RAJARAM JATOTHU - Academia.edu (original) (raw)

Uploads

Papers by RAJARAM JATOTHU

Research paper thumbnail of Algorithm for Adaptive Processing of High-speed Integrated Filters

Current Overview on Science and Technology Research Vol. 8, Nov 10, 2022

Research paper thumbnail of Data Aggregation of Wireless Sensor Network Using BEE Swarm Optimisation Technique

2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)

Research paper thumbnail of Deep Convolution Neural Network for RBC Images

2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)

Research paper thumbnail of Network Intrusion Detection Using Machine Learning for Virtualized Data

Algorithms for intelligent systems, Sep 14, 2022

Research paper thumbnail of End-to-End Latency Analysis for Data Transmission via Optimum Path Allocation in Industrial Sensor Networks

Wireless Communications and Mobile Computing

In a sensor network, packet transmission is easy, but achieving an effective routing path is diff... more In a sensor network, packet transmission is easy, but achieving an effective routing path is difficult. The packet information is modified by the intruder node. Initial node capacity is not monitored, so it does not filter out the individual status of each and every node in the routing path. It causes a network that utilizes more energy and minimum packet delivery ratio. This work has implemented the enhanced centrum path allotment-based shielded communication (ECSC) scheme to achieve the shielded packet broadcasting from the sender node to the destination node in the network environment. The quality of packet transmission is improved by using the spatial uniqueness node selection algorithm. It is designed to select the routing node based on its uniqueness; priority-based communication is carried out by the uniqueness process. It improves the packet delivery ratio and network lifetime. It also minimizes packet drop rate and end-to-end delay.

Research paper thumbnail of Node Location Discovery in Ad hoc and Sensor Networks

Research Scholar, Professor Department of Computer Science and Engineering Sri Satya Sai Universi... more Research Scholar, Professor Department of Computer Science and Engineering Sri Satya Sai University of Technology and Medical Science, Sehore, Madhya Pradesh, India. _____________________________________________________________________________________________ Abstract— Wireless sensor network consist of large number of sensor devices spread over a larger filed. A sensor is a small device which is having one or more sensors, processor, memory, a radio and actuator. Each sensor device will sense the data and transfers the collected data along the network. To transfer the data, each sensor node should be present in the network. For that finding location is important so as to send and receive the data from one to another node. Finding the location in the ad-hoc [1] network is too difficult. In ad-hoc and wireless sensor network, every node is moving from one location to another location, when node is moving from one location to another location during that juncture there may be a chance...

Research paper thumbnail of The Operative Tree based Distributed Clustering Routing Policy for Energy Efficiency in Wireless Sensor Networks

The energy efficiency the most important and vital performance metrics of wireless sensor network... more The energy efficiency the most important and vital performance metrics of wireless sensor networks (WSNs) as the lifetime of battery is limited. Energy efficiency helps in deciding the long running WSNs functionality. There are different solutions have been presented for energy efficiency based on hardware and software. However, particularly clustering based routing algorithms are most promising approaches and hence studied extensively for energy efficiency and load balancing. The existing clustering methods having drawbacks like cluster heads suffered from excessive energy consumption due to all loads on it, therefore this can be later overcome by placing the gateways in WSNs which can acts cluster head with more energy sources in it. However with use only gateways with clustering again imposing limitation of energy consumption as gateways are also battery operated as well as load balancing is not addressed. In this paper, aim is to design and simulate novel tree based distributed ...

Research paper thumbnail of Enhancement in SNMP services with improved security with the impact of SSH, TLS and DTLS protocols

2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)

Since decades, there has been many efforts to make Simple Network Management Protocol popularly c... more Since decades, there has been many efforts to make Simple Network Management Protocol popularly called as SNMP. The study has revealed a protocol, based on review published in 2002, which includes User-based Security Model (USM), which comprise of users and key-management infrastructure issues. Since that period the network operators have been reporting that deployment of another user with key management infrastructure for securing SNMP is an expensive proposition and a appropriate reason to defy deployment of SNMPv3. This paper narrates how existing security protocols operate above the transport layer and beneath application protocol render a secured SNMP. These protocols can take gain of deployed key management infrastructures that are employed in other network management interface and this would incur less operational costs linked with secured SNMP. The objective of this paper is focus on performance analysis of a model implementation, comparing the functioning and performance of SSH, SNMPv3, TLS, and DTLS with other flavors of SNMP. The paper also attempts to study the differences among diverse options to secure SNMP and offer strategies for selecting solutions to apply or deploy.

