• Home
  • Rajesh Manoharan
Rajesh Manoharan

Rajesh Manoharan
Sanjivani College Of Engineering · Computer Science and Engineering

Professor

About

87
Publications
19,337
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,582
Citations
Citations since 2017
62 Research Items
1467 Citations
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
Additional affiliations
August 2020 - present
Sanjivani College of Engineering
Position
  • Professor (Associate)
July 2017 - present
Raga Academic Solutions
Position
  • Research Associate
July 2012 - July 2019
St.Peter's University
Position
  • Researcher
Education
June 2012 - April 2017
St.Peter's University
Field of study
  • Wireless sensor networks
August 2010 - May 2012
Arunai College of Engineering
Field of study
  • Computer Science and Engineering
August 2002 - April 2006
Kamban Engineering College
Kamban Engineering College
Field of study
  • Computer Science and Engineering

Publications

Publications (87)
Article
Full-text available
The goal of 5G wireless networks is to address the growing need for network services among users. User equipment has progressed to the point where users now expect diverse services from the network. The latency, reliability, and bandwidth requirements of users can all be classified. To fulfil the different needs of users in an economical manner, wh...
Article
Full-text available
Peer-to-peer energy (P2P) energy trading is the vital paradigm of power systems operation and control. P2P energy trading is a concept of buying and selling the generated electrical energy from the own renewable energy resources to the micro-grid connected houses, offices and factories. P2P energy trading also allows the users to decide to whom the...
Article
In this modern world, the need for compact, lightweight, and flexible devices to modernize and monitor the health in busy day-to-day life is increasing drastically. In connection to this, a flexible and compact antenna using a flexible PDMS substrate is proposed in this research with high radiation efficiency and gain. These antennas can be integra...
Article
Full-text available
Medical image fusion is a synthesis of visual information present in any number of medical imaging inputs into a single fused image without any distortion or loss of detail. It enhances image quality by retaining specific features to improve the clinical applicability of medical imaging for treatment and evaluation of medical conditions. A big chal...
Article
Background In recent years, deep learning techniques have dramatically enhanced mobile robot sensing, navigation, and reasoning. Due to the advancements in machine vision technology and algorithms, visual sensors have become increasingly crucial in mobile robot applications in recent years. However, due to the low computing efficiency of current ne...
Article
Full-text available
In recent decades, the technique of the Internet of Things (IoT) and cloud computing are widely integrated together. The resource-limited nature of IoT devices creates a requirement for middleware to manage a high volume of data in real-time. In such types of systems, the capability to add or remove services based on the application requirement wit...
Article
Full-text available
The DC Microgrid sounds familiar in recent days for its independent grid operation and energizing small communities without relying on the central grid. The sudden change in energy demand in the microgrid can negatively impact its performance and operation. Energy management is the only optimal solution to the energy production of microgrids. This...
Article
Today COVID-19 pandemic articulates high stress on clinical resources around the world. At present, physical and viral tests are slowly emerging, and there is a need for robust pandemic detection that biomedical sensors can aid. The utility of biomedical sensors is correlated with the medical instruments with physiological metrics. These Biomedical...
Article
Full-text available
This paper presents a novel and generic framework for the recognition of emotions using human body expression like head, hand and leg movements. Whole body movements are among the main visual stimulus categories that are naturally associated with faces and the neuro scientific investigation of how body expressions are processed has entered the rese...
Article
The present trend of automation and data interchange in industrial technology is known as Industry 4.0. Industry 4.0, is altering its next generation of distribution networks by making them more responsive and efficient. When implementing IoT devices in an Industry 4.0 scenario, there are various issues, mainly due to reduced IoT nodes or devices w...
Article
Full-text available
Retraction: “Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs” by authors Subbiah Balaji, Mohammad S. Obaidat, Sriram Suthir, Manoharan Rajesh and Koneri Chandrasekaran Suresh, IET Netw. 2021;1–7. https://doi.org/10.1049/ntw2.12026. The above article...
Article
Full-text available
Retraction: “Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems” by authors Ganesh Babu R, Mohammad S. Obaidat, Amudha V, Rajesh Manoharan and Sitharthan R, IET Netw. 2021;1–11. https://doi.org/10.1049/ntw2.12027. The above article, published online on 5 May...
Article
With the global rollout of fifth-generation (5G) communication networks, the development on sixth-generation (6G) communication network has begun. The sixth generation (6G) technology is an emerging technology that will meet the ever-increasing demands of evolving industrial services and applications. This technology consists of varied number of he...
Article
Full-text available
The pandemic situation has pretentious the habitual life of the human, it also has surpassed the regional, social, business activities and forced human society to live in a limited boundary. In this paper, the application of the internet of things (IoT) and machine learning (ML) based system to combat pandemic situation in health care application h...
