Work place: Adikavi Nannaya University, Rajahmundry, India
Research Interests: Computer systems and computational processes, Computer Networks, Data Mining, Data Structures and Algorithms
Dr. P. Suresh Varma received the Master’s degree M.Tech in Computer Science & Technology from Andhra University. He received Ph.D. degree in Computer Science & Engineering from Acharya Nagarjuna University. He is currently working as Professor in Department of Computer Science in Adikavi Nannaya University, Rajahmundry, A.P., India. He published several papers in National and International Journals. He is active member of various professional bodies. His current research is focused on Computer Networks, Cloud Computing and Data Mining.
DOI: https://doi.org/10.5815/ijigsp.2023.06.05, Pub. Date: 8 Dec. 2023
Alzheimer's disease is a progressive neurologic disorder that causes the brain to shrink (atrophy) and brain cells to die. A recent study found that 40 million people worldwide suffer from Alzheimer's disease (AD). A few symptoms of this AD disease are problems with language understanding, mood swings, behavioral issues, and short-term memory loss. A key research area for AD is the classification of stages. In this paper, we applied both binary and multi-class classification. In this paper, proposed is a Mask-Region based Convolution Neural Network (R-CNN) for classifying the stages including MCI, LMCI, EMCI, AD, and CN of Alzheimer's Disease. First performing pre-processing by using the skull-stripping algorithm for removing the noise. Second, the patch wise U-Net has been employed to segment the images for improving the classification process. After that, the system's efficiency is examined using MATLAB-based experiments, utilizing images from the Alzheimer's disease Neuroimaging Initiative (ADNI) dataset to evaluate the efficiency in terms of accuracy, precision, recall, specificity, and sensitivity. Our proposed approach to classifying the stages achieves about 98.54%,94.2%, 98.25%, 99.2%, and 99.02%in terms of accuracy with EMCI, CN, MCI, AD, and LMCI respectively. Proposing mask R-CNN with segmentation to classify from CN to AD subjects successfully improved classifier accuracy significantly on the ADNI datasets.[...] Read more.
DOI: https://doi.org/10.5815/ijisa.2018.10.06, Pub. Date: 8 Oct. 2018
Recommender systems inherently dynamic in nature and exponentially grow with time, in terms of interests and behaviour patterns. Traditional recommender systems rely on similarity of users or items in static networks where the user/item neighbourhood is almost same and they generate the same recommendations since the network is constant. This paper proposes a novel architecture, called Temporal Community-based Collaborative filtering, which is an association of recommendation and the dynamic community algorithm in order to exploit the temporal changes in the community structure to enhance the existing system. Our framework also provides solutions to common inherent issues of collaborative filtering approach such as cold-start, sparsity and compared against static and traditional collaborative systems. The outcomes indicate that the proposed system yields higher values in quality standards and minimizes the drawbacks of the traditional recommender system.[...] Read more.
DOI: https://doi.org/10.5815/ijieeb.2013.03.06, Pub. Date: 8 Sep. 2013
Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2013.04.07, Pub. Date: 8 Apr. 2013
Wireless networks, in particular Mobile Ad hoc Networks (MANETs) have revolutionized the field of networking with increasing number of their commercial and military applications. Security on the other hand, is now an essential requirement for these applications. However, the limitations of the dynamic, infrastructure-less nature of MANETs impose major difficulties in establishing a secure framework suitable for such services. Security for MANETs is a dynamic area of research. Most of the traditional routing protocols proposed for MANETs are focused on routing only not on the security aspects. As in traditional wired networks, wireless networks also require security. Unlike the wired networks, where dedicated routers, servers control the network, in MANETs nodes act both as terminals and also as routers for other nodes. A popular mechanism to satisfy the security requirements is the Group Key Management in which the group key is to be shared by each group communication participant. But to establish and manage the group key efficiently imposes new challenges – especially in infrastructure less MANETs. The basic needs of such networks require that the group key schemes must demonstrate not only high performance but also fault-tolerance.[...] Read more.
DOI: https://doi.org/10.5815/ijitcs.2013.04.06, Pub. Date: 8 Mar. 2013
Piracy is no new lesson to every user of technology. It is a giant existing in the industry of technology numbing the heights software is reaching in terms of efficiency and use in all the sectors to an extent where even the industry of enterprise, beaurocracy, technology etc. depend upon the use of software in various ways to contribute their needs and success. Dollars are running at stakes of any industry while the piracy is acting as a dominator of all illegal transactions indirectly by giving easy and such illegal access to many users. One such victim is the entertainment industry where movies are being pirated and accessed to users causing millions of dollars of loss to the entertainment industry. Many researchers and technical specialists have made their contributions to save technology. Our paper is another potential solution with a promise of accuracy rate in detecting the pirated movies. It is a known fact that primary detection is the source of prevention. Our paper puts forth a technique that efficiency detects piracy to reduce such illegal downloads using the efficient measures of signature generation, normalization in an effective manner.[...] Read more.
DOI: https://doi.org/10.5815/ijisa.2013.01.08, Pub. Date: 8 Dec. 2012
A Mobile Ad hoc Network (MANET) is a collection of autonomous self-organized nodes. They use wireless medium for communication, thus two nodes can communicate directly if and only if they are within each other’s transmission radius in a multi-hop fashion. Many conventional routing algorithms have been proposed for MANETs. An emerging area that has recently captured much attention in network routing researches is Swarm Intelligence (SI). Besides conventional approaches, many new researches have proposed the adoption of Swarm Intelligence for MANET routing. Swarm Intelligence (SI) refers to complex behaviors that arise from very simple individual behaviors and interactions, which is often observed in nature, especially among social insects such as ants, bees, fishes etc. Although each individual has little intelligence and simply follows basic rules using local information obtained from the environment. Ants routing resembles basic mechanisms from distributed Swarm Intelligence (SI) in biological systems and turns out to become an interesting solution where routing is a problem. Ants based routing is gaining more popularity because of its adaptive and dynamic nature. A number of Swarm Intelligence (SI) based algorithms were proposed by researchers. In this paper, we study bio-inspired routing protocols for MANETs.[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2012.06.04, Pub. Date: 8 Jun. 2012
The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The Adhoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium and network topology. These challenges clearly make a case for building multifence security solutions that achieve both road protection and desirable network performance. The general security objectives like authentication, confidentiality, integrity, availability and non-repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to analyze Challenges, Overview of Security, attacks, threats faced by the Adhoc network environment and provide a classification of the various security mechanisms.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals