Jennifer S Raj

Jennifer S Raj
Gnanamani College of Technology | GCT · Department of Electronics and Communication Engineering

M.Tech.Ph.D

About

78
Publications
9,331
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,138
Citations
Additional affiliations
January 2018 - present
Gananamani College of Technology
Position
  • Professor
January 2018 - present
Ganamani College of Technology
Position
  • Professor
June 2016 - December 2017
Ranganathan Engineering College
Ranganathan Engineering College
Position
  • Professor
Education
July 2003 - April 2005
SRM Institute of Science and Technology
Field of study
  • Communication Systems

Publications

Publications (78)
Article
The introduction of Wi-Fi into the residences is creating a biological havoc among humans. A lot of research has been evolved and presented depicting the various imperfections caused by the radiation of Wi-Fi. To overcome this LiFi technology may be used for indoor communication instead of Wi-Fi. LiFi communication needs line of sight for communica...
Article
Full-text available
In today's world, wireless sensor network is an unavoidable technology especially for Internet of Things applications. But the nodes limited resource introduces challenges while designing the network topology. So, these limited resources can be efficiently utilized if energy-efficient strategies are employed in the network design. Clustering is one...
Article
Medical IoT systems have recently become one of the most sophisticated medical technologies in well-developed countries. The remote monitoring of medical services may benefit greatly from this technology. According to a new study, security measures and training are critical in protecting IoMT systems from cyber-attacks. In this paper, the primary s...
Chapter
In recent days, wearable antennas are getting adequate attention in many areas. The antennas should be lightweight and its should be easily integrated with other systems. To match with the system requirements, conduction mode of textiles and conductive threads are used in many places. A specified shape (badge) microstrip wearable antenna for X-band...
Book
This book features research papers presented at the 4th International Conference on Intelligent Sustainable Systems (ICISS 2021), held at SCAD College of Engineering and Technology, Tirunelveli, Tamil Nadu, India, during February 26–27, 2021. The book discusses the latest research works that discuss the tools, methodologies, practices, and applicat...
Article
Full-text available
The availability of the smart existing systems utilizes the system assets for crucial internet of things (IoT). The IoT visions to develop effectively with the processing model. Past customary versatile figuring set-ups utilize advanced mobile phones and portables. A sensor could drop out for various reasons, for the system to act naturally adjusti...
Article
Several subscribing and content sharing services are largely personalized with the growing use of mobile social media technology. The end user privacy in terms of social relationships, interests and identities as well as shared content confidentiality are some of the privacy concerns in such services. The content is provided with fine-grained acces...
Article
This paper has proposed a hybrid electric vehicle that uses intelligent energy management strategy to decrease the energy consumption of the vehicle. Here, the total energy consumption of the vehicle is initially modelled and further investigated to reduce the amount of energy used to be identified as a sum of electrical energy provided by consumed...
Article
Due to the global energy crisis and environmental degradation, largely as a result of the increased usage of non-renewable energy sources, researchers have become more interested in exploring alternative energy systems, which may harvest energy from natural sources. This research article provides a comparison between various modeling of piezoelectr...
Article
The advent of autonomous vehicles is indeed a potential field of research in today's situation. Connected Vehicles (CV) have received a lot of attention in the last decade, which has resulted in CV as a Service (CVaaS). With the advent of taxi services, there is a need for or demand for robust, seamless, and secure information transmission between...
Article
In this research work and unmanned aerial vehicle (UAV) that uses blockchain methodology to collect health data from the users and saves it on a server nearby is introduced. In this paper the UAV communicates with the body sensor hives (BSH) through a low-power secure manner. This process is established using a token with which the UAV establishes...
Article
Edge computing is a new computing paradigm that is rapidly emerging in various fields. Task completion is performed by various edge devices with distributed cloud computing in several conventional applications. Resource limitation, transmission efficiency, functionality and other edge network based circumstantial factors make this system more compl...
Article
As the technology revolving around IoT sensors develops in a rapid manner, the subsequent social networks that are essential for the growth of the system will be utilized as a means to filter the objects that are preferred by the consumers. The ultimate purpose of the system is to give the customers personalized recommendations based on their prefe...
Article
In the big data era, there is a high requirement for data storage and processing. The conventional approach faces a great challenge, and de-duplication is an excellent approach to reduce the storage space and computational time. Many existing approaches take much time to pinpoint the similar data. MapReduce de-duplication system is proposed to atta...
Article
The municipal wireless networks are developed using Wi-Fi connectivity for establishing smart cities. Wi-Fi access is provided to several thousands of cities worldwide. However, the overall utilization profile, Quality of Experience (QoE) of the user and Quality of Service (QoS) analysis has not been performed in most of these cities. There are 304...
Article
