V. Mohanraj

V. Mohanraj
Ramakrishna Mission Vidyalaya · department of Pysics

Doctor of Philosophy

About

46
Publications
2,832
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
137
Citations
Introduction
Skills and Expertise

Publications

Publications (46)
Article
A catastrophic epidemic of Severe Acute Respiratory Syndrome-Coronavirus, commonly recognised as COVID-19, introduced a worldwide vulnerability to human community. All nations around the world are making enormous effort to tackle the outbreak towards this deadly virus through various aspects such as technology, economy, relevant data, protective ge...
Article
Modern organizations are keen to work towards their customer needs. To achieve this, analyzing their activities and identifying their interest in any entity becomes important. Every user has been identified as the most important factor in point of organization, and they never give up even a single user. Several approaches have been discussed earlie...
Article
Wireless Sensor Network (WSN) is most vulnerable to routing attacks which affects the confidentiality and integrity services of the data transmitted between any nodes. Many research efforts have been taken to propose secure routing schemes for improving the data security against routing attacks in WSN. The existing secure routing schemes are not ab...
Article
Full-text available
Deep neural network training involves multiplfe hyperparameters which have an impact on the prediction or classification accuracy of the model. Among all the hyperparameters, learning rate plays a key role in training the network to achieve results effectively. Several researchers have attempted to design a learning rate scheduler to find an optima...
Article
Full-text available
In intrusion detection, approaches incorporated with data mining become interesting nowadays, in particular the associative classification which is a hybrid technique which uses pruning measure. Although the full rules set is not intended for precise classification, the rules have been used effectively by classifiers that have been built in previou...
Article
Full-text available
Machine learning process is an important part in intrusion detection system (IDS) and plays an essential role in security information. Analysts operate IDS for the study of server logs or packets of data to identify network traffic malware. IDS automates this process with machine learning‐based techniques that allow packet detection on a continuous...
Article
Full-text available
A major concern in wireless sensor network (WSN) is energy efficiency as they utilize small sized batteries, which can neither be replaced nor be recharged. Hence, there are many research efforts in designing energy efficient hierarchical clustering model. Most of the hierarchical models have created improper clusters which induces increased commun...
Article
Full-text available
The modern wireless sensor network has great impact in the development of various domains of applications. The presence of malicious nodes introduces various threats and challenges to the network services. Different algorithms have been proposed towards the data security but not achieved the expected performance. Towards performance hike, a novel t...
Article
Full-text available
Increasing utilization of wireless sensor networks Leads scarcity problems in spectrum allocation channels. The development of cognitive radio networks over wireless spectrum technology based on both licensed and unlicensed user. The maximum interference of users are mitigated to use unlicensed bandwidth. Due the high interference of bandwidth shar...
Article
Full-text available
In wireless sensor networks, sensor nodes are distributed in different geographically dispersed areas, sink nodes are used for sensing data and sink nodes are used for data collected from different sensor nodes. Therefore, data collection is a key issue in wireless sensor networks. In addition to computational overhead, many challenging security is...
Chapter
In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriv...
Article
There has been a major and rising interest in India for increasing vaccination rate among peoples to make the nation healthier and safer. In this paper, a new hybrid deep learning model is proposed to predict and target vaccination rates in the less immunized regions. The Rank-Based Multi-Layer Perceptron (R-MLP) hybrid deep learning framework uses...
Article
Full-text available
The authors have retracted this article [1] as it overlaps significantly with a previously published article by Aboul-Dahab et al. [2]. All authors agree with this retraction.
Article
Hearing The adaptive filters for biomedical and communication application needs new adaptation methodology and new architecture to meet the standards of the contemporary technology. The paper presents a new method based on Robust mixed norm (RMN) algorithm and Ant Bee Colony optimization in VLSI architecture for adaptive filter. A method is propose...
Article
Full-text available
Wireless Sensor Networks has been the most interesting field in the collecting data from remote area where human cannot enter or monitor it has been most useful in many ways but the main problem is that sensor are powered by small battery power which makes us change the sensor more frequently to increase the performance of the network several routi...
Article
The Data storage Model has been the significant research due to some issues of traffic and attacking systems, and there are numerous methodologies has been communicated about for the effect of data storage and data distributions, but suffer from the exactness and time complicated issues. We propose a novel approach which performs Data Consistency M...
Article
Intrusion Detection Systems (IDS) is a software or device used to monitor a system or network for malicious activity. Thus, effective intrusion detection of different attacks. Existing methods of studies prove value of data mining methods in Intrusion Detection Systems (IDS). We focus on improving intrusion detection rate of IDS using Data Mining t...
Article
The Hydrodynamic characteristics has been considered for routing in Wireless Sensor Networks by various researchers and presented several methods. The flow and friction based routing approaches would produces sustainable results but would not improve the QoS. To improve the performance of F2VHDR (Flow -Flow-Friction-Velocity Based Hydro Dynamic Rou...
Article
The Filter Bank Multicarrier (FBMC), one of the multi-carrier modulation technique are subjected to extreme intensities of Peak to Average Power Ratio (PAPR). Moreover, the FBMC is a firm user, like the waveform-centred framework in the unconventional wireless communication frameworks, such as the 5G telecommunication system. This system framework...
Article
In any correspondence framework, the emphasis is on assessing the channel drive reaction to recover the transmitted information flag precisely at the recipient’s end. The Constrained Pattern Extension (CPE) plot gives successful methods for foreshorten the peak-to-average power ratio (PAPR) without the requirement for side data. In these proposed c...
Article
Minimum Exposure Problem (MEP) has become one of the most important issues in WSN as it affects the coverage quality measurement to a greater extent. Recently, MEP issues have been dealt by Physarum Optimization Algorithm (POA). Nevertheless, this method ends with the less scope in precision faults. Along with these issues, the necessity for comput...
Article
Full-text available
Recommenders utilize the knowledge discovery-based methods for identifying information required by the user. The recommender system faces some serious challenges in recent years to access exponentially increasing information due to high number of Web site users. Some of the challenges posed in this respect are: The system should assure high-quality...
Article
The surfactant based synthesis route is the ligend based aqueous method using to Ultrasonic wave irradiation to form the confined shape of Cadmium sulfide (CdS) nanoparticles. The effect of different weight percentage of polyvinyl alcohol (PVA) in the preparation of CdS nanoparticles is studied. The surfactant PVA is highly influenced on particle s...
Article
Cadmium sulfide (CdS) nanoparticles are prepared through different potential of hydrogen (pH) ranging from 8 to 12 at constant frequency ultrasonic wave irradiation. Sodium hydroxide (NaOH) was preferred as the pH modifier. The effect of pH variation on the structural, optical and electrical properties of CdS particles was studied. The particle siz...
Article
The mixed phase CdS and NiS nanoparticles are prepared by adopting ultrasonic wave irradiation method under different doping concentration of Ni in CdS. The well defined nano spheres are obtained during this synthesis process. The predicted particle sizes from X-ray diffraction (XRD) analysis are found to lie in the range between 37 and 49 nm. The...
Article
Indium oxide nanoparticles were synthesized by a co-precipitation method using the basic raw materials like Indium (III) Chloride and the precipitating reagent as Ammonium hydroxide. The formation of Indium oxide is highly dependent on temperature. The morphology, structural, particle size, optical and electrical properties of In2O3 nanoparticles w...
Article
Full-text available
The simple co-precipitation method and ultrasonic wave irradiation method for the preparation of Cadmium Sulfide nanoparticles are discussed. The spherical shaped CdS nanoparticles are formed by simple co-precipitation method and the larger agglomeration is observed in between these spherical particles. The ultrasonic wave irradiation method has a...
Article
Online recommendation system is the modern software system used in all the e-commerce sites to capture the user intent and recommend the web pages that contain user expected information. The important challenges for such a system must include a need of being self-adaptive because the needs for online users may change dynamically. Classifier plays a...
Article
In wireless sensor network, dynamic cluster-based routing approach is widely used. Such practiced approach, quickly depletes the energy of cluster heads and induces the execution of frequent re-election algorithm. This repeated cluster head re-election algorithm increases the number of advertisement messages, which in turn depletes the energy of ov...
Article
Every web user has different intent when accessing the information on website. The primary goal of recommendation system is to anticipate the user intent and recommend the web pages that contain user expected information. Effective recommendation of web pages involves two important challenges: accurately identifying the user intent and predict the...
Article
Problem statement: Every web user has different intent when accessing the information on website. The primary goal of recommendation system is to anticipate the user intent and recommend the web pages that contain user expected information. Effective recommendation of web pages involves two important challenges: accurately identifying the user inte...
Article
In Wireless Sensor Network, dynamic cluster based routing protocol approach is widely used. Such practiced approach, quickly depletes the energy of cluster heads and induces the execution of frequent re-election algorithm. This repeated cluster head re-election algorithm increases the number of advertisement messages which in turn depletes the ener...
Article
A big challenge for the web master of any e-commerce website is to match user needs and keep them continuously to browse their site. It is easy for any unsatisfied user to reach out the counterpart site in a single click. Many Web usage mining methods were adopted to work on web server log and capture the future browsing pattern of user. However, t...
Article
The World Wide Web is continuously growing and become de facto place to conduct online business. In the current internet world, peoples are more attracted towards participating in the e-commerce sites. The real challenge for the web master of any such website is to find the users need in advance and provide the resources pages that keep them intere...
Article
In Wireless Sensor Network, dynamic cluster based routing protocol approach is mostly used. In this approach, most frequently cluster reelection algorithm is performed due to the energy depletion of cluster heads. This repeated cluster head reelection increases the number of advertisement messages which in turn depletes the energy of overall sensor...
Conference Paper
A real world challenging task for Web master of a Web site is to match the user needs and keep their attention in their Web site. Because, it's easy for the Web users to reach out the counterpart sites by a single click. So, only option for Web master is to provide the pages by capturing the intuition of their user. Web master should use the WUM me...
Conference Paper
In the current age of recession, human resource department of every organization is facing a real challenging task of recruiting right talent peoples who can do the project in different problem domain and complete it within timeline. The main responsibility of any HR personnel is to propose right talent pool to the interviewers to save their time i...
Conference Paper
Recent Internet traffic measurement shows that the majority of the TCP flows are short lived. Use of short flow highest priority scheduling provides the performance improvement in the internet traffic. However, long lived flows competing against the short flows starve at some point. We propose a novel two class Queue State Packet Scheduling mechani...
Conference Paper
In Wireless Sensor Network, dynamic cluster based routing protocol approach is mostly used. In this approach, cluster reelection algorithm is most frequently performed due to the energy depletion of cluster heads. This repeated cluster head reelection increases the number of advertisement messages which in turn depletes the energy of overall sensor...

Network

Cited By

Projects

Project (1)
Project
To prepare a eco and enviroimental friendly nanoparticles.