Jayashree Agarkhed
PDA College of Engineering
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jayashree Agarkhed.
Archive | 2017
Jayashree Agarkhed; Patil Yogita Dattatraya; Siddarama R. Patil
Wireless Sensor Networks (WSNs) consists of densely populated large number of spatially distributed configurable sensors, to meet the requirements of industrial, military, precision agriculture and health monitoring applications with ease of implementation and maintenance cost. Transmission of data requires both energy and quality of service (QoS) aware routing to ensure efficient use of the sensors and effective access of gathered information. In turn routing technique must provide reliable transmission of data without compromising QoS requirements of applications. We have addressed different routing protocol categories with range of QoS metrics to be achieved, to improve performance of WSNs applications.
international conference on advances in electrical electronics information communication and bio informatics | 2016
R. Ashalatha; Jayashree Agarkhed; Siddarama R. Patil
Cloud computing technology is considered to be the top most strategic technology in todays world. This is the result made in the advancement in storage technology towards cloud computing. The world of cloud computing has become more and more advanced in the recent years. It has become more and more popular and powerful in gaining everyones attention in the field axdbhof research and business as well. Advanced cryptographic techniques are proposed for performing security much stronger way. Therefore, people from different field especially for business in companies are relying on cloud storage. Auditability is considered as an important factor for securing the cloud environment to overcome the hacking issue. Data auditability has been designed for storing the cloud data. This paper discusses various data security algorithms for public cloud computing area.
communication systems and networks | 2016
Sujata V. Mallapur; Siddarama R. Patil; Jayashree Agarkhed
Mobile ad hoc network (MANET) is a distributed wireless network with highly dynamic topology. So, the nodes keep moving in and out of the network instantly and a path formed between two distant nodes through several intermediate nodes cannot be maintained for long duration of time. But, the availability of the link between any two nodes can be predicted up to the certain extent based on specific constraints such as the available bandwidth, available power and delay etc. Even then the guaranteed data delivery through the path cannot be made. Therefore, reliable multicast routing in MANET is very challenging problem. This paper proposed a multi-constrained reliable multicast routing protocol (MRMRP) using network coding. This technique initially builds the stable path between the desired distant for data transmission and then uses network coding for recovery of any packet that is lost during data transmission. We demonstrate through simulation results, that the proposed scheme shows its better performance compared to other methods. The simulation results show that the MRMRP increases the packet delivery ratio by reducing the packet drop ratio and control overhead as compared to multicast ad hoc on demand routing protocol (MAODV) and dynamic general coding Scheme (DGC).
international conference on intelligent systems and control | 2017
R. Ashalatha; Jayashree Agarkhed; Siddarama R. Patil
Virtualization is one of the important key technologies in cloud computing. Main advantages include maximum resource utilization and high flexibility. The virtualization technology offers different services to users and the vendors and has become an upcoming technology in the IT (Information Technology) industry. This article explores various network virtualization technologies using cloud computing system to a certain extent which has turned more efficient than previous technologies.
Archive | 2017
Gauri Kalnoor; Jayashree Agarkhed; Siddarama R. Patil
Secured transmission of data is the most challenging and critical issue in Wireless Sensor networks (WSN). QoS parameters such as energy efficiency, power consumption, end-to-end delay and so on plays an important role for system performance. Clustering approach is an effective way that can enhance system and network performance. In Clustered Wireless Sensor Network (CWSN), any type of attacks that are malicious and harmful to the network can occur and security of CWSN is affected. One of the major attack that may occur in CWSN is sinkhole attack that needs to be detected. An agent-based protocol is used to detect or prevent such type of attack. This can help improve the performance of the network that includes QoS parameters. An intrusion detection system (IDS) is configured using agent-based protocol to detect if an intrusion occurs.
international conference on inventive computation technologies | 2016
Pooja R Adki; Jayashree Agarkhed
Internet of Things (IoT) refers to the general idea of a network of interconnected things or objects that are able to collect and exchange data irrespective of the communication means. In transportation, IoT applications can help to improve transport utilization and road safety. The proposed work introduces a complete framework that solves the urban vehicle parking problem. This work helps the end users to efficiently find nearby parking lots along with the available parking spaces with the aid of navigational directions. The system consists of smart phone applications, cloud services, sensing and communication technologies. The proposed work indirectly reduces the unnecessary traffic congestion and fuel wastage that inevitably crops up due to the use of vehicles that are increasing tremendously in present era.
international conference on circuit power and computing technologies | 2016
Gauri Kalnoor; Jayashree Agarkhed
Wireless Sensor networks (WSN) is basically comprised of sensors that are spatially distributed with self-ruling capability, which monitors physical or environmental conditions such as, pressure, temperature, motion, sound and so on. Sensors also passes all the related information throughout the network. As the number of nodes and size of the network increases, there will be rapid increase in internet traffic. In WSN, security is the major issue and needs to a system that can provide security. Intrusion detection system is the system which plays a vital role in security of a system. One of the major challenges of WSN is to provide consistent Quality of Service (QoS) such as reliability, congestion control, energy efficiency and end-to-end delay, by applying secured routing protocols along with detection of an intruder so that QoS of WSN does not get affected. In our research work, we have discussed different routing protocols that are QoS based, to improve overall performance of the network.
international conference on advances in electrical electronics information communication and bio informatics | 2016
Patil Yogita Dattatraya; Jayashree Agarkhed
Wireless Sensor Network formed by huge number sensors, used to detect the physical conditions and environmental conditions. These sensors have very small computing capability and less storage. This limits its use in medical health applications. Additional Storage capacity can be achieved by cloud computing. Cloud computing is one of the innovative paradigm which provides computing resources such as processing servers, more memory, and large storage, that can be provided virtually. These all resources are not present at the users location but appear to be at current physical location. The objective of this work is to provide access to authorized user for retrieval of sensor information stored on cloud. Computation to validate authorized user is offloaded on remote server to increase lifetime of sensor battery and sensor node. Computation offloading helps to transfer heavy computation to resourceful server outside the computing environment of user, enhancing the performance of application using sensors.
international conference on advances in electrical electronics information communication and bio informatics | 2016
Gauri Kalnoor; Jayashree Agarkhed
Wireless Sensor Network (WSN) is a network with large number of tiny sensor devices which are of low cost, and minimum consumption of power called as sensor nodes. These type of nodes have great sensing technology which are specifically designed for applications such as military, smart homes and other security related areas. Due its wireless nature, network can be deployed anywhere in the environment, which becomes more vulnerable for attackers to destroy the network. Most importantly, WSN should be protected from malicious activities to take place and thus security becomes a major issue. However, such security can be provided by applying mechanisms for both intrusion detection and prevention. In our study, pattern matching is one of the mechanism that can be used for security of WSN. We also discuss some of the preventive measures that can be considered for protecting the sensor network.
Archive | 2019
Jayashree Agarkhed; Yogita Dattatraya Patil; Siddarama R. Patil
With the development of Internet technology and communications technology, our lives are progressively led into the virtual world. The Internet facilitates people to chat, shop and work in the virtual world. This virtual world can be integrated with real world by Internet of Things (IoT) with its potential to identify and connect all physical objects worldwide into a unified system using sensors/actuators and wireless communication. This paper presents need to understand protocol stack of IoT, various ways to integrate sensor network to IoT for better implementation of IoT applications.