Smitha Shekar B - Academia.edu (original) (raw)

Papers by Smitha Shekar B

Research paper thumbnail of An Efficient Framework and Implementation of a Weather Prediction System

BENTHAM SCIENCE PUBLISHERS eBooks, Oct 10, 2023

Research paper thumbnail of SupplySphere: Orbting SupplyChain Management with Blockchain and IOT

International journal for research in applied science and engineering technology, May 31, 2024

Conventional supply chain management systems often lack adaptability and visibility, leading to i... more Conventional supply chain management systems often lack adaptability and visibility, leading to inefficiencies and diminished trust among stakeholders. Supply Sphere presents a novel framework that integrates blockchain technology and the Internet of Things (IoT) to establish flexible and transparent supply chains. This platform enables manufacturers to customize supply chains according to specific products, starting from procurement to final delivery to end-users. Each product is associated with a QR code, granting access to detailed historical data and essential information as required by regulatory bodies. IoT devices within the system are designated unique functions, providing real-time data to smart contracts managed by blockchain. These contracts actively supervise compliance and integrity, halting operations and notifying stakeholders in case of discrepancies or irregularities. These functionalities are especially vital in critical sectors like pharmaceuticals, emphasizing precision and confidence. By streamlining and safeguarding supply chain procedures, Supply Sphere improves operational effectiveness and nurtures a higher level of confidence and dependability throughout all supply chain phases.

Research paper thumbnail of SupplySphere: Orbting SupplyChain Management with Blockchain and IOT

International journal for research in applied science and engineering technology, May 31, 2024

Conventional supply chain management systems often lack adaptability and visibility, leading to i... more Conventional supply chain management systems often lack adaptability and visibility, leading to inefficiencies and diminished trust among stakeholders. Supply Sphere presents a novel framework that integrates blockchain technology and the Internet of Things (IoT) to establish flexible and transparent supply chains. This platform enables manufacturers to customize supply chains according to specific products, starting from procurement to final delivery to end-users. Each product is associated with a QR code, granting access to detailed historical data and essential information as required by regulatory bodies. IoT devices within the system are designated unique functions, providing real-time data to smart contracts managed by blockchain. These contracts actively supervise compliance and integrity, halting operations and notifying stakeholders in case of discrepancies or irregularities. These functionalities are especially vital in critical sectors like pharmaceuticals, emphasizing precision and confidence. By streamlining and safeguarding supply chain procedures, Supply Sphere improves operational effectiveness and nurtures a higher level of confidence and dependability throughout all supply chain phases.

Research paper thumbnail of Performance Evaluation of AFOD Protocol for Energy Efficient Routing

Research paper thumbnail of Data Offloading Through Target Selection In Mobile Social Network

International journal of engineering research and technology, Aug 13, 2013

Increase in technological development has given rise to a variety of applications available for S... more Increase in technological development has given rise to a variety of applications available for Smartphone. These uses Mobile Social Network like Wechat; which provides multimedia communication with text messaging in social network. WhozThat; a system that ties together online social networks with mobile smart phones to answer common and essential social questions. There are also online social network services like Facebook, Google+, Twitter, etc. which are used worldwide that has led to increase the overload in 3G network. This paper proposes a solution based on opportunistic communication which is a promising solution to partially solve the data traffic problem in Mobile Social Network which has no monetary cost associated with it. In this work it is been aimed to exploit opportunistic communication to facilitate information dissemination in the emerging Mobile Social Networks (MoSoNets) and thus reduce the amount of mobile data traffic by investigating the target-set selection problem for information delivery. In particular the target set with only k users are selected, such that it can minimize the mobile data traffic over cellular networks using three algorithms Greedy, Heuristic, and Random. These algorithms will investigate the problem and their performance is evaluated through an extensive trace-driven simulation study.

