About
57
Publications
5,684
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
279
Citations
Current institution
Additional affiliations
September 2001 - present
Publications
Publications (57)
Wireless sensor networks (WMSNs) are becoming increasingly popular in many fields, from academia to transportation, environmental monitoring, wildlife preservation, and military espionage. Therefore, examining potential threats, power consumption, vulnerability recognition, and systemic vulnerability characteristics is essential to develop a reliab...
Irrespective of the branch of study, practical/laboratory courses are integral parts of engineering curriculum. These courses develop the knowledge, skill and attitude of the graduates. It is thus necessary to frame the laboratory experiments, to create a student centric learning environment and to have suitable assessment methodologies to enhance...
Feasibility of convolutional neural networks (CNNs) for the classification of weld defects from ultrasonic signals is studied in this paper. Three different defects, namely lack of fusion, lack of penetration, and porosity, are considered in this work. One-dimensional function is converted into two-dimensional spectrograms and CNNs, namely RESNET18...
The transferring of huge multimedia data over the limited bandwidth environment has many challenges in real time. Wireless Multimedia Sensor Networks (WMSN) is a special type of wireless sensor networks which are used to overcome such bandwidth limitations in order to provide effective transferring of multimedia data. The malicious nodes in WMSN fa...
Archeological assets of the nation are to be preserved and rejuvenated. Ageing of these sites poses a major challenge in assessing the health of these structures. Hence it necessitates a technique that is non contact non invasive and non hazardous. Passive InfraRed Thermography is one such technique that uses an IR camera to capture the temperature...
Automatic identification of skin carcinoma is significant. The dangerous types of cancer found in humans are skin cancer. Melanoma is the deadlier type of skin cancer. Healing can be beneficial on early diagnosis of melanoma. This paper aims to propose a skin cancer diagnosis algorithm that can automatically classify lesions as malignant or benign....
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal).
This article has been withdrawn as part of the withdrawal of the Proceedings of the International Conference on Emerging Trends in Materials Science, Technology and Engineering (ICMSTE2K21). Su...
Melanoma is a skin disorder, occurring in melanocytes. They are classified as Benign and Malignant. The cure of melanoma is effective, if it can be recognized early. The most crucial part in the cure of melanoma is the exact classification and determining the group of melanoma. A comparative study for classifying the group of melanoma using the sup...
The incidence of skin cancer, one of the most rapidly growing and common malignancies, has been rising at a faster pace worldwide. This cancer can be disfiguring or even deadly if not recognized in the earlier stages, and cancer identification has long been considered a critical concern. Computer-dependent analysis is the latest clinical tool, allo...
The multi‐radio–multi‐channel wireless mesh networks (MRMC WMNs) have attracted much attention due to their low cost, reliable coverage, stable topology, and so forth. Load balancing among gateways (GWs) is a challenging task in MRMC WMNs. The GW nodes with higher loads will lead to disconnected network. GW and shortest path selection may increase...
In the recent era, security is the major problem in sensor networks. Wireless sensor networks (WSNs) are mostly used for various real-world applications. However, WSNs face a lot of insider and outsider attacks, and it is complex to identify and protect towards insider attacks. Generally, an insider attack, in which the intruders choose several rec...
Mostly survivability in optical Mesh network is major topic of discussion as failure in the high speed network will affect the services. Wavelength Division Multiplexing (WDM) technology has made it possible to use the large capacity of an optical fiber. In a WDM Network, survivability is a major area of concern as a WDM network carries a large amo...
Wireless Mesh Network (WMN), is a upcoming promising technology, that is continuing to boom because of its various advantages like low deployment cost, scalability, efficiency, characteristics of each node being to function as a router, etc.. But there are many challenges that are not addressed, which includes congestion prevention and avoidance. C...
Introduction and Aim: This paper depicts a novel image processing approach for skin cancer detection on dermatoscope images. The main objective of this work is to classify the skin lesion as malignant or benign using Hybrid texture features. Materials and Methods: The different stages of detection involve: a collection of data images, filtering the...
Internet of things (IoT) is communication between smart objects and human. It finds enormous applications in the field of healthcare monitoring, information management system, agriculture, predicting the natural disaster etc. In all those applications of IoT, security plays a vital role. In this paper, a study on various encryption light weight tec...
In event driven WSN applications like telemedicine,e-health monitoring etc.,high speed reliable data transmission is crucial. However,limited battery resource of the sensor node affects the network connectivity and thereby affects the reliable data transmission. Clustering is the most commonly used technique where data is reliably transmitted throu...
