Sumeshwar Singh - Academia.edu (original) (raw)

Papers by Sumeshwar Singh

Research paper thumbnail of Critical Analysis of Blockchain-based Security for The Internet of Things in Enhancing the Future Technology

2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA)

Research paper thumbnail of An empirical study on the implications of Artificial Intelligence (AI) in hotels of Uttarakhand

CRC Press eBooks, Jun 22, 2023

Research paper thumbnail of Role of Artificial Intelligence to address Cyberbullying and Future Scope

2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)

Research paper thumbnail of Predicting Mobile Prices with Machine Learning Techniques

Research paper thumbnail of Internet of Things Enabled Intelligent Mote with LoRa Architecture for Agricultural Use

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

As the world's population grows, there is pressure to switch to more sustainable agricultural... more As the world's population grows, there is pressure to switch to more sustainable agricultural methods. This, together with dwindling supplies of raw materials, shrinking amounts of farmable land, and more extreme weather events, has caused widespread anxiety about national food supplies. As a result, more farmers are turning to IoT and DA in an effort to maximise output while decreasing input costs. Smart agriculture is now being driven mostly by the IoT and data analytics, rather than by wireless sensor networks (WSN). Some of the technologies that have been merged to form the Internet of Things include wireless sensor networks for radio-frequency proof of identity, cloud computing, middleware infrastructures and customer-facing software. The advantages and disadvantages of the IoT are discussed in this article. Here, we demonstrate how smart farming is being made possible by the convergence of IoT and DA, and how an IoT ecological map may be created. In addition, we categorise...

Research paper thumbnail of Spatiotemporal Image Encoding for Cross-Subject Zero Calibration Driver’s Drowsiness Detection through EEG Signals

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

In this digital signal processing procedure, which analyses Electroencephalogram (EEG) data withi... more In this digital signal processing procedure, which analyses Electroencephalogram (EEG) data within a specified framework, the signal's frequency sub-bands were broken down using DWT, and a collection of features representing the distribution of wavelet coefficients was retrieved from the sub-bands. With the use of feature extraction techniques like mean, standard deviation, and variance, the size of the data is decreased. Following that, the classifier utilised these attributes as input to determine if the input data was normal or drowsy, and it classified the data accordingly. To demonstrate the superiority of the classification process, the performance of classification is evaluated. The system's main goal is to increase the precision of patient monitoring systems, remove variations in EEG signals, and enhance process accuracy.

Research paper thumbnail of A Machine Learning-based Approach for Anomaly Detection in IoT Systems

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

The increased use of IoT devices has created new hurdles in the detection of anomalies. Anomaly d... more The increased use of IoT devices has created new hurdles in the detection of anomalies. Anomaly detection is the process of discovering unexpected or abnormal behaviour in a system, and anomalies in IoT systems can be produced by a variety of sources, including hardware and software faults, cyber assaults, and environmental conditions. Machine learning-based approaches for anomaly detection in IoT systems have emerged as a viable option, harnessing the capabilities of machine learning algorithms to detect and categorise anomalies in real-time. However, there are drawbacks to these approaches, such as data quality difficulties, the necessity for real-time analysis, and the possibility of false positives and false negatives. Organizations must carefully analyse the trade-offs associated in their implementation and deployment to overcome these problems. Based on research a review of machine learning-based algorithms for anomaly detection in IoT systems. We explore the problems and pote...

Research paper thumbnail of Identification of Building Damages using Satellite Images based on CNN- Recurrent Neural Network Approach

2023 8th International Conference on Communication and Electronics Systems (ICCES)

Research paper thumbnail of BERT Algorithm used in Google Search

Mathematical Statistician and Engineering Applications

Search engines are now a need for obtaining information due to the internet's explosive expan... more Search engines are now a need for obtaining information due to the internet's explosive expansion in digital material. One of the most widely used search engines, Google, works hard to improve its search functionality. Google has recently used cutting-edge natural language processing (NLP) methods to enhance search results. The Bidirectional Encoder Representations from Transformers (BERT) method is one such ground-breaking invention. This study seeks to offer a thorough evaluation of the BERT algorithm and its use in Google Search. We examine BERT's design, training procedure, and salient characteristics, emphasising its capacity to comprehend the subtleties and context of real language. We also talk about BERT's effects on user experience and search engine optimisation (SEO), as well as potential future advances and difficulties.

