Muralidhar Kurni | Jawaharlal Nehru Technological University Anantapur (original) (raw)

Papers by Muralidhar Kurni

Research paper thumbnail of Review of: "Enhancing Science Education with Learning Management System for Effective Learning Outcomes

Research paper thumbnail of Problems

Advances in Analytics for Learning and Teaching, 2021

Research paper thumbnail of Moving Forward

Advances in Analytics for Learning and Teaching, 2021

Research paper thumbnail of Blockchain

Blockchain Technology for Emerging Applications

Research paper thumbnail of A forefront insight into the integration of AI and blockchain technologies

Blockchain Technology for Emerging Applications

Research paper thumbnail of Blockchains in the Pharmaceutical Sector

Blockchain in Digital Healthcare, 2021

Research paper thumbnail of Controlling Node Failure Localization in Data Networks Using Probing Mechanisms

Micro-Electronics and Telecommunication Engineering, 2022

Research paper thumbnail of Case Studies

Advances in Analytics for Learning and Teaching, 2021

Research paper thumbnail of Securing IoT through Blockchain in Big Data Environment

Data Analytics, Computational Statistics, and Operations Research for Engineers, 2022

Research paper thumbnail of The Efficacy of AI and Big Data in Combating COVID-19

Data Analytics, Computational Statistics, and Operations Research for Engineers, 2022

Research paper thumbnail of Present and Future Prospects of Blockchain Technology in Healthcare

Advances in Healthcare Information Systems and Administration, 2022

Many sectors, including finance, government, energy, health, and others, have found interest in b... more Many sectors, including finance, government, energy, health, and others, have found interest in blockchain technology over the last decade. It's no exaggeration to state that blockchain is pervasive in the healthcare industry. According to industry insiders, its application in healthcare has yet to achieve its full potential, but the implications might be substantial as it matures. This chapter presents the ongoing research trends, the existing issues and challenges, and presents future research opportunities to understand blockchain better. This chapter also throws light on the concepts of blockchain. This chapter also presents some examples of the uses of blockchain in healthcare. The authors hope that this chapter provides insight to the readers on the present and future research opportunities of blockchain in healthcare.

Research paper thumbnail of Enhancing the lifetime of WSNs through fuzzy logic based hierarchical cluster-heads formation approach

2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015

This paper attempts to enhance the lifetime of Wireless Sensor Networks (WSNs) by using a fuzzy l... more This paper attempts to enhance the lifetime of Wireless Sensor Networks (WSNs) by using a fuzzy logic based hierarchical Cluster-heads formation approach. In order to enhance the lifetime of the Wireless Sensor Network, a two-level hierarchy of Cluster-heads is formed. At the initial level of the two-level hierarchy, a node with high residual energy and centrality is selected as the Cluster-head. Cluster-heads are elected for every cluster in the network by using the above said two descriptors. At the final level of the two-level hierarchy, a Chief Cluster-head is selected for the entire network. Out of the elected Cluster-heads in the network, the Cluster-head with high residual energy, with a low concentration and nearer to the base station is selected as the Chief Cluster-head. All the Cluster-heads of the clusters in the network will aggregate the data received from other sensor nodes in the clusters and send to the Chief Cluster-head. The Chief Cluster-head compresses the data ...

Research paper thumbnail of Energy Efficient Zone Disjoint Shortest Multipath Routing Protocol (EEZDSM)

Energy in mobile adhoc networks is of much important. Similarly shortest path from source to dest... more Energy in mobile adhoc networks is of much important. Similarly shortest path from source to destination is also important for routing. Several routing protocols for MANETs have been proposed. Most of the existing routing protocols are single routing path between source and destination nodes. This results in rapid depletion of battery power of the nodes that comprise the path between the source and destination nodes and on the other hand the devices in mobile ad-hoc network have limited power. The proposed protocol overcomes these drawbacks by following a hybrid approach to routing of data packets by establishing Energy efficient zone disjoint shortest multipaths between the source and destination zones by avoiding paths with nodes that have a shorter lifetime remaining, since the nodes‟ residual energy is important in determining the path to successfully complete data transfer without interruption and also avoiding paths with many hopes, which delays the delivery of packets. The pr...

