Sachin Shetty

Learn More
We report a case of ocular tuberculosis (TB) which initially presented with disc edema and was mistaken for optic neuritis. With no definite pathology being identified, the patient was treated on the lines of optic neuritis with intravenous (IV) steroid with beneficial effect. Ocular TB was suspected when he presented later with a subretinal abscess. Based(More)
One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points in enterprises to not only get free Internet access, but also to(More)
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There(More)
—One of the most challenging security concerns for network administrators is the presence of rogue access points. In this paper, we propose a statistical based approach to detect rogue access points using a Hidden Markov Model applied to passively measured packet-header data collected at a gateway router. Our approach utilizes variations in packet(More)
A Bayesian network model is a popular technique for data mining due to its intuitive interpretation. This paper presents a semantic genetic algorithm (SGA) to learn a complete qualitative structure of a Bayesian network from a database. SGA builds on recent advances in the field and focuses on the generation of initial population, crossover, and mutation(More)
IEEE 802.11b wireless networks and Bluetooth networks provide complimentary services using the same unlicensed radio frequency band. As the benefits of utilizing these services become increasingly apparent, the likelihood of mutual interference also increases. The well-known frequency hopping algorithm and adaptive frequency hopping algorithm do not fully(More)
—Time synchronization is a key component in numerous wireless sensor network applications. Most of the current software based time synchronization approaches suffer from communication overhead and lack of scalability. In this paper, we propose a hardware based approach based on voltage controlled crystal oscillator and phase locked loop techniques to(More)
—Energy efficiency improvement methods can be applied at different layers of the network architecture for mobile ad-hoc networks. There have been many research efforts on improving the performance parameters at physical, data link, and network layers. The properties of directional antennas have been exploited for better energy efficiency. Some of the(More)