Research paper thumbnail of Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks

jowc, 2017

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be ... more Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node's trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network's resources that further shortens network lifetime. In this paper, we have proposed a system for identification and recovery of false alarms (IRFA) which is the optimization of existing trust based system. But security solution needs to be energy efficient due to scarcity of energy resources in WSN. To provide energy efficiency, we have implemented proposed IRFA system in cluster based environment which detects insider packet drop attackers in an energy efficient manner. We have conducted OMNET++ simulation and results demonstrate that the proposed system performance is better than existing trust-based system in terms of packet delivery rate and energy efficiency which improves network lifetime.

Research paper thumbnail of Energy Efficient Technique for Concealing Sink Location in WSN

blue eye publication iijte, 2019

In a wireless sensor network, concealing the location of the sink is critical. Location of the si... more In a wireless sensor network, concealing the location of the sink is critical. Location of the sink can be revealed (or at least guessed with a high probability of success) through traffic analysis. In this paper, we proposed an energy efficient technique for concealing sink location named EESLP (Energy Efficient Sink Location Privacy) scheme. Here we proposed an approach, in which we are concealing the sink location in such a way so that node energy utilization while securing sink in network can be minimum, to defending sink's location privacy and identity when the network is subjected to multiple traffic analysis attack. EESLP designs the network area of coverage with multiple spots generating fake message traffic for fake sink location creation that resembles the traffic behavior that is expected to be observed in the area where the sink is located. To achieve this we select some sensors away from the actual sink location which act as fake sinks by generating dummy or fake packet. The simulation results prove that EESLP can improve network life time and QOS (congestion, throughput, packet delivery rate) of sensor network while protecting sinks Location privacy.

Research paper thumbnail of Time Series Forecasting Models: A Comprehensive Review

International Journal of Recent Technology and Engineering, 2020

This comprehensive review provides an extensive overview of the existing Time Series Forecasting ... more This comprehensive review provides an extensive overview of the existing Time Series Forecasting technique. This survey is not restricted to any single time series analysis; it provides forecasting of time series in different areas like marketing prediction, weather forecasting, technology prediction, financial forecasting etc. In this paper, we have analyzed forecasting in some areas namely, load forecasting, wind speed forecasting, prediction of energy consumption and short-term traffic flow prediction. Various models are available for prediction among them Autoregressive Integrated Moving Average model (ARIMA) is seen as a universal mechanism, these discussed forecasting areas utilizes different models that are combined with ARIMA. Hybrid models are the combination of classical models and modern methods, like ARIMA (classical method) combines with Artificial Neural Network (ANN) as well as with Support Vector Machine (SVM) (modern models). Hybrid model’s performance is depending ...

Research paper thumbnail of Classification of BMD using artificial neural network

INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE “TECHNOLOGY IN AGRICULTURE, ENERGY AND ECOLOGY” (TAEE2022)

Osteoporosis is a disease that affects the bones, which are a very important part of the human bo... more Osteoporosis is a disease that affects the bones, which are a very important part of the human body. It has a tendency to lessen the volume of bones and, as a result, affect the micro architecture of bone tissues. For decades, a variety of imaging techniques have been used to evaluate and investigate the micro architecture of disturbed and damaged bones to be able to discover bone density inadequacies. Image enhancement ,filtering, classification, segmentation, and other preprocessing techniques are used in image processing to diagnose the afflicted bone structure and obtain crucial information about the distorted micro architecture pattern. In this research, we have gathered rudimentary knowledge of tissues like osteoblast and osteoclast as well as a comparison evaluation of few osteoporosis detection approaches based on image processing. The goal of this study is to determine the prevalence of osteoporosis and changes in bone mass as people become older, as well as to compare the bone health of seemingly healthy males, puberty of women, and menopause women. We used a 260-person ethical database, with 130 men, 80 women (before menopausal), and 50 women (after menopausal). Bone mineral density (BMD) was measured at the femoral neck using dual energy X-ray absorptiometry.

