40 results on '"Amarsinh, Vidhate"'
Search Results
2. Evaluation of the circulatory levels of resistin in coronary artery disease with associated co-morbidities
- Author
-
Deepak Ramdas Kamble, Vijay Rajaram Pandhare, Deepali Amarsinh Vidhate, Aarya Amarsinh Vidhate, Haritkumar Vivek, Vidhisha Jariwala, Becky Prakash Thomas, and James Thomas
- Subjects
General Nursing ,Education - Abstract
Inflammation is known to be the root cause of the development of coronary artery disease (CAD). Subclinical inflammation is one of the key players in pathophysiology of CAD. An inflammatory response leads to the secretion of various adipokines and cytokines. There are various pro-inflammatory markers which could be used to determine the onset of disease, and one such marker is resistin adipokine. The present study evaluates and compares the circulatory concentration of resistin in CAD patients and controls for the determination of its association with CAD. In this study, 58 CAD patients were enrolled and were further subdivided into four groups as per the associated co-morbidities. Various anthropometric and biochemical parameters were assessed. The circulatory levels of resistin were found to be significantly elevated in CAD patients and their subgroups as compared to controls. We conclude that elevated resistin levels in CAD patients suggest a key role of resistin in the development of CAD. The present study also observed that co-morbidities like type 2 diabetes can act as one of the major factors for the elevated concentration of resistin in the circulation of CAD patients with diabetes.
- Published
- 2022
3. A novel blockchain based framework for healthcare workers.
- Author
-
Agarwal, Manisha and Amarsinh, Vidhate
- Subjects
- *
MEDICAL personnel , *BLOCKCHAINS , *INCENTIVE (Psychology) , *COVID-19 pandemic , *SUPPLY chains - Abstract
The Covid-19 pandemic has surely made us realize that we can fall short of important equipment and drugs which do not reach people on time leading to deaths and tension. The reason for this is not only the lack of funds or raw materials but something even more disheartening. Even during these tough times, people have taken advantage of the situation where they keep and store important equipment like PPE kits, masks, sanitizers, etc. and start black marketing the same. This grave situation has occurred because of the lack of control, transparency, and traceability of the existing supply chain. Blockchain seems to be a good solution to this serious problem. Blockchain technology is used to store the data in a decentralized and immutable format keeping it private and safe from unintended users and tracking and tracing the products. This paper talks about the various use cases for healthcare workers and the various limitations of the existing blockchain framework for the forward supply chain. A framework is proposed that overcomes the limitations of the entire blockchain framework available and used for supply chain with its incentive mechanism which will help every participant in the chain. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. An intelligent Crop Price Prediction using suitable Machine Learning Algorithm
- Author
-
Ghutake Ishita, Verma Ritesh, Chaudhari Rohit, and Amarsinh Vidhate
- Subjects
prediction ,random forest regression ,decision tree regression ,Information technology ,T58.5-58.64 - Abstract
Planning of crops for the next season has been a tedious task for the farmers as it is a difficult prediction about metrics of prices that their crop will fetch in a particular season which will be typically based on dynamic weather conditions. This leads to inaccurate prediction of crops’ prices by farmers, and they happen to wrongly select the crops or in haste they happen to sell their crops early without storing and thus earning less than what the same crop would have fetched them in the future. This problem could be addressed by an ML model which will predict the prices of crops in advance showing the proper analysis of the crop and presenting their future scenario so that farmers can select the right crops to strategize crop production which involves crop selection, time of sowing deciding crop pattern and storage of harvested crops providing enough insights for predicting the appropriate price in the markets.
- Published
- 2021
- Full Text
- View/download PDF
5. Issues and Future Trends in IoT Security using Blockchain: A Review
- Author
-
Sumita Kumar and Amarsinh Vidhate
- Published
- 2023
6. Integrity and Authenticity of Academic Documents Using Blockchain Approach
- Author
-
Rane Mukul, Singh Shubham, Singh Rohan, and Amarsinh Vidhate
- Subjects
blockchain ,hyperledger ,academic record verification ,secure hash algorithm (sha-256) ,Information technology ,T58.5-58.64 - Abstract
Blockchain has a strong capacity to monitor and retain educational records. The paperless future has yet to become a reality, even with the ability to digitally generate documents. Physical copy of records are still regularly printed which makes them susceptible to document fraud. Thus, the issue of fake certificates and academic records has risen drastically. In this paper, we have made a reliable verification method to avoid academic frauds. The idea presented here is developed over Hyperledger. The University or The Educational Institute is responsible for issuing the certificates, mark-sheets, transcripts, etc. and mining it over the blockchain. The student is provided with the hash number which is the reference number. This number serves the reference of the data. The Organization or the Industry Personal using the hash number checks for the integrity of the submitted document. The present study discusses about importance of block chain and it’s applicability especially for the applications like verification of Academic Records.
