Priti MaheshwaryRabindranath Tagore University (Formerly known as AISECT University) Bhopal · CSE
Priti Maheshwary
PhD in Computer Application
About
74
Publications
95,672
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
924
Citations
Publications
Publications (74)
UAVs are flying in the air at different speeds and continuously forwarding the collected information to other UAVs or IoT devices in FANET. UAVs are playing an important role in data collection from places where humans can’t reach them easily. The UAVs are intelligent devices, and these devices have sufficient bandwidth and memory for data forwardi...
In recent years, machine learning (ML) has shown a significant impact in tackling various complicated problems in different application domains, including healthcare, economics, ecological, stock market, surveillance, and commercial applications. Machine Learning techniques are good enough to deal with a wide range of data, uncover fascinating link...
Solid waste management is a significant challenge in the development of smart cities. Existing approaches for solid waste monitoring are often time‐consuming and resource intensive. Therefore, this study proposes a novel approach to solid waste monitoring that utilizes drone technology. The proposed method enables the efficient identification and c...
Nanomaterials are finding increasingly diverse medical uses as technology advances. Researchers are constantly being introduced to new and improved methods, and these applications see widespread use for both diagnostic and therapeutic purposes. Early disease detection, efficient drug delivery, cosmetics and health care products, biosensors, miniatu...
Background:
Understanding complex systems is made easier with the tools provided by the theory of nonlinear dynamic systems. It provides novel ideas, algorithms, and techniques for signal processing, analysis, and classification. Presently, these ideas are being applied to the investigation of how physiological signals evolve.
Objective:
The stu...
The recursive network design used in this paper to monitor traffic flow ensures accurate anomaly identification. The suggested method enhances the effectiveness of cyber attacks in SDN. The suggested model achieves a remarkable attack detection performance in the case of distributed denial-of-service (DDoS) attacks by preventing network forwarding...
Biomedical applications coupled with IoT advancements help to bridge the gap between the physical and digital worlds, creating a hyper-connected society where objects are utilized not only to share data but are also becoming increasingly intelligent and aware of their context. This book takes a look into applications of the Internet of Things (IoT)...
A Greedy Perimeter Coordinator Routing and Mobility Awareness (GPCR-MA) vehicular routing is a widely accepted routing protocol for VANET (Vehicular Ad hoc Network). The insufficiency of security measures in the operating design of GPCR-MA gives possible exposure to a Sybil attack. During a Sybil attack, the attacker (usually a vehicle) collects da...
CloudOps is cloud operations and it is used for identifying and defining appropriate standards for IT services. It is very supportive to make the pipeline and optimize cloud and IT operations. CloudOps provide network combinations, maintains security, provides performance, proper device management, help desk, and some other tasks that are used by c...
Science, Technology, and Innovation policies boost the human development, economic
growth, and social progress of a country. Technological changes improve innovation
paradigms. This chapter describes the 1958 SPR (Scientific Policy Resolution), 1983 TPS
(Technology Policy Statement), 2003 STP (Science and Technology Policy, and 2013 STIP
(Science T...
This work utilizes a novel image encryption technique for block image encryption with the help of nonlinear 2D chaotic map and DNA sequences (NL2DCM-DNA). 2D chaotic map has generated the several key sequences for encryption, and DNA rules are applied to perform fast block encryption of image. Nonlinearity of 2D chaotic map and complexity of DNA se...
Industry 4.0 is an abbreviation of the fourth industrial revolution, which is the effect of digital technologies such as the Internet of Things (IoT), Robotics, Cloud Computing, Additive Manufacturing, Artificial Intelligence (AI), and others. Technological changes like result,
artifacts, knowledge, and expertise are becoming obsolete at an exponen...
COVID-19 is a new disease, caused by the novel coronavirus SARS-CoV-2, that was firstly delineated in humans in 2019. Coronaviruses cause a range of illness in patients varying from common cold to advanced respiratory syndromes such as Severe Acute Respiratory Syndrome (SARS-CoV) and Middle East Respiratory Syndrome (MERS-CoV). The SARS-CoV-2 outbr...