Research paper thumbnail of Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption

International journal of engineering research, Jul 1, 2014

Reversible data-hiding in an encrypted image (RDHEI) embeds additional data into the encrypted im... more Reversible data-hiding in an encrypted image (RDHEI) embeds additional data into the encrypted image content, in a manner such that the data-hiding operation does not affect the lossless recovery of the encrypted image content. In previous RDHEI methods, the encrypted images contain little redundant space; thus, these approaches may feature a low embedding rate and burden content owners with too many tasks. In contrast, in this paper, we propose a novel RDHEI by redundant space transfer (RST) scheme, which involves transferring redundant space from the original image to the encrypted image. Then, the encrypted image will necessarily contain redundant space. Thus, reversibly embedding data into this encrypted image becomes easy and efficient, and general reversible data-hiding (RDH) algorithms can be used. The proposed scheme has the advantages of a high embedding rate and requires few tasks of the content owner. The experimental results show that the performance of the proposed scheme outperforms other RDHEI algorithms.

Research paper thumbnail of Iot Based Heart and Face Function Monitoring for Heart Disease Prediction System with Doctors Prescriptions

Journal of emerging technologies and innovative research, 2020

Conventionally the term Health care is considered an important determinant to uphold the general ... more Conventionally the term Health care is considered an important determinant to uphold the general physical and mental health and wellbeing of the people. Currently, this domain combined with technology is to offer better for people across time and place within most care and patientfriendly way. To be of concern with the increase of Heart diseases and Heart attack to be the primary cause of death in the world, is mainly due to the sheer negligence of health monitoring, complaining lack of time due to massive workload and pressure. Medically, accurate and exact prediction of the heart problems mainly depends on Electrocardiogram (ECG) data and patient clinical data. The work considers IOT Based Heart Disease Prediction, and Monitoring system using raspberry pi 3. It utilizes the Heart rate (Pulse) sensor module to interface to serially communicate to the raspberry pi board. Facial video recording by a camera in the ambient light. We describe a real-time algorithm to quantify the heartbeat rate from a facial video recording captured by the camera. We extract the green channel from the video using a machine learning algorithm, supported with a GPS module to location information and send it to doctors. It offers security and also facilitates retrieving all the sensor information subjected to a heart condition to monitor across time and place over the internet/Smartphone. This design is made helpful to Heart patients for determining changes in their health condition and be monitored with regard to face color and notifying with a patient location for timely help with their concerned cardiologist.

Research paper thumbnail of Vehicular Ad Hoc Networks for Modeling Simulation and Analysis of Communication in Hetnet Scenario

Research paper thumbnail of The ELF Tribe: Redefining Primary Education in a Post-COVID Era

Lecture notes on data engineering and communications technologies, Sep 9, 2022

Research paper thumbnail of A Machine Learning Model for Prediction of Diabetes and Hypertension Using Ensemble Learning Approach

Journal of emerging technologies and innovative research, Sep 1, 2021

Research paper thumbnail of A Comparative Study for Source Privacy Preserving and Message Authentication in Wireless Sensor Networks

<b><i>Source node privacy and message authentication are the most important issues to... more <b><i>Source node privacy and message authentication are the most important issues to be addressed in wireless sensor networks. Many schemes have come up to deal with message authentication. However, some of the schemes have stood by with some limitations like lack of scalability and high communication and computational overhead. Later these issues were solved by a polynomial based scheme, but failed to transmit number of messages beyond its threshold. To overcome this limitation an ECC and RSA algorithm has been used. To fix all these issues, a source node privacy based message authentication using Greedy Random walk algorithm has been proposed in this paper. A comparative study is done for the work that is implemented using ns2 and matlab. </i></b>

Research paper thumbnail of A Machine Learning Model For Detection and Recognition Of Traffic Signs

2021 International Conference on Intelligent Technologies (CONIT), 2021

Road accidents and deaths has been a major concern all over the world. There is never a day where... more Road accidents and deaths has been a major concern all over the world. There is never a day where there is no news about road accidents and deaths. The main cause for the frequency of road accidents to drastically increase is supposed to be the changing environmental conditions and non-realization of traffic sign recognition system. Now the world is moving towards an era of driver-less or autonomous vehicles, the paper proposes a novel approach to help vehicle drivers for safety driving concentrating mainly towards road traffic sign detection mechanism. The proposed system is a part of Intelligent Transport System(ITS) which can pave way as one of the dimension of a Smart City. The work here mainly focus on the challenges that could be tackled to avoid road accidents by introducing an alert system to detect the traffic signs while driving and also assist drivers with low vision. The work-done describes the use of Convolution Neural Network(CNN) classification model with inbuilt OpenCV functions to pre-process the images for traffic sign detection and recognition using Binarization and Region Of Interest(ROI). Overall, the proposed model has resulted an accuracy of 96.9% for training set and 98.8% for the validation set.

