- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Wireless Networks and Protocols
- Cooperative Communication and Network Coding
- Advanced Steganography and Watermarking Techniques
- Service-Oriented Architecture and Web Services
- Chaos-based Image/Signal Encryption
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Image and Video Retrieval Techniques
- Caching and Content Delivery
- Video Analysis and Summarization
- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Digital Media Forensic Detection
- Image Retrieval and Classification Techniques
- Web Data Mining and Analysis
- Security in Wireless Sensor Networks
- Network Security and Intrusion Detection
- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
- Semantic Web and Ontologies
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
Sri Venkateswara University
2015-2023
AAA College of Engineering and Technology
2023
Jawaharlal Nehru Technological University, Hyderabad
2012-2022
Institute of Science and Technology
2019
Institute of Engineering
2016
Anna University, Chennai
2014
Gulbarga University
2008-2010
Social media is Internet-based by design, allowing people to share content quickly via electronic means. People can openly express their thoughts on social sites such as Twitter, which then be shared with other people. During the recent COVID-19 outbreak, public opinion analytics provided useful information for determining best health response. At same time, dissemination of misinformation, aided and digital platforms, has proven a greater threat global than virus itself, pandemic shown. The...
In this paper we presents a novel and effective way for extracting region based silhouette of human with moving background thereby facilitating subsequent analysis like action recognition. The system first detects objects in the video that can be classified as or non human. For this, Histogram Oriented Gradients (HOG) is used descriptors Support Vector Machine (SVM) classifier. localized part also contains unnecessary information. Hence, propose to use Graph-Cut method foreground (humans)...
MANETs are more susceptible to the security attacks because of properties such as node mobility, lack centralized management and limited band width. To reduce risks these attacks, various mechanisms encryption authentication have been proposed. But we cannot completely eliminate there is a strong need for Intrusion Detection Systems (IDS). So, in this paper propose neural network method based on MLP (Multi Layer Perceptron) detecting normal attacked behaviour system. The was tested black...
Mobile ad-hoc networks (MANETs) comprise a set of power-constrained mobile nodes. They enable multi-hop peer-to-peer routing without any requirement predefined infrastructure for its deployment. The topology MANETs change dynamically which necessitates development efficient protocols message packets that reduce energy consumption, congestion and propagation delays. Existing such as BRAWN, AODV DSDV improve the quality service (QoS) in only when there are less number hops nodes close to each...
As the technology gets advanced so as security issues come into picture. Here we will discuss about one such advancement in modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role transmission of data without any wired structure. Its distinct nature maintaining nodes and links to transmit at faster rate has proven its importance media. The major issue with mobile adhoc network security, there are two type affects...
Security in Wireless Sensor Networks has become very much important as sensor networks are being used for sensitive applications like weather forecasting, military, medicine etc. The severe resource constraints a node make it challenging to secure using existing strong security mechanisms. In Body Area Network (WBAN) the sink collect data from mobile patient through BAN-Head biosensor nodes and is then transmitted healthcare provider health monitoring. this paper (i) we propose more WBAN...
Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance on-demand protocols.For sustained network functionality, load balancing need compute energy efficient paths with lesser traffic.Further severe degradation is observed due intense traffic activity neighboring nodes.In this paper, we propose a mechanism that also by considering potential interference caused nodes influence an existing flow.Our...
Multipath routing mechanisms have been preferred over single path to provide parallel fail safe paths and maximize throughput. Applying traditional shortest metric for multipath route selection leads traffic concentration at some nodes resulting in congestion, thereby causing performance degradation . Interference caused due neighbouring node is another factor that further limit its gains. Towards this, ease out congestion improve network resource utilization we devise a load balancing...
The growth in the number of mobile users is motivating new technology computing to offer many types services like location-based that pose challenging problems for location-dependent query processing and data management. In this paper, we discuss various challenges distributed continuous queries a environment by studying different scenarios which both querying unit object being queried are motion. Then proceed classify location dependent queries. We solutions solve these complex using...
In recent years high performance computing has evolved from large and expensive supercomputers to network based environments or workstation clusters grid computing. A is composed by geographically sparse resources that join form a virtual computer. The (computers, networks, storage devices, etc.) of the are heterogeneous reside in differentiated domains. An important aspect most applications execute systems they handle great volumes data transfer amounts over long distance networks....
Due to increased adoption of digital consumer services, Mobile Ad-hoc Networks (MANETs) are gaining importance in real-life business applications. MANETs wireless networks consisting a set mobile nodes and enables multi-hop peer-to-peer routing without any requirement predefined infrastructure for its deployment. There several works literature improving the Quality Service (QoS) such as BRAWN, AODV DSDV. However, these approaches have be augmented with additional parameters mainly avoid...
Currently, model based development of web services is being actively researched for its usefulness in developing a system. Various techniques like EPC, petrinet, process algebra, CPN and UML have been proposed service modeling. FSM found appropriate to Business requirements because business on execution moves forward from one state other. We shown uses (Finite State Machine) models [1], also developed tool HUMSAT specification generate executable codes BPEL WSDL. However, automated code...
Web usage mining is the application of data techniques to web log repositories. It used in finding user access patterns from log. User page visits are sequential nature. In this paper we presented new Rough set Dbscan clustering algorithm which identifies behavior users visits, order occurrence visits. Clusters formed using rough Similarity Upper Approximations. We present experimental results on MSNBC navigation dataset, and proved that has better efficiency performance groups share common...
Existing on demand routing protocols for MANET's use shortest path as the metric, which leads to overuse of an existing thereby creating hot spots leading congestion and packet loss. Hence it is important a protocol adapt increasing load conditions by timely estimating avoid such congested nodes during route formation. Estimating difficult in due time varying channel contention among neighboring nodes. Through this study we attempt provide solution discovering new paths are efficient have...
Mobile adhoc network(MANET) is a ¿on the fly¿ network of mobile nodes. Packets are routed through nodes instead any fixed base station. (AODV) most adopted routing protocol in MANET where path established when node wants to communicate with another node. The period over which communication proceeds this known as Session. When mobility high, and topology changes frequently route maintenance overhead AODV increases. routes be new moves away. It results low performance many packets dropped some...
Clustering web sessions is to group based on similarity and consists of minimizing the intra-group maximizing inter-group similarity. The other question that arises how measure between sessions. Here in this paper we adopted a CLIQUE (CLUstering QUEst) algorithm for clustering personalization. Then various measures like Euclidean distance, projected distance Jaccard, cosine fuzzy dissimilarity using sequence alignment determine learning behaviors. This has significant results when comparing...
Data sharing is obvious in present day scenario of digital world, and when data being shared among various application areas the sensitive individuals disclosed to public.An evident awareness about this privacy violation has been created people now compared earlier days they are also showing a real concern towards their technology enabled world.At one end several studies have proved that primary suggesting not disclose too much individual information, but at other disclosing personal...
The leading of Computing Paradigm is Cloud. One Sword two edges. side growing in terms technology and user can use any where time, the other edge security probing to data loss, theft, hijacking acting as someone else. or should be given protection enjoy benefits cloud. There are various kinds attacks taking place Cloud which undetected for years. kind attack DDos its variants causing damage In our paper we addressed DDoS using Ensemble Cluster Plus technique helps identifying genuinely user.