Poonam N. Railkar
Savitribai Phule Pune University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Poonam N. Railkar.
International Journal of Synthetic Emotions | 2017
Mayur Sunil Jawalkar; Nayan Desale; Fanil Suratwala; Amol Lamkhade; Parikshit N. Mahalle; Poonam N. Railkar
This paper proposes an intelligent system to track location of an individual animal or animals in wildlife sanctuary. Existing systems makes use of various technologies such as RFID, GPS, GSM, etc. RFID based systems either lack in range if passive tags are used or lack in cost effectiveness if active tags are used. Similarly, GSM based system becomes costlier and requires constant network connectivity. Hence this paper proposes a Wi-Fi based tracking system. Proposed system makes use of ubiquitous technology which encourages the use of Wi-Fi Transceivers. The Stationary Wi-Fi Transceiver consists of ESP8266 NodeMCU development board which detects the Mobile Transceiver. The Mobile Transceiver consists of ESP8266 NodeMCU attached to animals. The Stationary Wi-Fi transceiver detects Mobile Transceivers under its vicinity and sends the data to other Stationary transceiver through hop based transmission and ultimately the data is stored in the database. The mobile application accesses the location information from the database for particular animal and plots it onto the Map. This paper comprises of system architecture, proposed algorithm and mathematical model. Intelligent Wildlife Tracking Using Ubiquitous Technological Suite
International Journal of Computer Applications | 2013
Amruta B. Pandule; Poonam N. Railkar; Parikshit N. Mahalle
Wireless networks are becoming more and more popular nowadays. These are widely used because they are easy to deploy. As these networks are essentially decentralized in nature they enhance the resource sharing and collaboration. The anonymous and open nature of system offers an almost ideal environment for unauthorized access of resources and also prone to different attacks in the network. These systems have to challenge the attacks like man-in-the-middle, replay and Denial of Service (DoS) attacks by anonymous malicious peers. So these systems have to protect themselves from these malicious nodes. For this purpose, before communication happens node must determine whether other nodes are trusted and in turn authorized to access resources or functionalities i.e. nodes must establish the trust before their interactions. Hence there is a need to have an effective Trust Management System which will establish a trust between the nodes in a network will update it periodically. This paper presents novel trust management model for trust score calculations to achieve trusted communication in WLAN network. This paper proposes a Review and Reputation based Trust Score Calculation (RRTSC) scheme for wireless networks and independent ad-hoc networks. This presents the trust based model for WLAN as an example of scenario of central authority assisted network which compute the trust for a node based in WLAN. In this trust establishment and trust maintenance between the two peers in WLAN is achieved by trusted central authority.
International Journal of Synthetic Emotions | 2017
Aditya R. Raikwar; Rahul R. Sadawarte; Rishikesh G. More; Rutuja S. Gunjal; Parikshit N. Mahalle; Poonam N. Railkar
The need of faster life has caused the exponential growth in No. of vehicles on streets. The adverse effects include frequent traffic congestion, less time efficiency, unnecessary fuel consumption, pollution, accidents, etc. One of most important solution for resolving these problems is efficient transportation management system. Data science introduces different techniques and tools for overcoming these problems and to improve the data quality and forecasting inferences. The proposed long-term forecasting model can predict numerical values of effective attributes for a particular day on half-hourly basis, at least 24 hours prior to the time of prediction. The proposed forecasting model for short-term analysis will be having access to data as close as 30-minute difference from the time of prediction. Our proposed solution has integrated use of Holt-Winters (HW) method along with comparability schemes for seasonal approach. Long-Term and Short-Term Traffic Forecasting Using Holt-Winters Method: A Comparability Approach With Comparable Data in Multiple Seasons
International Journal of Pervasive Computing and Communications | 2015
Nancy Ambritta P; Poonam N. Railkar; Parikshit N. Mahalle
Purpose – This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack. Design/methodology/approach – This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against ...
ieee india conference | 2014
P Nancy Ambritta; Poonam N. Railkar; Parikshit N. Mahalle
The Future Internet (FI) sees the world of objects completely connected over the Internet constantly. A well-managed identity management system should provide necessary tools for controlling user access and access to critical information. In this paper we quote the proposed architecture from our previous work that provides a solution to the discussed issues and derive a mathematical model for the proposed system by leveraging the M/D/1 queuing model followed by an extension of the model to M/D/n to suite our proposed architecture. This paper also supports the proposed mathematical model by proof of concept.
International Journal of Computer Applications | 2013
Poonam N. Railkar; Parikshit N. Mahalle
Mobile technology and Internet is becoming an integral part of our daily life. Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. In mobile computing, the characteristic like context awareness allows to provide proactively adapted services to user according to the context. Especially in combination with mobile devices, these mechanisms carries high value and are used to increase usability tremendously. Equally being an Android operating system as open source, it is prone to attack. In this view there is need to define new attack taxonomy and its modeling. This paper presents a novel taxonomy for Context Aware Proactive System (CAPS) in smart phone. This paper also presents activity modeling of proposed taxonomy to get an actual view of happening of attack like Cross Service attack, spyware and Battery Exhaustion attack. At the end this paper also discusses mitigation techniques to address few of the mentioned attacks.
Archive | 2015
Parikshit N. Mahalle; Poonam N. Railkar
Journal of ICT Standardization | 2014
P Nancy Ambritta; Poonam N. Railkar; Parikshit N. Mahalle; Pune
Archive | 2013
Ketaki Shah; Anuja Raundal; Gouri Bhandari; Santwana Rathi; Poonam N. Railkar; Parikshit N. Mahalle
International Journal of Rough Sets and Data Analysis | 2017
Sandesh Mahamure; Poonam N. Railkar; Parikshit N. Mahalle