P. Ganesh Kumar

ORCID: 0000-0003-3105-9630
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • Cooperative Communication and Network Coding
  • Dialysis and Renal Disease Management
  • ECG Monitoring and Analysis
  • EEG and Brain-Computer Interfaces
  • Network Security and Intrusion Detection
  • Digital Media Forensic Detection
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Phonocardiography and Auscultation Techniques
  • Blood Pressure and Hypertension Studies
  • Palliative Care and End-of-Life Issues
  • Qur’anic Interpretation Studies
  • Medical Malpractice and Liability Issues
  • Age of Information Optimization
  • Blind Source Separation Techniques
  • Potassium and Related Disorders
  • Scheduling and Timetabling Solutions
  • Acute Kidney Injury Research
  • Misinformation and Its Impacts
  • Network Packet Processing and Optimization

Rajalakshmi Engineering College
2024

Manipal Academy of Higher Education
2014-2023

Kasturba Medical College, Manipal
2023

Manipal University Jaipur
2020-2023

Rajasthan Technical University
2020

Sarojini Naidu Medical College
2013

Maulana Azad National Institute of Technology
2012

K.S. Rangasamy College of Technology
2012

Indian Institute of Science Bangalore
2007

Indian Institute of Technology Roorkee
2005

In this Letter, a robust technique is presented to detect and classify different electrocardiogram (ECG) noises including baseline wander (BW), muscle artefact (MA), power line interference (PLI) additive white Gaussian noise (AWGN) based on signal decomposition mixed codebooks. These codebooks employ temporal spectral-bound waveforms which provide sparse representation of ECG signals can extract local waves as well BW, PLI, MA AWGN simultaneously. Further, statistical approaches features...

10.1049/htl.2019.0096 article EN cc-by-nc Healthcare Technology Letters 2020-01-25

In cloud computing, a shared, configurable pool of computing resources is made accessible online and allocated to users according their needs. It essential for provider schedule jobs in the keep up service quality boost system efficiency. this paper, we present scheduling technique based on modified particle swarm optimization combat issues excessively long time high computation costs associated with environment. The PSO used allocate virtual machines order minimize objective function...

10.1155/2023/3916735 article EN cc-by Mathematical Problems in Engineering 2023-01-01

To empower the general mass through access to information and knowledge, organized efforts are being made develop relevant content in local languages provide language capabilities utility software. We have developed a Question Answering (QA) System for Hindi documents that would be masses using as primary of education. The user should able from E-learning friendly way, is by questioning system their native will return intended answer (also Hindi) searching context repository documents....

10.1109/icisip.2005.1619416 article EN 2005-01-01

This paper formulates the college timetable scheduling (CTTS) as a constraint satisfaction problem (CSP) in manner that is easy to implement. Timetable process revised every academic session and requires lot of checking, so it inefficient check same type constraints repeatedly create proper schedule manually. CSP natural choice for automating this process. The prototype presented aimed offer such assistance classes different courses running an keeping given checking like limit maximum number...

10.23939/mmc2024.03.710 article EN Mathematical Modeling and Computing 2024-01-01

Steganography is known as a secret data sharing technique. It method of protection which allows the user to send information in enveloped form. That means hidden cannot be seen by observer because one can only see media. This paper presents steganography technique using Pixel swapping-Quantum Hilbert image scrambling and discrete wavelet transformation, followed stego smoothing operation. Initial steps proposed include best suitable cover selection for image. process compares with different...

10.47974/jdmsc-1742 article EN Journal of Discrete Mathematical Sciences and Cryptography 2023-01-01

Sensor network applications such as environmental monitoring demand that the data collection process be carried out for longest possible time. Our paper addresses this problem by presenting a routing scheme ensures remains connected and hence live sensor nodes deliver longer duration. We analyze role of relay (neighbours base-station) in maintaining connectivity present strategy that, particular class networks, approaches optimal set becomes larger. then use these findings to develop an...

10.1109/sensorcomm.2007.38 article EN International Conference on Sensor Technologies and Applications 2007-10-14

10.3923/ajsr.2013.736.744 article EN Asian Journal of Scientific Research 2013-07-01

Mobile Ad hoc Networks were well - thought out as the independent deployment of mobile nodes. It is eminently said that MANET a self configuring infra structure less network do not count on centralized and organized connectivity Military networks, Disaster relief efforts are some common instance Networks. showed way for new form namely Intermittently Connected Network (ICMANET) which prominently Delay Tolerant Network. leads to ICMANET due sparse or high mobility in networks. The...

