
Rajesh ManoharanSanjivani College Of Engineering · Computer Science and Engineering
Rajesh Manoharan
Professor
About
87
Publications
19,337
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,582
Citations
Citations since 2017
Introduction
Additional affiliations
August 2020 - present
Sanjivani College of Engineering
Position
- Professor (Associate)
July 2017 - present
Raga Academic Solutions
Position
- Research Associate
July 2012 - July 2019
Education
June 2012 - April 2017
August 2010 - May 2012
Arunai College of Engineering
Field of study
- Computer Science and Engineering
August 2002 - April 2006
Kamban Engineering College
Field of study
- Computer Science and Engineering
Publications
Publications (87)
The goal of 5G wireless networks is to address the growing need for network services among users. User equipment has progressed to the point where users now expect diverse services from the network. The latency, reliability, and bandwidth requirements of users can all be classified. To fulfil the different needs of users in an economical manner, wh...
Peer-to-peer energy (P2P) energy trading is the vital paradigm of power systems operation and control. P2P energy trading is a concept of buying and selling the generated electrical energy from the own renewable energy resources to the micro-grid connected houses, offices and factories. P2P energy trading also allows the users to decide to whom the...
In this modern world, the need for compact, lightweight, and flexible devices to modernize and monitor the health in busy day-to-day life is increasing drastically. In connection to this, a flexible and compact antenna using a flexible PDMS substrate is proposed in this research with high radiation efficiency and gain. These antennas can be integra...
Medical image fusion is a synthesis of visual information present in any number of medical imaging inputs into a single fused image without any distortion or loss of detail. It enhances image quality by retaining specific features to improve the clinical applicability of medical imaging for treatment and evaluation of medical conditions. A big chal...
Background
In recent years, deep learning techniques have dramatically enhanced mobile robot sensing, navigation, and reasoning. Due to the advancements in machine vision technology and algorithms, visual sensors have become increasingly crucial in mobile robot applications in recent years. However, due to the low computing efficiency of current ne...
In recent decades, the technique of the Internet of Things (IoT) and cloud computing are widely integrated together. The resource-limited nature of IoT devices creates a requirement for middleware to manage a high volume of data in real-time. In such types of systems, the capability to add or remove services based on the application requirement wit...
The DC Microgrid sounds familiar in recent days for its independent grid operation and energizing small communities without relying on the central grid. The sudden change in energy demand in the microgrid can negatively impact its performance and operation. Energy management is the only optimal solution to the energy production of microgrids. This...
Today COVID-19 pandemic articulates high stress on clinical resources around the world. At present, physical and viral tests are slowly emerging, and there is a need for robust pandemic detection that biomedical sensors can aid. The utility of biomedical sensors is correlated with the medical instruments with physiological metrics. These Biomedical...
This paper presents a novel and generic framework for the recognition of emotions using human body expression like head, hand and leg movements. Whole body movements are among the main visual stimulus categories that are naturally associated with faces and the neuro scientific investigation of how body expressions are processed has entered the rese...
The present trend of automation and data interchange in industrial technology is known as Industry 4.0. Industry 4.0, is altering its next generation of distribution networks by making them more responsive and efficient. When implementing IoT devices in an Industry 4.0 scenario, there are various issues, mainly due to reduced IoT nodes or devices w...
Retraction: “Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs” by authors Subbiah Balaji, Mohammad S. Obaidat, Sriram Suthir, Manoharan Rajesh and Koneri Chandrasekaran Suresh, IET Netw. 2021;1–7. https://doi.org/10.1049/ntw2.12026.
The above article...
Retraction: “Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems” by authors Ganesh Babu R, Mohammad S. Obaidat, Amudha V, Rajesh Manoharan and Sitharthan R, IET Netw. 2021;1–11. https://doi.org/10.1049/ntw2.12027.
The above article, published online on 5 May...
With the global rollout of fifth-generation (5G) communication networks, the development on sixth-generation (6G) communication network has begun. The sixth generation (6G) technology is an emerging technology that will meet the ever-increasing demands of evolving industrial services and applications. This technology consists of varied number of he...
The pandemic situation has pretentious the habitual life of the human, it also has surpassed the regional, social, business activities and forced human society to live in a limited boundary. In this paper, the application of the internet of things (IoT) and machine learning (ML) based system to combat pandemic situation in health care application h...