- Published
- 2020
- Full Text
- View/download PDF
7. Improved Latency Handover in Fast MIPv6 for Streaming Video
- Author
-
Amarsinh, Vidhate, Devane, Satish, Unnikrishnan, Srija, editor, Surve, Sunil, editor, and Bhoir, Deepak, editor
- Published
- 2013
- Full Text
- View/download PDF
8. MAC Protocol Selection and Performance Analysis in Wireless Body Area Networks
- Author
-
Bhavana Alte and Amarsinh Vidhate
- Published
- 2022
9. Applying Blockchain Security for Agricultural Supply Chain Management
- Author
-
Sweta Siddarth Waghmare, Teresa Edgar, Chitra Ramesh Saraf, Amarsinh Vidhate, and Mrunal Anil Wani
- Subjects
Blockchain ,Agricultural supply chain ,Business ,Environmental economics - Abstract
Blockchain technology permits a highly secured record keeping and digital transaction. Blockchain technology is changing the digital world and industry by bringing a new view to security, transparency, and efficiency of systems. It provides a safe way for the exchange of products, services, or transaction. Blockchain will enable more agile value chains, faster product innovations, closer customer relationship sector. This paper provides an overview of blockchain technology and its potential in developing a secure and reliable agriculture supply chain management. Agriculture supply chain management systems are vital for getting food products delivered from farmers to the consumers. Blockchain technology can also be used to achieve better prices and payment options, land title registration and for transparent disbursement of subsidies to farmers.
- Published
- 2020
10. A Hybrid Clustering Approach for Faster Propagation of Emergency Messages in VANET
- Author
-
Puja Padiya, Amarsinh Vidhate, and Ramesh Vasappanavara
- Published
- 2022
11. A Comparative Analysis of Applied AI Techniques for an Early Prediction of Chronic Kidney Disease
- Author
-
Amarsinh Vidhate, Deepali Vidhate, and Anindita A Khade
- Subjects
Global population ,Computer science ,Early prediction ,Indian population ,medicine ,Global health ,Disease ,medicine.disease ,Data science ,Kidney disease - Abstract
Chronic Kidney Disease (CKD) is a global health threat that affects approximately 10% of the global population and approximately 20% of the Indian population. Medical specialists face a large and difficult burden in detecting this disease at an early stage. In this case, a computer-based intelligent system that can diagnose kidney disease and its stages could be unbelievably valuable. Artificial Intelligence (AI) is being used by researchers and scientists to create smart solutions. This paper gives a gist of the different varieties of works done by different scholars in the field of early prediction of CKD using AI techniques. Further, all the works are categorized into 3 different categories and further it has been attempted to analyze the best proposals in those categories. Finally, it has been concluded with the most optimizing and exhaustive proposal.
- Published
- 2021
12. Unstructured Big Data Information Extraction Techniques Survey: Privacy Preservation Perspective
- Author
-
Swarupa S. Bodhe, Poonam S. Jadhav, Amarsinh Vidhate, and Gautam M. Borkar
- Subjects
Computer science ,business.industry ,Perspective (graphical) ,Big data ,Unstructured data ,Context (language use) ,computer.software_genre ,Data science ,Set (abstract data type) ,Information extraction ,Data extraction ,business ,computer ,Personally identifiable information - Abstract
Big data analytics has given us the ability to analyze massive amounts of data, but it has also put privacy at a risk. Personal information may be present in data processed by big data analytics, which must be preserved. Existing privacy preservation strategies, such as anonymization, necessitate dividing a dataset into a set of sensitive, quasi-identifiers and non-sensitive properties. It may be conceivable to have such a distribution with structured data, but it is difficult to detect sensitive features and quasi-identifiers in unstructured data. Big data generates massive amounts of data that are heterogeneous in nature and includes a range of different sorts of data, including text, image, audio and video. Traditional data extraction technologies are ineffective in the context of this massive influx of unstructured big data. This paper present a survey of various information extraction techniques for unstructured big data analytics with a context of privacy preservation.
