- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Chaos-based Image/Signal Encryption
- Advanced Database Systems and Queries
- Web Data Mining and Analysis
- Child Nutrition and Water Access
- Nuclear and radioactivity studies
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Image Retrieval and Classification Techniques
- Radioactive contamination and transfer
- Video Analysis and Summarization
- IoT and Edge/Fog Computing
- Advanced Steganography and Watermarking Techniques
- Advanced Data Storage Technologies
- Data Mining Algorithms and Applications
- Wireless Networks and Protocols
- Distributed Control Multi-Agent Systems
- Web visibility and informetrics
- Elevator Systems and Control
- Ethics and Social Impacts of AI
- Privacy, Security, and Data Protection
- Smart Grid Energy Management
- Privacy-Preserving Technologies in Data
National Institute of Technology Andhra Pradesh
2024
Bhabha Atomic Research Centre
2024
Birla Institute of Technology and Science, Pilani
2011-2021
Synergy University Dubai
2011-2021
Birla Institute of Technology and Science, Pilani - Dubai Campus
2011-2020
Sri Siddhartha Medical College
2017
Institute of Medical Sciences
2017
M S Ramaiah University of Applied Sciences
2016-2017
Visvesvaraya Technological University
2015
Aravind Eye Hospital
2015
Background: Type 1 diabetes (T1D) is a chronic disease which needs prompt diagnosis, frequent monitoring and appropriate therapy to prevent complications. Objectives: To study the morbidity pattern among children with T1D. Method: For this prospective observational study, 234 adolescents aged 1-17 years T1D, attending diabetic clinic in tertiary care centre, were recruited followed up quarterly for year. Anthropometric measurements glycaemic status by mean of HbA1c assessed quarterly, along...
Visually impaired individuals encounter numerous impediments when traveling, such as navigating unfamiliar routes, accessing information, and transportation, which can limit their mobility restrict access to opportunities. However, assistive technologies infrastructure solutions tactile paving, audio cues, voice announcements, smartphone applications have been developed mitigate these challenges. also face difficulties encountering potholes while traveling. Potholes pose a significant safety...
Introduction: Family planning contributes effectively to the social development of a country. This study was carried out assess unmet need for contraception among married women rural area Davangere taluk and determine factors associated with Methods: A community based cross sectional conducted 1020 in reproductive age group 15-49 years 24 villages Karnataka. They were interviewed using pre-tested semi-structured questionnaire. Results: The total 16.7% 13.6% spacing 3.1% limiting. most...
The present work deals with designing and creating a Academic Search Web Application that provides the user range of options. It also discusses ways in which files are accessed from MySQL database. implementation has been carried out PHP test scenario presented. will assist organized search downloading academic related web pages for various users an University environment.
Background: Adolescence is the formative period of life when maximum amount physical, psychological, and behavioural changes take place. During this stage requirement nutrition micronutrients relatively high. Therefore, adolescents, especially girls, particularly those between ages 12–15 years, are vulnerable to iron deficiency mainly because requirements at a peak. This study was planned highlight problem anaemia in adolescent females. The objectives were prevalence severity among urban...
A wireless sensor network is a system of spatially distributed nodes to collect important information about the target environment. major challenge in it operates an unattended environment, with limited computational and sensing capabilities. WSN are used many applications, such as surveillance,environment habitat monitoring,structural health monitoring, care, home automation traffic control. In this work we have proposed technique does node localization groups for collaborative processing...
Closeness is described as a privacy measure and its advantages are illustrated through examples experiments on real dataset.In this Paper the closeness can be verified by giving different values for N T. Government agencies other organizations often need to publish micro data, e.g., medical data or census research purposes.Typically, such stored in table, each record (row) corresponds one individual.Generally if we want A common anonymization approach generalization, which replaces...
A wireless sensor network is a kind of ad hoc deployed in huge number nodes order to sense the physical world. Its application includes both military and civilian services. The sensors are characterized by limited resources inhibited power hence they experience computation, communication resources. major challenge provide an improved operational efficiency with computational sensing capabilities. In this work we have proposed clustering technique that groups node for collaborative processing...
Nuclear power plants have been often considered as some of the most environmentally friendly generation technologies. Their long operating life, negligible operational emissions and high-power density highlighted their energy security environmental sustainability well. However, apprehensions still lie amongst population policy makers regarding radioactive nature discharges from nuclear impact on health environment. To alleviate such concerns, this study, for first time, presents analysis...
Ubiquitous computing is shifting healthcare from treatment by professionals in hospitals to self-care, mobile care, home care and preventive care. In order support the evolution. a global system, which links service providers an individual's personal physical spaces, expected provide personalized services at right time, place manner. Developing personalized, user-centric system peaceful better quality life one of today's challenging issue. This paper discusses on Cognition based...
The main aim of the proposed methodology is to design a multi-objective function for replica management system using oppositional gravitational search algorithm (OGSA), in which we analyze various factors influencing replication decisions such as mean service time, file availability, energy consumption, load variance, and access latency. OGSA hybridization oppositional-based learning (OBL) (GSA), change existing solution, adopt new good solution based on objective function. Here, firstly...
Transmission control protocol (TCP), a widely used transport layer provides reliable service and end-to-end congestion control. Performance of TCP is satisfactory in wired networks but fails to perform well wireless networks. It because two types packet losses are important. Congestion loss transmission loss. can be ignored whereas very frequent due random bit error rate (BER). If the congestion, should react such that it minimises network. transmission, continue with its operations....
Securing wireless sensor network is drawing a lot of attention researchers with detecting outliers being major concern. Outlier referred to as deviated behavior from normal pattern the elements caused by noise, events or attacks. detection crucial for functioning and forms first step towards security management. By taking suitable actions thwarting erroneous can be managed. Events occur when there change in state networks expected network, whereas attacks are unexpected causing difficult...
In Wireless Sensor Networks, Broadcast communication is the most fundamental and prevailing pattern. Securing broadcast messages from adversary critical issue. To defend WSNs against attacks of impersonation a source or receiver, modification/fabrication message, attacker injecting malicious traffic to deplete energy sensors, authentication receivers becomes extremely inevitable. this paper, we propose novel ECC based public key distribution protocol scheme. The proposed method provides high...
This paper deals with Web Content Mining.While browsing the web, user has to go through many pages of Internet, filter data and download related documents files.This task searching downloading is time consuming.Sometimes search queries call for specific option, say, limiting few links.To reduce spent by users, a web extraction storage tool been designed implemented in Java, that automates from given query.The Test Scenario presented various keywords.The present work can be useful input...