In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in v...
Internet of Things in Biomedical Applications presents the current research areas in the Internet of Everything (IoE) applications for medical patient observation, monitoring, and symptomatic treatments. The book takes a broad area approach for both human-related parameters as well as the technical aspects of cloud, big data, security, networking a...
Disclosed are a multi-objective optimization system and method for a node capture attack in a wireless sensor network (WSN). The method captures sensor nodes in the WSN through a collection module. The method includes a step of creating a key-path matrix, sensor node-key matrix, key-contribution matrix, sensor node - path matrix, and sensor node-li...
Wireless sensor network (WSN) is a group of a huge number of low price, low control, and self-organizing specialized sensor nodes. WSN is very much vulnerable to different types of physical attacks due to limited resource capacity and screened to external atmosphere for circulating data. The node capture attack is one of the major attacks in WSN in...
With increasing population, urbanization, energy, transportation, and agricultural developments, pollution is degrading the environment with ever-increasing pace. The degradation in the environment due to pollution can easily affect the quality of human life by increasing health issues. Therefore, in order to avoid health risks due to the polluted...
This paper proposes an innovative image cryptosystem algorithm using the properties of the block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated and pixel substitution is performed by using nonlinear 4D logistic map, then encryption is performed by using DNA rules to ensure that the different blocks are encrypted s...
Software methodologies are the life line of software industry. A suitable software methodology is in demand by software
industry for their current needs to provide solutions in current era for the success of software project management. In the current era the
Internet of Things (IoT) is the emerging technology a step towards the dream of Smart Worl...
Recently, it is one of the concerns to protect multimedia applications with storage of images being an important security issue. The process used to encrypt data and protect these multimedia applications is encryption. Present cryptography provides crucial techniques in order to secure information and these encryption techniques are utilized for pr...
With increasing population, urbanization, energy, transportation, and agricultural developments, pollution is degrading the environment with ever-increasing pace. The degradation in the environment due to pollution can easily affect the quality of human life by increasing health issues. Therefore, in order to avoid health risks due to the polluted...
The weather forecast is an important factor in daily life routine. Earlier the predictions were made on the bases of stars, galaxy things behavior etc. Here in this research paper, the weather forecast is the Internet of things (IoT) based where the sensor sends the value to the cloud with the help of Microcontroller where the analytics are done an...
Atechnological revolution Internet of things (IoT) describes the forthcoming
of communications and computing. Development of IoT from wireless sensors to
nanotechnology in many important fields depends on dynamic technical innovation.
In IoT, each object will be tagged for identifying, monitoring, automating and controlling.
This research paper des...
Because of the cumulative number of attacks in the networks, equipping the network with an IDS (intrusion detection system). The capability of the networks should be deal enough to apportion with the fast velocity of today's era along with the large network system. The research is regarding the distributed intrusion detection system which accomplis...
The present invention is related to vehicle network routing method of controlling a vehicle ad-hoc network. More particularly, the present invention is related to proposing a protocol of routing which more effective to greedy perimeter coordinator routing in vehicle ad-hoc network. The present invention is related to method of Vehicle Ad-hoc Networ...
Wireless sensor network (WSN) (Kaur and Kang in Int J Comput Sci Eng IJCSE 6(4):157–162, 2016, [1]) is susceptible to different types of physical attacks. It is collection of tiny-sized sensor nodes. The reason behind these attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is s...
Vehicular ad hoc network systems are highly important experiments because of enthusiastically exchanging information and symmetric relations of systems. The best transmitting device supports a successful arrangement of networks. This article presents GPCR-MA mobility aware routing protocol concepts based on the Gauss Markov Mobility and Freeway Mod...
Overcoming security issues are one of the main challenges for the Internet of things (IoT). There are different security issues that are related to IoT in the context of sensor nodes, system network, IoT cloud, IoT backend database, IoT applications, system software, and firmware. IoT applications have real-time requirements and expected to deliver...