Research paper thumbnail of Image Compression Using Deep Convolutional Adversarial Networks

Data Driven Approach Towards Disruptive Technologies, 2021

Image compression is a kind of compression of data, which is used to images for minimizing its co... more Image compression is a kind of compression of data, which is used to images for minimizing its cost in terms of storage and transmission. Neural networks are supposed to be good at this task. One of the major problem in image compression is long-range dependencies between image patches. There are mainly two approaches to solve this problem; one is to develop a better residual patch-based encoder, and the second one is to create an entropy coder capable of collecting long-term dependencies inside the picture between patches. We address both the problems in this paper and fuse the two possible solutions to improve compression levels for a given material. Results of the simulation reveal that the new algorithm works much better in all parameters than in the current model.

Research paper thumbnail of Energy Optimization in WSN Using Evolutionary Bacteria Foraging Optimization Method

Research paper thumbnail of Automatic Diagnosis of Covid-19 Using Chest X-ray Images Through Deep Learning Models

Lecture Notes in Electrical Engineering, 2021

Research paper thumbnail of Characterization of banana peel ionic polymer membrane by using polynomial regression

Materials Today: Proceedings, 2021

Abstract The banana peel contains Phenolic compounds, which has higher concentrations as compared... more Abstract The banana peel contains Phenolic compounds, which has higher concentrations as compared to other fruits. These Phenolic compounds contain very rich concentration of antioxidant, antimicrobial and antibiotic properties. The amendment of banana is good in India as well as world. The banana has second main fruit crop in India. The Banana has belong to Musa family. It is grown in warmer areas. Banana contains potassium, vitamin B6, vitamin C and various antioxidants and phytonutrients. Alike the banana peel (BP) contains Iron, cadmium, chromium, Nickel, Copper, lead and Zinc conducting materials. By using conducting material a flexible conducting ionic polymer membrane developed. The purpose of this paper is optimum use of the nutrients which is present in banana peel (Bp). Banana peel is biodegradable material, when they get some moisture its get starts rotten which increased the production of the micro-organism, causes disease. Through banana peel an ionic polymer membrane is developed which helps overcome the banana peel waste problem. Through impedance analyzer we measured the electrical property of the banana peel ionic polymer membrane. Electric properties like conductance, capacitance, real and imaginary impedances are measured. From 20 Hz to 10 mHz range frequency is used to measure all electric properties. By using this range different- different 1600 / electric values are calculate. All these values are plotted with the help of polynomials regression. The conductivity PVA/BP is enhanced from 3 X 10-8 S to 8 X 10-7S by increasing the concentration of banana peel from 1 ml to 4 ml. The composition BP/ PAV shows good conduction or low dissipation factor and low dielectric constant.

Research paper thumbnail of Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks

Journal of Wireless Communications, 2017

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be ... more Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node’s trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network’s resources that further shortens network lifetime. In this pape...

Research paper thumbnail of Energy Efficient Technique for Concealing Sink Location in WSN

International Journal of Innovative Technology and Exploring Engineering, 2020

In a wireless sensor network, concealing the location of the sink is critical. Location of the si... more In a wireless sensor network, concealing the location of the sink is critical. Location of the sink can be revealed (or at least guessed with a high probability of success) through traffic analysis. In this paper, we proposed an energy efficient technique for concealing sink location named EESLP (Energy Efficient Sink Location Privacy) scheme. Here we proposed an approach, in which we are concealing the sink location in such a way so that node energy utilization while securing sink in network can be minimum, to defending sink’s location privacy and identity when the network is subjected to multiple traffic analysis attack. EESLP designs the network area of coverage with multiple spots generating fake message traffic for fake sink location creation that resembles the traffic behavior that is expected to be observed in the area where the sink is located. To achieve this we select some sensors away from the actual sink location which act as fake sinks by generating dummy or fake packet...