Coronavirus Disease 19 (COVID-19) is a highly infectious viral disease affecting millions of people worldwide in 2020. Several studies have shown that COVID-19 results in a severe acute respiratory syndrome and may lead to death. In past research, a greater number of respiratory diseases has been caused by exposure to air pollution for long periods...
Abstract Piezoelectric Energy Harvesting Systems play a vital role in energizing microelectronic devices with the low‐frequency operation. Here, a novel piezoelectric energy harvesting device has been developed for low power electronic devices. The developed Piezoelectric Energy Harvesting Systems consists of a cantilever with poles projecting outw...
In the current scenario most of the business enterprises are running through web applications. But the major drawback is that they fail to provide a secure environment. To overcome this security issue in web applications, there are many vulnerability detection tools are available at present. But these tools are not proactive and consistent as it do...
Breast cancer (BC) is the most commonly found disease among women all over the world. The early diagnosis of breast cancer can potentially reduce the mortality rate and increase the chances of a successful treatment. Paper focuses on proposing a methodology to conduct early diagnosis of breast cancer using the Internet of Things and Machine Learnin...
The manufacturing industries are in a compelling situation to maintain the quality of product as well as better and trustful service in order to keep their sustenance. But most of the manufacturers are not able to meet out the global competence due to lack of constructive conceptual model of Knowledge Management Practice (KMP) in their organization...
Attributable to the modernization of Artificial Intelligence (AI) procedures in healthcare services, various developments including Support Vector Machine (SVM), and profound learning. For example, Convolutional Neural systems (CNN) have prevalently engaged in a significant job of various classificational investigation in lung malignant growth, and...
Increased utilisation of naturally available energy sources in a distribution system (DS) is customary in recent years. These RES are intermittent in nature and impact the system performance significantly. In this paper, a methodology is utilised for bidding the lowest price to the consumer based on the availability of RES. A physical communication...
Purpose
Corona Virus Disease 2019 (COVID-19) is a deadly virus named after severe acute respiratory syndrome coronavirus 2; it affects the respiratory system of the human and sometimes leads to death. The COVID-19 mainly attacks the person with previous lung diseases; the major cause of lung diseases is the exposure to nitrogen dioxide (NO2) for a...
Piezoelectric Energy Harvesting Systems (PEHS) play a vital role in energizing microelectronic devices with the low-frequency operation. In this paper, a novel piezoelectric energy harvesting device has been developed for low power electronic devices. The developed PEHS consists of a cantilever with poles projecting outwards and the cantilevers one...
Torque ripple and harmonics in Permanent Magnet Synchronous Motor (PMSM) cause
negative impacts on its speed control and overall efficiency. In this paper, an Elman Neural
Network (ENN) controlled Feedback Linearization based Direct Torque Control strategy (FLDTC) has been proposed to mitigate torque ripples and undesirable harmonics of PMSM. In th...
Web service is the newest development in the contemporary system that transforms the web from a group of information into a disseminated computational device. This article proposes a new web service where the users are given the option to select the service that satisfies the quality of service (QoS) requirements from the set of discovered services...
In recent years, EEG-based navigation and communication systems for differentially enabled communities have been progressively receiving more attention. To provide a navigation system with a communication aid, a customized protocol using thought evoked sensor potentials has been proposed in this research work to aid the differentially enabled commu...
In this study, a study has been conducted to compare the performance of different heuristic optimisation algorithms, such as distributed swarm optimised clustering (DSOC), distributed firefly optimised clustering (DFOC) and distributed jumper firefly optimised clustering (DJFOC) techniques used for the dynamic clustering. In DSOC, every group of cl...
Administration request in cellular radio networks is for the most part heterogeneous and non-uniform, prompting lopsided topologies. This many-sided quality along with the various radio access advances, the radio channel and down to earth imperatives, make the radio network arranging process a testing job that generally rules out instinctive arrang...
Internet of Things (IOT) can be defined as a thing or device, physical and virtual, connected and communicating together, and integrated to a network for a specific purpose. The IoT uses technologies and devices such as sensors, RFID (radio frequency identification) and actuators to collect data. IoT is not only about collecting data generated from...
-Big Data is the era of data processing. Big Data is the Collate's observer data sets that are complicated that traditional data-processing abilities.There are the various challenges include data analysis, capture the data, curation, search, sharing, stowage, transmission, visualization, and privacy violations. A large collections of petabytes of d...
: Paper Setup must be in A4 size with Margin: Top 0.7", Bottom 0.7", Left 0.65", 0.65", Gutter 0", and Gutter Position Top. Paper must be in two Columns after Authors Name with Width 8.27", height 11.69" Spacing 0.2".
