SH Manjula

SH Manjula
UVCE, Bangalore University · Computer Science & Engg

Ph.D Computer Science and Engg

About

105
Publications
12,225
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
316
Citations
Additional affiliations
April 2015 - May 2019
UVCE, Bangalore University
Position
  • Professor

Publications

Publications (105)
Article
Learning analytics (LA) is considered a promising field of study as it's helping to improve learning and the context in which it occurs. A learner's performance can be defined as how well students are learning in terms of knowledge and skills development and can be analyzed based on students’ outcomes and engagement in the course. We have consolida...
Chapter
E-commerce application in recent days are gaining more importance due to its worldwide services and user-friendly applications. Some of the social networking applications are being backbone of e-commerce applications help in its functioning. With this, the number of e-commerce applications are being associated with social networking site and their...
Article
Nowadays, the demand for mobile wireless communication systems has increased drastically due to its significant use for various real-time applications. This increased demand for communication causes heavy utilization of the radio spectrum to improve ubiquitous computing services. However, systems providing high-speed communication fail to achieve t...
Article
Full-text available
The demand of real-time wireless communication is increasing drastically where users demand for better Quality of Service (QoS) for various applications. In order to satisfy the communication requirement, communication spectrum must be utilized efficiently and all the available resource must be allocated appropriately. Recently, the cognitive radio...
Article
Full-text available
Cognitive Radio based network technology provides a promising solution for various types of real-time wireless communication by offering better spectrum utilization and resource allocation. Generally, the dynamic network topology, interference, channel switching and under-utilization of resource can degrade the network performance. Therefore, devel...
Article
With the advancement of Cognitive Radio Network (CRN), localization of primary users progress the improvement of network performance with respect to power adoption and reliability. Moreover, CRN localization is essential because storage energy of CR devices is limited and causes increased network lifetime. By considering these issues, we propose an...
Article
Full-text available
Social Networks is a platform which is easily accessible by normal users worldwide. Online Social Networks facilitates users online to get registered with ease of speed and create their own accounts to communicate with the social world for information gathering. This platform allows everyone to get registered online irrespective of their social beh...
Article
Full-text available
Sentiment classification is a much needed topic that has grabbed the interest of many researchers. Especially, classification of data from customer reviews on various commercial products has been an important source of research. A model called supervised dual sentiment analysis is used to handle the polarity shift problem that occurs in sentiment c...
Article
Full-text available
Video-on-demand (VoD) applications have become extensively used nowadays. YouTube is one of the most extensively used VoD application. These applications are used for various purposes like entertainment, education, media, etc., of all age groups. Earlier, these applications were supported by private data centers and application servers. Sufficient...
Article
In the cloud technology security of information is a key functionality, sharing of information in distributed storage is a provident technique. These days, the principle challenges is information security in distributed computing. To overcome this issue we proposed a novel Dynamic Privacy Aggregate Key Re-Encryption (DPAKRE) algorithm. The DPAK-RE...
Article
The rapid growth in the data storage and data processing demands the energy consumption of data centers. Recently it became a major issue in large data centers due to financial and environmental concerns. Virtual Machine (VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in clou...
Conference Paper
The rapid growth in the data storage and data processing demands the energy consumption of data centers. Recently it became a major issue in large data centers due to financial and environmental concerns. Virtual Machine (VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in clou...
Article
The Cloud computing is a rising technique which offers information sharing are more efficient, effective and economical approaches between group members. To create an authentic and anonymous information sharing, IDentity based Ring Signature (ID-RS) is one of the promising method between the groups. Ring signature conspire grants the chief or d...
Article
Cloud computing is a prominent emerging data interactive pattern, which helps in online storing the data in the cloud server. Cloud services make available for the users to get beneficiated in the form of accessing, storing data in the cloud. In large organizations, the data sharing may be in a collaborative manner and thus sharing of the data be...
Article
Full-text available
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication...
Article
Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key Aggregate cryptosystem used to...
Conference Paper
Wireless sensor networks has become envisage for various purpose in all the fields of technology. Random deployments are a fundamental crisis to realize coverage and/or connectivity in sensor networks. Path-Trace-Back protocol is proposed proficiently to preserve the data at specific geographic area coverage in a network with node mobility in natur...
Article
Full-text available
Wireless Sensor Networks have gained popularity due to their real time applications and low-cost nature. These networks provide solutions to scenarios that are critical, complicated and sensitive like military fields, habitat monitoring, and disaster management. The nodes in wireless sensor networks are highly resource constrained. Routing protocol...