There has been a rapid growth in research towards developing smart, low-cost, and high-performance unmanned aerial vehicles (UAVs) for enabling wireless data transfer and communication. The practical applications of UAVs in healthcare, surveillance, agriculture and other domains is increasing at a faster pace. Mass production of these UAVs is essen...
Article
As the need for super-fast mobile devices incorporating cloud computing technology continues to be the need of the hour, Mobile Cloud Computing (MCC) serves as the platform for mobile users to share data with others, store information on the cloud and also compute using the data. Over the years, the most widely preferred encryption that has proven...
Article
Full-text available
Large amount of data is generated each second around the world. Along with this technology is evolving each day to handle and store such enormous data in an efficient way. Even with the leap in technology, providing storage space for the gigantic data generated per second globally poses a conundrum. One of the main problems, which the storage serve...
Book
This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communica...
Chapter
The main focus of the smart city relates to safety, expedient, easy process, and improved power consumption. As street light is an important device associated with safety in the urban areas and the reason for the major power utilization, the paper concentrates on developing street lights with adjustable luminance to reduce power usage. The proposed...
Chapter
Data is the key element in this digital era. The information retrieved from these data is a valuable source of income for many companies. Many companies are hiring data analysts and data scientists to examine these data. OLAP and BI are evolving rapidly depending upon these data. Data analytics is the process of analyzing any format of data like st...
Article
Full-text available
Cloud computing provides services and resources in the Internet, and many applications are self-service-supported, on-demand resource allocation-adapted. These dynamic networks allocated necessary resource to the users’ need and they require proper resource allocation scheme. Since various resources are consumed by users if resource allocation is n...
Article
The recent technology developments and innovations improves the life style of people through smart applications, sensors, wireless communication networks, etc., for all those technologies internet is the backbone and the information processing like accessing, distributing the necessary information is achieved through Internet of Things (IoT). IoT s...
Article
The recent technology development increases the opportunity to create valuable network services to user. Flying ad-hoc networks (FANET) in one among them which evolved recently with enhanced value added services with common features similar to its predecessor ad-hoc networks like vehicular ad hoc networks (VANET) and mobile ad hoc networks (MANET)....
Article
Significant enhancement of spectrum utilization can be performed by means of Cognitive Radio technology. A game theory based Cognitive Radio Network with Dynamic Spectrum Allocation model is proposed in this paper. M|M|1 queuing model is implemented along with Preemptive Resume Priority for accommodation of all the cases. An Incremental Weights-Dec...
Article
The decentralized network formed without any assistance of the fixed infrastructure and just by the employing the volunteering mobile or the portable devices that work in a cooperative manner along with the other devices that are clubbed in the network are inbuilt with the capacity of providing a best data conveyance facility utilizing the unicast,...
Article
To have an effective scheduling of the generators in order to achieve a perfect planning and functioning of the electric power generation system so as to satisfy the demands required, the economic load dispatch is important. The economic load dispatch is very essential in the network operations in the market with the derestricted electricity and ta...
Article
The occurrences of forest fires is not only a progressing concern in the lives of the people but also in the deterioration of the environment. Since the emergence of the internet of things, new methodologies are being continuously devised to have an early knowledge about the occurrence of the forest fires. The identifying the areas with the fire ri...
Article
The mobile devices capabilities are found to be greater than before by utilizing the cloud services. There are various of service rendered by the cloud paradigm and the mobile devices usually allows the execution of the resource-intensive applications on the resource- constrained mobile device to be offloaded to the cloudlets that are resource rich...
Article
The sensors grouped to gather to form the network of their own, in the wireless medium and communicating to the each other over radio, faces issues that leads to failure in continuous communication, causing miss communication as it is powered by batteries with limited energy availability So it becomes essential to device a perfect routing scheme th...
Book
This book presents emerging concepts in data mining, big data analysis, communication, and networking technologies, and discusses the state-of-the-art in data engineering practices to tackle massive data distributions in smart networked environments. It also provides insights into potential data distribution challenges in ubiquitous data-driven net...
Article
The multi cloud architecture improvises the constancy of the system associated with the cloud computing as they offer benefits such as the reducing the severity of the vendor lock in, which is the major impediment to the cloud service adoption. However the information maintenance in the multi cloud architecture is a very tedious and challenging as...
Article
The auxiliary wavelength configurations that are artificially fabricated are usually utilized in the metasurface nowadays in order to improve its potency in manipulating the light utilizing the unique and extraordinary operations. The paper puts forth the exploration of the metasurface application to comprehend a camouflaged structure using augment...
Article