The objective of the work is to propose a formal technique encompassing the logic and the illogic involved in the security of information science. The received or collected information about the existing or past security incidents in business processes is to be identified for their correctness and preciseness. The emphasis on various segments of th...
In the recent days, there are rapid advancements in the web 2.0 contents (texts, images and videos) and in the computational complexity. The next generation in computing is predictably in the mobile arena. A lot of applications are being developed to cater the needs of mobile device users. This research is based on the question: How can we benefit...
The objective of the research work is to propose a strategic reasoning for information security Frame work against various attacks in business organization. The earlier information security research works and incidents include the activation of appropriate safeguards; the prevention and reduction of risks and recovery from impacts were considered f...
The study of different age people from different lifestyle, what all symptoms came for the disease, at what stage, what measures taken to get rid of, later changes, what were the side effects, how it decreased or increased will help in future prediction of possible chance for illness in others. A System which having the above details, suggestions f...
A mobile ad-hoc network (MANET) consists of set of mobile nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in MANETs possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need for these security issues i...
Data transfer is very essential in the wireless sensor networks. The communications between the nodes are important because the loss of any data or changes created in the data may affect the entire progress. During the processing of the nodes for optimization the entire values obtained must be used and then obtain the best values out of them. Monit...
Arrangement Z-Source organize, Associate in Nursing growth of the favored origination of Z-source dc interface, was initially anticipated for upgrading the yield voltage of energy electronic inverters. all through this paper, idea is reached out on a three-stage roundabout lattice converter. The converter relies upon the ultra-meager lattice topolo...
In Wireless Ad Hoc Networks (WANETs), tasks are conducted based on the cooperation of nodes in the networks. However, since the nodes are usually constrained by limited computation resources, selfish nodes may refuse to be cooperative. Reputation system is one of the main solutions to the node non cooperation problem. A reputation system evaluates...
Recently, a standout amongst the most vital difficulties is the security of cloud computing. In contrast, the security of access is essential and private information in banks, organizations and so forth is completely crucial. Security is the fundamental aim of any innovation during which unapproved interloper can't get to your record or data in the...
Information conglomeration procedures have been generally utilized as a part of wireless sensor systems (WSNs) to take care of the vitality imperative issues of sensor hubs. They can preserve the huge measure of vitality by decreasing information bundle transmission costs. Be that as it may, numerous information accumulation applications require se...
The idea of Learning Health Systems (LHS) is picking up force as more electronic medicinal services information turns out to be progressively available. The center thought is to empower gaining from the aggregate involvement of a care conveyance arrange as recorded in the observational information, to iteratively enhance mind quality as care is bei...
Here, AES, RSA, Blowfish and ECC encryption techniques are considered. From the security model, the most data secure in blowfish encryption contrasted with different procedures in view of encryption and decryption time with data.
Wireless ad hoc networks are going to be an emerged multi-hop communication exploit among mobiles to deliver data packets. The special characteristics of Wireless network make the communication link between mobiles to be unreliable. To handle high mobility and environmental obstacles, most of physical routing protocols do not consider stable links...
The sentiment classification aims to identify the sentiment polarity of the reviews as positive or negative based on the subjective information expressed in the reviews. Generally, all learning techniques require labeled data to train a classifier. However, obtaining labeled data in every domain is impractical and also assigning label for each doma...
Predicting Congestion Control in Heterogeneous Wireless Ad Hoc Networks is a complex task because heterogeneous resource nodes are involved in a distributed environment. Long execution workload on an Adhoc network is even harder to predict due to heavy load fluctuations. In this paper, we use Bloom filter to minimize the prediction errors. We apply...
Cloud computing brings for higher instructive foundation an extensive variety of advantages with new abilities to join in the instructive procedure. Notwithstanding, the cloud administrations are helpless against an assortment of security difficulties. One of the key difficulties that instructive establishments confront in embracing Cloud computing...
Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. We are gradually more dependent upon such information and communications inf...
Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. We are gradually more dependent upon such information and communications inf...
We define a consistently neighbor detection layer for mobile ad-hoc networks and present two algorithms that implement this layer as a service with varying progress guarantees. Our algorithms are implemented atop an abstract MAC layer [13], which deals with the lower level details of collision detection and contention. Specifically, we first descri...
