Books by Dr. Sudesh Kumar Assistant Professor
IGI Global, 2023
Recently, a flying ad-hoc network (FANET) has been employed in modern warfare for monitoring and ... more Recently, a flying ad-hoc network (FANET) has been employed in modern warfare for monitoring and reconnaissance to produce a healthy living environment in smart cities through multiple unmanned aerial vehicles (UAVs). FANETs allow multiple UAVs to communicate in 3D space to establish an adhoc network. FANET applications, among others, can deliver cost-effective services to help future smart cities achieve their goals. However, adopting FANET technology in smart cities is difficult due to its challenges from UAV mobility, energy, and security considerations. Therefore, this study analyzed the new trends and technologies of smart city research and proposes research directions through FANET. This chapter aims to look at FANET's possible applications in smart cities and the implications and issues that come with them. Furthermore, it also goes over the current state of recent enabling technologies for FANET in order.
Advances in Intelligent Systems and Computing(AISC), 2020
Flying ad hoc networks (FANETs) have developed as an emerging technology with a number of applica... more Flying ad hoc networks (FANETs) have developed as an emerging technology with a number of applications that may have a significant impact on the society. FANET-based health monitoring, which is used for transferring data using small unmanned aerial vehicles (UAVs) as drones in 3D space, is one of the promising application under information and communication technologies for improving communication between medical professionals and patients. This planning can be improved to monitor patients using wireless body area network (WBAN) by sending the personal health information (PHI) to the healthcare center with the help of FANET. In this paper, we have proposed a framework for a health monitoring plan with the help of FANET by using WBAN technology for on-board ships, which is used to provide immediate response to on-board patients in emergency situations that are vulnerable to communication difficulties like sea and extend this planning for the on-board ships monitoring with wireless sensor network (WSN) through FANET.
IGI Global, 2018
In this chapter, the authors have introduced the use of Internet of Things (IoT) applications and... more In this chapter, the authors have introduced the use of Internet of Things (IoT) applications and services in Indian Railway Transportation System (IRTS). Railway transportation infrastructure is one of the most important factors for the development of any country. India is a developing country and we have a vision to transform India into a developed nation by 2020 using different technologies and tools. Therefore, we need to adopt smart and secure technology for advancement in each area especially in railway trans- portation for growth and betterment of the country. Further, authors has introduced Vehicular Ad-Hoc Network (VANET) concept for automatic railway gate controlling system to reduce number of accidents over railway premises and enhance the system components for the Indian railway transportation system to provide the comfort, security, safety and infotainment services to the passengers.
IGI Global, 2020
Recently, with the rapid technological advancement in communication technologies, it has been pos... more Recently, with the rapid technological advancement in communication technologies, it has been possible to establish wireless communication between small, portable, and flexible devices like Unmanned Aerial Vehicles (UAVs). These vehicles can fly autonomously or be operated without carrying any human be- ing. The workings with UAVs environment often refer to flying ad-hoc network (FANETs), currently a very important and challenging area of research. The usage of FANETs promises new applications in military and civilian areas. The data routing between UAVs also plays an important role for these real- time applications and services. However, the routing in FANETs scenario faces serious issues due to fast mobility and rapid network topology change of UAVs. Therefore, this chapter proposes a comparative study on topology-based routing protocols like AODV, DSDV, and DSR. Furthermore, investigate the performance of these different protocols for a FANETs environment based on different parameters by using the NS-2 simulator.
MADAM ID FOR INTRUSION DETECTION USING DATA MINING by Dr. Sudesh Kumar Assistant Professor
Multimedia transmission over the communication network and computer has gained importance from ma... more Multimedia transmission over the communication network and computer has gained importance from many years. Real time multimedia applications have come into existence like audio, video etc. So the congestion problem is also increasing .Congestion is really a complex problem to define. It arises when the users tries to access the same resource. Congestion is a complex problem. There are many types of techniques to control congestion but we want time sensitive, easier, fast, effective technique to control congestion. To control the problem of congestion many algorithms were designed but fuzzy logic is very easy, simple and effective way to solve the problem of congestion. For multimedia application RTCP is used with RTP and uses TCP for bidirectional client server connection. The rapid internet growth and the demand of usage of internet for time sensitive streaming applications is increasing the utilization and design of effective congestion control techniques. This paper takes the fuz...