Research paper thumbnail of Quantum Secret Sharing Protocol using the heuristic Attacks

In this work to dissect the power of the four party QSS protocol exceptionally well known heurist... more In this work to dissect the power of the four party QSS protocol exceptionally well known heuristic attack are executed. This heuristic attack is molded by three prevalent heuristics calculations, for example, Quantum motivated Genetic Algorithm (GA), and Tabu Search Algorithm (TSA) and Cuckoo Search Algorithm (CSA) .The mobile ad-hoc network (MANET) is one of the self-configuring infrastructures less network, of mobile terminals associated by wireless. Quantum cryptography is the science of exploiting quantum mechanical properties to achieve cryptographic perform tasks. The best known example of quantum cryptography quantum key distribution is which offers and information secure solution. IndexTerms— Heuristic attacks, MANET, Cuckoo Search Algorithm, Quantum Secret Sharing Protocol ______________________________________________________________________________________________________

Research paper thumbnail of Efficient routing and High security transmission using AODV and Distributed protocol key generation with Dual RSA

Security is a major issue in mobile nodes communication, because of the various attacks like acti... more Security is a major issue in mobile nodes communication, because of the various attacks like active attack, passive attack, internal attack, external attack, Blackhole (BH) attack, wormhole attack, Byzantine attack, eavesdropper and flooding attacks. This attack causes the various effects like data loss and packet loss. To overcome these problems and to provide higher security in Mobile Ad-Hoc Networks (MANET), Ad hoc On-Demand Distance Vector-Dual RSA-Quantum Cryptography (AODV-DRSA-QC) technique is introduced. In this AODV-DRSA-QC method, Cryptography method is employed for security purpose in between the source (Alice) and destination (Bob) with the help of Key values. In our AODV-DRSA-QC system, QC method is used for same encryption purpose and the cryptographic key is additionally encrypted through the dual RSA method as well as Advanced Encryption Standard (AES) is employed to encrypt and decrypt the message based on the Dual RSA key. AODV algorithm is employed for Routing pur...

Research paper thumbnail of An efficient cloud‐based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine

Concurrency and Computation: Practice and Experience

Research paper thumbnail of A Fuzzy Logic Based Soft Computing Approach in CBIR System Using Incremental Filtering Feature Selection to Identify Patterns

Content based Image Retrieval (CBIR) may be a set of techniques for retrieving semantically-relev... more Content based Image Retrieval (CBIR) may be a set of techniques for retrieving semantically-relevant pictures from an image database supported automatically-derived image options. Generally, in CBIR systems, the visual features are described at low-level. They are simply rigid mathematical measures that cannot influence the inherent subjectivity and fogginess of individual’s understandings and perceptions. As a result, there is a niche between low-level features and highlevel semantics. We have a tendency to are witnessing the era of massive information computing where computing the resources is turning into the most bottleneck to handle those massive datasets. With in the case of high dimensional data where every view of information is of high spatiality, feature selection is important for additional rising the clustering and classification results. In this paper, we have a tendency to propose a new feature selection method is Incremental Filtering Feature Selection (IFFS) algorith...

Research paper thumbnail of The Efficient Route Management Protocol for Misbehavior in Ad Hoc Networks

Ad hoc wireless networks have emerged as one of the key growth areas for wireless networking and ... more Ad hoc wireless networks have emerged as one of the key growth areas for wireless networking and computing technology. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. One of the major factors effecting the ad hoc communication is the misbehaving of nodes. Although an efficient power management scheme is applied to an ad hoc network, a misbehaving node may result in the improper routing of packet which may extend to the complete collapsing of the network also. Existing approaches such as economic incentives or secure routing by cryptographic means alleviate the problem to some extend with limitations. The main objective of this project is to cope with misbehavior. This paper task...