Research paper thumbnail of Critical Analysis of Blockchain-based Security for The Internet of Things in Enhancing the Future Technology

2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA)

Research paper thumbnail of An empirical study on the implications of Artificial Intelligence (AI) in hotels of Uttarakhand

CRC Press eBooks, Jun 22, 2023

Research paper thumbnail of Role of Artificial Intelligence to address Cyberbullying and Future Scope

2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)

Research paper thumbnail of Predicting Mobile Prices with Machine Learning Techniques

Research paper thumbnail of Internet of Things Enabled Intelligent Mote with LoRa Architecture for Agricultural Use

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

As the world's population grows, there is pressure to switch to more sustainable agricultural... more As the world's population grows, there is pressure to switch to more sustainable agricultural methods. This, together with dwindling supplies of raw materials, shrinking amounts of farmable land, and more extreme weather events, has caused widespread anxiety about national food supplies. As a result, more farmers are turning to IoT and DA in an effort to maximise output while decreasing input costs. Smart agriculture is now being driven mostly by the IoT and data analytics, rather than by wireless sensor networks (WSN). Some of the technologies that have been merged to form the Internet of Things include wireless sensor networks for radio-frequency proof of identity, cloud computing, middleware infrastructures and customer-facing software. The advantages and disadvantages of the IoT are discussed in this article. Here, we demonstrate how smart farming is being made possible by the convergence of IoT and DA, and how an IoT ecological map may be created. In addition, we categorise...

Research paper thumbnail of Spatiotemporal Image Encoding for Cross-Subject Zero Calibration Driver’s Drowsiness Detection through EEG Signals

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

In this digital signal processing procedure, which analyses Electroencephalogram (EEG) data withi... more In this digital signal processing procedure, which analyses Electroencephalogram (EEG) data within a specified framework, the signal's frequency sub-bands were broken down using DWT, and a collection of features representing the distribution of wavelet coefficients was retrieved from the sub-bands. With the use of feature extraction techniques like mean, standard deviation, and variance, the size of the data is decreased. Following that, the classifier utilised these attributes as input to determine if the input data was normal or drowsy, and it classified the data accordingly. To demonstrate the superiority of the classification process, the performance of classification is evaluated. The system's main goal is to increase the precision of patient monitoring systems, remove variations in EEG signals, and enhance process accuracy.

Research paper thumbnail of A Machine Learning-based Approach for Anomaly Detection in IoT Systems

Turkish Journal of Computer and Mathematics Education (TURCOMAT)

The increased use of IoT devices has created new hurdles in the detection of anomalies. Anomaly d... more The increased use of IoT devices has created new hurdles in the detection of anomalies. Anomaly detection is the process of discovering unexpected or abnormal behaviour in a system, and anomalies in IoT systems can be produced by a variety of sources, including hardware and software faults, cyber assaults, and environmental conditions. Machine learning-based approaches for anomaly detection in IoT systems have emerged as a viable option, harnessing the capabilities of machine learning algorithms to detect and categorise anomalies in real-time. However, there are drawbacks to these approaches, such as data quality difficulties, the necessity for real-time analysis, and the possibility of false positives and false negatives. Organizations must carefully analyse the trade-offs associated in their implementation and deployment to overcome these problems. Based on research a review of machine learning-based algorithms for anomaly detection in IoT systems. We explore the problems and pote...

Research paper thumbnail of Identification of Building Damages using Satellite Images based on CNN- Recurrent Neural Network Approach

2023 8th International Conference on Communication and Electronics Systems (ICCES)

Research paper thumbnail of BERT Algorithm used in Google Search

Mathematical Statistician and Engineering Applications

Search engines are now a need for obtaining information due to the internet's explosive expan... more Search engines are now a need for obtaining information due to the internet's explosive expansion in digital material. One of the most widely used search engines, Google, works hard to improve its search functionality. Google has recently used cutting-edge natural language processing (NLP) methods to enhance search results. The Bidirectional Encoder Representations from Transformers (BERT) method is one such ground-breaking invention. This study seeks to offer a thorough evaluation of the BERT algorithm and its use in Google Search. We examine BERT's design, training procedure, and salient characteristics, emphasising its capacity to comprehend the subtleties and context of real language. We also talk about BERT's effects on user experience and search engine optimisation (SEO), as well as potential future advances and difficulties.

