Awadhesh Kumar

Work place: Department of Computer Science and Engineering, Kamla Nehru Institute of technology, Sultanpur, India

E-mail: awadhesh@knit.ac.in

Website: https://scholar.google.com/citations?hl=en&user=k5dgZE4AAAAJ&view_op=list_works&sortby=pubdate

Research Interests: Wireless Sensor Networks, Wireless Ad Hoc Network, Computer Networks, Wireless Networks

Biography

Dr. Awadhesh Kumar has completed his B.E. degree from G.B. Pant Engineering college, Pauri (Garhwal) in 1999 and M.Tech. in Computer Science from A.K.T.U., Lucknow, U.P. in 2006 and Ph.D. from M.N.N.I.T., Allahabad, UP, India in 2017. He is presently working as Associate Professor and Head, in the dept. of Computer Science &Engg., in KNIT, Sultanpur, UP, India since 2000. His teaching and research interests include Computer Networks, Wireless Networks, Mobile Ad-Hoc Networks, Wireless Sensor Networks.

Author Articles
Performance Analysis of HWMP Protocol in Wireless Mesh Network

By Jyoti Mishra Awadhesh Kumar Akash Raghuvanshi

DOI: https://doi.org/10.5815/ijwmt.2023.02.04, Pub. Date: 8 Apr. 2023

Wireless Mesh Networks (WMNs) play a vital role in next-generation wireless networking, with applications ranging from last-mile wireless internet, transportation systems enterprise, enterprise networks, home networking, and wireless community networks are all examples of wireless community networks.Individual vendors created several proprietary mesh systems, but IEEE organized the IEEE 802.11s task force to design a meshed networking exposition to assure interoperability.In this paper, we evaluate the Quality of service parameters such as throughput, delay, PDR and jitter of mesh protocol.We simulated the HWMP protocol's performance,the present work is an attempt to address the problem related to wireless mesh networks by minimizing the delay and maximizing the throughput of the network.

[...] Read more.
An E-mail Spam Detection using Stacking and Voting Classification Methodologies

By Aasha Singh Awadhesh Kumar Ajay Kumar Bharti Vaishali Singh

DOI: https://doi.org/10.5815/ijieeb.2022.06.03, Pub. Date: 8 Dec. 2022

Nowadays, we use emails almost in every field; there is not a single day, hour, or minute when emails are not used by people worldwide. Emails can be categorized into two types: ham and spam. Hams are useful emails, while spam is junk or unwanted emails. Spam emails may carry some unwanted, harmful information or viruses with them, which might harm user privacy. Spam mails are used to harm people by wasting their time and energy and stealing valuable information. Due to increasing in spam emails rapidly, spam detection and filtering are the prominent problems that need to be solved. This paper discusses various machine learning models like Naïve Bayes, Support Vector Machine, Decision Tree, Extra Decision Tree, Linear regression., and surveys about these machine learning techniques for email spam detection in terms of their accuracy and precision. In this paper, a comprehensive comparison of these techniques and stacking of different algorithms is also made based on their speed, accuracy, and precision performance.

[...] Read more.
Pure-Octet Extraction based Technique for Identifying Malicious URLs based on IP Address Attributes

By Aasha Singh Awadhesh Kumar Ajay Kumar Bharti Vaishali Singh

DOI: https://doi.org/10.5815/ijwmt.2022.06.03, Pub. Date: 8 Dec. 2022

On the basis of characteristics derived from IPv4 addresses, this paper offers a method for identifying interaction linked with website-based malware and then modelling a machine-learning-based classifier.  In this research work, a modified approach is proposed for detecting fraudulent websites and compared with other methods like SVM assessment of IP addresses, octet-based technique, modified extended version of octet-based technique, and bit string-based characteristics. This modified approach is based on the fact that logical addressing is more reliable and consistent than other measures like URLs and DNS. The characteristic sequence which makes up URLs and domain names are more changeable with respect to IP addresses which are less changeable in comparison to URLs or domain names. The IPv4 address length is encoded into 4-byte space. Here, we have evaluated our modified approach with valid IP addresses from Kaggle [11], published on January 16, 2018, have been used to validate the efficacy of their metho.

[...] Read more.
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation

By Awadhesh Kumar Prabhat Singh Vinay Kumar Neeraj Tyagi

DOI: https://doi.org/10.5815/ijcnis.2013.09.06, Pub. Date: 8 Jul. 2013

A Mobile Ad-hoc Network (MANET) is a collection of multi-hop wireless mobile nodes among which the communication is carried out without any centralized control or fixed infrastructure. MANET is a self-organized, self-configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The wireless link in the network are highly error prone and can go down frequently due to the mobility of nodes, interference and less infrastructure. Hence, because of the highly dynamic environment routing in MANET is a very difficult task. Over the last decade various routing protocols have been proposed for the mobile ad-hoc network and the most important among all of them are AODV, DSR, DSDV and CBRP. This research paper gives the overview of these routing protocols as well as the characteristics and functionality of these routing protocols along with their pros and cons and then make their comparative analysis in order to measure the performance of the network. The main objective of this paper is to compare the performance of all the four routing protocols and then to make the observations about how the performance of these routing protocols can be improved. Performance of these routing protocols are compared on the basis of various parameters such as throughput, delay and packet delivery ratio.

[...] Read more.
Other Articles