Research paper thumbnail of Algorithm for Adaptive Processing of High-speed Integrated Filters

Current Overview on Science and Technology Research Vol. 8, Nov 10, 2022

Research paper thumbnail of Data Aggregation of Wireless Sensor Network Using BEE Swarm Optimisation Technique

2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)

Research paper thumbnail of Deep Convolution Neural Network for RBC Images

2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)

Research paper thumbnail of Network Intrusion Detection Using Machine Learning for Virtualized Data

Algorithms for intelligent systems, Sep 14, 2022

Research paper thumbnail of End-to-End Latency Analysis for Data Transmission via Optimum Path Allocation in Industrial Sensor Networks

Wireless Communications and Mobile Computing

In a sensor network, packet transmission is easy, but achieving an effective routing path is diff... more In a sensor network, packet transmission is easy, but achieving an effective routing path is difficult. The packet information is modified by the intruder node. Initial node capacity is not monitored, so it does not filter out the individual status of each and every node in the routing path. It causes a network that utilizes more energy and minimum packet delivery ratio. This work has implemented the enhanced centrum path allotment-based shielded communication (ECSC) scheme to achieve the shielded packet broadcasting from the sender node to the destination node in the network environment. The quality of packet transmission is improved by using the spatial uniqueness node selection algorithm. It is designed to select the routing node based on its uniqueness; priority-based communication is carried out by the uniqueness process. It improves the packet delivery ratio and network lifetime. It also minimizes packet drop rate and end-to-end delay.

Research paper thumbnail of Node Location Discovery in Ad hoc and Sensor Networks

Research Scholar, Professor Department of Computer Science and Engineering Sri Satya Sai Universi... more Research Scholar, Professor Department of Computer Science and Engineering Sri Satya Sai University of Technology and Medical Science, Sehore, Madhya Pradesh, India. _____________________________________________________________________________________________ Abstract— Wireless sensor network consist of large number of sensor devices spread over a larger filed. A sensor is a small device which is having one or more sensors, processor, memory, a radio and actuator. Each sensor device will sense the data and transfers the collected data along the network. To transfer the data, each sensor node should be present in the network. For that finding location is important so as to send and receive the data from one to another node. Finding the location in the ad-hoc [1] network is too difficult. In ad-hoc and wireless sensor network, every node is moving from one location to another location, when node is moving from one location to another location during that juncture there may be a chance...

Research paper thumbnail of The Operative Tree based Distributed Clustering Routing Policy for Energy Efficiency in Wireless Sensor Networks

The energy efficiency the most important and vital performance metrics of wireless sensor network... more The energy efficiency the most important and vital performance metrics of wireless sensor networks (WSNs) as the lifetime of battery is limited. Energy efficiency helps in deciding the long running WSNs functionality. There are different solutions have been presented for energy efficiency based on hardware and software. However, particularly clustering based routing algorithms are most promising approaches and hence studied extensively for energy efficiency and load balancing. The existing clustering methods having drawbacks like cluster heads suffered from excessive energy consumption due to all loads on it, therefore this can be later overcome by placing the gateways in WSNs which can acts cluster head with more energy sources in it. However with use only gateways with clustering again imposing limitation of energy consumption as gateways are also battery operated as well as load balancing is not addressed. In this paper, aim is to design and simulate novel tree based distributed ...

Research paper thumbnail of Enhancement in SNMP services with improved security with the impact of SSH, TLS and DTLS protocols

2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)

Since decades, there has been many efforts to make Simple Network Management Protocol popularly c... more Since decades, there has been many efforts to make Simple Network Management Protocol popularly called as SNMP. The study has revealed a protocol, based on review published in 2002, which includes User-based Security Model (USM), which comprise of users and key-management infrastructure issues. Since that period the network operators have been reporting that deployment of another user with key management infrastructure for securing SNMP is an expensive proposition and a appropriate reason to defy deployment of SNMPv3. This paper narrates how existing security protocols operate above the transport layer and beneath application protocol render a secured SNMP. These protocols can take gain of deployed key management infrastructures that are employed in other network management interface and this would incur less operational costs linked with secured SNMP. The objective of this paper is focus on performance analysis of a model implementation, comparing the functioning and performance of SSH, SNMPv3, TLS, and DTLS with other flavors of SNMP. The paper also attempts to study the differences among diverse options to secure SNMP and offer strategies for selecting solutions to apply or deploy.