Research paper thumbnail of Improving the Performance of Browsers Using Fuzzy Logic

Research paper thumbnail of Assimilation of Fuzzy Logic and Replacement Algorithms to Browser Web Caching

international journal of research in computer application & management, 2012

Web caching is a well-known strategy for improving performance of Web-based system by keeping web... more Web caching is a well-known strategy for improving performance of Web-based system by keeping web objects that are likely to be used in the near future close to the client. Most of the current Web browsers still employ traditional caching policies that are not efficient in web caching. This research proposes a splitting browser cache to two caches, instant cache and durable cache. Initially, a web object is stored in instant cache, and the web objects that are visited more than the pre-specified threshold value will be moved to durable cache. Other objects are removed by Least Recently Used (LRU) algorithm as instant cache is full. More significantly, when the durable cache saturates, a fuzzy system is employed in classifying each object stored in durable cache into either cacheable or uncacheable object. The old uncacheable objects are candidate for removing from the durable cache. By implementing this mechanism, the cache pollution can be mitigated and the cache space can be utilized effectively. Experimental results have revealed that the proposed approach can improve the performance up to 14.8% and 17.9% in terms of hit ratio (HR) compared to LRU and Least Frequently Used (LFU). In terms of byte hit ratio (BHR), the performance is improved up to 2.57%, compared to LRU and LFU.

Research paper thumbnail of An Improved Node-Initiated Message Ferrying Approach for Data Dissemination in Disconnected Mobile Ad Hoc Networks

Message Ferrying is a new approach developed to assist communication in Mobile adhoc networks. Mo... more Message Ferrying is a new approach developed to assist communication in Mobile adhoc networks. Mobile ad-hoc networks are typically deployed with limited infrastructure. In addition, due to various conditions like limited radio range, physical obstacles or inclement weather, some nodes in the network might not be able to communicate with others. This could result in a disconnected network. In such situations, a typical network protocol might not yield good results. Message Ferrying is an approach which works around such problems. The message ferrying technique makes use of mobile nodes, called “ferries”, which are able to collect and transport data from one node to another. There are two approaches to deliver a message, Node-Initiated Message Ferrying (NIMF) and Ferry-Initiated Message Ferrying (FIMF). In NIMF approach a node will move towards known route of ferry if it has data to transmit or receive. The node comes close so that ferry will be in normal range of node. In FIME appro...

Research paper thumbnail of An investigation into the operational limitations of mobile ad hoc networks

2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2017

Mobile ad hoc network (MANET) is wireless ad hoc network that includes a collection of mobile nod... more Mobile ad hoc network (MANET) is wireless ad hoc network that includes a collection of mobile nodes sometimes called mobiles connected by wireless links. The nodes in a MANET have limited resources and restricted transmission range. The infrastructure of a MANET is not fixed but is easy and quick to setup. Application areas of MANETs include, but not limited to; emergency services, disaster recovery, environment monitoring, home networking, personal area networking, search and rescue operations, etc. The inherent nature of MANETs brings many operational limitations. This paper mainly discusses the operational limitations of MANETs, which raise various challenges in transforming it into the commercial world viable. These limitations include bandwidth constraints, energy constraints, storage limitations, mobility issues, variation in link capabilities, etc. This study starts with the evolution of the mobile ad hoc networks, later provides an insight into more pragmatic applications and finally on the operational limitations of MANETs. To make a transition of MANET to the commercial world viable, the operational limitations of MANETs need to overcome.

Research paper thumbnail of An optimal replica relocation scheme for improving service availability in mobile Ad Hoc Networks

2014 IEEE International Conference on Computational Intelligence and Computing Research, 2014

This paper proposes an optimal replica relocation scheme improving service availability in Mobile... more This paper proposes an optimal replica relocation scheme improving service availability in Mobile Ad Hoc Networks (MANETs) that relocates replicas as necessary so that the actual data items are available to the nodes which are in need of them. Since MANET's topology is highly dynamic, data items should be made available to the nodes that are required by them in a minimum distance. The nodes which initially store data may move far because of the dynamic topology and the nodes that are selected for relocation should be nearer to the nodes that are in need of them. Also the nodes which store the replicas may drain out in servicing excessive data access requests. This proposed scheme not only considers the minimum distance parameter, but also considers the vital parameters like storage availability, and residual energy parameters in selecting the node for relocation. The proposed scheme was implemented in NS2 and when compared to the no relocation scheme, our proposed scheme proved to be superior.