10.1109/icoac.2012.6416801 article EN 2012-12-01

Summary Industrial wireless sensor networks (IWSNs) are very important to improve and simplify the way manage, monitor, control industrial factories. IWSNs have many benefits, but because of their vulnerability extremely complex variable contexts, they also limit some potential that is currently available present difficulties on numerous fronts. The proposed work develops energy‐efficient routing technique minimize overall energy consumption. Heterogeneous mobile nodes randomly deployed in...

10.1002/dac.5656 article EN International Journal of Communication Systems 2023-11-05

10.3923/jai.2013.123.133 article EN Journal of Artificial Intelligence 2013-03-01

A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are kind wireless Networks that usually has routable networking environment on top Link Layer Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. traditional schemes not pertinent to the so called Intermittently Connected (ICMANET). ICMANET form Delay Tolerant Network, where...

10.7815/ijorcs.33.2013.066 article EN International Journal of Research in Computer Science 2013-05-05

The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where complete connectivity never exists. intermittent due to the dense nature of network. mainly high mobility nodes in Routing such sparse arduous. Due attribute network, encounter suspicious also remains tedious task. In this paper, we put forward secure routing that aids detecting and preventing intrusion malicious nodes. process made adorable through ANT colony optimization (ACO) technique. accordance...

10.1109/icoac.2013.6921987 article EN 2013-12-01

10.1109/icaccs60874.2024.10717323 article EN 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) 2024-03-14

Mobile Ad-hoc Networks (MANETs) is a most common studied and hot area of research over past few decades. This form network has aid data connectivity where wired solutions are impracticable but due to some unique personality it fetched many issues, design implementation an efficient routing protocol one the vital key challenging issues MANETs. However, since age MANETs number have been proposed by numerous researchers highly dynamic unrelated environment each every algorithm struggle maintain...

10.1109/icisc.2018.8398863 article EN 2018 2nd International Conference on Inventive Systems and Control (ICISC) 2018-01-01

Today, Wireless Sensor Network (WSN) is a vital technology required in every phase of development. During data aggregation (WSN), there may be possibility various types failures. Apart from hardware failures, failures occur due to bad channel conditions and energy drain. Hence routing tree should built towards each sink which fault tolerant. In this study, we propose develop tolerant management technique node selects path the effectively also maintains backup simultaneously. This can...

10.19026/rjaset.11.1800 article EN Research Journal of Applied Sciences Engineering and Technology 2015-10-05

Video fingerprinting is the process of extracting features from a given video. These fingerprints, are used to uniquely identify video other videos. The goal system decide whether two videos have same contents or not, by measuring distance between fingerprints extracted these This paper proposes, simple and fast matching method. proposed method based on centroids gradient orientation using Absolute Euclidean Distance (AED). Distance, chosen for because its low calculation complexity more...

10.1109/csae.2012.6272600 article EN 2012-05-01

Electroencephalogram (EEG) is widely exploited practice to measure the level of electrical motion rising from brain humans. With modest procedure this mechanism globally exploits vigorously assess functions. Since born age technique a rapid methodsof fashionable EEG indications aids medical experts recognize diseases and also simplifies an Emotions recognition This paper carried out survey over recent offered methodologies techniques.

10.1109/icaccs54159.2022.9785229 article EN 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) 2022-03-25

Aimed at determining the time period for progression to ESRD and also find out major risk factors early ESRD. A retrospective cohort study was conducted in a tertiary care teaching hospital. The data collected from medical record dept. last two years (2012 2013) Demographic details clinical parameters of patients with were using descriptive statistics feature SPSS v20.0. total 240 included study. mean age population found be 54.6±14.2 years. Majority males (74.83%). Hypertension 67.1%,...

10.1016/j.jval.2014.08.1311 article EN publisher-specific-oa Value in Health 2014-10-26

To examine the demographic, clinical characteristics and independent risk cause of sudden cardiac death in HD patients. We analyzed data 410 hemodialysis patients, who were undergoing a tertiary care teaching hospital followed for median 3 years. Baseline demographic data, comorbidities, biochemical parameters, ECG, ECHO all these was assessed form patient files. The logistic regression applied to obtain adjusted odds ratio 95% CI calculated. In tests, probability p < 0.05 considered as...

10.1016/j.jval.2015.09.623 article EN publisher-specific-oa Value in Health 2015-10-20
Coming Soon ...