A VANET is observed an adequate solution to the cooperative driving among communicating cars on road. Organizing road network and testing these networks, typically known as (VANETs), contains a high cost in real world, so the simulation is valuable alternative in research. Our investigation demonstrates the comparison between the GPCR-MA routing ne...
The concept of ‘Smart’l has made sensors very much prominent in one’ls life. In this smart world, Wireless sensor network (WSN) [1]is another area of interest. There are good side and bad side of coin when dealt with WSN. Good side of WSN has made its presence felt in various areas but bad side has made it susceptible to different types of physical...
In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in v...
The term VANET developed regularly synonymous with additional broad term IVC (inter-vehicle communication), while the focus on remains feature of spontaneous networking system, less on infrastructure use such as RSUs and cellular networks. VANET conventions have high experiments because of powerfully trading topologies and symmetric connections fro...
Fingerprint classification decreases the number of possible matches in automated fingerprint identification systems by categorizing fingerprints into predefined classes. Support vector machines are widely used in pattern classification and have produced high accuracy when performing fingerprint classification. In order to effectively apply Support...
Abstract- Vehicular Ad-hoc Network (VANET) implies gathering of the remote vehicle which forming an impermanent system with no concentrated Road Side Unit (RSU). VANET conventions have high experiments because of powerfully trading topologies and symmetric connections of systems. A best reasonable and operative directing mechanism supports to enhan...
Water source is necessary and an important factor in agricultural and farm production and is a key of our quality of life as well. Monitoring water level of a water source, such as water tank or borewell etc., plays a key role in agricultural. For example if a water level drops below the threshold level for pumping in a borewell, the pump motor may...
Internet of Things (IoT) is an emerging technology that is making our world smarter.
In order to deal with disaster effectively, it is very important to identify the disaster scale and provide the accurate information about the site of disaster in real time. Sharing information on disaster situation helps to control and prevent the causalities during disaster. The Internet is a necessary tool to share the vital information about th...
Internet of Things (IoT) is an innovative idea which will transform the real world objects into intelligent virtual objects in the near future. The IoT enables user to identify everything in the world uniquely, take control over identified things (e. g. Lights, TV, Door Locks, Microwave, Coffee Maker etc.) and keep informed about the state of thing...
Since early 90s Information and Communication Technologies (ICTs) are playing a focal role in the development process of any country. In today's life Technology became a part of life and livelihood. In this digital era, India is using ICTs to promote their development programs as well as reaches to the poor to strengthen their lively hood. Here the...
Wave Cluster is a grid based clustering approach. Many researchers have applied wave cluster technique for segmenting images. Wave cluster uses wave transformation for clustering the data item. Normally it uses Haar, Daubechies and Cohen Daubechies Feauveau or Reverse Bi-orthogonal wavelets. Symlet, Biorthogonal and Meyer wavelet families have been...
The remote sensing images are increasing day by day therefore storage and retrieval of these images is of significant importance. In this paper a prototype model for retrieval of remote sensing images on the basis of color moment and gray level co-occurrence matrix feature is developed and different vegetation index feature is extractor as color, t...
Grouping images into semantically meaningful categories using low-level visual feature is a challenging and important problem in content-based image retrieval. The groupings can be used to build effective indices for an image database. Digital image analysis techniques are being used widely in remote sensing assuming that each terrain surface categ...
The remote sensing image archive is increasing day by day. The storage, organization and retrieval of these images poses a challenge to the scienitific community. In this paper we have developed a system for retrieval of remote sensing images on the basis of color moment and gray level co-occurrence matrix feature extractor. The results obtained th...
Information extraction in remote sensing images has become an important area of research. Now daypsilas remote sensing images are used extensively for finding patterns of interest. The remote sensing data is processed automatically by computer and/or manually interpreted by humans, and are used in agriculture, geology, oceanography, meteorology, en...
Questions
Question (1)