Shibin David

Shibin David
Karunya University | KITS · Department of Computer Science and Engineering

B.Tech (IT) ., M Tech (NIE)., M.B.A., (Ph.D).,

About

37
Publications
23,045
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
179
Citations
Introduction
Currently, I work in the area of mobile security, cryptographic techniques and intrusion detection. Also, I am interested in testing, malware analysis and debugging.
Additional affiliations
August 2015 - March 2021
Karunya University
Position
  • Professor (Assistant)
August 2013 - March 2021
Karunya University
Position
  • Professor (Assistant)
Education
July 2011 - May 2013
Karunya University
Field of study
July 2007 - May 2011
Karunya University
Field of study
  • Information Technology

Publications

Publications (37)
Article
Thermosyphon operating with refrigerants are usual choices for low temperature heat transfer applications. The present study focuses on the performance evaluation of thermosyphons employing refrigerant R134a and Al2O3/R134 as working fluids, with novel designs to enhance the heat transfer. Two designs are proposed in the study in which eight intern...
Poster
Full-text available
Article
Security plays a major role in most of the fields including pharmaceutical field. Authorization and Authentication are the key concepts in supporting notable areas of the cyber-health world. HIPAA's (Health Insurance Portability and Accountability Act) ultimate focus is to preserve the privacy of the health records of an individual without disclosi...
Article
Full-text available
A wireless network is used to connect various wired organizational structures and provide connectivity within the organization for employees to move freely by avoiding the hurdle of a physical network. Maintenance of WLAN security is crucial to an organization because WLANs are directly linked to the core organization’s network. In this paper, we r...
Article
The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elli...
Article
Performance of Al2O3/R134a nanorefrigerant based modified thermosyphon predicted by random forest algorithm is presented in this paper. Three types of thermosyphon namely conventional, thermosyphon with internal fin and thermosyphon with internal fin and internal cut were used in the study. The input parameters to the random forest algorithm are he...
Article
Full-text available
Thermosyphon is an effective heat transfer device which is widely used all over the world for its ease of use, feasible with different environmental challenges. In this research article, the experimentation with different boiling point of working fluids water and R134a has been used in modified thermosyphon. The modified thermosyphon comprises of t...
Article
Full-text available
In the fast-moving world, it is noticed that every industry is developing gradually, but recently it is identified that the use of AI has become the talk of own. Therefore, this study is focused on gathering data regarding the AI on how it has transformed the entire world’s corporate sector. The essential application AI in the business world helps...
Article
The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elli...
Article
Full-text available
Biofeedback therapy trains the patient to control voluntarily the involuntary process of their body. This non-invasive and non-drug treatment is also used as a means to rehabilitate the physical impairments that may follow a stroke, a traumatic brain injury or even in neurological aspects within occupational therapy. The idea behind this study is b...
Article
Full-text available
A shell and tube device is deployed for the applications such as oil refinery processes, chemical processes and high pressure technologies. The hot fluid flows to the tubes in the heat exchanger, and the cool fluid moves through the shell section. Hence, heat is transferred from the tube section to the shell section of the heat exchanger. This arti...
Article
The serenity of the materials can be reflected from the load applied over them to extract its strength and scope. Perhaps the tender nature of the materials and its behavior such as ductility, hardness, impact resistance, the measurement of such behavior remains complex. To replace the efforts of conventional machine elements and man-power over the...
Article
The serenity of the materials can be reflected from the load applied over them to extract its strength and scope. Perhaps the tender nature of the materials and its behavior such as ductility, hardness, impact resistance, the measurement of such behavior remains complex. To replace the efforts of conventional machine elements and man-power over the...
Article
Wireless sensor network comprises of scattered sensors to sense, monitor and aggregate the sensed information. The major issue in a wireless sensor network is to balance network load and to maintain less energy consumption where multi parent crossover method is considered. Multiparent cross over method will generate offspring from parent and aims a...
Article
In India, Agriculture is considered as the backbone of the country where 70 percent of the economy relies upon it. It requires the involvement of many natural resources including land, water, and energy. An astonishing factor is that 60 percent of the water diverted or pumped for irrigation is wasted via runoff into waterways or evapotranspiration....
Chapter
Security is very crucial to enhance the privacy and secrecy of the data and applications that are used in routine life. Human life, has been transformed into a much smarter one with the advent of several smart applications based on Internet of Things (IoT). The evolution of the Internet of computer to the Internet of Things was made possible by the...
Article
One of the most powerful and important tools used by the meteorologist for weather forecasting is satellite images. Satellite images have always reassured forecasters the behavior of atmosphere as they provide facts that are clear, conscience and accurate representation of how events are unfolding. From satellite images some features will be extrac...
Article
Full-text available
Mobile payment is widely used payment methodology adopted by the users in the recent days, Contactless payment is one among the technology used recently with the NFC enabled devices. Contactless payment is nothing but a secure method for customers to purchase products via smartcards by using RFID or NFC enabled device. In contactless payment syst...
Article
Full-text available
Network attacks in network traffic are vital and well known problems which can subdue the basic security concerns like confidentiality, integrity and availability of both the individuals and enterprise. In this paper, a detailed analysis of the existing intrusion detection systems is done. A Network Based Intrusion Detection System framework with e...
Article
Full-text available
Coverage and connectivity are one of the most important performance metrics in sensor networks because it reflects how well a sensor field is monitored and being able to communicate the information sensed by the sensor. We introduce the maximum coverage deployment problem in wireless sensor networks and analyze the cost efficiency, guaranteed conne...
Conference Paper
Full-text available
DDoS attacks nowadays are manoeuvred from the botnet. The traffic which is created from the botnet normally behaves as the legitimate traffic this is considered as masquerading. This masquerading now has employed in many of the cyber attacks. Moreover the format of the same attack varies from one incident to another this is considered as camouflagi...
Article
Full-text available
Network simulators are used worldwide for education, commercial and Industrial purposes to simulate any part or entire network. There are numerous network simulators used day by day. Network simulators can be used to produce an approximation result of the network, which lays foundation for real time application or implementation. Researchers are no...
Article
Network simulators are used worldwide for education, commercial and Industrial purposes to simulate any part or entire network. There are numerous network simulators used day by day. Network simulators can be used to produce an approximation result of the network, which lays foundation for real time application or implementation. Researchers are no...

Questions

Questions (8)
Question
Interested persons can approach to work with this. The writing progress is about to get completed in few days. Please approach with quick publishing SCI/ESCI journal contacts.
Question
Can anyone list the quick publishing SCI indexed journals in computer science stream please
Question
If anybody undergoes the research work in the above mentioned area, lets have a discussion and make some innovative work.
Question
Opening the forum for scholars to collaborate and work on the field of cloud storage security. Interested at hers can ping to collaborate and bring out more secure solutions
Question
Can anybody suggest some refereed journals on security on networks/cloud/pervasive computing without processing fee?
Question
Can anybody suggest some test beds / implementation tools to implement trust cubes

Network

Cited By