Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Raju, V.K."

Filter results by typing the first few letters
Now showing 1 - 4 of 4
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks
    (2012) Raju, V.K.; Kumar, K.V.
    Mobile ad hoc networks are vulnerable to many kinds of attacks since they have unique characteristics like limited bandwidth, limited battery power and dynamic network topology. Among the various attacks possible in mobile ad hoc networks wormhole attack is one which is treated as a very severe attack. In this attack a malicious node records packets at one location in the network and tunnels them to another malicious node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack in the routing phase itself. Our mechanism is based on the total round trip time (RTT) of the established route and the average round trip times of the sender one hop neighbors, which is considered as maximum one hop round trip time. Our solution works for both mobile ad hoc networks and wireless ad hoc networks. © 2012 IEEE.
  • No Thumbnail Available
    Item
    Development of online isolated digit recognizer using hidden Markov model
    (2013) Supreeth, Prajwal, S.; Raju, V.K.; Lalitesh, M.; Banriskhem, K.K.; Prasanna, S.R.M.
    The objective of this work is to develop an online isolated digit recognizer that takes small footprint and also runs faster than that using the conventional Hidden Markov Model (HTK) toolkit. Such system will find applications on devices with limited computing power and memory capacity. The different modules in the online digit recognizer are explained first. This is followed by the development of offline digit recognizer in MATLAB. Later the online digit recognizer is implemented in C language. The performance evaluation of the digit recognizer is made in both offline and online mode. The digit recognizer works well except for digit two and eight where the confusion is high. However, the online system works well in speaker independent scenario.
  • No Thumbnail Available
    Item
    Development of online isolated digit recognizer using hidden Markov model
    (Institution of Engineering and Technology journals@theiet.org, 2013) Supreeth Prajwal, S.; Raju, V.K.; Lalitesh, M.; Khonglah, K.K.; Prasanna, S.R.M.
    The objective of this work is to develop an online isolated digit recognizer that takes small footprint and also runs faster than that using the conventional Hidden Markov Model (HTK) toolkit. Such system will find applications on devices with limited computing power and memory capacity. The different modules in the online digit recognizer are explained first. This is followed by the development of offline digit recognizer in MATLAB. Later the online digit recognizer is implemented in C language. The performance evaluation of the digit recognizer is made in both offline and online mode. The digit recognizer works well except for digit two and eight where the confusion is high. However, the online system works well in speaker independent scenario.
  • Thumbnail Image
    Item
    A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks
    (2012) Raju, V.K.; Kumar, K.V.
    Mobile ad hoc networks are vulnerable to many kinds of attacks since they have unique characteristics like limited bandwidth, limited battery power and dynamic network topology. Among the various attacks possible in mobile ad hoc networks wormhole attack is one which is treated as a very severe attack. In this attack a malicious node records packets at one location in the network and tunnels them to another malicious node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack in the routing phase itself. Our mechanism is based on the total round trip time (RTT) of the established route and the average round trip times of the sender one hop neighbors, which is considered as maximum one hop round trip time. Our solution works for both mobile ad hoc networks and wireless ad hoc networks. � 2012 IEEE.

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify