Jawaharlal Nehru Technological University
Computer Science And Engineering
In the field of network security, the task of processing and analyzing huge amount of Packet CAPture (PCAP) data is of utmost importance for developing and monitoring the behavior of networks, having an intrusion detection and prevention... more
Support Vector Machines (SVM) were originally designed for binary classification. Later it was extended to multi-class classification. Various methods have been proposed to construct a multi-class aclassifier by combining binary... more
This paper deals with the optimized Multi class SVM classifier (OMSC) with Named entity extraction in cloud environment. The proposed OMSC handles with scheduling workflow in cloud computing where the data and files are transferred... more
looking at the training computational time factor. This paper presents mathematical foundation of multi-class support vector machines and the evolution of the problem formulation aiming to reduce the training time by improving the... more
Cloud computing is a model which can be used in any domain expanding from large scale enterprise to start ups to educational institutions. In the traditional way of building a site, people go for external/shared web hosting, these have... more
Dealing with high dimensional data of the form p>n for multivariate analysis of missingness is very complicated. It arises in many fields mainly in social science, economics and medical study; genome is an example for that where is to... more
- by vijay suresh
This document describes the organizational structure of Team Tau along with project completion plans. Team and individual responsibilities, deliverables, risk management, and schedule management are detailed in this document.
Communication in a Mobile ad hoc network is accomplished in a multi-hop fashion wherein the nodes themselves act as routers as well as source. MANET is vulnerable to a variety of insider as well as outsider attacks because of it's... more
Most of the existing security mechanisms for detecting the packet droppers in a mobile ad hoc network generally detect the adversarial nodes performing the packet drop individually wherein false accusations upon an honest node by an... more
Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the... more
Malicious packet drop attack over the data plane in a MANET involves malicious nodes dropping the data packets after the route formation. In this paper, a security mechanism has been proposed to detect those nodes which exhibit the... more
Mobile ad hoc networks are open networks which are infrastructure less, decentralized and formed spontaneously resulting in a lot of security vulnerabilities. Reliable data delivery from a source node to a destination node requires a path... more
Dishonest recommenders can have an impact upon the trust management framework of a mobile ad hoc network through the launch of an on-off attack pattern which involves periodic good behaviors so as to evade detection and avoid the trust... more
—A mobile ad hoc network is a spontaneous self-organized infrastructure-less network wherein the networking activities like routing and data transmission are carried on by the nodes themselves in a collaborative manner. However, since... more
Machine learning (ML) is a rising field. Machine learning is to find patterns automatically and reason about data.ML enables personalized care called precision medicine. Machine learning methods have made advances in healthcare domain.... more
With the technological advances in ICT people are migrating to urban areas. Urbanization becomes a global phenomenon. By 2030, 60% of the population will live in urban. Development of smart cities is inevitable. Cyber Physical Systems... more
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment... more
The early diagnosis of diabetes helps in avoiding the major risks associated with the disorder. The proposed research involves the design of a machine learning pipeline which generates the most representative feature subset of minimal... more