Article
Coronavirus Disease 19 (COVID-19) is a highly infectious viral disease affecting millions of people worldwide in 2020. Several studies have shown that COVID-19 results in a severe acute respiratory syndrome and may lead to death. In past research, a greater number of respiratory diseases has been caused by exposure to air pollution for long periods...
Article
Full-text available
Abstract Piezoelectric Energy Harvesting Systems play a vital role in energizing microelectronic devices with the low‐frequency operation. Here, a novel piezoelectric energy harvesting device has been developed for low power electronic devices. The developed Piezoelectric Energy Harvesting Systems consists of a cantilever with poles projecting outw...
Article
Full-text available
In the current scenario most of the business enterprises are running through web applications. But the major drawback is that they fail to provide a secure environment. To overcome this security issue in web applications, there are many vulnerability detection tools are available at present. But these tools are not proactive and consistent as it do...
Article
Breast cancer (BC) is the most commonly found disease among women all over the world. The early diagnosis of breast cancer can potentially reduce the mortality rate and increase the chances of a successful treatment. Paper focuses on proposing a methodology to conduct early diagnosis of breast cancer using the Internet of Things and Machine Learnin...
Article
Full-text available
The manufacturing industries are in a compelling situation to maintain the quality of product as well as better and trustful service in order to keep their sustenance. But most of the manufacturers are not able to meet out the global competence due to lack of constructive conceptual model of Knowledge Management Practice (KMP) in their organization...
Article
Attributable to the modernization of Artificial Intelligence (AI) procedures in healthcare services, various developments including Support Vector Machine (SVM), and profound learning. For example, Convolutional Neural systems (CNN) have prevalently engaged in a significant job of various classificational investigation in lung malignant growth, and...
Article
Increased utilisation of naturally available energy sources in a distribution system (DS) is customary in recent years. These RES are intermittent in nature and impact the system performance significantly. In this paper, a methodology is utilised for bidding the lowest price to the consumer based on the availability of RES. A physical communication...
Article
Purpose Corona Virus Disease 2019 (COVID-19) is a deadly virus named after severe acute respiratory syndrome coronavirus 2; it affects the respiratory system of the human and sometimes leads to death. The COVID-19 mainly attacks the person with previous lung diseases; the major cause of lung diseases is the exposure to nitrogen dioxide (NO2) for a...
Article
Full-text available
Piezoelectric Energy Harvesting Systems (PEHS) play a vital role in energizing microelectronic devices with the low-frequency operation. In this paper, a novel piezoelectric energy harvesting device has been developed for low power electronic devices. The developed PEHS consists of a cantilever with poles projecting outwards and the cantilevers one...
Article
Full-text available
Torque ripple and harmonics in Permanent Magnet Synchronous Motor (PMSM) cause negative impacts on its speed control and overall efficiency. In this paper, an Elman Neural Network (ENN) controlled Feedback Linearization based Direct Torque Control strategy (FLDTC) has been proposed to mitigate torque ripples and undesirable harmonics of PMSM. In th...
Article
Web service is the newest development in the contemporary system that transforms the web from a group of information into a disseminated computational device. This article proposes a new web service where the users are given the option to select the service that satisfies the quality of service (QoS) requirements from the set of discovered services...
Article
In recent years, EEG-based navigation and communication systems for differentially enabled communities have been progressively receiving more attention. To provide a navigation system with a communication aid, a customized protocol using thought evoked sensor potentials has been proposed in this research work to aid the differentially enabled commu...
Article
In this study, a study has been conducted to compare the performance of different heuristic optimisation algorithms, such as distributed swarm optimised clustering (DSOC), distributed firefly optimised clustering (DFOC) and distributed jumper firefly optimised clustering (DJFOC) techniques used for the dynamic clustering. In DSOC, every group of cl...
Article
Full-text available
Administration request in cellular radio networks is for the most part heterogeneous and non-uniform, prompting lopsided topologies. This many-sided quality along with the various radio access advances, the radio channel and down to earth imperatives, make the radio network arranging process a testing job that generally rules out instinctive arrang...
Article
Full-text available
Internet of Things (IOT) can be defined as a thing or device, physical and virtual, connected and communicating together, and integrated to a network for a specific purpose. The IoT uses technologies and devices such as sensors, RFID (radio frequency identification) and actuators to collect data. IoT is not only about collecting data generated from...
Article
Full-text available
-Big Data is the era of data processing. Big Data is the Collate's observer data sets that are complicated that traditional data-processing abilities.There are the various challenges include data analysis, capture the data, curation, search, sharing, stowage, transmission, visualization, and privacy violations. A large collections of petabytes of d...