Conference Paper
In large scale Wireless Sensor Network the network owner and the users of the sensor network may be different. A distributed access control module allows the users to access data from the network for which the user has privileges. The users of such a network required the privacy of their identity and access patterns from the network and other users...
Article
Full-text available
Network Lifetime is an important issue in Wireless Sensor Networks. It depends on many factors like the amount of data to be communicated, number of nodes in the network and initial energy of the sensor nodes. This paper proposes a novel routing protocol by name Trust-Based Hierarchical Routing (TBHR) protocol for multi-hop hierarchical wireless se...
Article
Wireless Sensor Networks are by its nature prone to various forms of security attacks. Authentication and secure communication have become the need of the day. Due to single point failure of a sink node or base station, mobile sinks are better in many wireless sensor networks applications for efficient data collection or aggregation, localized sens...
Conference Paper
Full-text available
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service. Congestion effects the performance metrics, namely throughput and per-packet energy consumption, network lifetime and packet delivery ratio. Reducing congestion allows better utilization of the network resources and thus enhances the Quality of Service metrics of...
Conference Paper
Association rule mining is a process of finding the frequent item sets based on the interestingness measure. The major challenge exists when performing the association of the data where privacy preservation is emphasized. The actual transaction data provides the evident to calculate the parameters for defining the association rules. In this paper,...
Article
Full-text available
Wireless Sensor Network is a set of sensors deployed in the area of interest, for the purpose of monitoring physical or environmental conditions. Due to limited battery capacity of sensors, Wireless Sensor Networks have limited lifetime. A large number of sensors deployed in a circular grid, sending the sensed data to base station located at the ce...
Article
Full-text available
In wireless sensor networks multi-hop routing is often used because of the limited transmission range of sensor nodes. Opportunistic Routing is a multi-hop routing for wireless sensor networks. In this routing, the neighbors of sender node overhear the transmission andorm multiple hops from source to the destination for transfer of information. The...
Article
Full-text available
In wireless sensor networks multi-hop routing is often used because of the limited transmission range of sensor nodes. Opportunistic Routing is a multi-hop routing for wireless sensor networks. In this routing, the neighbors of sender node overhear the transmission andorm multiple hops from source to the destination for transfer of information. The...
Conference Paper
Full-text available
Wireless sensor network is a collection of a group of sensors connected to monitor an area of interest. Installation flexibility, mobility, reduced cost and scalability have given popularity to wireless sensor networks. Opportunistic routing is a routing protocol that takes the advantage of broadcasting nature of wireless sensor network for multi-h...
Conference Paper
Full-text available
Wireless Sensor Networks is a set of sensors deployed in the area of interest, for the purpose of monitoring physical or environmental conditions. Due to limited battery capacity of sensors, Wireless Sensor Networks have limited lifetime. A large number of sensors deployed in a circular grid, sending the sensed data to base station located at the c...
Conference Paper
Full-text available
Opportunistic Routing in wireless sensor networks is a multi-hop routing. In this routing neighbors of a node overhear the transmission and form multiple hops from source to the destination for transfer of information. The set of neighbor nodes participating in the routing are included in the forwarder list in the order of priority. A node with hig...
Conference Paper
Full-text available
Wireless sensor networks have many applications involving autonomous sensors transmitting their data to a sink placed in the network. A protocol by name Chain Routing for Convergecast Small Scale (CRCSS) Wireless sensor networks is proposed in this paper. The set of sensor nodes in the network send the data periodically to the sink located in the a...
Conference Paper
The disclosure of information and its misuse in Privacy Preserving Data Mining (PPDM) systems is a concern to the parties involved. In PPDM systems data is available amongst multiple parties collaborating to achieve cumulative mining accuracy. The vertically partitioned data available with the parties involved cannot provide accurate mining results...
Article
Full-text available
The WorldWideWeb (WWW) is a huge conservatory of web pages. Search Engines are key applications that fetch web pages for the user query. In the current generation web architecture, search engines treat keywords provided by the user as isolated keywords without considering the context of the user query. This results in a lot of unrelated pages or li...
Article
Full-text available
Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes two stage pred...
Article
Full-text available
Privacy Preserving Data Mining (PPDM) presents a novel framework for extracting and deriving information when the data is distributed amongst the multiple parties. The privacy preservation of data and the use of efficient data mining algorithms in PPDM systems is a major issue that exists. Most of the existing PPDM systems employ the cryptographic...
Conference Paper
In large-scale Wireless Sensor Networks (WSNs) the amount of data gathered require energy efficient data dissemination and data retrieval techniques. Data Centric Sensor (DCS) networks is a better approach in which the sensed data are sent to a sensor node whose name is associated with sensed data. Due to unattended nature of Wireless Sensor Networ...