Research paper thumbnail of GPS Based Shortest Path for Ambulances using VANETs

Cities and traffic go hand in hand drawing inhabitants to congregate in large urban areas which l... more Cities and traffic go hand in hand drawing inhabitants to congregate in large urban areas which lead to intolerable levels of traffic congestion. Effective urban governance requires a compromise between agglomeration and excessive congestion. Congestion poses challenge for transporting lifesaving drugs and equipments, patients, accident victims, defence equipments, immunation, currency chest etc. In this paper, VANET based efficient navigation system for ambulances in real time traffic congestion is estimated through a centralized dispatch centre to avoid unexpected congestion and follow the shortest path to the destination (hospital) based on historical data and the updates of real time traffic information. A dynamic routing system has been developed which includes the metro rail network along with road transport system to guide ambulances in real time scenarios. IEEE 802.11p has been implemented at the Physical and Medium Access Control(MAC) layers of the WAVE protocol stack which...

Research paper thumbnail of Geocasting and Multicasting Routing Operation in Mobile Ad Hoc Network

The paper considers, the different multicasting routing protocols in wireless mobile Ad hoc netwo... more The paper considers, the different multicasting routing protocols in wireless mobile Ad hoc network (MANET).An Ad hoc network is composed of mobile nodes without the presence of a wired support infrastructure .In this environment routing/multicasting protocols are faced with the challenge of producing multihop router under host mobility and band constraints. Various approaches and routing protocol have been proposed to address Ad hoc networking problems and multiple standardization effort within the Internet Engineering Task Force, along with academic and industrial research projects. In recent year, a number of new multicast protocols of different styles have been proposed for Ad hoc networks. Geocast Adaptive Mesh Environment for Routing (GAMER) is one which provides geocast communication in an Ad hoc network and it adapts to the correct network environment by dynamically changing the density of the mesh. Forwarding Group Multicast Protocol (FGMP) is based on the forward group con...

Research paper thumbnail of A Collaborative Vehicle and Roadside Infrastructure Communication Scheme for Congestion Detection and Traffic Management

In developing countries the traffic congestion and management is one of the critical issue. Due t... more In developing countries the traffic congestion and management is one of the critical issue. Due to traffic congestion huge amount of fuel and resources are wasted and also the safety of vehicles is an important issue while travelling. To address these problems recent advances in wireless technologies have given contribution to Vehicular ad-hoc networks (VANETs).VANETs offer new opportunities for better communication of inter vehicle communication and road traffic management by vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communication. VANETs are capable to increase the road safety and road traffic management by using inter-vehicle communication. When the traffic congestion is dense, the vehicles spend long time on road to reach the destination. To eliminate the flow of vehicles from one direction, the need of gathering traffic information and central traffic management to distribute the traffic information globally is a concern. The proposed system contributes toward...

Research paper thumbnail of Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

IEEE Transactions on Information Forensics and Security, 2013

Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, si... more Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may subject to some errors on data extraction and/or image restoration. Here, a novel method is proposed so as to reserve room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, i.e., data extraction and image recovery are free of any error.

Research paper thumbnail of Licensed Under Creative Commons Attribution CC BY Route Discovery in VANETs Using Routing Protocols with Reliable and Connective Metrics

Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. ... more Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. Data transmission in vehicular communication with preventing delay and error is a challenging problem due to dynamic topology of the ad hoc network. Here our approach is to make a reliable path in V2V(Vehicle-to-Vehicle) communication which transmit the data in less time without delay using reliability and connectivity matrix

Research paper thumbnail of Route Discovery in VANETs Using Routing Protocols with Reliable and Connective Metrics

Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. ... more Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. Data transmission in vehicular communication with preventing delay and error is a challenging problem due to dynamic topology of the ad hoc network. Here our approach is to make a reliable path in V2V(Vehicle-to-Vehicle) communication which transmit the data in less time without delay using reliability and connectivity matrix

Research paper thumbnail of MANET based Dynamic Power Conscious Emergency Communication Module