Article
Full-text available
The objective of the work is to propose a formal technique encompassing the logic and the illogic involved in the security of information science. The received or collected information about the existing or past security incidents in business processes is to be identified for their correctness and preciseness. The emphasis on various segments of th...
Article
Full-text available
In the recent days, there are rapid advancements in the web 2.0 contents (texts, images and videos) and in the computational complexity. The next generation in computing is predictably in the mobile arena. A lot of applications are being developed to cater the needs of mobile device users. This research is based on the question: How can we benefit...
Article
Full-text available
The objective of the research work is to propose a strategic reasoning for information security Frame work against various attacks in business organization. The earlier information security research works and incidents include the activation of appropriate safeguards; the prevention and reduction of risks and recovery from impacts were considered f...
Article
Full-text available
The study of different age people from different lifestyle, what all symptoms came for the disease, at what stage, what measures taken to get rid of, later changes, what were the side effects, how it decreased or increased will help in future prediction of possible chance for illness in others. A System which having the above details, suggestions f...
Article
A mobile ad-hoc network (MANET) consists of set of mobile nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in MANETs possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need for these security issues i...
Article
Full-text available
Data transfer is very essential in the wireless sensor networks. The communications between the nodes are important because the loss of any data or changes created in the data may affect the entire progress. During the processing of the nodes for optimization the entire values obtained must be used and then obtain the best values out of them. Monit...
Article
Full-text available
Arrangement Z-Source organize, Associate in Nursing growth of the favored origination of Z-source dc interface, was initially anticipated for upgrading the yield voltage of energy electronic inverters. all through this paper, idea is reached out on a three-stage roundabout lattice converter. The converter relies upon the ultra-meager lattice topolo...
Article
Full-text available
In Wireless Ad Hoc Networks (WANETs), tasks are conducted based on the cooperation of nodes in the networks. However, since the nodes are usually constrained by limited computation resources, selfish nodes may refuse to be cooperative. Reputation system is one of the main solutions to the node non cooperation problem. A reputation system evaluates...
Article
Recently, a standout amongst the most vital difficulties is the security of cloud computing. In contrast, the security of access is essential and private information in banks, organizations and so forth is completely crucial. Security is the fundamental aim of any innovation during which unapproved interloper can't get to your record or data in the...
Article
Full-text available
Information conglomeration procedures have been generally utilized as a part of wireless sensor systems (WSNs) to take care of the vitality imperative issues of sensor hubs. They can preserve the huge measure of vitality by decreasing information bundle transmission costs. Be that as it may, numerous information accumulation applications require se...
Article
The idea of Learning Health Systems (LHS) is picking up force as more electronic medicinal services information turns out to be progressively available. The center thought is to empower gaining from the aggregate involvement of a care conveyance arrange as recorded in the observational information, to iteratively enhance mind quality as care is bei...
Article
Full-text available
Here, AES, RSA, Blowfish and ECC encryption techniques are considered. From the security model, the most data secure in blowfish encryption contrasted with different procedures in view of encryption and decryption time with data.
Article
Full-text available
Wireless ad hoc networks are going to be an emerged multi-hop communication exploit among mobiles to deliver data packets. The special characteristics of Wireless network make the communication link between mobiles to be unreliable. To handle high mobility and environmental obstacles, most of physical routing protocols do not consider stable links...
Article
Full-text available
The sentiment classification aims to identify the sentiment polarity of the reviews as positive or negative based on the subjective information expressed in the reviews. Generally, all learning techniques require labeled data to train a classifier. However, obtaining labeled data in every domain is impractical and also assigning label for each doma...
Article
Full-text available
Predicting Congestion Control in Heterogeneous Wireless Ad Hoc Networks is a complex task because heterogeneous resource nodes are involved in a distributed environment. Long execution workload on an Adhoc network is even harder to predict due to heavy load fluctuations. In this paper, we use Bloom filter to minimize the prediction errors. We apply...
Article
Full-text available
Cloud computing brings for higher instructive foundation an extensive variety of advantages with new abilities to join in the instructive procedure. Notwithstanding, the cloud administrations are helpless against an assortment of security difficulties. One of the key difficulties that instructive establishments confront in embracing Cloud computing...
Article
Full-text available
Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. We are gradually more dependent upon such information and communications inf...
Technical Report
Full-text available
Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. We are gradually more dependent upon such information and communications inf...
Conference Paper
We define a consistently neighbor detection layer for mobile ad-hoc networks and present two algorithms that implement this layer as a service with varying progress guarantees. Our algorithms are implemented atop an abstract MAC layer [13], which deals with the lower level details of collision detection and contention. Specifically, we first descri...
Article
Full-text available
The current development of IP based 4G system is the Long Term Evolution-Advanced (LTE-A), which focuses on the integration of existing wireless technologies in order to provide an extended service for all mobile users. LTE-A system uses the Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol to mitigate the security issues an...