Research paper thumbnail of Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks

jowc, 2017

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be ... more Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node's trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network's resources that further shortens network lifetime. In this paper, we have proposed a system for identification and recovery of false alarms (IRFA) which is the optimization of existing trust based system. But security solution needs to be energy efficient due to scarcity of energy resources in WSN. To provide energy efficiency, we have implemented proposed IRFA system in cluster based environment which detects insider packet drop attackers in an energy efficient manner. We have conducted OMNET++ simulation and results demonstrate that the proposed system performance is better than existing trust-based system in terms of packet delivery rate and energy efficiency which improves network lifetime.

Research paper thumbnail of Energy Efficient Technique for Concealing Sink Location in WSN

blue eye publication iijte, 2019

In a wireless sensor network, concealing the location of the sink is critical. Location of the si... more In a wireless sensor network, concealing the location of the sink is critical. Location of the sink can be revealed (or at least guessed with a high probability of success) through traffic analysis. In this paper, we proposed an energy efficient technique for concealing sink location named EESLP (Energy Efficient Sink Location Privacy) scheme. Here we proposed an approach, in which we are concealing the sink location in such a way so that node energy utilization while securing sink in network can be minimum, to defending sink's location privacy and identity when the network is subjected to multiple traffic analysis attack. EESLP designs the network area of coverage with multiple spots generating fake message traffic for fake sink location creation that resembles the traffic behavior that is expected to be observed in the area where the sink is located. To achieve this we select some sensors away from the actual sink location which act as fake sinks by generating dummy or fake packet. The simulation results prove that EESLP can improve network life time and QOS (congestion, throughput, packet delivery rate) of sensor network while protecting sinks Location privacy.

Research paper thumbnail of Time Series Forecasting Models: A Comprehensive Review

International Journal of Recent Technology and Engineering, 2020

This comprehensive review provides an extensive overview of the existing Time Series Forecasting ... more This comprehensive review provides an extensive overview of the existing Time Series Forecasting technique. This survey is not restricted to any single time series analysis; it provides forecasting of time series in different areas like marketing prediction, weather forecasting, technology prediction, financial forecasting etc. In this paper, we have analyzed forecasting in some areas namely, load forecasting, wind speed forecasting, prediction of energy consumption and short-term traffic flow prediction. Various models are available for prediction among them Autoregressive Integrated Moving Average model (ARIMA) is seen as a universal mechanism, these discussed forecasting areas utilizes different models that are combined with ARIMA. Hybrid models are the combination of classical models and modern methods, like ARIMA (classical method) combines with Artificial Neural Network (ANN) as well as with Support Vector Machine (SVM) (modern models). Hybrid model’s performance is depending ...

Research paper thumbnail of Classification of BMD using artificial neural network

INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE “TECHNOLOGY IN AGRICULTURE, ENERGY AND ECOLOGY” (TAEE2022)

Osteoporosis is a disease that affects the bones, which are a very important part of the human bo... more Osteoporosis is a disease that affects the bones, which are a very important part of the human body. It has a tendency to lessen the volume of bones and, as a result, affect the micro architecture of bone tissues. For decades, a variety of imaging techniques have been used to evaluate and investigate the micro architecture of disturbed and damaged bones to be able to discover bone density inadequacies. Image enhancement ,filtering, classification, segmentation, and other preprocessing techniques are used in image processing to diagnose the afflicted bone structure and obtain crucial information about the distorted micro architecture pattern. In this research, we have gathered rudimentary knowledge of tissues like osteoblast and osteoclast as well as a comparison evaluation of few osteoporosis detection approaches based on image processing. The goal of this study is to determine the prevalence of osteoporosis and changes in bone mass as people become older, as well as to compare the bone health of seemingly healthy males, puberty of women, and menopause women. We used a 260-person ethical database, with 130 men, 80 women (before menopausal), and 50 women (after menopausal). Bone mineral density (BMD) was measured at the femoral neck using dual energy X-ray absorptiometry.