Deployment of Mobile Ad Hoc Network (MANET) plays an important role in post- disaster situations ... more Deployment of Mobile Ad Hoc Network (MANET) plays an important role in post- disaster situations where fixed network infrastructure is unavailable. Once deployed, the network nodes would self-configure to provide connectivity and form a communication network. Based on recent disaster of debris flow in the town of Leh in Ladakh, Indian controlled Kashmir, there is a need for alternatives to communicate with people within the disaster struck area. Life came to a standstill in Leh, with communication and transport fractured beyond the point of immediate repair. Cellular networks highly dependable during emergency, power lines and backhaul links that connected base stations to their controllers were completely wiped out and roads connecting to the surrounding regions were blocked. During disaster Emergency response personnel must be able to exchange information with each other with ubiquitous communication to successfully track the victims. MANET based communication modules in disaster struck areas connect with the people around the world and also track the victims. This paper mainly focuses on the low power consumption of MANETs deployed in emergencies while still achieving high packet success rate, intimates the need for dynamic power routing concept and incorporation of Geographic Adaptive Fidelity (GAF) routing protocol that is energy efficient in locating the nodes in the network. This helps best use of it to have a better fidelity from our simulation results

Research paper thumbnail of Energy efficient Enhanced-AODV protocol for Multi-Rover systems

In recent years, on-demand routing protocols have attained more attention in MANETs due to their ... more In recent years, on-demand routing protocols have attained more attention in MANETs due to their abilities and efficiency as they are able to organize themselves dynamically with lower memory overhead at lower bandwidth requirement than table driven protocols (proactive protocols). MANETs (Mobile Ad hoc Networks) have limited bandwidth and hence it is important to reduce the number of routing packets exchanged to maintain the routing state information. The conventional broadcast scheme that broadcast packets omni directionally suffers from several drawbacks like excessive amount of redundant traffic, exaggerated interference or contention on among neighboring nodes and limited coverage. The prevalent well known AODV and DSDV protocols used for routing in such networks use the conventional broadcast scheme and thus suffer from these drawbacks as well. Extensive research has been made in this front and various routing algorithms have been proposed for conserving network resources spec...

Research paper thumbnail of An Efficient Framework and Implementation of a Weather Prediction System

BENTHAM SCIENCE PUBLISHERS eBooks, Oct 10, 2023

Research paper thumbnail of SupplySphere: Orbting SupplyChain Management with Blockchain and IOT

International journal for research in applied science and engineering technology, May 31, 2024

Conventional supply chain management systems often lack adaptability and visibility, leading to i... more Conventional supply chain management systems often lack adaptability and visibility, leading to inefficiencies and diminished trust among stakeholders. Supply Sphere presents a novel framework that integrates blockchain technology and the Internet of Things (IoT) to establish flexible and transparent supply chains. This platform enables manufacturers to customize supply chains according to specific products, starting from procurement to final delivery to end-users. Each product is associated with a QR code, granting access to detailed historical data and essential information as required by regulatory bodies. IoT devices within the system are designated unique functions, providing real-time data to smart contracts managed by blockchain. These contracts actively supervise compliance and integrity, halting operations and notifying stakeholders in case of discrepancies or irregularities. These functionalities are especially vital in critical sectors like pharmaceuticals, emphasizing precision and confidence. By streamlining and safeguarding supply chain procedures, Supply Sphere improves operational effectiveness and nurtures a higher level of confidence and dependability throughout all supply chain phases.

Research paper thumbnail of SupplySphere: Orbting SupplyChain Management with Blockchain and IOT

International journal for research in applied science and engineering technology, May 31, 2024

Conventional supply chain management systems often lack adaptability and visibility, leading to i... more Conventional supply chain management systems often lack adaptability and visibility, leading to inefficiencies and diminished trust among stakeholders. Supply Sphere presents a novel framework that integrates blockchain technology and the Internet of Things (IoT) to establish flexible and transparent supply chains. This platform enables manufacturers to customize supply chains according to specific products, starting from procurement to final delivery to end-users. Each product is associated with a QR code, granting access to detailed historical data and essential information as required by regulatory bodies. IoT devices within the system are designated unique functions, providing real-time data to smart contracts managed by blockchain. These contracts actively supervise compliance and integrity, halting operations and notifying stakeholders in case of discrepancies or irregularities. These functionalities are especially vital in critical sectors like pharmaceuticals, emphasizing precision and confidence. By streamlining and safeguarding supply chain procedures, Supply Sphere improves operational effectiveness and nurtures a higher level of confidence and dependability throughout all supply chain phases.