- Published
- 2021
13. An intelligent Crop Price Prediction using suitable Machine Learning Algorithm
- Author
-
Chaudhari Rohit, Amarsinh Vidhate, Ghutake Ishita, and Verma Ritesh
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,random forest regression ,Data_CODINGANDINFORMATIONTHEORY ,prediction ,Information technology ,Machine learning ,computer.software_genre ,T58.5-58.64 ,Price prediction ,Crop ,decision tree regression ,ComputerApplications_MISCELLANEOUS ,Artificial intelligence ,InformationSystems_MISCELLANEOUS ,business ,computer - Abstract
Planning of crops for the next season has been a tedious task for the farmers as it is a difficult prediction about metrics of prices that their crop will fetch in a particular season which will be typically based on dynamic weather conditions. This leads to inaccurate prediction of crops’ prices by farmers, and they happen to wrongly select the crops or in haste they happen to sell their crops early without storing and thus earning less than what the same crop would have fetched them in the future. This problem could be addressed by an ML model which will predict the prices of crops in advance showing the proper analysis of the crop and presenting their future scenario so that farmers can select the right crops to strategize crop production which involves crop selection, time of sowing deciding crop pattern and storage of harvested crops providing enough insights for predicting the appropriate price in the markets.
- Published
- 2021
14. Performance Analysis of Unified Threat Management (UTM)
- Author
-
Jatin Gharat, Amarsinh Vidhate, and Amit Barve
- Subjects
Multi-core processor ,Network security ,business.industry ,Network packet ,Computer science ,Packet processing ,The Internet ,Unified threat management ,Central processing unit ,Splay tree ,business ,Computer network - Abstract
With the substantial increase in the internet usage and the growing threat of hackers to infect as many devices as possible, security has become important to prevent data breaches and industrial sabotage. Unified Threat Management are the Next-Generation network security appliances that include multiple security features along with the performance required for future networks. But packet processing usually consumes 70% of the CPU time and during heavy load it degrades the UTM performance by dropping important packets. To overcome such limitations, many techniques and algorithms have been proposed by the researchers. In this paper, survey and numerical analysis of each technique is done based on the overall packet processing time. Based on the numerical analysis, we suggest the best technique to reduce the overall packet processing time in UTM and hence reduce the load under heavy traffic conditions.
- Published
- 2020
15. Offline Transaction System
- Author
-
Shitanshu Kochar, Hrishikesh Nikam, Rahul Tripathi, and Amarsinh Vidhate
- Abstract
The usage of online payment systems is increasing multifold these days due to their transaction reliability and ease of completion in real-time. The most preferred service is UPI service, which is majorly available in Metropolitan cities, in some semi-urban and rural areas which have a proper communication infrastructure. However, there is a major issue to expand these services in rural areas, which lack proper communication infrastructure. Even after the internet revolution, it is ensured that all Indians are connected to data at all times but there might be situations where the user could not able to connect to the Internet owing to many reasons like High Altitude, Low Network availability, in-flight, etc. As an individual, such situations cannot be avoided, and there it comes to the applicability of offline transaction systems. We plan to change that by introducing an offline transaction system. We plan to expand on the idea of an offline payment system that will ensure that a reliable & secured digital payment system is available to all individuals.
- Published
- 2022
16. Sports Injury Prediction System using Random Forest Classifier
- Author
-
Akshay Shringarpure, Ronak Shetty, Ajinkya Surve, and Amarsinh Vidhate
- Abstract
One of the largest growing industries in the modern-day world is the sporting industry. Currently valued at around 500 billion USD, with a growth scope of exponential potential, its ability to attract investors is incredible. And just like any other investment. It is part andparcel of the investor’s fiscal responsibility to take good care of their assets. The biggest assets in the sporting industry are of course the players, and the greatest threat to said assets is injuries. We take into consideration said factors and deem it important to solve said issues, and understanding the money involved, the industry sides with us too. We seek to solve the said problemby taking into account all previous injury records and datasets of various players and predicting the kind, number, and severity of the injuries in the future. We seek to create a methodology for such prediction, which applies to all and any sports, being one of the only such models of its kind.
- Published
- 2022
17. SISA: A secret-sharing scheme application for cloud environment
- Author
-
Taral S. Sarvagod, Rohit B. Chilwant, Kunal R. Kumbhar, Prathmesh N. Gunjgur, and Amarsinh Vidhate
- Subjects
Scheme (programming language) ,021110 strategic, defence & security studies ,business.industry ,Computer science ,0211 other engineering and technologies ,Cloud computing ,02 engineering and technology ,Encryption ,Computer security ,computer.software_genre ,Secret sharing ,Distributed data store ,Data outsourcing ,business ,computer ,computer.programming_language - Abstract
Security defies one of the galactic barrier when pondering the use of cloud services. Data outsourcing in the cloud (DOC) is conventionally based on data encryption, which imparts impregnable security, but deteriorating the efficiency and rimming the functionalities of cloud. In this proposal we aim to possess them by proposing a secret sharing scheme that depends on partitioning the data and distributed storage over multi-clouds. The scheme used in the proposal uses a combination of symmetric (AES) and asymmetric (RSA) encryption techniques to share the data among the peers in the cloud environment. The proficiency of the suggested scheme has been demonstrated by the empirical results.
