Senthilkumar Mathi
YOU?
Author Swipe
View article: Federated Learning-Based Parent Selection in Low Power and Lossy Networks to Enhance Energy Efficiency
Federated Learning-Based Parent Selection in Low Power and Lossy Networks to Enhance Energy Efficiency Open
View article: An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications
An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications Open
The increasing use of the internet has led to a growing number of security threats.Computers, smartphones, smartwatches, and other mobile devices associated with the internet face different threats and exploits.In those cases, different se…
View article: Guard: Graph-Based Utility for Adversarial Ransomware Detection Using Structural and Behavioural Characteristics
Guard: Graph-Based Utility for Adversarial Ransomware Detection Using Structural and Behavioural Characteristics Open
View article: Beyond Sensors: IntelliSignal’s Map-Integrated Intelligence in Traffic Flow Optimization
Beyond Sensors: IntelliSignal’s Map-Integrated Intelligence in Traffic Flow Optimization Open
The burgeoning growth of vehicular traffic, fuelled by rapid urbanization and an ever-expanding population, has resulted in congested road networks. Traditional and sensor-based adaptive traffic light management systems have shown commenda…
View article: A New Approach to Road Incident Detection Leveraging Live Traffic Data: An Empirical Investigation
A New Approach to Road Incident Detection Leveraging Live Traffic Data: An Empirical Investigation Open
Accidents can have a significant impact on road safety and the efficiency of transport. With the ever-increasing number of vehicles on the road, it is crucial to quickly detect and respond to such events to decrease the impact. The current…
View article: An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures
An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures Open
A great venue for communication amongst regular people is the internet.Many efficient communication methods are available online, such as email, mailing lists, discussion forums, chat services, online conferencing, and blogs.Social network…
View article: Cluster Ensemble Method and Convolution Neural Network Model for Predicting Mental Illness
Cluster Ensemble Method and Convolution Neural Network Model for Predicting Mental Illness Open
One out of every four individuals have a diagnosable mental disease in a given year. Social media is an excellent way for people to communicate and engage, as it reflects their emotions, moods, and thoughts. As a result, machine learning a…
View article: An Experimental Investigation on Unsupervised Text Summarization for Customer Reviews
An Experimental Investigation on Unsupervised Text Summarization for Customer Reviews Open
People generally turn to websites such as Yelp to find reviews for the food/restaurant before trying it first-hand. However, some reviews are so long and ambiguous that users get confused about whether the review appreciates or disparages …
View article: Lane clearance approach for emergency vehicles in highways network
Lane clearance approach for emergency vehicles in highways network Open
The steady rise in the number of vehicles in modern urban areas and poor conformance to traffic laws (or rules) lead to avoidable commute delays and traffic jams. Also, there is an increased likelihood of road accidents requiring immediate…
View article: Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of things Open
The article exposes a smart device designed for mitigating the coronavirus disease (COVID-19) risk using the internet of things. A portable smart alerting device is designed for ensuring safety in public places which can alert people when …
View article: Design and Implementation of Message Communication to Control Traffic Flow in Vehicular Networks
Design and Implementation of Message Communication to Control Traffic Flow in Vehicular Networks Open
Nowadays on the road, the number of vehicles has been increasing rapidly. The road traffic congestions are posturing severe hitches owing to the inadequate ability of road networks and irregular on-route procedures in most of the towns and…
View article: Preventing Denial-of-service in Next Generation Internet Protocol Mobility
Preventing Denial-of-service in Next Generation Internet Protocol Mobility Open
Internet Protocol version 6 (IPv6) is a next-generation internet protocol that is devised to replace its predecessor, the IPv4. With the benefit of ample address space, flexible header extensions and its many specific features, IPv6 is the…
View article: AN ENHANCED BINDING UPDATE SCHEME FOR NEXT GENERATION INTERNET PROTOCOL MOBILITY
AN ENHANCED BINDING UPDATE SCHEME FOR NEXT GENERATION INTERNET PROTOCOL MOBILITY Open
In recent years, the usage of mobile devices has become essential for people, both for business and for their daily activities. The mobile devices can get services directly from their home network and from other correspondent devices regar…
View article: Investigation of Next Generation Internet Protocol Mobility-Assisted Solutions for Low Power and Lossy Networks
Investigation of Next Generation Internet Protocol Mobility-Assisted Solutions for Low Power and Lossy Networks Open
With the phenomenal increase of computing devices, especially the low powered mobile devices created many new requirements for traditional networking protocols and standards. The IPv6 was introduced as the solution for addressing requireme…
View article: Integrating Non-linear and Linear Diffusion Techniques to Prevent Fault Attacks in Advanced Encryption Standard to Enhance Security of 4G-LTE Networks
Integrating Non-linear and Linear Diffusion Techniques to Prevent Fault Attacks in Advanced Encryption Standard to Enhance Security of 4G-LTE Networks Open
Long term evolution based fourth generation (4G) mobile technology has provided a platform for fast and efficient wireless communication. The advanced encryption standard (AES) is one of the three cryptographic algorithms used in 4G networ…
View article: Investigation of Home Agent Load Balancing, Failure Detection and Recovery in IPv6 Network-based Mobility
Investigation of Home Agent Load Balancing, Failure Detection and Recovery in IPv6 Network-based Mobility Open
Mobile IPv6 came as an extensively acknowledged technology to support mobility in networks. Home agents are in charge for the registration of mobile devices and act as a key entity for the tunneling of data packets to the corresponding reg…
View article: Extensible Markup Language Databases: A Study
Extensible Markup Language Databases: A Study Open
Recent years have perceived a theatrical increase in the fame and acceptance of XML - eXtensible Markup Language. This impulsive growth is determined by its ability to offer a standardized, extensible means of involving semantic content wi…
View article: Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme
Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme Open
The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such…
View article: Integrating Dynamic Architecture with Distributed Mobility Management to Optimize Route in Next Generation Internet Protocol Mobility
Integrating Dynamic Architecture with Distributed Mobility Management to Optimize Route in Next Generation Internet Protocol Mobility Open
Increasing population of mobile users has lead to the demand of higher mobility support. Many protocols have been standardized for mobility management such as Mobile Internet Protocol version 6, hierarchical mobile IPv6 and proxy mobile IP…
View article: A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment
A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment Open
Usage of wireless networks among the users is apparently high. But, efficiency of the network gets decreased because of the challenges in the network. In proxy mobile IPv6 (PMIPv6), the message exchange for location update by any mobile de…