Research paper thumbnail of Performance Evaluation of AFOD Protocol for Energy Efficient Routing

Research paper thumbnail of Data Offloading Through Target Selection In Mobile Social Network

International journal of engineering research and technology, Aug 13, 2013

Increase in technological development has given rise to a variety of applications available for S... more Increase in technological development has given rise to a variety of applications available for Smartphone. These uses Mobile Social Network like Wechat; which provides multimedia communication with text messaging in social network. WhozThat; a system that ties together online social networks with mobile smart phones to answer common and essential social questions. There are also online social network services like Facebook, Google+, Twitter, etc. which are used worldwide that has led to increase the overload in 3G network. This paper proposes a solution based on opportunistic communication which is a promising solution to partially solve the data traffic problem in Mobile Social Network which has no monetary cost associated with it. In this work it is been aimed to exploit opportunistic communication to facilitate information dissemination in the emerging Mobile Social Networks (MoSoNets) and thus reduce the amount of mobile data traffic by investigating the target-set selection problem for information delivery. In particular the target set with only k users are selected, such that it can minimize the mobile data traffic over cellular networks using three algorithms Greedy, Heuristic, and Random. These algorithms will investigate the problem and their performance is evaluated through an extensive trace-driven simulation study.

Research paper thumbnail of Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption

International journal of engineering research, Jul 1, 2014

Reversible data-hiding in an encrypted image (RDHEI) embeds additional data into the encrypted im... more Reversible data-hiding in an encrypted image (RDHEI) embeds additional data into the encrypted image content, in a manner such that the data-hiding operation does not affect the lossless recovery of the encrypted image content. In previous RDHEI methods, the encrypted images contain little redundant space; thus, these approaches may feature a low embedding rate and burden content owners with too many tasks. In contrast, in this paper, we propose a novel RDHEI by redundant space transfer (RST) scheme, which involves transferring redundant space from the original image to the encrypted image. Then, the encrypted image will necessarily contain redundant space. Thus, reversibly embedding data into this encrypted image becomes easy and efficient, and general reversible data-hiding (RDH) algorithms can be used. The proposed scheme has the advantages of a high embedding rate and requires few tasks of the content owner. The experimental results show that the performance of the proposed scheme outperforms other RDHEI algorithms.

Research paper thumbnail of Iot Based Heart and Face Function Monitoring for Heart Disease Prediction System with Doctors Prescriptions

Journal of emerging technologies and innovative research, 2020

Conventionally the term Health care is considered an important determinant to uphold the general ... more Conventionally the term Health care is considered an important determinant to uphold the general physical and mental health and wellbeing of the people. Currently, this domain combined with technology is to offer better for people across time and place within most care and patientfriendly way. To be of concern with the increase of Heart diseases and Heart attack to be the primary cause of death in the world, is mainly due to the sheer negligence of health monitoring, complaining lack of time due to massive workload and pressure. Medically, accurate and exact prediction of the heart problems mainly depends on Electrocardiogram (ECG) data and patient clinical data. The work considers IOT Based Heart Disease Prediction, and Monitoring system using raspberry pi 3. It utilizes the Heart rate (Pulse) sensor module to interface to serially communicate to the raspberry pi board. Facial video recording by a camera in the ambient light. We describe a real-time algorithm to quantify the heartbeat rate from a facial video recording captured by the camera. We extract the green channel from the video using a machine learning algorithm, supported with a GPS module to location information and send it to doctors. It offers security and also facilitates retrieving all the sensor information subjected to a heart condition to monitor across time and place over the internet/Smartphone. This design is made helpful to Heart patients for determining changes in their health condition and be monitored with regard to face color and notifying with a patient location for timely help with their concerned cardiologist.