- Published
- 2019
18. Detection of Phishing Websites Using Ensemble Machine Learning Approach
- Author
-
Dhanashri Bhosale, Soumya Badkul, Kimaya Gharat, M Dharani, and Amarsinh Vidhate
- Subjects
business.industry ,Information technology ,Online trading ,T58.5-58.64 ,Machine learning ,computer.software_genre ,Login ,Ensemble learning ,Phishing ,Random forest ,Uniform resource locator ,Artificial intelligence ,Extreme gradient boosting ,business ,computer - Abstract
In this paper, we propose the use of Ensemble Machine Learning Methods such as Random Forest Algorithm and Extreme Gradient Boosting (XGBOOST) Algorithm for efficient and accurate phishing website detection based on its Uniform Resource Locator. Phishing is one of the most widely executed cybercrimes in the modern digital sphere where an attacker imitates an existing - and often trusted - person or entity in an attempt to capture a victim’s login credentials, account information, and other sensitive data. Phishing websites are visually and semantically similar to real ones. The rise in online trading activities has resulted in a rise in the number of phishing scams. Cybersecurity jobs are the most difficult to fill, and the development of an automated system for phishing website detection is the need of the hour. Machine Learning is one of the most feasible methods to approach this situation, as it is capable of handling the dynamic nature of phishing techniques, in addition to providing an accurate method of classification.
- Published
- 2021
19. Journey in vehicular ad-hoc network: a survey of message dissemination approaches and their delays
- Author
-
Amarsinh Vidhate, Ramesh Vasappanavara, and Puja Padiya
- Subjects
Vehicular ad hoc network ,Computer science ,business.industry ,Control and Systems Engineering ,Automotive Engineering ,business ,Computer network ,Computer Science Applications - Published
- 2021
20. Integrity and Authenticity of Academic Documents Using Blockchain Approach.
- Author
-
Patil, M.D., Vyawahare, V.A., Rane, Mukul, Singh, Shubham, Singh, Rohan, and Amarsinh, Vidhate
- Published
- 2020
- Full Text
- View/download PDF
21. A Comprehensive Development and Testing of Improved Publish-Subscribe Method for IoT
- Author
-
Amarsinh Vidhate and Jyoti Deogirikar
- Subjects
Service (business) ,Smart objects ,Computer science ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,End-to-end delay ,QualNet ,050801 communication & media studies ,020207 software engineering ,02 engineering and technology ,Bottleneck ,Task (project management) ,0508 media and communications ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,business ,Computer network - Abstract
Internet of Things (IoT) is a network of smart devices which communicate with each other to accomplish task or provide any particular service. In IoT, smart objects have to provide services continuously by realizing requirement of a person without disturbing him. To accomplish this task, IoT devices need to share information with each other as soon as it updates. In such condition, request-response technique creates overhead on the system. So publish-subscribe technique is used to get an immediate response as soon as data changes. Service consumer or subscriber needs to send a request for particular service to the broker. The broker will maintain the list of the subscriber and will forward data to all subscribers as it updates. But this broker creates single point bottleneck in publish-subscribe communication. In this paper, distributed publish-subscribe techniques has been proposed which will distribute publishers and subscribers on the different brokers removing single point bottleneck. It will also distribute the load of brokers and improve the availability of service. For simulation purpose, we have used QualNet 5.1 simulation tool. Simulation is done by using parameters like number of total packets received by all nodes in simulation, end to end delay as number of nodes increases also number of total packets received by all nodes in simulation as number of transaction increases.
- Published
- 2018
22. Hybrid Model For Text Classification
- Author
-
Amarsinh Vidhate, Smita Bhoir, and Priyanka Ingole
- Subjects
Support vector machine ,Naive Bayes classifier ,Casual ,Process (engineering) ,Computer science ,Data analysis ,Social media ,Social engagement ,Data science ,Popularity - Abstract
Increasing popularity of social media sites (e.g., Twitter, Facebook) leads to the increasing amount of online data. Student's casual talks on these social media sites can be used to know their educational experiences i.e. their worries, opinions, feelings, and emotions about the learning process. However, the main challenge is to analyze this informal data. Because of the complexity of the student's posts on the social media sites, it requires human understanding. But, it is practically not possible to perform human interpretation on such increasing scale of data. Hence, there is a demand for pre-programmed data analysis methods. In this paper, a hybrid approach is used to analyze these large scale and informal data. We have considered engineering student's Twitter posts to know their concerns and difficulties in their learning experiences. We have carried out a qualitative analysis on the data of about 25,000 tweets of engineering student's educational problems and studied that many students face problems such as heavy study load, diversity problem, lack of social engagement, their negative emotions and lack of sleep. Considering these analysis, we have implemented a hybrid model by combining two most popular machine learning algorithms viz. Naive Bayes classifier and Support Vector Machine to classify tweets regarding student's problems. The result shows that there is a significant reduction in training time and shows an increase in the classification accuracy when compared to individual Naive Bayes classifier and Support Vector Machine.
