P. Niranjan

Learn More
Reuse is the key paradigm for increasing productivity and quality in software development. To be able to reuse software components, whether it is code or designs, it is necessary to locate the component that can be reused. Locating components, or even realizing they exist, can be quite difficult in a large collection of components. These components need to(More)
Software Reuse effectiveness can be improved by reducing cost and investment. Software reuse costs can be reduced when reusable components are easy to locate, adapt and integrate into new efficient applications. Reuse is the key paradigm for increasing software quality in the software development. This paper focuses on the implementation of software tool(More)
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. In this paper we specifically considering Tunneling attack which does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting suspicious routes as in previous methods, we implement a(More)
Denial-of-service (DoS) attacks pose an increasing threat to today's Internet. One major difficulty to defend against Distributed Denial-of-service attack is that attackers often use fake, or spoofed IP addresses as the IP source address. Probabilistic packet marking algorithm (PPM), allows the victim to trace back the appropriate origin of spoofed IP(More)
The main goal of this paper is to design and implement a bank locker security system based on RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from bank locker. We have implemented a bank locker security system based on RFID and GSM technology containing door(More)
Privacy is become major issue in distributed data mining. In the literature we can found many proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in(More)
Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure-less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network.(More)
— A mobile ad hoc network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Mobile Ad-hoc networks are self organizing and self-configuring multichip wireless networks where, the structure of the network changes dynamically. A routing protocol in(More)
— Software Reuse is the process of using existing knowledge or concepts in creating new software applications instead of building them from scratch. Software reuse is a very effective strategy for software industry to develop high quality software. To use software reusable components from the reuse repository, the selection of proper retrieval technique is(More)
In this paper, we propose the software and hardware architecture for specifically Autonomous Robots using distributed embedded system. These concepts have implemented in developing a prototype robot. An autonomous robot has minimum three components a. sensor b. controller c. actuators. A distributed embedded system is most enabling technology in developing(More)