Research paper thumbnail of Vehicular Ad Hoc Networks for Modeling Simulation and Analysis of Communication in Hetnet Scenario

Research paper thumbnail of The ELF Tribe: Redefining Primary Education in a Post-COVID Era

Lecture notes on data engineering and communications technologies, Sep 9, 2022

Research paper thumbnail of A Machine Learning Model for Prediction of Diabetes and Hypertension Using Ensemble Learning Approach

Journal of emerging technologies and innovative research, Sep 1, 2021

Research paper thumbnail of A Comparative Study for Source Privacy Preserving and Message Authentication in Wireless Sensor Networks

<b><i>Source node privacy and message authentication are the most important issues to... more <b><i>Source node privacy and message authentication are the most important issues to be addressed in wireless sensor networks. Many schemes have come up to deal with message authentication. However, some of the schemes have stood by with some limitations like lack of scalability and high communication and computational overhead. Later these issues were solved by a polynomial based scheme, but failed to transmit number of messages beyond its threshold. To overcome this limitation an ECC and RSA algorithm has been used. To fix all these issues, a source node privacy based message authentication using Greedy Random walk algorithm has been proposed in this paper. A comparative study is done for the work that is implemented using ns2 and matlab. </i></b>

Research paper thumbnail of A Machine Learning Model For Detection and Recognition Of Traffic Signs

2021 International Conference on Intelligent Technologies (CONIT), 2021

Road accidents and deaths has been a major concern all over the world. There is never a day where... more Road accidents and deaths has been a major concern all over the world. There is never a day where there is no news about road accidents and deaths. The main cause for the frequency of road accidents to drastically increase is supposed to be the changing environmental conditions and non-realization of traffic sign recognition system. Now the world is moving towards an era of driver-less or autonomous vehicles, the paper proposes a novel approach to help vehicle drivers for safety driving concentrating mainly towards road traffic sign detection mechanism. The proposed system is a part of Intelligent Transport System(ITS) which can pave way as one of the dimension of a Smart City. The work here mainly focus on the challenges that could be tackled to avoid road accidents by introducing an alert system to detect the traffic signs while driving and also assist drivers with low vision. The work-done describes the use of Convolution Neural Network(CNN) classification model with inbuilt OpenCV functions to pre-process the images for traffic sign detection and recognition using Binarization and Region Of Interest(ROI). Overall, the proposed model has resulted an accuracy of 96.9% for training set and 98.8% for the validation set.

Research paper thumbnail of GPS Based Shortest Path for Ambulances using VANETs

Cities and traffic go hand in hand drawing inhabitants to congregate in large urban areas which l... more Cities and traffic go hand in hand drawing inhabitants to congregate in large urban areas which lead to intolerable levels of traffic congestion. Effective urban governance requires a compromise between agglomeration and excessive congestion. Congestion poses challenge for transporting lifesaving drugs and equipments, patients, accident victims, defence equipments, immunation, currency chest etc. In this paper, VANET based efficient navigation system for ambulances in real time traffic congestion is estimated through a centralized dispatch centre to avoid unexpected congestion and follow the shortest path to the destination (hospital) based on historical data and the updates of real time traffic information. A dynamic routing system has been developed which includes the metro rail network along with road transport system to guide ambulances in real time scenarios. IEEE 802.11p has been implemented at the Physical and Medium Access Control(MAC) layers of the WAVE protocol stack which...

Research paper thumbnail of Geocasting and Multicasting Routing Operation in Mobile Ad Hoc Network

The paper considers, the different multicasting routing protocols in wireless mobile Ad hoc netwo... more The paper considers, the different multicasting routing protocols in wireless mobile Ad hoc network (MANET).An Ad hoc network is composed of mobile nodes without the presence of a wired support infrastructure .In this environment routing/multicasting protocols are faced with the challenge of producing multihop router under host mobility and band constraints. Various approaches and routing protocol have been proposed to address Ad hoc networking problems and multiple standardization effort within the Internet Engineering Task Force, along with academic and industrial research projects. In recent year, a number of new multicast protocols of different styles have been proposed for Ad hoc networks. Geocast Adaptive Mesh Environment for Routing (GAMER) is one which provides geocast communication in an Ad hoc network and it adapts to the correct network environment by dynamically changing the density of the mesh. Forwarding Group Multicast Protocol (FGMP) is based on the forward group con...

