Manjula G

@www,bgscet.ac.in

Associate Professor Dept of CSE
BGS College of Engineering and Technology



              

https://researchid.co/manjulalokesh

EDUCATION

BE in CSE 2001
MTech in CSE 2010
Ph,D in CSE 2021

RESEARCH INTERESTS

Information Security,Artificial Intelligence,Machine Learning,Data Science

8

Scopus Publications

124

Scholar Citations

6

Scholar h-index

4

Scholar i10-index

Scopus Publications

  • Reliable Target Tracking Model Employing Wireless Sensor Networks
    H. V. Chaitra, Madhu Patil, G. Manjula, M. K. Bindiya, and E. Naresh

    Springer Science and Business Media LLC

  • Two-Phase Privacy Preserving Big Data Hybrid Clustering for Multi-Party Data Sharing


  • Delay optimization and energy balancing algorithm for improving network lifetime in fixed wireless sensor networks
    Achyutha Prasad N., Chaitra H.V., Manjula G., Mohammad Shabaz, Ana Beatriz Martinez-Valencia, Vikhyath K.B., Shrawani Verma, and José Luis Arias-Gonzáles

    Elsevier BV

  • Resource Allocation Energy Efficient Algorithm for H-CRAN in 5G
    Manjula G, Pratibha Deshmukh, Udaya Kumar N. L., Víctor Daniel Jiménez Macedo, Vikhyath K B, Achyutha Prasad N, and Amit Kumar Tiwari

    Auricle Technologies, Pvt., Ltd.
    In today's generation, the demand for data rates has also increased due to the rapid surge in the number of users. With this increasing growth, there is a need to develop the next fifth generation network keeping in mind the need to replace the current 4G cellular network. The fifth generation (5G) design in mobile communication technology has been developed keeping in mind all the communication needs of the users. Heterogeneous Cloud Radio Access Network (H-CRAN) has emerged as a capable architecture for the newly emerging network infrastructure for energy efficient networks and high data rate enablement. It is considered as the main technology. Better service quality has been achieved by developing small cells into macro cells through this type of network. In addition, the reuse of radio resources is much better than that of homogeneous networks. In the present paper, we propose the H-CRAN energy-efficient methods. This energy-efficient algorithm incorporates an energy efficient resource allocation management design to deal to heterogeneous cloud radio access networks in 5G. System throughput fulfillment is elevating by incorporating an efficient resource allocation design by the energy consumption model. The simulation results have been demonstrated by comparing the efficiency of the introduced design with the existing related design.

  • DPMM: Data Privacy and Memory Management in Big Data Server using Hybrid Hashing Method
    Manjula GS and T. Meyyappan

    IEEE
    Data deduplication (Dedup) is commonly used in the cloud to save bandwidth and storage space by removing duplicate data sets before sending. Data integrity is protected during the Dedup process by encrypting it before it is reused. This paper proposes a DPMM framework for data privacy and memory management in a big data server using a hybrid hashing method. Some programmes use Apache Hadoop because the Hadoop Distributed File System (HDFS) offers a highly dependable static imitation strategy for processing data. The limitations are each file has a different access rate, using the same imitation factor across the board can weaken the performance. Considering this limitations, a research approach has been proposed to utilize predictive examination for progressively imitating the data. So to attain greater efficiency, Dynamic Data Partial Imitation (DDPI) algorithm is implemented, which helps to avoid excessive memory consumption. In the proposed, we have executed the partial imitation technique (DPMM), i.e., the data is fragmented and stored in four Hadoop servers partially to achieve fault tolerance. The proposed method provides the user-requested files even when there is a problem in any servers by this partial imitation technique. Before the imitation process, the files uploaded are checked for duplication to avoid repetition by implementing Secure Hash Algorithm-1 and 2 (SHA1 & SHA2) that apply the hash code of data to check ownership with code verification, thus reducing the excess consumption of storage. Finally, this method is compared with existing methods of execution time for various file sizes. The implemented result demonstrates that this proposed methodology gives much more efficient performance, redundancy and overhead is received.

