Papers by Ramya Shivanagu
International Journal of Scientific Research in Computer Science and Engineering
Finding an optimal collision-free route from an arbitrary point to a designated point with obstac... more Finding an optimal collision-free route from an arbitrary point to a designated point with obstacles in a given environment is essential to design an algorithm for path planning. The main goal is to search a workspace to find the shortest path within a minimal amount of time, by starting at the source point and exploring adjacent objects until the destination point is reached. This paper gives an overview of path planning algorithms like A*, D star, PRM, and RRT, which gives an optimal path to find the way in a given workspace. This paper also presents how to coalesce the Genetic Algorithm with other path planning algorithms to find an optimal path in a given workspace.
International Journal of Engineering Applied Sciences and Technology, 2020
In recent years, the Internet of Things (IOT) is getting more tractions. One of the real world ex... more In recent years, the Internet of Things (IOT) is getting more tractions. One of the real world examples of IOT is smart home. Smart home delivers home automation for installed devices at home such as lighting, air conditioning, temperature control etc. It permits the device which is connected to internet to be observed and managed at a distance by the user. Furthermore many researches on smart home concept concentrate only on some of the main feature. They still lack on the importance of using IOT i.e. providing energy efficiency, monitoring the energy usage, providing adequate security and protecting privacy. In this paper we propose a smart home automation system which consists of Raspberry pi and Node MCU to automate the system that serves as merely a switch replacement and it also records and reports important things which should be known by the owner of house. We fruitfully inspect our proposed system in a real world working condition. The interaction of the user and the system is made through Blynk application. Safety is an important measure in the house. In our paper we are focusing on two main important features firstly, designing a prototype of smart door lock system which can be used to intensify security of a door. Here we are making use of OTP based door locking technology at the door knob for automatic door lock purposes. Secondly, energy efficiency is provided by implementing an efficient system where energy consumption is monitored by recording the energy produced and consumed. I.
International Journal of Security, Privacy and Trust Management, 2013
Providing an efficient security for wireless sensor network is a crucial challenge which is made ... more Providing an efficient security for wireless sensor network is a crucial challenge which is made more difficult due to its broadcast nature and restrictions on resources such as energy, power memory usage, computation and communication capabilities. The Reactive Jammer Attack is a major security threat to wireless sensor networks because reactive jammer attack is a light weight attack which is easy to launch but difficult to detect .This work suggest a new scheme to neutralize malicious reactive jammer nodes by changing the characteristic of trigger nodes to act as only receiver. Here the current approach attempts to identify the trigger nodes using the group testing technique, which enhances the identification speed and reduces the message complexity of the status report sent periodically between the sensor nodes and the base station.
International Journal in Foundations of Computer Science & Technology, 2013
Wireless sensor networks have been widely applied to various domains such as environmental monito... more Wireless sensor networks have been widely applied to various domains such as environmental monitoring and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low network throughput because of jamming signals. Failure of data transmission in sensor networks is due to corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
IJRECE VOL. 7 ISSUE 2, 2019
It presents about the robot which is controlled over the internet through the Web Browser, where ... more It presents about the robot which is controlled over the internet through the Web Browser, where the monitoring and controlling is done by the robot for detecting and recognizing the face of staffs for comparing it with the data which is available in the integrated database and yields the result for a while who wants to access the stored data of staffs handling classes.
International Journal of Engineering Applied Sciences and Technology, 2020
In recent years, the Internet of Things (IOT) is getting more tractions. One of the real world ex... more In recent years, the Internet of Things (IOT) is getting more tractions. One of the real world examples of IOT is smart home. Smart home delivers home automation for installed devices at home such as lighting, air conditioning, temperature control etc. It permits the device which is connected to internet to be observed and managed at a distance by the user. Furthermore many researches on smart home concept concentrate only on some of the main feature. They still lack on the importance of using IOT i.e. providing energy efficiency, monitoring the energy usage, providing adequate security and protecting privacy. In this paper we propose a smart home automation system which consists of Raspberry pi and Node MCU to automate the system that serves as merely a switch replacement and it also records and reports important things which should be known by the owner of house. We fruitfully inspect our proposed system in a real world working condition. The interaction of the user and the system is made through Blynk application. Safety is an important measure in the house. In our paper we are focusing on two main important features firstly, designing a prototype of smart door lock system which can be used to intensify security of a door. Here we are making use of OTP based door locking technology at the door knob for automatic door lock purposes. Secondly, energy efficiency is provided by implementing an efficient system where energy consumption is monitored by recording the energy produced and consumed. I.
ISRONET, 2021
Finding an optimal collision-free route from an arbitrary point to a designated point with obstac... more Finding an optimal collision-free route from an arbitrary point to a designated point with obstacles in a given environment is essential to design an algorithm for path planning. The main goal is to search a workspace to find the shortest path within a minimal amount of time, by starting at the source point and exploring adjacent objects until the destination point is reached. This paper gives an overview of path planning algorithms like A*, D star, PRM, and RRT, which gives an optimal path to find the way in a given workspace. This paper also presents how to coalesce the Genetic Algorithm with other path planning algorithms to find an optimal path in a given workspace.
Wireless sensor networks have been widely applied to various domains such as environmental monito... more Wireless sensor networks have been widely applied to various domains such as environmental monitoring and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low network throughput because of jamming signals. Failure of data transmission in sensor networks is due to
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
Providing an efficient security for wireless sensor network is a crucial challenge which is made ... more Providing an efficient security for wireless sensor network is a crucial challenge which is made more difficult due to its broadcast nature and restrictions on resources such as energy, power memory usage, computation and communication capabilities. The Reactive Jammer Attack is a major security threat to wireless sensor networks because reactive jammer attack is a light weight attack which is easy to launch but difficult to detect .This work suggest a new scheme to neutralize malicious reactive jammer nodes by changing the characteristic of trigger nodes to act as only receiver. Here the current approach attempts to identify the trigger nodes using the group testing technique, which enhances the identification speed and reduces the message complexity of the status report sent periodically between the sensor nodes and the base station.
Uploads
Papers by Ramya Shivanagu
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.