Adhoc networks as the name suggests is framed for a specialized reason using the volunteering devices available near the source to destination, utilizing the devices in between the source and the destination as the relaying nodes. Several methods were framed to optimize the performance of the wireless adhoc network to retain the energy level of the...
Article
The wireless network virtualization for the cloud and the enterprise information system would enable maximum utilization of resources, causing an enhancement in the enterprise information system efficiency, by sharing the infrastructure among multiple applications or service provisioning’s. The physical wireless structure of the network and the rad...
Article
The artificial intelligence that tries to imitate the human beings by gathering a vast knowledge gained using the reasoning, planning, searching and prediction fails in certain areas that necessitate a construction of large set of rules. The AI also faces challenges due to the growing demands in the learning and the search optimization. These failu...
Article
Full-text available
Routing and mobile data traffic management is a major performance affecting issue in vehicular Ad Hoc networks (VANET). High-rise structures and such radio obstacles cause trouble in proper reception of signals when position-based routing schemes are used. Other major challenges include constrained mobility and irregular distribution of vehicular n...
Article
Full-text available
Storage and processing of information is the major application of big data analytics. Internet of Everything (IoE) is the smart connection between people, data, things and processes. This paper studies the available frameworks used for developing secure Internet of Everything with big data analytics. Big data is a collection of data generated from...
Article
Green house is generally a building of small or large structures. The structure of the green house is made of walls and the translucent roof, with the capability of maintaining the planned climatic condition. It ensures the growth of plants that requires a specified level of soil moisture, sunlight, humidity and temperature. The green house systems...
Article
The nonlinear regression estimation issues are solved by successful application of a novel neural network technique termed as support vector machines (SVMs). Evaluation of recurrent neural networks (RNNs) can assist in pattern recognition of several real-time applications and reduce the pattern mismatch. This paper provides a robust prediction mode...
Article
Virtual reality (VR) technology has the potential to make a person experience anything, anytime, anywhere. It has the ability to influence the human brain that it assumes to be present somewhere that it is really not. In this paper, we exploit this application of the VR technology to simulate virtual environments that can help with PTSD therapy for...
Article
Nowadays the devices embedded with the internet connectivity termed as internet of things are constantly generating a monumental amount of the information. These huge set of data produced are coined as the big data. The big amount of data produced introduces complexity in analyzing and processing to extract the useful information’s from them, this...
Article
The wireless Adhoc network are framed instantaneously utilizing the neighboring available mobile nodes and are capable of reconfiguring and healing. This autonomous behavior of the WANET and their other unique characteristics such as high mobility, limited battery power and dynamic topology changes incorporates several challenges in routing process...
Article
The internet of things is a group of connected computing, digital and mechanical machines with the capability of being identified by other devices that are internet enabled. The wireless sensor networks is a gathering of sovereign sensing elements in combination with actuating, computing, communicating and energy storing devices to keep track of th...
Article
Full-text available
The advanced progress in wireless communication pays attention on information of more sensitivity to be delivered to its destined end with numerous of restrains, such as reliableness, constancy, response time and safety. The advancements in digital gadgetry, the usage of unwired transceivers and microcontrollers has made viable the integration of s...
Article
The development in the area of networking is Internet of Things (IoT). This will interrelated the object and things together. The realization of IoT subsystems will be subjected to numerous constraints that include cost, power, energy, and lifetime. However, most challenging requirement will be trust. It is widely recognized that the attacks from m...
Article
Full-text available
Secured self organizing network is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. In delay tolerant network packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of ne...
Article
The objective of this work is to analyse performance of unstable mobile nodes with self-organization structures in Delay Tolerant Networks (DTN). This process enables the nodes to utilize their power fairly, and ensures that the links are established between nodes and used to improve the connectivity. In this paper two approaches are proposed: 1. S...
Article
Full-text available
Spreading the switching frequency of a DC-DC converter is a cost effective method for reducing conducted emission. In this paper the main objective is to implement spread spectrum techniques in a digitally controlled DC-DC converter and to reduce conducted emission by modulation. To vary the switching frequency the spectrum can be spread across a b...
Conference Paper
Full-text available
The mobile ad hoc network (MANET) is an infrastructure less wireless network where the nodes are mobile in nature. As the network is infrastructure less, the routes are maintained based on some trusted nodes present in the network. It is required that the nodes in these networks have to be aware of the position of other nodes present in the network...
Conference Paper
Full-text available
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. In Disruption Tolerant Networks...
Article
Full-text available