Research paper thumbnail of Prolonging the MANET lifetime through wireless energy transfer using high powered and native powered mobile nodes

2014 International Conference on Advances in Electronics Computers and Communications, 2014

Research paper thumbnail of A novel dead end and packet loss avoidance scheme for geographic forwarding in manets

Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), 2013

ABSTRACT

Research paper thumbnail of Review of: "Enhancing Science Education with Learning Management System for Effective Learning Outcomes

Research paper thumbnail of Problems

Advances in Analytics for Learning and Teaching, 2021

Research paper thumbnail of Moving Forward

Advances in Analytics for Learning and Teaching, 2021

Research paper thumbnail of Blockchain

Blockchain Technology for Emerging Applications

Research paper thumbnail of A forefront insight into the integration of AI and blockchain technologies

Blockchain Technology for Emerging Applications

Research paper thumbnail of Blockchains in the Pharmaceutical Sector

Blockchain in Digital Healthcare, 2021

Research paper thumbnail of Controlling Node Failure Localization in Data Networks Using Probing Mechanisms

Micro-Electronics and Telecommunication Engineering, 2022

Research paper thumbnail of Case Studies

Advances in Analytics for Learning and Teaching, 2021

Research paper thumbnail of Securing IoT through Blockchain in Big Data Environment

Data Analytics, Computational Statistics, and Operations Research for Engineers, 2022

Research paper thumbnail of The Efficacy of AI and Big Data in Combating COVID-19

Data Analytics, Computational Statistics, and Operations Research for Engineers, 2022

Research paper thumbnail of Present and Future Prospects of Blockchain Technology in Healthcare

Advances in Healthcare Information Systems and Administration, 2022

Many sectors, including finance, government, energy, health, and others, have found interest in b... more Many sectors, including finance, government, energy, health, and others, have found interest in blockchain technology over the last decade. It's no exaggeration to state that blockchain is pervasive in the healthcare industry. According to industry insiders, its application in healthcare has yet to achieve its full potential, but the implications might be substantial as it matures. This chapter presents the ongoing research trends, the existing issues and challenges, and presents future research opportunities to understand blockchain better. This chapter also throws light on the concepts of blockchain. This chapter also presents some examples of the uses of blockchain in healthcare. The authors hope that this chapter provides insight to the readers on the present and future research opportunities of blockchain in healthcare.

Research paper thumbnail of Enhancing the lifetime of WSNs through fuzzy logic based hierarchical cluster-heads formation approach

2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015

This paper attempts to enhance the lifetime of Wireless Sensor Networks (WSNs) by using a fuzzy l... more This paper attempts to enhance the lifetime of Wireless Sensor Networks (WSNs) by using a fuzzy logic based hierarchical Cluster-heads formation approach. In order to enhance the lifetime of the Wireless Sensor Network, a two-level hierarchy of Cluster-heads is formed. At the initial level of the two-level hierarchy, a node with high residual energy and centrality is selected as the Cluster-head. Cluster-heads are elected for every cluster in the network by using the above said two descriptors. At the final level of the two-level hierarchy, a Chief Cluster-head is selected for the entire network. Out of the elected Cluster-heads in the network, the Cluster-head with high residual energy, with a low concentration and nearer to the base station is selected as the Chief Cluster-head. All the Cluster-heads of the clusters in the network will aggregate the data received from other sensor nodes in the clusters and send to the Chief Cluster-head. The Chief Cluster-head compresses the data ...

Research paper thumbnail of Energy Efficient Zone Disjoint Shortest Multipath Routing Protocol (EEZDSM)

Energy in mobile adhoc networks is of much important. Similarly shortest path from source to dest... more Energy in mobile adhoc networks is of much important. Similarly shortest path from source to destination is also important for routing. Several routing protocols for MANETs have been proposed. Most of the existing routing protocols are single routing path between source and destination nodes. This results in rapid depletion of battery power of the nodes that comprise the path between the source and destination nodes and on the other hand the devices in mobile ad-hoc network have limited power. The proposed protocol overcomes these drawbacks by following a hybrid approach to routing of data packets by establishing Energy efficient zone disjoint shortest multipaths between the source and destination zones by avoiding paths with nodes that have a shorter lifetime remaining, since the nodes‟ residual energy is important in determining the path to successfully complete data transfer without interruption and also avoiding paths with many hopes, which delays the delivery of packets. The pr...

Research paper thumbnail of Improving the Performance of Browsers Using Fuzzy Logic

Research paper thumbnail of Assimilation of Fuzzy Logic and Replacement Algorithms to Browser Web Caching

international journal of research in computer application & management, 2012

Web caching is a well-known strategy for improving performance of Web-based system by keeping web... more Web caching is a well-known strategy for improving performance of Web-based system by keeping web objects that are likely to be used in the near future close to the client. Most of the current Web browsers still employ traditional caching policies that are not efficient in web caching. This research proposes a splitting browser cache to two caches, instant cache and durable cache. Initially, a web object is stored in instant cache, and the web objects that are visited more than the pre-specified threshold value will be moved to durable cache. Other objects are removed by Least Recently Used (LRU) algorithm as instant cache is full. More significantly, when the durable cache saturates, a fuzzy system is employed in classifying each object stored in durable cache into either cacheable or uncacheable object. The old uncacheable objects are candidate for removing from the durable cache. By implementing this mechanism, the cache pollution can be mitigated and the cache space can be utilized effectively. Experimental results have revealed that the proposed approach can improve the performance up to 14.8% and 17.9% in terms of hit ratio (HR) compared to LRU and Least Frequently Used (LFU). In terms of byte hit ratio (BHR), the performance is improved up to 2.57%, compared to LRU and LFU.

