by implanting malware, gaining unauthorized access systems, or illegally collecting personal information. We propose implement an approach classifying benign given their Uniform Resource...

10.1109/comsnets48256.2020.9027485 article EN 2020-01-01

In indoor wireless communication networks, mobile computing devices need to be handed off different base stations based on certain criteria. this paper, a fuzzy logic scheme for selection of station at the time handoff is presented. The considers three criteria, namely, received power levels, user population and used bandwidth each arrive decision regarding any particular station. For comparison, conventional level schemes are also considered. It shown through simulation that results in...

10.1109/vetecs.2000.851697 article EN 2002-11-07

The authors model a parallel processing system comprising several homogeneous computers interconnected by communication network. Jobs arriving to this have linear fork-join structure. Each fork of the job gives rise random number tasks that can be processed independently on any computers. Since exact analysis models is known intractable, resort obtaining analytical bounds mean response time job. For jobs with single and, probabilistic allocation N processors, they obtain upper and lower...

10.1109/71.246075 article EN IEEE Transactions on Parallel and Distributed Systems 1993-01-01

Internet of Things (IoT) promises to be a key enabler in Smart Manufacturing and Supply Chain. The IoT systems are responsible for enabling improving the operational efficiencies factories, plant floors, including assembly plants. These characterized by reliable sensing reporting multiple parameters within factory floor. Such activities offer safe, efficient optimized performance not only machines manufacturing products, but also workforce operating them. Industrial (IIoT) could suffer from...

10.1109/comsnets.2016.7439960 article EN 2016-01-01

This paper solves the problem of modeling scheme for developing software systems, which can be used in building solutions secure energy networks. A development is proposed a set representations through each program complex passes, namely following representations: idea, conceptual model, architecture, algorithm, source code, graphic abstract syntax tree, assembler machine byte executed code. The main properties representation are indicated, such as form (text, graphic, programming language,...

10.3390/en16135111 article EN cc-by Energies 2023-07-02

We study the performance metrics associated with TCP-regulated traffic in multi-hop wireless networks that use a common physical channel (e.g., IEEE 802.11). In contrast to earlier analyses, we focus simultaneously on two key operating - energy efficiency and session throughput. Using analysis simulations, show how these are strongly influenced by radio transmission range of individual nodes. Due tradeoffs between packet likelihood retransmissions, total consumption is convex function number...

10.1109/infcom.2002.1019262 article EN 2003-06-25

We consider the problem of modeling TCP over multi-hop wireless networks using IEEE 802.11 protocol. By identifying suitable regeneration instants, we are able to apply standard technique regenerative processes compute long term average throughput achieved by a single session. Simulation results show that proposed model predicts very high level accuracy. then discuss how extend this more general situations.

10.1109/wcnc.2004.1311549 article EN 2004-01-01

Bluetooth/sup TM/ wireless technology is a proposed publicly available specification for radiofrequency (RF), short-range, point-to-multipoint voice and data transfer. It also supports point-to-point connections. operates in the 2.4 GHz ISM (industrial, scientific medical) band based on low-cost, short-range radio link that facilitates ad-hoc connections stationary mobile communication environments. There has been much interest Bluetooth since it could enable users to connect wide range of...

10.1109/icpwc.2000.905777 article EN 2002-11-11

Secure communication of time critical information in V2V networks is expected to be achieved via a robust infrastructure that provides security related services at all times. This paper explores the dependence performance secure communications on mechanisms used by infrastructure. We propose and analyze metric termed confidence (CoS) can assist accepting/dropping message each node communications.

10.1109/move.2007.4300817 article EN 2007-05-11

CNNs (Convolutional Neural Networks) can have a large number of parameters, thereby having high storage and computational requirements. These requirements are not typically satisfied by resource-constrained edge devices. Thus, current industry practice for making decisions at include transferring visual data from to cloud nodes, prediction on that with CNN processed in the return output There two problems this approach - Sending requires bandwidth between cloud, we use resources available...

10.1109/comsnets48256.2020.9027432 article EN 2020-01-01

In indoor pico-cellular wireless systems, power is limited and therefore communication protocols need to be properly designed conserve energy at the mobile stations. The existing schemes heuristics devices by reducing activity period of do not work effectively in a master driven TDD based systems such as Bluetooth. We propose new policies that use an low mode Bluetooth for optimization MAC layer. define measure utilization. show each proposed are improved compared naive scheduling...

10.1109/vetecs.2000.851445 article EN 2002-11-07

An interesting feature of IEEE 802.11 wireless LAN cards is that they support multiple transmission modes. For example, the 802.11b four modes I, 2, 5.5 and 11 Mbps, whereas, 802.11a eight modes, up to a maximum 54 Mbps. In this paper, we study layer protocols over multi-rate multi-hop networks attempt answer question whether higher bandwidth links necessarily outperform lower in these networks. We examine by taking into account transport such as TCP UDP. While network capacity topic active...

10.1109/wcnc.2004.1311548 article EN 2004-10-19

Internet of things (IoT) encompass a plethora connected smart devices and support diverse applications. IoT is likely to be an integral feature next generation cellular systems. In the manufacturing supply chain industry, Industrial (IIoT), which consists sensors, actuators machinery, deployed for monitoring, data collection analysis, asset management, maintenance planning, plant control optimization. this work, we consider uplink transmission IIoT system, in transmit their Base Station (BS)...

10.1109/comsnets.2017.7945392 article EN 2017-01-01

In indoor pico-cellular wireless systems, such as Bluetooth, a pico-cell has master-slave configuration. Bluetooth is centralized master driven system that supports time division duplex medium access control. A limit on the maximum number of active slaves. can have seven slaves in state (capable transmitting and receiving data). The remaining remain an inactive state. Having more than connected to be advantageous many situations. large one compared forming new pico-cells lead lower power...

10.1109/vetecs.2000.851256 article EN 2002-11-07
Coming Soon ...