A. Damodaram

ORCID: 0000-0002-1482-0443
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Networks and Protocols
  • Cooperative Communication and Network Coding
  • Advanced Steganography and Watermarking Techniques
  • Service-Oriented Architecture and Web Services
  • Chaos-based Image/Signal Encryption
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Image and Video Retrieval Techniques
  • Caching and Content Delivery
  • Video Analysis and Summarization
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Digital Media Forensic Detection
  • Image Retrieval and Classification Techniques
  • Web Data Mining and Analysis
  • Security in Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Parallel Computing and Optimization Techniques
  • Distributed and Parallel Computing Systems
  • Energy Efficient Wireless Sensor Networks
  • Semantic Web and Ontologies
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance

Sri Venkateswara University
2015-2023

AAA College of Engineering and Technology
2023

Jawaharlal Nehru Technological University, Hyderabad
2012-2022

Institute of Science and Technology
2019

Institute of Engineering
2016

Anna University, Chennai
2014

Gulbarga University
2008-2010

Social media is Internet-based by design, allowing people to share content quickly via electronic means. People can openly express their thoughts on social sites such as Twitter, which then be shared with other people. During the recent COVID-19 outbreak, public opinion analytics provided useful information for determining best health response. At same time, dissemination of misinformation, aided and digital platforms, has proven a greater threat global than virus itself, pandemic shown. The...

10.1155/2022/8898100 article EN Computational Intelligence and Neuroscience 2022-05-06

In this paper we presents a novel and effective way for extracting region based silhouette of human with moving background thereby facilitating subsequent analysis like action recognition. The system first detects objects in the video that can be classified as or non human. For this, Histogram Oriented Gradients (HOG) is used descriptors Support Vector Machine (SVM) classifier. localized part also contains unnecessary information. Hence, propose to use Graph-Cut method foreground (humans)...

10.1049/cp.2013.2641 article EN 2013-01-01

MANETs are more susceptible to the security attacks because of properties such as node mobility, lack centralized management and limited band width. To reduce risks these attacks, various mechanisms encryption authentication have been proposed. But we cannot completely eliminate there is a strong need for Intrusion Detection Systems (IDS). So, in this paper propose neural network method based on MLP (Multi Layer Perceptron) detecting normal attacked behaviour system. The was tested black...

10.1049/cp.2013.2626 article EN 2013-01-01

Mobile ad-hoc networks (MANETs) comprise a set of power-constrained mobile nodes. They enable multi-hop peer-to-peer routing without any requirement predefined infrastructure for its deployment. The topology MANETs change dynamically which necessitates development efficient protocols message packets that reduce energy consumption, congestion and propagation delays. Existing such as BRAWN, AODV DSDV improve the quality service (QoS) in only when there are less number hops nodes close to each...

10.1504/ijnvo.2013.064461 article EN International Journal of Networking and Virtual Organisations 2013-01-01

As the technology gets advanced so as security issues come into picture. Here we will discuss about one such advancement in modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role transmission of data without any wired structure. Its distinct nature maintaining nodes and links to transmit at faster rate has proven its importance media. The major issue with mobile adhoc network security, there are two type affects...

10.1109/iccic.2015.7435734 article EN 2015-12-01

Security in Wireless Sensor Networks has become very much important as sensor networks are being used for sensitive applications like weather forecasting, military, medicine etc. The severe resource constraints a node make it challenging to secure using existing strong security mechanisms. In Body Area Network (WBAN) the sink collect data from mobile patient through BAN-Head biosensor nodes and is then transmitted healthcare provider health monitoring. this paper (i) we propose more WBAN...

10.1109/health.2008.4600119 article EN 2008-07-01

Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance on-demand protocols.For sustained network functionality, load balancing need compute energy efficient paths with lesser traffic.Further severe degradation is observed due intense traffic activity neighboring nodes.In this paper, we propose a mechanism that also by considering potential interference caused nodes influence an existing flow.Our...

10.5120/1464-1979 article EN International Journal of Computer Applications 2010-11-10

Multipath routing mechanisms have been preferred over single path to provide parallel fail safe paths and maximize throughput. Applying traditional shortest metric for multipath route selection leads traffic concentration at some nodes resulting in congestion, thereby causing performance degradation . Interference caused due neighbouring node is another factor that further limit its gains. Towards this, ease out congestion improve network resource utilization we devise a load balancing...

