Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andhe Dharani is active.

Publication


Featured researches published by Andhe Dharani.


advances in recent technologies in communication and computing | 2009

Automated Regression Suite for Testing Web Services

S Ashok Kumar; Gokul Prem Kumar; Ankur Dhawan; Andhe Dharani

In this paper our aim is to show how we can automate the testing of any web service. We will present a method which involves the parsing of WSDL file, generating SOAP requests along with respective values required for the requests that are queried from different databases. We will parse the given WSDL into its corresponding methods and parameters. For these parameters values are fetched from different databases and SOAP requests are generated using these values. These SOAP requests are submitted to a web server, which provides the corresponding SOAP response. Using these responses a response report is generated which specifies the number of methods that have passed and those that have failed.


international conference on information technology and applications | 2014

Simple Secure Protocol for Wireless Sensor Networks

Manjuprasad B; Andhe Dharani

Security is one of the most important issues in all the fields, wireless sensor networks is not an exception to this. Security in sensor networks can be achieved by data confidentiality, authentication, freshness, and integrity. One of the main mechanisms used for this purpose is encryption and decryption but due to resource constraints of the sensor nodes these mechanism may affect their performance and increase the computational complexity of the nodes. This paper aims to provide a simple secure protocol for providing an efficient secure system with low computational complexity and efficient resource utilization in wireless sensor networks.


international conference on information communication and embedded systems | 2014

Flanking stencil method for the detection of impact craters

R. Krishnan; Andhe Dharani

Detection of the topographical pattern is a challenging area in the field of astronomy and atmospheric science. An improvement is required, in the existing algorithms for the detection of topographical patterns because of the pattern complexity and detection rate. From the satellite, daily about 500 images are transmitted to ground station with resolution ranging from 5-100 meters. The transmission and processing time is important while considering huge volume of data. This paper deals with a novel framework, the flanking stencil method, over the conventional template matching, which provides a competent reduction in execution time. This lightweight framework can be utilized to eliminate the data, during the time of image acquisition which reduces data transmission time and increase in detection rate by using optimum templates. In this approach, the priority of template image, time reduction for comparison between the input image and template image are considered. The storage of coordinates will be useful, so that the coordinate comparison need not be done again. The same method is used here, for the detection of low and high intensity region with the help of different categories of templates. This algorithm includes transformation generator which generates transformed images based on the priority.


Third International conference on advances in communication, network and computing | 2012

Clustering Methodologies and Their Implications in Sensor Networks

Mohan Aradhya; K. A. Sumithradevi; Andhe Dharani; Vijay Singh

Currently many algorithms like LEACH, HEED, EECH are applied to sensors networks to achieve better lifetime of a network. But each of these algorithms has some drawback in achieving a effective lifetime of a sensor network. This paper deals with existing algorithm and comparing the simulated results to know the effective solution to increase lifetime of the sensor network.


Archive | 2017

A New 2D Shape Descriptor Generation Method for Different Craters Based on the Intensity Values

R. Krishnan; Andhe Dharani

The topographical features like craters are forming in different size and shape in different categories that will give more information about the planet. The 2D shape descriptor from top view of the crater is very difficult to interpret the crater type. Here 2D shape descriptor is developed based on the intensity values of the crater image. The reverse order summation and smoothing function is applied to these intensity values, which will depict the cross-section of the crater image. This can be used for classification, 3D model development, and to retrieve other information.


soft computing | 2015

Prominence of each phase in Software development life cycle contributes to the overall quality of a product

Manju Geogy; Andhe Dharani

Quality of any application is the end result of how each phase of the Software development life cycle was handled. Multiple teams and techniques are used to achieve a good quality application. Software testing is one critical phase which all are aware. But justice will be done only if all the phases do participate well in their respective ways. Here in this paper we are trying to understand the contribution of how each phase of the software development life cycle contribute to the overall quality of an application. Identify each phase and what are the techniques available to filter out the errors in each phase. It is many time avoided either to save on time or cost. Every time the blame of a quality always goes to the software testing team, but herein we understand that each phase contributes to the quality of an application. How important it is for the whole team to understand and take actions accordingly for the real success of a product.


international conference on communications | 2015

The new approach: I-Genetic algorithm for classification of craters

R. Krishnan; Andhe Dharani

Generally object detection using genetic algorithm in images will consider all pixels of the images for cross over procedure, it is time consuming and expensive in nature. Here the I-Genetic algorithm considers the intensity values of the object interest for classification, so the considerations of all pixels are eliminated which improves execution time as well as object detection. The I-Genetic algorithm considers the intensity values of the object interest for cross over operation.


International Journal of Innovative Research in Computer and Communication Engineering | 2015

Performance Analysis of Cluster BasedProtocols in Sensor Networks and theirVulnerabilities

Andhe Dharani; Manjuprasad B; Shantharam Nayak; Vijayalakshmi M.N

Wireless sensor networks as gained lots of impact in the real time applications like monitoring, surveillances and tracking. These applications are mainly rely on the collection of critical information where manual information collection is very difficult task. WSNs are more vulnerable to many types of threats, providing security will be very complex due to the resource constraint sensors. The proposed work aims to study and analyze the vulnerabilities and its effect on the performance of sensor networks in cluster based routing protocols. An exhaustive analysis is presented by captivating the standard clustering architecture with its different stage of operating modes. A comparison is done for with latest existing security solutions which mainly deal with cluster based protocols in wireless sensor networks. An Open Systems Interconnection layer wise comparison is presented with the possible vulnerabilities at each layer. This work also enlightens the literal need of security and its requirements in wireless sensor networks for an efficient information system


international conference on communications | 2014

An efficient and optimal clustering algorithm for real-time forest fire prediction with

T. L. Divya; Manjuprasad B; M. N. Vijayalakshmi; Andhe Dharani

Grouping of forest fire images into meaningful categories to reveal useful information is a challenging task. In order to overcome this challenge, data mining techniques can be used with wireless sensor network which can detect and forecast forest fire more promptly than the satellite-based detection approach. This paper proposes an efficient image clustering algorithm using real time data for predicting of the occurrence of forest fire, with a new mechanism for secure information transmission in wireless sensor networks by minimizing the threat attacks caused by malicious nodes in wireless sensor networks.


2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA) | 2013

Uniform multihop clustering for low communication overhead in sensor network

Manjuprasad B; Andhe Dharani

Clustering is one of the efficient routing mechanisms in wireless sensor networks; unification of the clustering with others efficient mechanism like hierarchical, multihop and distance based clustering can enhance the performance of the wireless sensor networks. Clustering can also override the performance of the networks if it is not used in appropriate manner like selecting least energy nodes as a cluster head, selecting many cluster heads in similar region. This paper aims to increase the performance of wireless sensor networks by reducing the communication overhead with uniform multihop clustering mechanism.

Collaboration


Dive into the Andhe Dharani's collaboration.

Top Co-Authors

Avatar

Manjuprasad B

R.V. College of Engineering

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. Krishnan

R.V. College of Engineering

View shared research outputs
Top Co-Authors

Avatar

Shantharam Nayak

R.V. College of Engineering

View shared research outputs
Top Co-Authors

Avatar

Manju Geogy

R.V. College of Engineering

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vijay Singh

R.V. College of Engineering

View shared research outputs
Top Co-Authors

Avatar

K. A. Sumithradevi

R.V. College of Engineering

View shared research outputs
Top Co-Authors

Avatar

M. Archana

R.V. College of Engineering

View shared research outputs
Researchain Logo
Decentralizing Knowledge