Queuing theory is an important concept in current internet technology. As the requirement of bandwidth goes on increasing it is necessary to use optical communication for transfer of data. Optical communication at backbone network requires various devices for traffic grooming. The cost of these devices is very high which leads to increase in the co...
Digital mammography is the most widely used diagnostic technique for detecting breast cancer. Major challenge lies in developing an efficient image segmentation technique to extract the tumour to its original size and to remove the undesirable regions completely. In this paper, a hybrid image segmentation technique by combining ability of Hough tra...
In Remote Sensor Arrange deferral and vitality are vital limitations. It is watched that postponement, parcel conveyance proportion, vitality, rate transmission issues are created when a bundle is sent from sources to goal. This paper manages issues of postponement and vitality. Also, it deals with a Course choice paradigm which depends on least hu...
The driving force of the whole nature and the cure for everything is water, the rapid economic development in this emerging world has resulted in increase of care freeness among people for the timely detection of water resources from impurities and the harmful chemical wastes in it. Internet of Things (IoT) and wearable sensors through WSN (wireles...
Wireless sensor network comprises of dense sensor nodes which are randomly deployed. Major challenges in WSN are limited battery source and computation capacity. Considerable research has been carried out in the area of maximizing battery lifetime by reducing the energy consumption. Once such proposed technique involves hierarchical topology contro...
Condition monitoring of electrical equipments is indeed the earliest application of Infrared Thermography. It overcomes the disadvantages of conventional manual testing as it does not involve disassembly and reassembly of electrical equipments. Conventionally in IRT testing, hotspot is plotted across the time of testing and any abrupt deviation in...
Wireless sensor network continues to be a resource constrained network with limited energy, computing power, memory and communication capabilities. Among all the mentioned constraints, energy consumption is of paramount importance. The network does not maintain standard topology instead, it has dynamic topology. Hence, it necessitates the developme...
Automated speaker recognition system is extremely important in areas such as Forensic and Defense. Performance of an automated speaker recognition system is dependent on feature extraction and classification. As speech is a non-stationary signal and the information is present in low frequencies, it necessitates a non-stationary tool that performs m...
The role of internet became a non replaceable one in our day to day life. Internet users also face various security threats such as eavesdropping and unauthorized access through intrusion. Internet users need to be protected and provided privacy. Network security and image encryption has become important and high profile issues. Various cryptograph...
In Wireless Sensor Network, congestion plays a drastic role in degrading the performance of the network. It causes high packet loss, increased delay and low efficiency which in-turn decreases the overall performance of the network. Thus it necessitates an efficient congestion control technique. In this paper, an Intelligent Packet Dropping techniqu...
Automated recognizing a speaker from the speech signals is the foremost application in forensics. Speaker recognition system involves two phases namely feature extraction and a classifier system. Features extracted from the speech signals are fed to an already trained classifier system that identifies the speaker. Major challenge occurs when the da...
Wireless sensor network is an energy limited network widely used in various applications where human interaction with the environment is not possible. Since wireless sensor network works with a limited energy source, an efficient technique is desirable for increasing the energy conservation and thereby extending the lifespan of the network. Energy...
Prolonging the network lifetime is the most challenging task in the design of Wireless Sensor Networks (WSN). Using battery power effectively prevents sensor nodes from early death. Topology Control (TC) is one of the best attempts for saving battery power and to extend the network lifetime. TC is decisive in obtaining an energy efficient network w...
Recent years showed a wide range of applications in Wireless Sensor Networks (WSN). For a WSN, Topology Control is crucial to obtain an energy efficient network without affecting the connectivity and other properties. In this paper the sequence of strategies carried out to obtain a better scheme for a topology control in terms of energy is discusse...
Recent years showed a wide range of applications in Wireless Sensor Networks (WSN). For a WSN, Topology Control is crucial to obtain an energy efficient network without affecting the connectivity and other properties. In this paper the sequence of strategies carried out to obtain a better scheme for a topology control in terms of energy is discusse...
Archival of digital radiographs is the growing need in weld industries. However in addition to radiographs, the information about the weld piece must also be stored for future documentation. However the information about the radiographs may be confidential and should not be stored as such. Also matching the radiographs with the corresponding radiog...
Performance of overlay networks can be improved if proper detection of link failures is done and deployment of overlay nodes in exact locations are done. The major factors that result in link failure are loss of signals, loss of synchronization, link capacity and faulty interfaces. Though extensive research is carried out in improving the performan...
Recent years showed a wide range of applications in Wireless Sensor Networks (WSN). For a WSN, Topology Control is crucial to obtain an energy efficient network without affecting the connectivity and other properties. In this paper the sequence of strategies carried out to obtain a better scheme for a topology control in terms of energy is discusse...