Lecture Notes in Electrical Engineering, 2021
IEEE Access, 2021
A Flying Ad-hoc Networks (FANETs) is an autonomous technology that creates a selforganized wirele... more A Flying Ad-hoc Networks (FANETs) is an autonomous technology that creates a selforganized wireless network via Unmanned Arial Vehicles (UAVs). In this network, all UAVs can communicate within a restricted range of wireless communication in the absence of fixed infrastructure. As a result of high mobility, the limited energy, and the communication range of UAVs, network forming, and deformation between them are very frequent that causes packet delivery failure. Therefore, a stable route is always needed to ensure effective data dissemination between source and destination in FANETs. Since it has drastically changing network topology, therefore, to maintain the stable route during packet transmission, there is a need for a suitable routing protocol. This paper proposes an Optimized Location-Aided Routing (O-LAR) protocol which is the modified version of Location-Aided Routing (LAR) protocol. Our protocol's novelty comes from the fact that it established an optimal route between UAVs for information dissemination towards their respective destination UAV by considering weight function. A weighted function is used to decide the best next-hop node selection based on the parameters like residual energy, distance, and UAV movement direction. The performance of the O-LAR is evaluated mathematically and simulated through the NS-2 simulator. The empirical results attest that O-LAR improves the link duration, network lifetime, packet delivery ratio, and average throughput compared with the state-of-the-art protocols: LEPR, D-LAR, and LAR. Further, the proposed scheme reduces the number of next-hops, routing overhead and end-to-end delay compared to the state-of-the-art protocols.
International Journal of Information Technology, 2020
Recently, designing an effective routing protocol is challenging for flying ad-hoc networks (FANE... more Recently, designing an effective routing protocol is challenging for flying ad-hoc networks (FANETs) due to the versatile nature of unmanned aerial vehicles (UAVs). Position-based routing schemes are seen to be a remarkable preference for routing in FANETs due to the fact that the geographical information of UAVs is readily available. In this paper, we are interested in the modification of the location-aided routing (LAR) that we call 3D cone shaped location-aided routing (3DC-LAR) a position-based routing (PBR) protocol. In the existing LAR scheme, a route discovery process done through the concept of request zone, in which only nodes presents in the request zone will forward the route request for transmitting the data. The proposed 3DC-LAR scheme modified the definition of request zone using 3D cone shape by intermediate UAVs in FANETs environment. The simulation results reveal that the proposed 3DC-LAR scheme has contributed to lead to an improvement in the terms of routing overhead.
International Journal of Smart Vehicles and Smart Transportation, 2020
Recently, the flying ad-hoc network (FANETs) is a popular networking technology used to create a ... more Recently, the flying ad-hoc network (FANETs) is a popular networking technology used to create a wireless network through unmanned aerial vehicles (UAVs). In this network, the UAV nodes work as intermediate nodes that communicate with each other to transmit data packets over the network, in the absence of fixed an infrastructure. Due to high mobility degree of UAV nodes, network formation and deformation among the UAVs are very frequent. Therefore, effective routing is a more challenging issue in FANETs. This paper presents performance evaluations and comparisons of the popular topology-based routing protocol namely AODV and position-based routing protocol, namely LAR for high speed mobility as well as a verity of the density of UAV nodes in the FANETs environment through NS-2 simulator. The extensive simulation results have shown that LAR gives better performance than AODV significantly in terms of the packet delivery ratio, normalized routing overhead, end-to-end delay, and averag...
International Journal of Computer Applications, 2012
In any operating system, various objects are existed which are graphically shown to the users on ... more In any operating system, various objects are existed which are graphically shown to the users on his/her operating system. Each object has a security attributes that identifies its access control list. This list has an entry for each system user with access privileges. Reading the files (or all the files in a directory), writing the file or files and execute the file or files (if it is an executable file, or program) are most common privileges included. Thus, an Access Control List (ACL) is a table that tells a computer which user has to given the access rights for a particular system object, such as a file directory or individual file. Each operating system uses the access control list but in different manner. Linux operating system is based on the POSIX ACL and Windows O/S (Microsoft Windows NT/2000) is based on the ACL. This paper presents the analysis of Linux POSIX ACL and the Windows ACL, based on the various parameters.