Conference Paper
Wireless sensor networks has been the focus of a lot of research efforts recently. The barrier coverage problem is the fundamental issue in sensor networks, which minimizes the prob ability of intrusion detection through a barrier of sensor network attempting to cross a region of interest. The barrier coverage for heterogeneous lifetime has been im...
Article
Full-text available
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable...
Article
Full-text available
Cryptographic approaches are traditional and preferred methodologies used to preserve the privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend to derive knowledge when the data is available with multiple parties involved. The PPDM deployments that currently exist involve cryptographic key exchange and key comp...
Chapter
Wireless Sensor Networks (WSNs) are currently being used in a wide range of applications that demand high security requirements. Since sensor network is highly resource constrained, providing security becomes a challenging issue. Attacks must be detected and eliminated from the network as early as possible to enhance the rate of successful transact...
Conference Paper
Wireless Sensor Networks consists of sensor nodes that are capable of sensing the information and maintaining security. In this paper, an Anonymity Cluster based Trust Management algorithm(ACTM) is proposed which enhances the security level and provides a stable path for communication. It is observed that the performance of the network is better th...
Chapter
Wireless Sensor Networks (WSNs) are by its nature more prone to security attacks and data losses. Security and data privacy have become need of the day. The most challenging area in WSNs which needs security is target localization. In addition to this complexity we are here concentrating on acoustic sensor nodes which uses Particle Swarm Optimizati...
Article
Full-text available
Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind ofinternal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in...
Chapter
Searching the people names on the web is a challenging query types to the web search engines today on the web. When a person name is queried, the returned result often contains web pages related to several distinct keywords that have the queried name. In this paper we have proposed a new approach to improve the precision, recall and F-measure metri...
Article
Full-text available
Wireless Sensor Networks consists of tiny devices which processes and routes the sensed data. The process of detecting any external and internal intruders entering to a Wireless Sensor Network area is referred to as intrusion detection. An intruder is a moving attacker entering a particular area. In this paper, we propose an algorithm Secure and En...
Conference Paper
Wireless sensor networks(WSN) usually consists of a large number of tiny sensors with limited computation capacity, memory space and power resource. WSN's are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamper-resistant packages. To achieve security in...
Article
Full-text available
Wireless sensor network can be applied to both abom-inable and military environments. A primary goal in the design of wireless sensor networks is lifetime maximization, constrained by the energy capacity of batteries. One well-known method to reduce energy consumption in such networks is data aggregation. Providing efcient data aggregation while pr...
Article
Wireless sensor networks (WSN) consists of tiny autonomous devices called sensors capable of sensing, processing and transmitting information. Energy consumption, routing and maximizing lifetime are the important challenges in the sensor network. In this paper, we propose multiple tree construction (MTC) algorithm to address the problem of finding...
Article
Full-text available
The Sensor Network consists of densely deployed sensor nodes. Energy optimization is one of the most important aspects of sensor application design. Data acquisition and aggregation techniques for processing data in-network should be energy efficient. Due to the cross-layer design, resource-limited and noisy nature of Wireless Sensor Networks(WSNs)...
Article
Full-text available
Computing and maintaining network structures for efficient data aggregation incurs high overhead for dynamic events where the set of nodes sensing an event changes with time. Moreover, structured approaches are sensitive to the waiting time that is used by nodes to wait for packets from their children before forwarding the packet to the sink. An op...
Article
Wireless sensor networks (WSN) consists of tiny autonomous devices called sensors capable of sensing, processing and transmitting information. Energy consumption, routing and maximizing lifetime are the important challenges in the sensor network. In this paper, we propose multiple tree construction (MTC) algorithm to address the problem of finding...
Article
Wireless Sensor Networks (WSNs) is a collection of a large number of sensor nodes with sensing, computation and wireless communication capabilities. Dead end problem is one of the challenges that occurs in greedy forwarding. When a message is forwarded to a node that has no neighbors closer to destination than itself, it causes greedy forwarding to...
Article
Wireless Sensor Networks (WSNs) are highly distributed networks of small, light weighted, wireless nodes deployed in large numbers. These sensor nodes are immobile, non rechargeable with limited energy. The cluster-based protocols make judicious use of this limited energy. LEACH-C (Low Energy Adaptive Clustering Hierarchy-Centralized) has a drawbac...
Article
Full-text available
Wireless Sensor Network is Multihop Self-configuring Wireless Network consisting of sensor nodes. The patterns of movement of nodes can be classified into different mobility models and each is characterized by their own distinctive features. The significance of this study is that there has been very limited investigations of the effect of mobility...

Network

Cited By