In wireless domain finding the dominating set is one of the solutions for connectivity maintenance. Due to the dynamic topology, i.e. nodes move anywhere at any time: finding the dominating set also is a major task and lots of control messages require updating every change that occurs. To overcome the existing issues a new localized mechanism is pr...
Article
A fundamental problem that confronts wireless networks are localization, mobility maintenance and number of neighbors required to maintain the connectivity. To overcome this problem and achieve a better quality of service, a self stability model is introduced, named as localized tree model which includes min and max routing methods. This work is ba...
Article
Full-text available
A communication network with radio nodes which is organized in a mesh topology is called as wireless mesh network or WMN. They are used for variety application such as building automation, transportation, citywide wireless Internet services etc. The WMN experience link failure due to application bandwidth demands, channel interference etc. These fa...
Data
Full-text available
A fundamental problem that confronts wireless networks are localization, mobility maintenance and number of neighbors required to maintain the connectivity. To overcome this problem and achieve a better quality of service, a self stability model is introduced, named as localized tree model which includes min and max routing methods. This work is ba...
Article
Full-text available
Vehicular Ad hoc Network (VANET) is new network type which is used for short range high speed communication among vehicles and between vehicles and road side infrastructure units. In most of the existing literature, the gateways are considered static, deployed on the road side at fixed distance from each other, depending on their transmission range...
Article
Full-text available
Neighbor-aware architectures are mainly used to build scalable networks with a huge number of mobile subsystems. The primary objective of this paper is to improve connectivity efficiency and dynamic adaptation of nodes in the mobile Internet environment. The key issues are excessive control transfer, node/link access failure and connectivity mainte...
Article
A mobile ad-hoc network (MANET) is a complex distributed system with unpredictable node movements, which results in frequent node disconnectivity. In a MANET, each node works independently, using the resources based on individual need. The main problem with this arises during the movement of the nodes and random utilization of network resources. Th...
Article
The wireless sensor networks incorporated with multitude of distributed autonomous sensors with the potency of monitoring any changes that is physical or environmental, faces few challenges due to its distributed nature and the limited battery availability. The challenges incurred result with delay in the transmission, dynamic topology changes, and...
Article
Full-text available
The location predictions of the nodes are the key issues in mobile environment. The applications like video sharing, voice over IP and other online applications offer better results with stable nodes. In mobile scenario, connectivity and quality of service are critical issues. To overcome these issues dynamic overlay approaches are proposed in this...
Data
Full-text available
Over the Internet today, computing and communications environments are signi ficantly more complex and confusion than classica l di stributed systems, lacking any centralized organization or hierarchi cal control. Heuristic algorithm is used to maintaining a topology in wireless peer to peer networks. Here the topology of the Mobile Ad Hoc Netw ork...
Data
Full-text available
Autonomous Vehicle Navigation is a dream which will come to reality in near future. "Autonomous "refers to the capability of a vehicle to navigate by itself without human aid. Vehicles with build in computing system which performs real time calculations based on environmental inputs will come into existence. Vehicles will be able to adapt themselve...
Data
Full-text available
The objective of the paper is to analysis the connectivity performance of wireless network with new centralized and distributed network architecture. The problems in the wireless networks are finding a path to destination, connectivity maintenance and estimation of node positions. To solve these issues two algorithms are proposed, namely becon and...
Conference Paper
The objective of the paper is to implement topology control by maintain minimum degree and connectivity between nodes from the Virtual-Backbone (VB) updates. VB construction is very familiar, to reduce flooding and broadcast storm problem in wireless networks. Nodes in MANET, move anywhere at any time, it requires strong topology and connectivity m...
Article
In this paper a novel self organizing structure is proposed to improve the performance of ad hoc networks in various traffic conditions. Self organization is used to avoid node failure and link failures for huge traffic conditions. A new methodology is proposed with four different traffic environments, topologies and the entire network follows the...
Article
This paper focus on mobility management in ad hoc network using power based routing. To construct the mobility model a virtual structure is proposed and the routing is done via the same. Construction based on distance and transmission power of the node. The speed of the backbone node must be maintained as slow as possible compare to normal node in...
Article
Full-text available
Mobile Ad Hoc network is a collection of mobile nodes that are arbitrarily located in such a manner that the interconnections between nodes are capable of dynamically changing on a continual basis. Reliable transport protocols such as TCP are tuned to perform well in traditional wired networks where packet losses occur mostly because of congestion....
Conference Paper
Constructing a virtual backbone (VB) has been widely used to reduce the communication overhead. Previous research works emphasize on constructing the virtual backbone and do not consider the local reconstruction of virtual backbone with less control overhead and balanced manner. In this paper, we propose a VB local reconstruction algorithm which is...

Questions

Question (1)
Question
Why Contiki OS + Cooja simulator is highly prefereble for IOT networks?

Network

Cited By