10.5815/ijcnis.2012.09.03 article EN International Journal of Computer Network and Information Security 2012-08-14

The growth in the number of mobile users is motivating new technology computing to offer many types services like location-based that pose challenging problems for location-dependent query processing and data management. In this paper, we discuss various challenges distributed continuous queries a environment by studying different scenarios which both querying unit object being queried are motion. Then proceed classify location dependent queries. We solutions solve these complex using...

10.1109/iccnt.2010.39 article EN 2010-01-01

In recent years high performance computing has evolved from large and expensive supercomputers to network based environments or workstation clusters grid computing. A is composed by geographically sparse resources that join form a virtual computer. The (computers, networks, storage devices, etc.) of the are heterogeneous reside in differentiated domains. An important aspect most applications execute systems they handle great volumes data transfer amounts over long distance networks....

10.1109/itc.2010.64 article EN 2010-03-01

Due to increased adoption of digital consumer services, Mobile Ad-hoc Networks (MANETs) are gaining importance in real-life business applications. MANETs wireless networks consisting a set mobile nodes and enables multi-hop peer-to-peer routing without any requirement predefined infrastructure for its deployment. There several works literature improving the Quality Service (QoS) such as BRAWN, AODV DSDV. However, these approaches have be augmented with additional parameters mainly avoid...

10.1109/isda.2012.6416533 article EN 2012-11-01

Currently, model based development of web services is being actively researched for its usefulness in developing a system. Various techniques like EPC, petrinet, process algebra, CPN and UML have been proposed service modeling. FSM found appropriate to Business requirements because business on execution moves forward from one state other. We shown uses (Finite State Machine) models [1], also developed tool HUMSAT specification generate executable codes BPEL WSDL. However, automated code...

10.1109/ams.2010.107 article EN 2010-01-01

Web usage mining is the application of data techniques to web log repositories. It used in finding user access patterns from log. User page visits are sequential nature. In this paper we presented new Rough set Dbscan clustering algorithm which identifies behavior users visits, order occurrence visits. Clusters formed using rough Similarity Upper Approximations. We present experimental results on MSNBC navigation dataset, and proved that has better efficiency performance groups share common...

10.1109/dsde.2010.14 article EN 2010-02-01

Existing on demand routing protocols for MANET's use shortest path as the metric, which leads to overuse of an existing thereby creating hot spots leading congestion and packet loss. Hence it is important a protocol adapt increasing load conditions by timely estimating avoid such congested nodes during route formation. Estimating difficult in due time varying channel contention among neighboring nodes. Through this study we attempt provide solution discovering new paths are efficient have...

10.1109/ahici.2009.5340349 article EN 2009-11-01

Mobile adhoc network(MANET) is a ¿on the fly¿ network of mobile nodes. Packets are routed through nodes instead any fixed base station. (AODV) most adopted routing protocol in MANET where path established when node wants to communicate with another node. The period over which communication proceeds this known as Session. When mobility high, and topology changes frequently route maintenance overhead AODV increases. routes be new moves away. It results low performance many packets dropped some...

10.1109/wcsn.2009.5434796 article EN 2009-12-01

Clustering web sessions is to group based on similarity and consists of minimizing the intra-group maximizing inter-group similarity. The other question that arises how measure between sessions. Here in this paper we adopted a CLIQUE (CLUstering QUEst) algorithm for clustering personalization. Then various measures like Euclidean distance, projected distance Jaccard, cosine fuzzy dissimilarity using sequence alignment determine learning behaviors. This has significant results when comparing...

10.1109/icectech.2011.5941893 article EN 2011-04-01

Data sharing is obvious in present day scenario of digital world, and when data being shared among various application areas the sensitive individuals disclosed to public.An evident awareness about this privacy violation has been created people now compared earlier days they are also showing a real concern towards their technology enabled world.At one end several studies have proved that primary suggesting not disclose too much individual information, but at other disclosing personal...

10.5120/ijca2015907152 article EN International Journal of Computer Applications 2015-11-17

The leading of Computing Paradigm is Cloud. One Sword two edges. side growing in terms technology and user can use any where time, the other edge security probing to data loss, theft, hijacking acting as someone else. or should be given protection enjoy benefits cloud. There are various kinds attacks taking place Cloud which undetected for years. kind attack DDos its variants causing damage In our paper we addressed DDoS using Ensemble Cluster Plus technique helps identifying genuinely user.

10.1109/icatcct.2016.7911999 article EN 2016-01-01
Coming Soon ...