Suresh Limkar

Suresh Limkar
AISSMS Institute of Information Technology · Computer Engineering

About

26
Publications
5,248
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
85
Citations
Introduction
Skills and Expertise

Publications

Publications (26)
Chapter
In today’s world, steganography is achieved through various different factors like LSB replacement, DCT, etc., in various forms. In which the embedding of the data was used to be successful but at the cost of degrading the quality of the file behind which a secret message was embedded. Earlier techniques used were only for a particular subdomain li...
Chapter
Detecting the road condition is a very important task nowadays. There is an alarming increase in the number of vehicles so a number of accidents also have increased in turn. This paper shows a unique way to detect the potholes using an Arduino-based sensing module and android smartphone. It also does an important task of finding the appropriate way...
Chapter
Cloud computing is the best way for storing and computing data over an internet. Data can be shared in the form of texts, images, audio, and video. Sharing data securely over internet is a key issue. Cloud computing faces serious issues like security, integrity, and confidentiality of data. The most popular existing techniques for achieving data se...
Article
“Sa_Re_Ga_Ma_Pa_Da_Ni_Sa” is the soul of Indian Music. As we play these 7 nodes at different frequency, different length, and at different reparations on one or more nodes, we will listen n number of feelings, expressions, and emotions. As musician can create such number of tones manually and get famous, all world remember such tone forever. As fre...
Chapter
Hyper connectivity is what the world's reality is today. The day is not far away where clients, consumers, and suppliers " go online " to work, play, or consume ; no we live in a realm where one and all is just interconnected to each other and with Internet. This new age carries with it an acceleration of formulation and disruption. It is a domain...
Article
The development of education and college expansion and consolidation in the Educational Management System has made the Course Scheduling System complex, and therefore it has become necessary to design one for development, and reuse. A Course Timetabling Problem (CTP) is an NP-hard combinatorial optimization problem which lacks analytical solution m...
Article
In real world, wireless medium is widely used among various military agents and companies. It provides various challenging features such as Its faster accessibility among wide set of users, but it is fragile by intentional interference attacks from internal adversary. These attacks can be easily launched by sending continuous radio signals or sever...
Article
Topology control mechanism plays a vital role while designing wireless sensor network and mobile ad-hoc control. Topology control mechanism should create topology with lower transmission power, sparser connectivity, with smaller node degree. Proposed paper presents analysis of different topology control mechanisms at present. Energy conservation is...
Article
There are various Iris recognition and identification schemes known to produce exceptional results with very less errors and at times no errors at all but are patented. Many prominent researchers have given their schemes for either recognition of an Iris from an image and then identifying it from a set of available database so as to know who it bel...
Article
In recent years web applications allows users to interact or collaborate with each other in a social media dialogue, in contrast to websites where very few users view the static content that was created for them. A rapidly growing trend in web applications is the development of user interfaces through Rich Internet Applications. Among other capabil...
Article
Most widely use of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. Since the development of location-based services, privacy-preserving has gai...
Article
In the last few years there has been significant growth in the wireless communications. Security issues are prime concern in wireless communication networks. In this paper analyzed and observed the performance one of the most challenging attack i.e Black hole attacks in WiMAX-WLAN interface network. Black hole attack is very important for NGN (Next...
Article
There has been a lot of related work for detecting distributed denial of service attacks (DDoS) targeted on TCP and IP Layer. But these techniques cannot handle attacks which are mainly based on application layer. The severity of application layer DDoS attack has become a major threat to network operators nowadays. In this paper we introduce a new...
Conference Paper
We propose an access control model that works like three factor authentication for getting access to our system. This system takes time and location into account to specify access control policies. We also discuss implementation techniques for location and time based policy specifications and the integration of these policies in standalone applicat...
Article
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure.Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate...
Conference Paper
A novel improved VPN (Virtual Private Network) system based on SSL (Secure Socket Layer) protocol is discussed to overwhelm the defect of traditional SSL VPN. The concept, critical technique and working process of the geo-secured SSL based VPN are presented in details because they are very important to meet enhanced security requirement which is or...
Conference Paper
This paper presents simulation of WiMAX based system under jamming. The performance of the system was found out to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system development should be focused on. In addition, from the basic theory point of view, rather surprising results were also fou...
Conference Paper
IPv6 is coming, whether we like it or not. It isn't a matter of new features or "killer applications," although those may come with time. Rather, it is the rapid depletion of the remaining IPv4 addresses that is leaving IPv6 as the only feasible alternative for the continued growth of networks beyond the next few years. Governments and service prov...
Conference Paper
Future generation networks will be characterized by variable and high data rates, quality of services, seamless mobility both within a network and between networks of different technologies and service providers. An important aspect of components in a global next generation network is standardization to allow vendor independence and interoperabilit...
Article
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate...
Article
Full-text available
We are moving towards an era where location information will benecessary for access control. The use of location information can beused for enhancing the security of an application, for criticalapplications, such as the military. A formal model for location-basedaccess control is needed that increases the security of the applicationand ensures that...
Article
IPv6 was developed to replace and improve the existing Internet Protocol (IP), the IPv4 in many ways. Among the improved areas are addressing space, routing efficiency, header format, auto-configuration, Quality-of-Service (QoS), security and mobility. Although IPv6 promises enhancements to IPv4 standards, its deployment is rather slow in India. Th...

Network

Cited By