Andhe Dharani
R.V. College of Engineering
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Andhe Dharani.
advances in recent technologies in communication and computing | 2009
S Ashok Kumar; Gokul Prem Kumar; Ankur Dhawan; Andhe Dharani
In this paper our aim is to show how we can automate the testing of any web service. We will present a method which involves the parsing of WSDL file, generating SOAP requests along with respective values required for the requests that are queried from different databases. We will parse the given WSDL into its corresponding methods and parameters. For these parameters values are fetched from different databases and SOAP requests are generated using these values. These SOAP requests are submitted to a web server, which provides the corresponding SOAP response. Using these responses a response report is generated which specifies the number of methods that have passed and those that have failed.
international conference on information technology and applications | 2014
Manjuprasad B; Andhe Dharani
Security is one of the most important issues in all the fields, wireless sensor networks is not an exception to this. Security in sensor networks can be achieved by data confidentiality, authentication, freshness, and integrity. One of the main mechanisms used for this purpose is encryption and decryption but due to resource constraints of the sensor nodes these mechanism may affect their performance and increase the computational complexity of the nodes. This paper aims to provide a simple secure protocol for providing an efficient secure system with low computational complexity and efficient resource utilization in wireless sensor networks.
international conference on information communication and embedded systems | 2014
R. Krishnan; Andhe Dharani
Detection of the topographical pattern is a challenging area in the field of astronomy and atmospheric science. An improvement is required, in the existing algorithms for the detection of topographical patterns because of the pattern complexity and detection rate. From the satellite, daily about 500 images are transmitted to ground station with resolution ranging from 5-100 meters. The transmission and processing time is important while considering huge volume of data. This paper deals with a novel framework, the flanking stencil method, over the conventional template matching, which provides a competent reduction in execution time. This lightweight framework can be utilized to eliminate the data, during the time of image acquisition which reduces data transmission time and increase in detection rate by using optimum templates. In this approach, the priority of template image, time reduction for comparison between the input image and template image are considered. The storage of coordinates will be useful, so that the coordinate comparison need not be done again. The same method is used here, for the detection of low and high intensity region with the help of different categories of templates. This algorithm includes transformation generator which generates transformed images based on the priority.
Third International conference on advances in communication, network and computing | 2012
Mohan Aradhya; K. A. Sumithradevi; Andhe Dharani; Vijay Singh
Currently many algorithms like LEACH, HEED, EECH are applied to sensors networks to achieve better lifetime of a network. But each of these algorithms has some drawback in achieving a effective lifetime of a sensor network. This paper deals with existing algorithm and comparing the simulated results to know the effective solution to increase lifetime of the sensor network.
Archive | 2017
R. Krishnan; Andhe Dharani
The topographical features like craters are forming in different size and shape in different categories that will give more information about the planet. The 2D shape descriptor from top view of the crater is very difficult to interpret the crater type. Here 2D shape descriptor is developed based on the intensity values of the crater image. The reverse order summation and smoothing function is applied to these intensity values, which will depict the cross-section of the crater image. This can be used for classification, 3D model development, and to retrieve other information.
soft computing | 2015
Manju Geogy; Andhe Dharani
Quality of any application is the end result of how each phase of the Software development life cycle was handled. Multiple teams and techniques are used to achieve a good quality application. Software testing is one critical phase which all are aware. But justice will be done only if all the phases do participate well in their respective ways. Here in this paper we are trying to understand the contribution of how each phase of the software development life cycle contribute to the overall quality of an application. Identify each phase and what are the techniques available to filter out the errors in each phase. It is many time avoided either to save on time or cost. Every time the blame of a quality always goes to the software testing team, but herein we understand that each phase contributes to the quality of an application. How important it is for the whole team to understand and take actions accordingly for the real success of a product.
international conference on communications | 2015
R. Krishnan; Andhe Dharani
Generally object detection using genetic algorithm in images will consider all pixels of the images for cross over procedure, it is time consuming and expensive in nature. Here the I-Genetic algorithm considers the intensity values of the object interest for classification, so the considerations of all pixels are eliminated which improves execution time as well as object detection. The I-Genetic algorithm considers the intensity values of the object interest for cross over operation.
International Journal of Innovative Research in Computer and Communication Engineering | 2015
Andhe Dharani; Manjuprasad B; Shantharam Nayak; Vijayalakshmi M.N
Wireless sensor networks as gained lots of impact in the real time applications like monitoring, surveillances and tracking. These applications are mainly rely on the collection of critical information where manual information collection is very difficult task. WSNs are more vulnerable to many types of threats, providing security will be very complex due to the resource constraint sensors. The proposed work aims to study and analyze the vulnerabilities and its effect on the performance of sensor networks in cluster based routing protocols. An exhaustive analysis is presented by captivating the standard clustering architecture with its different stage of operating modes. A comparison is done for with latest existing security solutions which mainly deal with cluster based protocols in wireless sensor networks. An Open Systems Interconnection layer wise comparison is presented with the possible vulnerabilities at each layer. This work also enlightens the literal need of security and its requirements in wireless sensor networks for an efficient information system
international conference on communications | 2014
T. L. Divya; Manjuprasad B; M. N. Vijayalakshmi; Andhe Dharani
Grouping of forest fire images into meaningful categories to reveal useful information is a challenging task. In order to overcome this challenge, data mining techniques can be used with wireless sensor network which can detect and forecast forest fire more promptly than the satellite-based detection approach. This paper proposes an efficient image clustering algorithm using real time data for predicting of the occurrence of forest fire, with a new mechanism for secure information transmission in wireless sensor networks by minimizing the threat attacks caused by malicious nodes in wireless sensor networks.
2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA) | 2013
Manjuprasad B; Andhe Dharani
Clustering is one of the efficient routing mechanisms in wireless sensor networks; unification of the clustering with others efficient mechanism like hierarchical, multihop and distance based clustering can enhance the performance of the wireless sensor networks. Clustering can also override the performance of the networks if it is not used in appropriate manner like selecting least energy nodes as a cluster head, selecting many cluster heads in similar region. This paper aims to increase the performance of wireless sensor networks by reducing the communication overhead with uniform multihop clustering mechanism.