The current development of IP based 4G system is the Long Term Evolution-Advanced (LTE-A), which focuses on the integration of existing wireless technologies in order to provide an extended service for all mobile users. LTE-A system uses the Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol to mitigate the security issues an...
Wireless ad hoc networks are an emerging multi-hop communication system among mobiles to deliver data packets. The special characteristics of wireless networks make the communication link between mobiles unreliable. To handle high mobility and environmental obstacles, most physical routing protocols do not consider stable links during packet transm...
In Wireless Ad-hoc Networks (WANETs) obstruction occurs due to the packet loss and it can be successfully reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. In this paper, we propose an agent based congestion control technique for WANETs. In our technique, the information about n...
The fast developments of information and communication technology (ICT) today not only have an impact on the world of industry, but also in the world of education. In the world of education, the usage of ICT is expected to improve the performance, especially the performances of students with regard to their academic matters. This study aims, first...
AdHoc network that has wide promise and potential with various applications has aroused the common interesting of academic researchers and industrial circle. Firstly, this paper has mainly described the characteristic and the content of congestion control in AdHoc network. Then, A careful analysis of the implementation of the congestion control alg...
As wireless adhoc network is often deployed in a hostile environment, nodes in the networks are prone to major-range breakdown, resulting in the network not working normally. In this case, a useful Reinstallation scheme is needed to restore the error network timely. Most of alive Reinstallation schemes believe more about the number of deployed node...
Wireless ad hoc networks are an emerging multi-hop communication system among mobiles to deliver data packets. The special characteristics of wireless networks make the communication link between mobiles unreliable. To handle high mobility and environmental obstacles, most physical routing protocols do not consider stable links during packet transm...
In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent of any application. In this paper, we investigate an emerging class of distributed systems where low-level communication does not rely on network topological location. Rather, low-level communication is...
Adhoc sensor networks are ad hoc networks that are characterized by decentralized structure and ad hoc deployment. Sensor networks have all the basic features of ad hoc networks but to different degrees – for
example, much lower mobility and much more stringent energy requirements. We analyze the current state of
research and evaluate open issues i...
Major application of Software as a Service is a Multiple-Clients data management. Data management service is offered by a third party vendor to manage the outsourced data with the aid of Multiple-clients database system. The Multiple-clients database system needs a high quality database pattern to have high execution, low space requirements and exc...
Congestion control in wireless networks has been extensively investigated over the years and several schemes and techniques have been developed, all with the aim of improving performance in wireless network. With the rapid expansion and implementation of wireless technology it is essential that the congestion control problem be solved. This paper w...
Congestion control is the major problem in wireless Ad hoc network especially in broadcasting the packet. In heterogeneous network data should be reliable and secure the end to end delay of data transmission. So we propose to control the congestion and error in network using Forward Error Correction (FEC) technique, which will avoid the error. Feed...
Congestion control is the major problem in wireless Ad hoc network especially in broadcasting the packet. In heterogeneous network data should be reliable and secure the end to end delay of data transmission. So we propose to control the congestion and error in network using Forward Error Correction (FEC) technique, which will avoid the error. Feed...
One of the major challenges in wireless sensor networks (WSNs) research is to prevent traffic congestion without compromising with the energy of the sensor nodes. Network congestion leads to packet loss, throughput impairment, and energy waste. To address this issue in this paper, a distributed traffic-aware routing scheme with a capacity of adjust...
Routing protocols for wireless ad-hoc networks face the challenge of dynamic topology due to node mobility, limited channel bandwidth and low transmission power. Both proactive and reactive protocols have trade-off in them. Proactive protocols have large overhead and less latency while reactive protocols have less overhead and more latency. The ZRP...
In Wireless Ad Hoc Networks (WANETs), tasks are conducted based on the cooperation of nodes in the networks. However, since the nodes are usually constrained by limited computation resources, selfish nodes may refuse to be cooperative. Reputation system is one of the main solutions to the node non cooperation problem. A reputation system evaluates...
One of the major challenges in wireless sensor networks (WSNs) research is to prevent traffic congestion without compromising with the energy of the sensor nodes. Network congestion leads to packet loss, throughput impairment, and energy waste. To address this issue in this paper, a distributed traffic-aware routing scheme with a capacity of adjust...
Congestion is said to occur in the network when the resource demands exceed the capacity and packets are lost due to too much queuing in the network. During congestion, the network throughput may drop to zero and the path delay may become very high. A congestion control scheme helps the network to recover from the congestion state. In fact, securit...