- Published
- 2018
23. Hybrid data-centric routing protocol of wireless body area network
- Author
-
Amarsinh Vidhate and Sonal Vetale
- Subjects
Routing protocol ,business.industry ,Computer science ,Network packet ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Body area network ,Wireless ,Path loss ,business ,Hybrid routing ,Efficient energy use ,Computer network - Abstract
Wireless Body Area Network (WBAN) plays an important role in many health related applications by transmitting patients data to central database of hospital. So, routing of data is an important part of WBAN. As WBAN has unique features and requirements, there are crucial issues like Quality of service (QoS), path loss, temperature rise, energy efficiency and network lifetime etc. which are needed to be considering while designing routing protocol. To overcome those issues, we propose hybrid routing protocol which support all WBAN data packets such as delay sensitive data (DSD), normal data (ND), critical data (CD) and reliability sensitive data (RSD) packets. For simplicity in classifying these data packets, we design new data classifier which takes minimum time for classification in order to improve network lifetime. While selecting the next hop we also consider route which have high link quality and low path temperature to solve issue of path loss and temperature rise respectively. NS-2 Simulator has been used for simulation of the proposed protocol.
- Published
- 2017
24. Comparison of MAC protocols in VANET
- Author
-
Amarsinh Vidhate and Sanika Ajit Lokhande
- Subjects
Protocol (science) ,Vehicular ad hoc network ,Transmission (telecommunications) ,business.industry ,Wireless ad hoc network ,Computer science ,Reliability (computer networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless ,Access control ,business ,Wireless sensor network ,Computer network - Abstract
To avoid transmission collisions in vehicular ad hoc networks, a efficient and reliable medium access control protocol is needed. In VANET, vehicle act as a nodes and vehicle is having high mobility. There are different MAC protocols considering for the communication between the VANET.
- Published
- 2017
25. An improved publish-subscribe method in application layer protocol for IoT
- Author
-
Jyoti Deogirikar and Amarsinh Vidhate
- Subjects
Service (business) ,Machine to machine ,business.industry ,Computer science ,Server ,Scalability ,Overhead (computing) ,The Internet ,business ,Application layer ,Bottleneck ,Computer network - Abstract
Internet of Things (IoT) is a collection of smart devices which communicate with each other to accomplish task or provide any particular service. Machine to Machine (M2M) communication is more in IoT than normal internet. The Internet provides services when any person requests it. In case of IoT, smart devices have to provide services continuously by realizing requirement of a person without disturbing him. To accomplish this task, IoT devices need to share information with each other as soon as it updates. In such condition, request-response technique creates overhead on the system. So publish-subscribe technique is used to get an immediate response as soon as data changes. Service consumer or subscriber needs to send a request for particular service to the broker. The broker will maintain the list of the subscriber and will forward data to all subscribers as it updates. But this broker creates single point bottleneck in publish-subscribe communication. In this report, distributed publish-subscribe techniques has been proposed which will distribute publishers and subscribers on the different brokers removing single point bottleneck. It will also distribute the load of brokers and improve the availability of service.
- Published
- 2017
26. Security attacks in IoT: A survey
- Author
-
Amarsinh Vidhate and Jyoti Deogirikar
- Subjects
Engineering ,business.industry ,Internet privacy ,business ,Internet of Things ,Computer security ,computer.software_genre ,computer - Abstract
Internet of Things (IoT) is one of the most buzzing and discussed topic in research field today. Some of the researchers are also looking future of the world in this technology. Since then significant research and development have taken place on IoT, however various vulnerabilities are observed which shall keep IoT as a technology in danger. As a result, there are so many attacks on IoT have been invented before actual commercial implementation of it. The present study discusses about various IoT attacks happening, classify them, its countermeasures and finding the most prominent attacks in IoT. A state of the art survey about the various attacks have been presented and compared including their efficiency and damage level in IoT.