Research paper thumbnail of An Improved Node-Initiated Message Ferrying Approach for Data Dissemination in Disconnected Mobile Ad Hoc Networks

Message Ferrying is a new approach developed to assist communication in Mobile adhoc networks. Mo... more Message Ferrying is a new approach developed to assist communication in Mobile adhoc networks. Mobile ad-hoc networks are typically deployed with limited infrastructure. In addition, due to various conditions like limited radio range, physical obstacles or inclement weather, some nodes in the network might not be able to communicate with others. This could result in a disconnected network. In such situations, a typical network protocol might not yield good results. Message Ferrying is an approach which works around such problems. The message ferrying technique makes use of mobile nodes, called “ferries”, which are able to collect and transport data from one node to another. There are two approaches to deliver a message, Node-Initiated Message Ferrying (NIMF) and Ferry-Initiated Message Ferrying (FIMF). In NIMF approach a node will move towards known route of ferry if it has data to transmit or receive. The node comes close so that ferry will be in normal range of node. In FIME appro...

Research paper thumbnail of An investigation into the operational limitations of mobile ad hoc networks

2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2017

Mobile ad hoc network (MANET) is wireless ad hoc network that includes a collection of mobile nod... more Mobile ad hoc network (MANET) is wireless ad hoc network that includes a collection of mobile nodes sometimes called mobiles connected by wireless links. The nodes in a MANET have limited resources and restricted transmission range. The infrastructure of a MANET is not fixed but is easy and quick to setup. Application areas of MANETs include, but not limited to; emergency services, disaster recovery, environment monitoring, home networking, personal area networking, search and rescue operations, etc. The inherent nature of MANETs brings many operational limitations. This paper mainly discusses the operational limitations of MANETs, which raise various challenges in transforming it into the commercial world viable. These limitations include bandwidth constraints, energy constraints, storage limitations, mobility issues, variation in link capabilities, etc. This study starts with the evolution of the mobile ad hoc networks, later provides an insight into more pragmatic applications and finally on the operational limitations of MANETs. To make a transition of MANET to the commercial world viable, the operational limitations of MANETs need to overcome.

Research paper thumbnail of An optimal replica relocation scheme for improving service availability in mobile Ad Hoc Networks

2014 IEEE International Conference on Computational Intelligence and Computing Research, 2014

This paper proposes an optimal replica relocation scheme improving service availability in Mobile... more This paper proposes an optimal replica relocation scheme improving service availability in Mobile Ad Hoc Networks (MANETs) that relocates replicas as necessary so that the actual data items are available to the nodes which are in need of them. Since MANET's topology is highly dynamic, data items should be made available to the nodes that are required by them in a minimum distance. The nodes which initially store data may move far because of the dynamic topology and the nodes that are selected for relocation should be nearer to the nodes that are in need of them. Also the nodes which store the replicas may drain out in servicing excessive data access requests. This proposed scheme not only considers the minimum distance parameter, but also considers the vital parameters like storage availability, and residual energy parameters in selecting the node for relocation. The proposed scheme was implemented in NS2 and when compared to the no relocation scheme, our proposed scheme proved to be superior.

Research paper thumbnail of Prolonging the MANET lifetime through wireless energy transfer using high powered and native powered mobile nodes

2014 International Conference on Advances in Electronics Computers and Communications, 2014

Research paper thumbnail of A novel dead end and packet loss avoidance scheme for geographic forwarding in manets

Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), 2013

ABSTRACT

Research paper thumbnail of Research Tools for Simulation Study of Behavior of Wireless Sensor Networks

Research Tools for Simulation Study of Behavior of Wireless Sensor Networks

Research paper thumbnail of Some tools for Wireless Sensor Networks

The objective of this contribution is to present expositive review content on currently available... more The objective of this contribution is to present expositive review content on currently available experimental tools/services/concepts used for most emerging field Wireless Sensor Network that has the capability​ to change many of the Information Communication aspects in the upcoming era.