Research paper thumbnail of Quantum Secret Sharing Protocol using the heuristic Attacks

In this work to dissect the power of the four party QSS protocol exceptionally well known heurist... more In this work to dissect the power of the four party QSS protocol exceptionally well known heuristic attack are executed. This heuristic attack is molded by three prevalent heuristics calculations, for example, Quantum motivated Genetic Algorithm (GA), and Tabu Search Algorithm (TSA) and Cuckoo Search Algorithm (CSA) .The mobile ad-hoc network (MANET) is one of the self-configuring infrastructures less network, of mobile terminals associated by wireless. Quantum cryptography is the science of exploiting quantum mechanical properties to achieve cryptographic perform tasks. The best known example of quantum cryptography quantum key distribution is which offers and information secure solution. IndexTerms— Heuristic attacks, MANET, Cuckoo Search Algorithm, Quantum Secret Sharing Protocol ______________________________________________________________________________________________________

Research paper thumbnail of Efficient routing and High security transmission using AODV and Distributed protocol key generation with Dual RSA

Security is a major issue in mobile nodes communication, because of the various attacks like acti... more Security is a major issue in mobile nodes communication, because of the various attacks like active attack, passive attack, internal attack, external attack, Blackhole (BH) attack, wormhole attack, Byzantine attack, eavesdropper and flooding attacks. This attack causes the various effects like data loss and packet loss. To overcome these problems and to provide higher security in Mobile Ad-Hoc Networks (MANET), Ad hoc On-Demand Distance Vector-Dual RSA-Quantum Cryptography (AODV-DRSA-QC) technique is introduced. In this AODV-DRSA-QC method, Cryptography method is employed for security purpose in between the source (Alice) and destination (Bob) with the help of Key values. In our AODV-DRSA-QC system, QC method is used for same encryption purpose and the cryptographic key is additionally encrypted through the dual RSA method as well as Advanced Encryption Standard (AES) is employed to encrypt and decrypt the message based on the Dual RSA key. AODV algorithm is employed for Routing pur...

Research paper thumbnail of An efficient cloud‐based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine

Concurrency and Computation: Practice and Experience

Research paper thumbnail of A Fuzzy Logic Based Soft Computing Approach in CBIR System Using Incremental Filtering Feature Selection to Identify Patterns

Content based Image Retrieval (CBIR) may be a set of techniques for retrieving semantically-relev... more Content based Image Retrieval (CBIR) may be a set of techniques for retrieving semantically-relevant pictures from an image database supported automatically-derived image options. Generally, in CBIR systems, the visual features are described at low-level. They are simply rigid mathematical measures that cannot influence the inherent subjectivity and fogginess of individual’s understandings and perceptions. As a result, there is a niche between low-level features and highlevel semantics. We have a tendency to are witnessing the era of massive information computing where computing the resources is turning into the most bottleneck to handle those massive datasets. With in the case of high dimensional data where every view of information is of high spatiality, feature selection is important for additional rising the clustering and classification results. In this paper, we have a tendency to propose a new feature selection method is Incremental Filtering Feature Selection (IFFS) algorith...

Research paper thumbnail of The Efficient Route Management Protocol for Misbehavior in Ad Hoc Networks

Ad hoc wireless networks have emerged as one of the key growth areas for wireless networking and ... more Ad hoc wireless networks have emerged as one of the key growth areas for wireless networking and computing technology. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. One of the major factors effecting the ad hoc communication is the misbehaving of nodes. Although an efficient power management scheme is applied to an ad hoc network, a misbehaving node may result in the improper routing of packet which may extend to the complete collapsing of the network also. Existing approaches such as economic incentives or secure routing by cryptographic means alleviate the problem to some extend with limitations. The main objective of this project is to cope with misbehavior. This paper task...