Bhushan Sonawane

Learn More
offers finer-grain location authentication than do cellular telephones. Furthermore, the power grid is deployed widely and is highly reliable, even in many places where cellular telephone and GPS signals are obstructed or unavailable. We present our architecture and Power line Location Authentication Protocol (PLAP) in sufficient detail to permit further(More)
We present and experimentally evaluate Spread Identity (SI)—a new dynamic network address remapping mechanism that provides anonymity and DDoS defense capabilities for Internet communications. For each session between a source and destination host, the trusted source gateway dynamically and randomly assigns an IP address for the source host from the pool of(More)
Three-dimensional porous structures using biodegradable materials with excellent biocompatibility are critically important for tissue engineering applications. We present a multi-nozzle-based versatile deposition approach to flexibly construct porous tissue engineering scaffolds using distinct polymeric biomaterials such as thermoplastic and(More)
Assignment problem in content distribution networks (CDN) is unsplittable hard-capacitated facility location problem (UHCFLP) because of underlying anycast routing protocol. We extend assignment problem in CDN to multidimensional facility location problem (MFLP). With our devised algorithm, assignment cost considers CPU utilization parameter along with(More)
The Internet is rapidly being adopted as the dominant communication medium, as evidenced by the recent explosive growth of companies and services that integrate the traditional telephone service simply as a type of data-service over the Internet (viz., Voice-over-IP). Continuous and ubiquitous availability of Internet services is therefore increasingly(More)
In this paper we are describing how the secure communication can be achieved by using LDPC and stopping sets in data transmission process. It Emphasizes that the LDPC encoder and Stopping sets are been used for encrypting and decrypting the message respectively. By using this technique we achieved error free and secure communication. It also prevent the(More)
—The application present on Mobile doesn't give extra features. They are not sufficient for our daily life. And if anyone is really interested should download from internet, but the problem is each and every function should download one by one and it causes cost too. Mobile users should have functions like when Mobile is loss to get it back. Also we forgot(More)
— This paper relies on Microsoft Office Document Imaging (MODI) and puts forward to give easy access to documenting image for blind people. We propose the system with simple architecture which provides better reliability than ordinary traditional reading methods for blinds. This system replaces existing system such as braille lipi which reduces the efforts(More)
We introduce Markov Model for Web services attacks detection and mitigation. This model is capable of preventing not only injection attacks like SQL injection, Cross-Site Script-ing (XSS), buffer overflow but also detect abnormal Web service client behavior. We adopted the well known technique based on Markov model for detecting Web application attacks. Our(More)