- Published
- 2017
27. Data Mining Approach in Security Information and Event Management
- Author
-
Amarsinh Vidhate, Naresh Harale, and Anita Rajendra Zope
- Subjects
Database ,business.industry ,Data stream mining ,Computer science ,Data management ,Process mining ,Complex event processing ,computer.software_genre ,Security information and event management ,Text mining ,Information security management ,Data mining ,business ,computer - Published
- 2013
28. An agglomerative approach to elect the cluster head in VANET
- Author
-
Prasad Bhosale and Amarsinh Vidhate
- Subjects
Vehicular ad hoc network ,Network packet ,Computer science ,business.industry ,Quality of service ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,Hierarchical clustering ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Cluster (physics) ,Cluster analysis ,business ,Computer network - Abstract
The Vehicular Ad hoc Network (VANET) is the network of the mobile nodes which are connected without infrastructure. The mobile nodes requires routing that works with multi-hop characteristics. The clustering of node is needed in VANET. A cluster head is the essential part of any cluster for the efcient working of the cluster. In this work, we provide a method for the dynamically changing VANET, that elects the cluster head of the clusters and uses different parameters for the same. The QoS parameters are taken care while selecting the cluster head. The parameters involved for the same are direction of the vehicle, Speed of the vehicle, Duration for which it has been cluster head in past, Density of the Cluster, Packet Delivery ratio, Network Lifetime, Degree of the node, Transmission Range. The method proposed is the agglomerate method which involves all the parameters majorly affecting the VANET. Thus, this method will select the cluster head effectively and improves the QoS parameters of the VANET.
- Published
- 2016
29. Improved MAC protocol for emergency handling in WBAN
- Author
-
Jyoti Kamble and Amarsinh Vidhate
- Subjects
Computer science ,business.industry ,010401 analytical chemistry ,020206 networking & telecommunications ,Access control ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Health care ,Body area network ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Resource management ,Superframe ,business ,computer ,Protocol (object-oriented programming) ,Wireless sensor network ,Computer network - Abstract
Increase in average lifespan and aging population with increase in chronic diseases, there is need to monitor patient health status anywhere both in hospital and out of hospital. This demands more advance health care technology. Due to tremendous growth in sensor technology, the healthcare applications are increasing by manifolds. These opportunities have initiated many research proposals under healthcare domain. Due to its widespread requirement, sensor technology has subset into a category called Wireless Body Area Network (WBANs). These applications are devised to take care of emergency requirements to help the person to handle emergency health issue. To overcome this research problem, many research studies are going on and some already presented. Medium Access Control (MAC) for emergency handling, recently proposed Extended Period and Mixed Period (MPEP) approach overcome the problems associated with 802.15.4 protocol. The MPEP approach is based on superframe structured MAC protocols by considering the contention free period (CFP) allocations. However the problem with this method is inefficient slot allocation technique which may leads to delay in emergency handling in WBAN. To overcome this problem, in this paper MPEP is extended by adding the preemptive slot allocation method for improving the performance of slot allocation and hence emergency handling in WBAN, which is termed as Hybrid MPEP (HMPEP). To verify numerical results, we implemented set up and simulated using NS-2.
- Published
- 2016
30. A survey on Finite Automata based pattern matching techniques for network Intrusion Detection System (NIDS)
- Author
-
Prashantkumar M. Rathod, Amarsinh Vidhate, and Nilesh Marathe
- Subjects
TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Finite-state machine ,Theoretical computer science ,Network security ,business.industry ,Network packet ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Deep packet inspection ,Intrusion detection system ,Deterministic finite automaton ,Regular expression ,Pattern matching ,business ,Computer Science::Formal Languages and Automata Theory ,Computer Science::Cryptography and Security - Abstract
Many network security applications such as Intrusion Detection System (IDS), Firewall and Data Loss Prevention System (DLPS) are based on deep packet inspection, in this packets header as well as payload of the packets are checked with predefined attack signature to identify whether it contains malicious traffic or not. To perform this checking different pattern matching methods are used by NIDS. The most popular method to implement pattern matching is to use of Finite Automata (FA). Generally, regular expressions are used to represent most of the attack signatures defined by NIDS. They are implemented using finite automata, which takes the payload of packet as input string. However, existing approaches of Finite Automata (FA), both deterministic finite automata (DFA) and non-deterministic finite automata (NFA) for pattern matching are having their own advantages and some drawbacks. The DFA based pattern matching methods are fast enough but require more memory. However, NFA based pattern matching methods are comparatively takes less memory but the speed of matching is very slow, to overcome these drawbacks of finite automata there are many approaches have been proposed. This paper discuses comparative study of some Finite Automata (FA) based techniques for pattern matching in network intrusion detection system (NIDS).