Advances in Intelligent Systems and Computing, 2020
Flying ad hoc networks (FANETs) have developed as an emerging technology with a number of applica... more Flying ad hoc networks (FANETs) have developed as an emerging technology with a number of applications that may have a significant impact on the society. FANET-based health monitoring, which is used for transferring data using small unmanned aerial vehicles (UAVs) as drones in 3D space, is one of the promising application under information and communication technologies for improving communication between medical professionals and patients. This planning can be improved to monitor patients using wireless body area network (WBAN) by sending the personal health information (PHI) to the healthcare center with the help of FANET. In this paper, we have proposed a framework for a health monitoring plan with the help of FANET by using WBAN technology for on-board ships, which is used to provide immediate response to on-board patients in emergency situations that are vulnerable to communication difficulties like sea and extend this planning for the on-board ships monitoring with wireless sensor network (WSN) through FANET.
ICIC Express Letters, 2022
Road accidents are a major cause of causalities, and approximately 0.15
million people died in ro... more Road accidents are a major cause of causalities, and approximately 0.15
million people died in road accidents in India yearly. An intelligent transportation system must possess and improve the comfort and safety of drivers and pedestrians that
VANET can achieve. It has become necessary to implement VANET in India to reduce
high casualties and provide a comfortable journey. The relevance of VANET on Indian roads must be tried before execution indeed. Vehicles perform routing functionality
to deliver data; therefore, routing algorithms play a crucial role in VANET for message dissemination on time. VANETs routing is one of those challenges which required
specialized protocols. The work presented in this paper shows the simulation results of
AODV and DSDV routing protocols on important routing metrics such as packet delivery
ratio, throughput, and average end-to-end delay. To simulate a real traffic environment,
the authors have taken a map of Jaipur city, India, from OpenStreetMap and used the
Simulation of Urban Mobility as a traffic simulator and network simulator NS-2.35 for
AODV and DSDV routing protocols performance evaluation on the realistic city traffic
environment.
IEEE Access, 2021
A Flying Ad-hoc Networks (FANETs) is an autonomous technology that creates a self-organized wirel... more A Flying Ad-hoc Networks (FANETs) is an autonomous technology that creates a self-organized wireless network via Unmanned Arial Vehicles (UAVs). In this network, all UAVs can communicate within a restricted range of wireless communication in the absence of fixed infrastructure. As a result of high mobility, the limited energy, and the communication range of UAVs, network forming, and deformation between them are very frequent that causes packet delivery failure. Therefore, a stable route is always needed to ensure effective data dissemination between source and destination in FANETs. Since it has drastically changing network topology, therefore, to maintain the stable route during packet transmission, there is a need for a suitable routing protocol. This paper proposes an Optimized Location-Aided Routing (O-LAR) protocol which is the modified version of Location-Aided Routing (LAR) protocol. Our protocol’s novelty comes from the fact that it established an optimal route between UAVs for information dissemination towards their respective destination UAV by considering weight function. A weighted function is used to decide the best next-hop node selection based on the parameters like residual energy, distance, and UAV movement direction. The performance of the O-LAR is evaluated mathematically and simulated through the NS-2 simulator. The empirical results attest that O-LAR improves the link duration, network lifetime, packet delivery ratio, and average throughput compared with the state-of-the-art protocols: LEPR, D-LAR, and LAR. Further, the proposed scheme reduces the number of next-hops, routing overhead and end-to-end delay compared to the state-of-the-art protocols.
Recently, designing an effective routing protocol is challenging for flying ad-hoc networks (FANE... more Recently, designing an effective routing protocol is challenging for flying ad-hoc networks (FANETs) due to the versatile nature of unmanned aerial vehicles (UAVs). Position-based routing schemes are seen to be a remarkable preference for routing in FANETs due to the fact that the geographical information of UAVs is readily available. In this paper, we are interested in the modification of the location-aided routing (LAR) that we call 3D cone shaped location-aided routing (3DC-LAR) a position-based routing (PBR) protocol. In the existing LAR scheme, a route discovery process done through the concept of request zone, in which only nodes presents in the request zone will forward the route request for transmitting the data. The proposed 3DC-LAR scheme modified the definition of request zone using 3D cone shape by intermediate UAVs in FANETs environment. The simulation results reveal that the proposed 3DC-LAR scheme has contributed to lead to an improvement in the terms of routing overhead.
