ZHLS Security Enhancement by integrating SHA256, AES, DH in MANETS

BB Sundaram, MK Mishra… - Journal of Physics …, 2021 - iopscience.iop.org
In this century fast growing and progressive change of technology, Mobile Ad hoc Network
(MANET) which is a no centralized structure plays great role. The routing protocol in this …

Novel detection of accurate spam content using logistic regression algorithm compared with Gaussian algorithm

KV Bhavitha, SJJ Thangaraj - 2022 International Conference …, 2022 - ieeexplore.ieee.org
Aim: To detect the spam content over the internet and social media using Logistic
Regression algorithm over Gaussian algorithm. Methods and Materials: Detection of spam …

[PDF][PDF] Comprehensive Learning on Characteristics, Applications, Issues and Limitations of Manets

SJJ Thangaraj, A Rengarajan… - International Journal of …, 2019 - researchgate.net
This paper is aimed at giving an insight view over the research domains across various
levels of Mobile Ad-hoc Networks. A mobile ad-hoc sensor network follows a broader …

Reducing Task Scheduling Time in Cloud Computing using Novel Improved Whale Optimization Algorithm over Ant Colony Algorithm

PS Priya, SJJ Thangaraj - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
To decrease Cloud Computing Task Scheduling Time utilising Novel Improved Whale
Optimisation Algorithm over Ant Colony Algorithm. A Novel Improved Whale Optimisation …

[PDF][PDF] A survey on contemporary MANET security: approaches for securing the MANET

R Patel, P Kamboj - Int J Eng Technol, February, 2017 - researchgate.net
The wireless mobile nodes are capable to build spontaneously temporary wireless network
in absence of infrastructure like AP, Router etc. and they act as a wireless router. Due to this …

[PDF][PDF] Shortest and efficient multipath routing in mobile ad hoc network (manet)

S Sultanuddin, MA Hussain - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: In this paper, our work is intended to improve the nodes mobility within the
network, as it is still in development stage. Methods/Statistical Analysis An automatic system …

Innovative Facial Expression Identification for Criminal Identification using Unsupervised Machine Learning and Compare the Accuracy with CNN Classifiers

B Vaishali, SJJ Thangaraj - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Aim: To recognize human face expressions accurately using machine learning algorithms
and compare the image features against the criminal records. Methods and Materials: The …

Smart Phone based Microscopic Image Acquisition and Quantifying System for Detecting Dengue

MM Ramakrishna, V Karthikeyan - … International Conference on …, 2022 - ieeexplore.ieee.org
Mobile phones with high end configurations are now a found day-to-day use everywhere
even in the rural side. At the same time, Healthcare sectors are extending their technological …

[PDF][PDF] Exploration of security threat analysis in Wireless Mobile Adhoc Network

I Vijaya, AK Rath, B Puthal - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Abstract Objective: Mobile Adhoc Networks (MANETs) due to its principle characteristics of
network infrastructure, limited resources and transmission range are more vulnerable to …

[PDF][PDF] Failure Node Detection and Recovery in Wireless Sensor Networks

SJJ Thangaraj, MR Khanna, R Balamanigandan - researchgate.net
A Wireless Sensor Network may often consist of hundreds of distributed sensors. Our goal is
to formulate wireless sensor networks (WSNs) fault identification problem in terms of pattern …