- Published
- 2014
31. Session rate prediction for multimedia streaming
- Author
-
Amarsinh Vidhate and Prathmesh N. Gunjgur
- Subjects
Multimedia ,Mobile wireless ,Wireless network ,business.industry ,Computer science ,computer.software_genre ,Expression (mathematics) ,Transmission (telecommunications) ,Bandwidth (computing) ,Session (computer science) ,Mobile telephony ,business ,computer ,Mobile device ,Computer network - Abstract
Uses of multimedia on video and audio application are increasing day-by-day on mobile devices. The continuity of these applications may hamper due to improper session rates during transmission. In this study we survey various papers for session rate prediction of streaming media using network traffic prediction methods. Also bandwidth estimation is carried out for the wireless network which plays a significant role in predicting the session rates. Our proposed session rate expression helps to understand the significance of predicting the session rate for streaming media in mobile wireless network. We study various proposals in this regard and the state-of-the-art analytical analysis is presented followed by our notations.
- Published
- 2014
32. An improved WBAN MAC protocol
- Author
-
Amarsinh Vidhate and Smita Bhoir
- Subjects
business.industry ,Inter-Access Point Protocol ,Computer science ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless LAN controller ,law.invention ,Key distribution in wireless sensor networks ,law ,Embedded system ,Body area network ,Multiple Access with Collision Avoidance for Wireless ,Wi-Fi ,business ,Wireless sensor network ,Computer network - Abstract
A Wireless Body Area Network (WBAN) is considered as a special type of a Wireless Sensor Network (WSN) with its own challenges and requirements. A traditional WSN is designed to achieve higher efficiency, however, WBAN is designed to achieve maximum throughput, minimum delay and to maximize the energy efficiency, all together. Our analysis indicates that available protocols for WSN are not easily portable for WBAN, specifically Medium Access Control (MAC) Protocols. Thus, we have proposed a new WBAN MAC Protocol based on Aloha protocol which differentiates and preferred various types of traffic based on emergency case. The proposed protocol has been simulated using different scenarios and the obtained results are analyzed and compared using NS-2 Simulator.
- Published
- 2014
33. Exploitation of the unused resources for e-learning using Data Grid
- Author
-
Amarsinh Vidhate, Varsha Wangikar, Kavita Jain, and Seema Shah
- Subjects
DRMAA ,World Wide Web ,Semantic grid ,Data access ,Grid computing ,Data grid ,Computer science ,Grid ,computer.software_genre ,Data science ,computer ,Replication (computing) ,Shared resource - Abstract
Nowadays there is need to share the knowledge and collaboration with group of people with same interest because people and information which they want to access both is geographically distributed. Information technology plays a major role in the future of education, as they break geographical barriers and make educational content widely available. Knowledge collaboration is possible by creating virtual classrooms by interconnecting lecturers to geographically scattered students. Making educational material, such as tutorials and recorded lectures, available worldwide through high-storage infrastructures. Digitalizing and making books available through high-storage infrastructures. But this E-learning system requires huge investment for high-storage infrastructure. Some educational organizations and research institutes cannot afford expensive investments. On the other hand, in most of the organizations, there are large amounts of underutilized computing power and storage existing. Data Grid connects underutilized secondary storage of machines and provides huge secondary storage. It enables resource sharing among the geographically distributed users and resources. Therefore the institutes which do not have sufficient budget can make use of Data Grid efficiently. In this paper we have presented that how Grid computing can be used for inexpensive collaborative E-learning. Data replication increases availability, reliability of data and allows fast access to data. Replication reduces bandwidth consumption and congestion over communication line. Therefore replication is the major issue in Data Grid. Replication strategies determine when and where to create a replica of the data. A good replication strategy should ideally minimize file access time, reduce network congestion and minimize job execution time to improve performance of Data Grid. We strongly believe that the technological revolution that the grid is about to bring will definitely change the way that people deal with information and, ultimately, knowledge. In this sense, grid computing and e-learning form a perfect match.
- Published
- 2012
34. Improved one-pass IMS authentication in UMTS
- Author
-
Satish Devane, Amarsinh Vidhate, and Gaurav Sharma
- Subjects
Authentication ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Core network ,IP Multimedia Subsystem ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Mutual authentication ,User equipment ,Embedded system ,ComputingMilieux_COMPUTERSANDEDUCATION ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,General Packet Radio Service ,business ,UMTS frequency bands ,Computer network - Abstract
Universal Mobile Telecommunications System (UMTS), as a core network can support both circuit-switch as well as packet-switch networks. UMTS supports IP Multimedia services by including the IP Multimedia Subsystem (IMS) as part of its core network. IMS services are used by authenticating user equipment with the UMTS using UMTS AKA and then with the IMS using IMS AKA. This paper concentrates on the IMS authentication and proposes an improved one-pass IMS authentication procedure which will result in reduction in message delivery cost and improvement over IMS AKA. This proposed procedure also preserves security features such as mutual authentication and key agreement expected from an IMS authentication procedure.