IGI Global, 2020
Recently, the flying ad-hoc network (FANETs) is a popular networking technology used to create a ... more Recently, the flying ad-hoc network (FANETs) is a popular networking technology used to create a wireless network through unmanned aerial vehicles (UAVs). In this network, the UAV nodes work as intermediate nodes that communicate with each other to transmit data packets over the network, in the absence of fixed an infrastructure. Due to high mobility degree of UAV nodes, network formation and deformation among the UAVs are very frequent. Therefore, effective routing is a more challenging issue in FANETs. This paper presents performance evaluations and comparisons of the popular topology-based routing protocol namely AODV and position-based routing protocol, namely LAR for high speed mobility as well as a verity of the density of UAV nodes in the FANETs environment through NS-2 simulator. The extensive simulation results have shown that LAR gives better performance than AODV significantly in terms of the packet delivery ratio, normalized routing overhead, end-to-end delay, and average throughput, which make it a more effective routing protocol for the highly dynamic nature of FANETs.
International Journal of Computer Applications, 2012
In any operating system, various objects are existed which are
graphically shown to the users on ... more In any operating system, various objects are existed which are
graphically shown to the users on his/her operating system.
Each object has a security attributes that identifies its access
control list. This list has an entry for each system user with
access privileges. Reading the files (or all the files in a
directory), writing the file or files and execute the file or files
(if it is an executable file, or program) are most common
privileges included.
Thus, an Access Control List (ACL) is a table that tells a
computer which user has to given the access rights for a
particular system object, such as a file directory or
individual file. Each operating system uses the access control
list but in different manner. Linux operating system is based
on the POSIX ACL and Windows O/S (Microsoft Windows
NT/2000) is based on the ACL. This paper presents the
analysis of Linux POSIX ACL and the Windows ACL, based
on the various parameters
IJCA, 2014
The continue demands of internet and email communication has creating spam emails also known unso... more The continue demands of internet and email communication has creating spam emails also known unsolicited bulk mails. These emails enter bypass in our mail box and affect our system. Different filtering techniques are using to detect these emails such as Random Forest, Naive Bayesian, SVM and Neural Network. In this paper, we compare the different performance matrices using Bayesian Classification and Neural Network approaches of data mining that are completely based on content of emails. Proposed method are based on data mining approach, that provides an anti spam filtering technique that segregate spam and ham emails from large dataset. Methodologies that are used for the filtering methods are machine learning techniques using ANN and Bayesian Network based solutions. This approach practically applied on Trec07 dataset.
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 2013
Multimedia transmission over the communication network and computer has gained importance from ma... more Multimedia transmission over the communication network and computer has gained importance from many years. Real time multimedia applications have come into existence like audio, video etc. So the congestion problem is also increasing .Congestion is really a complex problem to define. It arises when the users tries to access the same resource. Congestion is a complex problem. There are many types of techniques to control congestion but we want time sensitive, easier, fast, effective technique to control congestion. To control the problem of congestion many algorithms were designed but fuzzy logic is very easy, simple and effective way to solve the problem of congestion. For multimedia application RTCP is used with RTP and uses TCP for bidirectional client server connection. The rapid internet growth and the demand of usage of internet for time sensitive streaming applications is increasing the utilization and design of effective congestion control techniques. This paper takes the fuzzy logic to control congestion problem. It's totally easy and faster and is based on human thinking. Fuzzy is based on the logic that takes the values between 0 and 1.It does not take the crisp values. Fuzzy logic toolbox is used in the matlab to make the effective fuzzy system. Congestion control has become an application for the fuzzy logic. In this paper we are proposing a mechanism to control congestion in streaming media applications by using fuzzy logic. Then a model has been generated by the fuzzy logic controller to control the congestion.
Conference Presentations by Dr. Sudesh Kumar Assistant Professor
Springer, Singapore., 2021
Recently, unmanned aerial vehicles (UAVs) have gained popularity in various applications such as ... more Recently, unmanned aerial vehicles (UAVs) have gained popularity in various applications such as military, commercial, and civilian domains. The communication between multiple UAVs in the sky can naturally form a flying ad hoc network (FANETs). However, due to limited energy and high mobility of UAVs, the performance of the network can degrade therefore; designing an efficient routing protocol for FANETs becomes a very challenging issue. In this paper, a new energy and direction aware location aided routing protocol (ED-LAR) has been proposed for FANETs environment, based on a utility function which considers the residual energy and movement direction of UAVs. The proposed routing scheme improves the link duration time between the UAVs as well as network lifetime by selection of best next hop among the UAVs in the route discovery process. The simulation result indicates that our scheme performs well as compared to state-of-the-art schemes.