Article
Full-text available
Wireless ad hoc networks are an emerging multi-hop communication system among mobiles to deliver data packets. The special characteristics of wireless networks make the communication link between mobiles unreliable. To handle high mobility and environmental obstacles, most physical routing protocols do not consider stable links during packet transm...
Article
Full-text available
In Wireless Ad-hoc Networks (WANETs) obstruction occurs due to the packet loss and it can be successfully reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. In this paper, we propose an agent based congestion control technique for WANETs. In our technique, the information about n...
Article
Full-text available
The fast developments of information and communication technology (ICT) today not only have an impact on the world of industry, but also in the world of education. In the world of education, the usage of ICT is expected to improve the performance, especially the performances of students with regard to their academic matters. This study aims, first...
Article
Full-text available
AdHoc network that has wide promise and potential with various applications has aroused the common interesting of academic researchers and industrial circle. Firstly, this paper has mainly described the characteristic and the content of congestion control in AdHoc network. Then, A careful analysis of the implementation of the congestion control alg...
Article
Full-text available
As wireless adhoc network is often deployed in a hostile environment, nodes in the networks are prone to major-range breakdown, resulting in the network not working normally. In this case, a useful Reinstallation scheme is needed to restore the error network timely. Most of alive Reinstallation schemes believe more about the number of deployed node...
Article
Wireless ad hoc networks are an emerging multi-hop communication system among mobiles to deliver data packets. The special characteristics of wireless networks make the communication link between mobiles unreliable. To handle high mobility and environmental obstacles, most physical routing protocols do not consider stable links during packet transm...
Article
Full-text available
In most distributed systems, naming of nodes for low-level communication leverages topological location (such as node addresses) and is independent of any application. In this paper, we investigate an emerging class of distributed systems where low-level communication does not rely on network topological location. Rather, low-level communication is...
Article
Full-text available
Adhoc sensor networks are ad hoc networks that are characterized by decentralized structure and ad hoc deployment. Sensor networks have all the basic features of ad hoc networks but to different degrees – for example, much lower mobility and much more stringent energy requirements. We analyze the current state of research and evaluate open issues i...
Article
Full-text available
Major application of Software as a Service is a Multiple-Clients data management. Data management service is offered by a third party vendor to manage the outsourced data with the aid of Multiple-clients database system. The Multiple-clients database system needs a high quality database pattern to have high execution, low space requirements and exc...
Article
Full-text available
Congestion control in wireless networks has been extensively investigated over the years and several schemes and techniques have been developed, all with the aim of improving performance in wireless network. With the rapid expansion and implementation of wireless technology it is essential that the congestion control problem be solved. This paper w...
Article
Full-text available
Congestion control is the major problem in wireless Ad hoc network especially in broadcasting the packet. In heterogeneous network data should be reliable and secure the end to end delay of data transmission. So we propose to control the congestion and error in network using Forward Error Correction (FEC) technique, which will avoid the error. Feed...
Article
Full-text available
Congestion control is the major problem in wireless Ad hoc network especially in broadcasting the packet. In heterogeneous network data should be reliable and secure the end to end delay of data transmission. So we propose to control the congestion and error in network using Forward Error Correction (FEC) technique, which will avoid the error. Feed...
Article
Full-text available
One of the major challenges in wireless sensor networks (WSNs) research is to prevent traffic congestion without compromising with the energy of the sensor nodes. Network congestion leads to packet loss, throughput impairment, and energy waste. To address this issue in this paper, a distributed traffic-aware routing scheme with a capacity of adjust...
Article
Full-text available
Routing protocols for wireless ad-hoc networks face the challenge of dynamic topology due to node mobility, limited channel bandwidth and low transmission power. Both proactive and reactive protocols have trade-off in them. Proactive protocols have large overhead and less latency while reactive protocols have less overhead and more latency. The ZRP...
Article
Full-text available
In Wireless Ad Hoc Networks (WANETs), tasks are conducted based on the cooperation of nodes in the networks. However, since the nodes are usually constrained by limited computation resources, selfish nodes may refuse to be cooperative. Reputation system is one of the main solutions to the node non cooperation problem. A reputation system evaluates...
Article
Full-text available
One of the major challenges in wireless sensor networks (WSNs) research is to prevent traffic congestion without compromising with the energy of the sensor nodes. Network congestion leads to packet loss, throughput impairment, and energy waste. To address this issue in this paper, a distributed traffic-aware routing scheme with a capacity of adjust...
Article
Full-text available
Congestion is said to occur in the network when the resource demands exceed the capacity and packets are lost due to too much queuing in the network. During congestion, the network throughput may drop to zero and the path delay may become very high. A congestion control scheme helps the network to recover from the congestion state. In fact, securit...