Research paper thumbnail of A Collaborative Vehicle and Roadside Infrastructure Communication Scheme for Congestion Detection and Traffic Management

In developing countries the traffic congestion and management is one of the critical issue. Due t... more In developing countries the traffic congestion and management is one of the critical issue. Due to traffic congestion huge amount of fuel and resources are wasted and also the safety of vehicles is an important issue while travelling. To address these problems recent advances in wireless technologies have given contribution to Vehicular ad-hoc networks (VANETs).VANETs offer new opportunities for better communication of inter vehicle communication and road traffic management by vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communication. VANETs are capable to increase the road safety and road traffic management by using inter-vehicle communication. When the traffic congestion is dense, the vehicles spend long time on road to reach the destination. To eliminate the flow of vehicles from one direction, the need of gathering traffic information and central traffic management to distribute the traffic information globally is a concern. The proposed system contributes toward...

Research paper thumbnail of Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

IEEE Transactions on Information Forensics and Security, 2013

Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, si... more Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may subject to some errors on data extraction and/or image restoration. Here, a novel method is proposed so as to reserve room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, i.e., data extraction and image recovery are free of any error.

Research paper thumbnail of Licensed Under Creative Commons Attribution CC BY Route Discovery in VANETs Using Routing Protocols with Reliable and Connective Metrics

Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. ... more Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. Data transmission in vehicular communication with preventing delay and error is a challenging problem due to dynamic topology of the ad hoc network. Here our approach is to make a reliable path in V2V(Vehicle-to-Vehicle) communication which transmit the data in less time without delay using reliability and connectivity matrix

Research paper thumbnail of Route Discovery in VANETs Using Routing Protocols with Reliable and Connective Metrics

Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. ... more Vehicular adhoc network is an emerging technology which gains lots of popularity in recent time. Data transmission in vehicular communication with preventing delay and error is a challenging problem due to dynamic topology of the ad hoc network. Here our approach is to make a reliable path in V2V(Vehicle-to-Vehicle) communication which transmit the data in less time without delay using reliability and connectivity matrix

Research paper thumbnail of MANET based Dynamic Power Conscious Emergency Communication Module

Deployment of Mobile Ad Hoc Network (MANET) plays an important role in post- disaster situations ... more Deployment of Mobile Ad Hoc Network (MANET) plays an important role in post- disaster situations where fixed network infrastructure is unavailable. Once deployed, the network nodes would self-configure to provide connectivity and form a communication network. Based on recent disaster of debris flow in the town of Leh in Ladakh, Indian controlled Kashmir, there is a need for alternatives to communicate with people within the disaster struck area. Life came to a standstill in Leh, with communication and transport fractured beyond the point of immediate repair. Cellular networks highly dependable during emergency, power lines and backhaul links that connected base stations to their controllers were completely wiped out and roads connecting to the surrounding regions were blocked. During disaster Emergency response personnel must be able to exchange information with each other with ubiquitous communication to successfully track the victims. MANET based communication modules in disaster struck areas connect with the people around the world and also track the victims. This paper mainly focuses on the low power consumption of MANETs deployed in emergencies while still achieving high packet success rate, intimates the need for dynamic power routing concept and incorporation of Geographic Adaptive Fidelity (GAF) routing protocol that is energy efficient in locating the nodes in the network. This helps best use of it to have a better fidelity from our simulation results

Research paper thumbnail of Energy efficient Enhanced-AODV protocol for Multi-Rover systems

In recent years, on-demand routing protocols have attained more attention in MANETs due to their ... more In recent years, on-demand routing protocols have attained more attention in MANETs due to their abilities and efficiency as they are able to organize themselves dynamically with lower memory overhead at lower bandwidth requirement than table driven protocols (proactive protocols). MANETs (Mobile Ad hoc Networks) have limited bandwidth and hence it is important to reduce the number of routing packets exchanged to maintain the routing state information. The conventional broadcast scheme that broadcast packets omni directionally suffers from several drawbacks like excessive amount of redundant traffic, exaggerated interference or contention on among neighboring nodes and limited coverage. The prevalent well known AODV and DSDV protocols used for routing in such networks use the conventional broadcast scheme and thus suffer from these drawbacks as well. Extensive research has been made in this front and various routing algorithms have been proposed for conserving network resources spec...