Papers by Dr. Sudesh Kumar Assistant Professor
Transactions on Emerging Telecommunications Technologies
Flying Ad‐hoc Networks (FANETs) has recently gained significant exposure for their emerging milit... more Flying Ad‐hoc Networks (FANETs) has recently gained significant exposure for their emerging military, civil, and commercial applications. In FANETs, all Unmanned Aerial Vehicles (UAVs) can communicate within a restricted wireless communication range without fixed infrastructure. However, the highly dynamic nature of UAVs imposes a significant issue in FANET's communications. Therefore, designing an effective routing strategy is always necessary for sustaining appropriate network performance in FANETs. This paper is interested in modifying Greedy Perimeter Stateless Routing (GPSR) protocol named Utility Function based Greedy Perimeter Stateless Routing (UF‐GPSR) protocol for FANETs. The proposed approach optimizes the greedy forwarding strategy by considering multiple vital parameters of UAVs: residual energy ratio, distance degree, movement direction, link risk degree, and speed, respectively. The proposed UF‐GPSR applies the utility function on these parameters to enhance the r...
Uploads
Books by Dr. Sudesh Kumar Assistant Professor
MADAM ID FOR INTRUSION DETECTION USING DATA MINING by Dr. Sudesh Kumar Assistant Professor
million people died in road accidents in India yearly. An intelligent transportation system must possess and improve the comfort and safety of drivers and pedestrians that
VANET can achieve. It has become necessary to implement VANET in India to reduce
high casualties and provide a comfortable journey. The relevance of VANET on Indian roads must be tried before execution indeed. Vehicles perform routing functionality
to deliver data; therefore, routing algorithms play a crucial role in VANET for message dissemination on time. VANETs routing is one of those challenges which required
specialized protocols. The work presented in this paper shows the simulation results of
AODV and DSDV routing protocols on important routing metrics such as packet delivery
ratio, throughput, and average end-to-end delay. To simulate a real traffic environment,
the authors have taken a map of Jaipur city, India, from OpenStreetMap and used the
Simulation of Urban Mobility as a traffic simulator and network simulator NS-2.35 for
AODV and DSDV routing protocols performance evaluation on the realistic city traffic
environment.
graphically shown to the users on his/her operating system.
Each object has a security attributes that identifies its access
control list. This list has an entry for each system user with
access privileges. Reading the files (or all the files in a
directory), writing the file or files and execute the file or files
(if it is an executable file, or program) are most common
privileges included.
Thus, an Access Control List (ACL) is a table that tells a
computer which user has to given the access rights for a
particular system object, such as a file directory or
individual file. Each operating system uses the access control
list but in different manner. Linux operating system is based
on the POSIX ACL and Windows O/S (Microsoft Windows
NT/2000) is based on the ACL. This paper presents the
analysis of Linux POSIX ACL and the Windows ACL, based
on the various parameters
Conference Presentations by Dr. Sudesh Kumar Assistant Professor
Papers by Dr. Sudesh Kumar Assistant Professor
million people died in road accidents in India yearly. An intelligent transportation system must possess and improve the comfort and safety of drivers and pedestrians that
VANET can achieve. It has become necessary to implement VANET in India to reduce
high casualties and provide a comfortable journey. The relevance of VANET on Indian roads must be tried before execution indeed. Vehicles perform routing functionality
to deliver data; therefore, routing algorithms play a crucial role in VANET for message dissemination on time. VANETs routing is one of those challenges which required
specialized protocols. The work presented in this paper shows the simulation results of
AODV and DSDV routing protocols on important routing metrics such as packet delivery
ratio, throughput, and average end-to-end delay. To simulate a real traffic environment,
the authors have taken a map of Jaipur city, India, from OpenStreetMap and used the
Simulation of Urban Mobility as a traffic simulator and network simulator NS-2.35 for
AODV and DSDV routing protocols performance evaluation on the realistic city traffic
environment.
graphically shown to the users on his/her operating system.
Each object has a security attributes that identifies its access
control list. This list has an entry for each system user with
access privileges. Reading the files (or all the files in a
directory), writing the file or files and execute the file or files
(if it is an executable file, or program) are most common
privileges included.
Thus, an Access Control List (ACL) is a table that tells a
computer which user has to given the access rights for a
particular system object, such as a file directory or
individual file. Each operating system uses the access control
list but in different manner. Linux operating system is based
on the POSIX ACL and Windows O/S (Microsoft Windows
NT/2000) is based on the ACL. This paper presents the
analysis of Linux POSIX ACL and the Windows ACL, based
on the various parameters