Research paper thumbnail of Image Compression Using Deep Convolutional Adversarial Networks

Data Driven Approach Towards Disruptive Technologies, 2021

Image compression is a kind of compression of data, which is used to images for minimizing its co... more Image compression is a kind of compression of data, which is used to images for minimizing its cost in terms of storage and transmission. Neural networks are supposed to be good at this task. One of the major problem in image compression is long-range dependencies between image patches. There are mainly two approaches to solve this problem; one is to develop a better residual patch-based encoder, and the second one is to create an entropy coder capable of collecting long-term dependencies inside the picture between patches. We address both the problems in this paper and fuse the two possible solutions to improve compression levels for a given material. Results of the simulation reveal that the new algorithm works much better in all parameters than in the current model.

Research paper thumbnail of Energy Optimization in WSN Using Evolutionary Bacteria Foraging Optimization Method

Research paper thumbnail of Automatic Diagnosis of Covid-19 Using Chest X-ray Images Through Deep Learning Models

Lecture Notes in Electrical Engineering, 2021

Research paper thumbnail of Characterization of banana peel ionic polymer membrane by using polynomial regression

Materials Today: Proceedings, 2021

Abstract The banana peel contains Phenolic compounds, which has higher concentrations as compared... more Abstract The banana peel contains Phenolic compounds, which has higher concentrations as compared to other fruits. These Phenolic compounds contain very rich concentration of antioxidant, antimicrobial and antibiotic properties. The amendment of banana is good in India as well as world. The banana has second main fruit crop in India. The Banana has belong to Musa family. It is grown in warmer areas. Banana contains potassium, vitamin B6, vitamin C and various antioxidants and phytonutrients. Alike the banana peel (BP) contains Iron, cadmium, chromium, Nickel, Copper, lead and Zinc conducting materials. By using conducting material a flexible conducting ionic polymer membrane developed. The purpose of this paper is optimum use of the nutrients which is present in banana peel (Bp). Banana peel is biodegradable material, when they get some moisture its get starts rotten which increased the production of the micro-organism, causes disease. Through banana peel an ionic polymer membrane is developed which helps overcome the banana peel waste problem. Through impedance analyzer we measured the electrical property of the banana peel ionic polymer membrane. Electric properties like conductance, capacitance, real and imaginary impedances are measured. From 20 Hz to 10 mHz range frequency is used to measure all electric properties. By using this range different- different 1600 / electric values are calculate. All these values are plotted with the help of polynomials regression. The conductivity PVA/BP is enhanced from 3 X 10-8 S to 8 X 10-7S by increasing the concentration of banana peel from 1 ml to 4 ml. The composition BP/ PAV shows good conduction or low dissipation factor and low dielectric constant.

Research paper thumbnail of Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks

Journal of Wireless Communications, 2017

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be ... more Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node’s trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network’s resources that further shortens network lifetime. In this pape...

Research paper thumbnail of Energy Efficient Technique for Concealing Sink Location in WSN

International Journal of Innovative Technology and Exploring Engineering, 2020

In a wireless sensor network, concealing the location of the sink is critical. Location of the si... more In a wireless sensor network, concealing the location of the sink is critical. Location of the sink can be revealed (or at least guessed with a high probability of success) through traffic analysis. In this paper, we proposed an energy efficient technique for concealing sink location named EESLP (Energy Efficient Sink Location Privacy) scheme. Here we proposed an approach, in which we are concealing the sink location in such a way so that node energy utilization while securing sink in network can be minimum, to defending sink’s location privacy and identity when the network is subjected to multiple traffic analysis attack. EESLP designs the network area of coverage with multiple spots generating fake message traffic for fake sink location creation that resembles the traffic behavior that is expected to be observed in the area where the sink is located. To achieve this we select some sensors away from the actual sink location which act as fake sinks by generating dummy or fake packet...