- Published
- 2011
35. Design of file size and type of access based replication algorithm for data grid
- Author
-
Varsha Wangikar, Amarsinh Vidhate, Seema Shah, and Kavita Jain
- Subjects
Data grid ,business.industry ,Computer science ,Distributed computing ,Grid file ,computer.software_genre ,Grid ,Replication (computing) ,File size ,Data access ,Grid computing ,business ,computer ,Algorithm ,Access time ,Computer network - Abstract
Grid computing provides the effective sharing of computational and storage resources among geographically distributed users. In most of the organizations, there are large amounts of underutilized computing power and storage existing. On the other hand most desktop machines are busy less than 5 percent of the time. Grid computing provides a framework for exploiting these underutilized resources and thus increases the efficiency of resource usage. Now a days, many commercial, business and research institutes produce huge amount of data and need to store this data on secondary storage of machines. Users of data are distributed among different geographical boundaries and they want to collaborate on the same problem. Data grids focus on providing secure access to distributed, heterogeneous pools of data. Data grids harness data, storage, and network resources located in distinct administrative domains, and provide high speed and reliable access to data. Optimization of data access can be achieved via data replication, whereby identical copies of data are generated and stored at various sites. A good replication strategy should ideally minimize latencies; reduce access time while optimizing resources. Hence in this paper we have focused on improving data grid performance. We have first presented a detailed analysis of various replication strategies like No replication, Always replication and the Economic model simulated by OptorSim. Next we have proposed a dynamic replication strategy which switches between No replication and Always replication based on file size and type of access. We argue that the proposed file size and type of access based replication algorithm will minimize the access latencies and execution time of jobs on Grid. In the next phase we shall proceed with implementing algorithm on simulator and observing the performance of the implemented algorithm.
- Published
- 2011
36. AOMDV-APLP
- Author
-
Madhumita Chatterjee, Amruta Chintawar, and Amarsinh Vidhate
- Subjects
Scheme (programming language) ,business.industry ,Network packet ,Computer science ,Routing table ,Reduction (complexity) ,Business process discovery ,Overhead (computing) ,Routing (electronic design automation) ,business ,computer ,Protocol (object-oriented programming) ,Computer network ,computer.programming_language - Abstract
In adhoc networks nodes change their position consistently, and routes are rapidly disturbed, thereby generating route errors and new route discoveries. AOMDV protocol computes multiple loop-free and link-disjoint paths but nodes are unaware of relative movement and location. In this paper a scheme AOMDV-APLP is implemented that makes AOMDV aware of accessibility of neighbor nodes in the network. Nodes acquire the accessibility information of other nodes through routine routing operations and maintain it in their routing table. Based on this information route discovery is restricted to only "accessible" and "start" nodes. Multiple paths are generated by accessibility prediction from which route with the strongest signal strength is selected depending on Link life value predicted by Link Breakage prediction technique. Simulation results show that using accessibility and link life knowledge in route discovery process results in reduction of MAC overhead, routing overhead and average end-to-end delay and improves the Packet delivery ratio to a large extent as compared to standard AOMDV which reflects effective use of network resources. The simulation is done using Ns-2.34 on Fedora 9 Linux environment.
- Published
- 2011
37. Smart Surveillance System for Vehicles Using Mobile Phone Camera
- Author
-
Sukanya V. Alevoor, Amarsinh Vidhate, and Bhavesh Parmar
- Subjects
Background subtraction ,Computer science ,Robustness (computer science) ,business.industry ,Mobile phone ,Server ,Subtraction ,Computer vision ,Central processing unit ,Artificial intelligence ,Mobile telephony ,Image sensor ,business - Abstract
The process of the alternative functioning of the mobile phones shall be detailed keeping in mind that these devices have less memory and less computing capacity. A simple background subtraction algorithm process may be used, that projects a moving object in consideration to be in the current view, when the subtraction of the current captured image and the background reaches a certain threshold. We suggest identifying the type of the object considering its shadow and then calculate the length of the shadow to decide and decipher type of object. The mobile camera enabled system can also count the total number of vehicles, even occluded vehicles to some extent is also obtained. Information may be processed on the mobile phone and immediate alert message be sent to the central processing unit.
- Published
- 2009
38. An improved fast MIPv6 using dynamic threshold buffer management
- Author
-
Amarsinh, Vidhate, primary and Satish, Devane, additional
- Published
- 2014
- Full Text
- View/download PDF
39. Improved session handover in mobile wireless networks for video streaming
- Author
-
Amarsinh, Vidhate, primary and Satish, Devane, additional
- Published
- 2014
- Full Text
- View/download PDF
40. Enhanced 2ACK scheme to Prevent Routing Misbehavior Using OLSR Protocol
- Author
-
Joshi, Jyoti, primary and Amarsinh, Vidhate, additional
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.