  • Probability based selective encryption scheme for fast encryption of medical images
    Manjula G and Mohan H S

    ACM
    Hiding data using encryption is the major solution to deliver security for data transmitted over a connection amongst any pair of nodes, however by adopting selective encryption, the speed and security can be provided by encoding only a specified portion of the data bit. Visual and multimedia data protections such as images require special design considerations for use in medical applications. This research focuses on choosing an significant part of the medical image to hide the secret data and that can be achieved efficiently by selecting parts of the image that are more used in the normal mode. When the process of encryption is complete, the secured and encrypted data is transmitted to ensure a safe transport and delivery over the public network. This paper intends to propose a novel approach to encrypt data in medical images using probability equation for random selection of blocks for encryption. The background idea with respect to the proposed effort is to encrypt only fragment of the image for encryption using AES algorithm instead of encrypting the whole image. By doing th is we can save computation power, time and speed than using the traditional approach.

  • Improved Dynamic S-Box generation using Hash function for AES and its Performance Analysis
    G. Manjula and H.S. Mohan

    IEEE
    With the development of information technology and increasing demands for information security, various encryption methods have been attracted more and more attention in recent years. AES is one such symmetric key algorithm used for securing the data that transmits in the Internet. The strength of AES block cipher depends on the S-Box structure which is a nonlinear substitution operation. S-Boxes are fundamental component of symmetric key algorithms which performs substitution. Since the Substitution boxes are dynamically created, this fact makes it clear that both linear and differential cryptanalysis cannot be done on Dynamic S-Boxes. They are basically used in block ciphers to make the affiliation between key and cipher text more unfamiliar. There are lots of techniques used for generation of S-Box such as key dependent S-Box in which S-Box depends on the key, Bijection, Strict Avalanche criterion etc. This paper briefly analyzes the structure of AES algorithm and a dynamic S-Box is generated based on hash function. Also, the eminence of generated S-Box is been experimentally evaluated and compared along with the original AES for the simulation time.

  • Constructing key dependent dynamic S-Box for AES block cipher system
    Manjula G. and Mohan H.S.

    IEEE
    As the rapid evolution of digital data transaction in E-way is expanding, information safety is emerging with much more importance in data storage and broadcast. Cryptography has emerged as a significant solution which portrays a vivacious role in securing the information against several attacks. Advanced Encryption Standard block cipher (Known as AES) is an extensively studied and widely used cryptographic block cipher system to secure data and information. The strength of AES algorithm is determined by the choice of S-Box along with other aspects. This paper proposes a new technique to generate S-Box dynamically which will intensify the complexity of S-Box construction to encounter any possible attack on the fixed S-Box. Predefined static S-Boxes pose a weak point for the attackers to analyze certain cipher text pairs. The new S-boxes created are additionally dynamic, random and key dependent which attempts to escalate the complexity of the algorithm and furthermore mark the cryptanalysis more challenging. This paper discusses the importance of substitution S-boxes, their role in ensuring the strength of a cipher system and finally describes a new approach of generating dynamic S-box which is constructed centered on round key.

RECENT SCHOLAR PUBLICATIONS

  • Blockchain-Aware secure lattice aggregate signature scheme
    M Rasool, A Khatri, RR Maaliw, G Manjula, MSK Varma, S Agarwal
    Artificial Intelligence, Blockchain, Computing and Security Volume 1, 653-661 2023

  • Reliable Target Tracking Model Employing Wireless Sensor Networks
    HV Chaitra, M Patil, G Manjula, MK Bindiya, E Naresh
    SN Computer Science 4 (5), 446 2023

  • Delay optimization and energy balancing algorithm for improving network lifetime in fixed wireless sensor networks
    HV Chaitra, G Manjula, M Shabaz, AB Martinez-Valencia, KB Vikhyath, ...
    Physical Communication 58, 102038 2023

  • Application of Deep Neural Networks for Weed Detection and Classification
    R Ganesan, G Manjula, M Chandan, I Thamarai, S Rajavelu, UM Bhatt, ...
    2023 2nd International Conference on Applied Artificial Intelligence and 2023

  • Deep Learning Based Image De-Noising Method
    G Manjula, BR Mohan, CD Guruprakash, VS Rekha, G Nirmala
    NeuroQuantology 20 (13), 3900-3906 2022

  • Trading App Analyzer Using Implanted Sensing Technique In Iot Via Block Chain-Based Networks
    N Kalyani, G Manjula, RP Selvi, K Saravanan, M Vedaraj
    Journal of Positive School Psychology, 6855-6861 2022

