Skip to main content

Showing 1–10 of 10 results for author: Ranga, V

Searching in archive cs. Search in all archives.
.
  1. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things

    Authors: Abhishek Verma, Virender Ranga

    Abstract: IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard network layer protocol for achieving efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Resource-constrained and non-tamper resistant nature of smart sensor nodes makes RPL protocol susceptible to different threats. An attacker may use insider or outsider attack strategy to perform Denial-… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.12443

    Journal ref: Computing, 103(7), 1479-1500 (2021)

  2. Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review

    Authors: Abhishek Verma, Virender Ranga

    Abstract: Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed th… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Journal ref: in IEEE Sensors Journal, vol. 20, no. 11, pp. 5666-5690, 1 June 1, 2020

  3. Machine Learning Based Intrusion Detection Systems for IoT Applications

    Authors: Abhishek Verma, Virender Ranga

    Abstract: Internet of Things (IoT) and its applications are the most popular research areas at present. The characteristics of IoT on one side make it easily applicable to real-life applications, whereas on the other side expose it to cyber threats. Denial of Service (DoS) is one of the most catastrophic attacks against IoT. In this paper, we investigate the prospects of using machine learning classificatio… ▽ More

    Submitted 24 February, 2023; originally announced February 2023.

    Journal ref: Wireless Personal Communications, 111, 2287-2310 (2020)

  4. CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

    Authors: Abhishek Verma, Virender Ranga

    Abstract: The IPv6 routing protocol for low-power and lossy networks (RPL) is the standard routing protocol for IPv6 based low-power wireless personal area networks (6LoWPANs). In RPL protocol, DODAG information object (DIO) messages are used to disseminate routing information to other nodes in the network. A malicious node may eavesdrop DIO messages of its neighbor nodes and later replay the captured DIO m… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Journal ref: Telecommunication Systems, 75, 43-61 (2020)

  5. arXiv:2211.06390  [pdf, other

    cs.AR

    The BlackParrot BedRock Cache Coherence System

    Authors: Mark Wyse, Daniel Petrisko, Farzam Gilani, Yuan-Mao Chueh, Paul Gao, Dai Cheol Jung, Sripathi Muralitharan, Shashank Vijaya Ranga, Mark Oskin, Michael Taylor

    Abstract: This paper presents BP-BedRock, the open-source cache coherence protocol and system implemented within the BlackParrot 64-bit RISC-V multicore processor. BP-BedRock implements the BedRock directory-based MOESIF cache coherence protocol and includes two different open-source coherence protocol engines, one FSM-based and the other microcode programmable. Both coherence engines support coherent uncac… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  6. arXiv:2111.03274  [pdf

    eess.IV cs.CV cs.LG q-bio.QM

    Pathological Analysis of Blood Cells Using Deep Learning Techniques

    Authors: Virender Ranga, Shivam Gupta, Priyansh Agrawal, Jyoti Meena

    Abstract: Pathology deals with the practice of discovering the reasons for disease by analyzing the body samples. The most used way in this field, is to use histology which is basically studying and viewing microscopic structures of cell and tissues. The slide viewing method is widely being used and converted into digital form to produce high resolution images. This enabled the area of deep learning and mac… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 6 Page, 3 Table and 6 Figures

    Journal ref: Recent Advances in Computer Science and Communications(Formerly Recent Patents on Computer Science),04 September,2020, Article ID e140921185564

  7. arXiv:2111.03270  [pdf

    cs.LG eess.SP q-bio.NC

    Automated Human Mind Reading Using EEG Signals for Seizure Detection

    Authors: Virender Ranga, Shivam Gupta, Jyoti Meena, Priyansh Agrawal

    Abstract: Epilepsy is one of the most occurring neurological disease globally emerged back in 4000 BC. It is affecting around 50 million people of all ages these days. The trait of this disease is recurrent seizures. In the past few decades, the treatments available for seizure control have improved a lot with the advancements in the field of medical science and technology. Electroencephalogram (EEG) is a w… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 11 Pages, 12 Figures, 5 Tables

    Journal ref: Journal of Medical Engineering & Technology,2020, 44:5, 237-246

  8. EpilNet: A Novel Approach to IoT based Epileptic Seizure Prediction and Diagnosis System using Artificial Intelligence

    Authors: Shivam Gupta, Virender Ranga, Priyansh Agrawal

    Abstract: Epilepsy is one of the most occurring neurological diseases. The main characteristic of this disease is a frequent seizure, which is an electrical imbalance in the brain. It is generally accompanied by shaking of body parts and even leads (fainting). In the past few years, many treatments have come up. These mainly involve the use of anti-seizure drugs for controlling seizures. But in 70% of cases… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

    Comments: 12 Pages, 12 Figures, 2 Tables

    Journal ref: ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, Issue, Vol. 10 N. 4 (2021), 429-446

  9. arXiv:1412.7534  [pdf

    cs.SE

    Toward Refactoring of DMARF and GIPSY Case Studies -- a Team 4 SOEN6471-S14 Project Report

    Authors: Afshin Somani, Ahmad Al-Sheikh Hassan, Anurag Reddy Pedditi, Challa Sai Sukesh Reddy, Vijay Nag Ranga, Saravanan Iyyaswamy Srinivasan, Hongyo Lao, Zhu Zhili

    Abstract: Software Quality is a major concern in software engineering development in order to be competitive. Such a quality can be achieved by a possible technique called Refactoring where the systems external behavior of the system is not changed. Initially we present our work by analyzing the case studies of ongoing researches of DMARF and GIPSY by understanding their needs and requirements involving the… ▽ More

    Submitted 23 December, 2014; originally announced December 2014.

    Comments: 54 pages, 53 figures

    ACM Class: D.2; K.6; H.5.2

  10. arXiv:1412.6359  [pdf

    cs.SE

    An Empirical Study on Refactoring Activity

    Authors: Mohammad Iftekharul Hoque, Vijay Nag Ranga, Anurag Reddy Pedditi, Rachitha Srinath, Md Ali Ahsan Rana, Md Eftakhairul Islam, Afshin Somani

    Abstract: This paper reports an empirical study on refactoring activity in three Java software systems. We investigated some questions on refactoring activity, to confirm or disagree on conclusions that have been drawn from previous empirical studies. Unlike previous empirical studies, our study found that it is not always true that there are more refactoring activities before major project release date tha… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Comments: 11 pages, 9 figures, 1 table

    ACM Class: D.2; K.6; H.5.2