  • Potential Sustainability in Storing Cloud Data with Privacy Preservation Scheme over E-Records in HealthCare Systems.
    G Manjula, N Kalyani, S Vijitha, A Packialatha, J Preethi
    International Journal of Early Childhood Special Education 14 (5) 2022

  • A Novel Trajectory Optimisation and Joint Resource Allocation for Mobile Edge Computing with Multi-UAV-Assisted Multi-Access
    R Megha, PN Achyutha, VS Rekha, BN Jagadeesh, G Manjula, H Rekha
    NeuroQuantology 20 (22), 3660 2022

  • A Survey on Trajectory Optimisation and Joint Resource Allocation for Multi-UAV-Assisted Multi-Access Mobile Edge Computing
    R Megha, PN Achyutha, VS Rekha, G Manjula, U Yamuna, ...
    Neuroquantology 20 (19), 4021 2022

  • Implementation of smart parking application using IoT and machine learning algorithms
    G Manjula, G Govinda Rajulu, R Anand, JT Thirukrishna
    Computer Networks and Inventive Communication Technologies: Proceedings of 2022

  • State-of-the-Art Analysis and Research Direction towards Secure Mobile Edge Computing in Transport System
    AAK Kumbhar, G Manjula, RR Kulkarni, PP Patavardhan
    Machine Learning Algorithms for Intelligent Data Analytics, 137 2022

  • A Secure Framework For Medical Image Encryption Using Enhanced AES Algorithm
    DMHS Manjula G
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 9 (2), 3837-3841 2020

  • Probability based Selective Encryption scheme for fast encryption of medical images
    DMHS Manjula G
    3rd International Conference on Advance Informatics for Computing Research, 1-7 2019

  • Improved Dynamic S-Box generation using Hash function for AES and its performance analysis
    DMHS Manjula G
    2nd IEEE International Conference on Green Computing and Internet of Things 2018

  • A study of Different methods of attacking and defending Cryptosystems
    DMHS Manjula G
    International Journal of Advanced Research in Computer and Communication 2017

  • Implementing AES Algorithm for Selective Encryption in Wireless Networks
    DMHS Manjula G
    International Journal of Advanced Research in Computer and Communication 2017

  • Constructing key dependent dynamic S-Box for AES block cipher system
    G Manjula, HS Mohan
    2016 2nd international conference on applied and theoretical computing and 2016

  • Constructing Key dependent Dynamic S-Box foe AES block Ciper System
    DMHS Manjula G
    2nd IEEE International Conference on Applied and Theoretical Computing and 2016

  • Named Data Networking Paradigm with Content Access Control (CAC) and Lightweight Integrity Verification (LIVE)
    M G
    IJERT 4 (22), 150-153 2016

  • A Survey of Commonly Used Cryptographic Algorithms in Information Security
    M G
    International journal of Engineering & computer science 4 (Issue 11 Nov 2015 2015

MOST CITED SCHOLAR PUBLICATIONS

  • Constructing key dependent dynamic S-Box for AES block cipher system
    G Manjula, HS Mohan
    2016 2nd international conference on applied and theoretical computing and 2016
    Citations: 42

  • Delay optimization and energy balancing algorithm for improving network lifetime in fixed wireless sensor networks
    HV Chaitra, G Manjula, M Shabaz, AB Martinez-Valencia, KB Vikhyath, ...
    Physical Communication 58, 102038 2023
    Citations: 32

  • Improved Dynamic S-Box generation using Hash function for AES and its performance analysis
    DMHS Manjula G
    2nd IEEE International Conference on Green Computing and Internet of Things 2018
    Citations: 17

  • Implementation of smart parking application using IoT and machine learning algorithms
    G Manjula, G Govinda Rajulu, R Anand, JT Thirukrishna
    Computer Networks and Inventive Communication Technologies: Proceedings of 2022
    Citations: 14

  • Probability based Selective Encryption scheme for fast encryption of medical images
    DMHS Manjula G
    3rd International Conference on Advance Informatics for Computing Research, 1-7 2019
    Citations: 9

  • A Secure Framework For Medical Image Encryption Using Enhanced AES Algorithm
    DMHS Manjula G
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 9 (2), 3837-3841 2020
    Citations: 7

  • A study of Different methods of attacking and defending Cryptosystems
    DMHS Manjula G
    International Journal of Advanced Research in Computer and Communication 2017
    Citations: 3