Manjusha Pandey

Work place: School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), India

E-mail: manjushapandey82@gmail.com

Website:

Research Interests: Human-Computer Interaction, Computer systems and computational processes, Computer Architecture and Organization, Network Architecture, Network Security, Data Structures and Algorithms

Biography

Manjusha Pandey is presently working as an Assistant Professor in the School of Computer Engineering, Kalinga Institute of Industrial Technology, and Bhubaneswar. She is pursuing her PhD from Indian Institute of Information Technology, Allahabad. She has more than 10 research publications to her credit in journals and conferences of repute. Her research interest areas include Wireless Sensor Network, Security and Privacy in Wireless Sensor Network, Human Computer Interaction and Computer Networks.

Author Articles
Adaptive Model for Dynamic and Temporal Topic Modeling from Big Data using Deep Learning Architecture

By Ajeet Ram Pathak Manjusha Pandey Siddharth Rautaray

DOI: https://doi.org/10.5815/ijisa.2019.06.02, Pub. Date: 8 Jun. 2019

Due to freedom to express views, opinions, news, etc and easier method to disseminate the information to large population worldwide, social media platforms are inundated with big streaming data characterized by both short text and long normal text. Getting the glimpse of ongoing events happening over social media is quintessential from the viewpoint of understanding the trends, and for this, topic modeling is the most important step. With reference to increase in proliferation of big data streaming from social media platforms, it is crucial to perform large scale topic modeling to extract the topics dynamically in an online manner. This paper proposes an adaptive framework for dynamic topic modeling from big data using deep learning approach. Approach based on approximation of online latent semantic indexing constrained by regularization has been put forth. The model is designed using deep network of feed forward layers. The framework works in an adaptive manner in the sense that model is extracts incrementally according to streaming data and retrieves dynamic topics. In order to get the trends and evolution of topics, the framework supports temporal topic modeling, and enables to detect implicit and explicit aspects from sentences also.

[...] Read more.
A Comprehensive Survey on Cloud Computing

By Md. Imran Alam Manjusha Pandey Siddharth S Rautaray

DOI: https://doi.org/10.5815/ijitcs.2015.02.09, Pub. Date: 8 Jan. 2015

Cloud Computing is an innovation ideas that helps in reducing the computing cost. Cloud Computing offers better computing through improved utilization and reduced administration and infrastructure costs. Cloud computing is the long-held dream of computing as a utility. Cloud Computing is the combination of Software as a Service (SaaS) and Utility Computing. Cloud computing shares characteristics with autonomic computing, peer to peer, grid computing, client server model, mainframe computer and utility computing. It has various open source resources which gives different platform for better computing utilization. Cloud computing are managed by Cloud Management tools, loaded and tested by various other software testing tools. Cloud computing modelling and simulation is done by CloudSim or SPECI or GroundSim or DCSim on the basis of testing benchmark. The application of Cloud Computing is discussed.

[...] Read more.
Enhanced Ring Signatures Schemes for Privacy Preservation in Wireless Sensor Networks

By Sarthak Mishra Manjusha Pandey

DOI: https://doi.org/10.5815/ijmecs.2014.11.08, Pub. Date: 8 Nov. 2014

Advancements in the domains of low-data-rate wireless networking and micro-electro-mechanical systems enabled the inception of a new networking domain, called wireless sensor network. These ad-hoc kind of networks have diversified applications in battlefield surveillance, disaster monitoring, intrusion detection etc. These networks consist plethora of sensor nodes which are severely resource constrained. As the application of the wireless sensor network is increasing, there is an emerging need for the security and privacy scheme which makes the network secure from various attacks and hide the ongoing activities in the network from a non-network entity. Privacy in wireless sensor network is yet a challenging domain to work on. Lot of work has been done to ensure privacy in the network. These relate to provide privacy in terms of the network entity and the privacy of the sensed information. Most of the solutions till date is based upon routing in the network layer, random walk based flooding, dummy data injection and cross layer solutions. Each of the schemes induce some overhead in the network. A light weight scheme is always desired for resource constraint wireless sensor networks. In this work we will propose a scheme which assures the privacy of the nodes in the network along with the privacy of the event generated in the network through a self organizing scheme. Through various simulation results the validity of our scheme among different network scenarios will be shown. We will also prove through graphical results that our proposed scheme enhances network lifetime quite satisfactorily.

[...] Read more.
Single and Multiple Hand Gesture Recognition Systems: A Comparative Analysis

By Siddharth Rautaray Manjusha Pandey

DOI: https://doi.org/10.5815/ijisa.2014.11.08, Pub. Date: 8 Oct. 2014

With the evolution of higher computing speed, efficient communication technologies, and advanced display techniques the legacy HCI techniques become obsolete and are no more helpful in accurate and fast flow of information in present day computing devices. Hence the need of user friendly human machine interfaces for real time interfaces for human computer interaction have to be designed and developed to make the man machine interaction more intuitive and user friendly. The vision based hand gesture recognition affords users with the ability to interact with computers in more natural and intuitive ways. These gesture recognition systems generally consist of three main modules like hand segmentation, hand tracking and gesture recognition from hand features, designed using different image processing techniques which are further integrated with different applications. An increase use of new interfaces based on hand gesture recognition designed to cope up with the computing devices for interaction. This paper is an effort to provide a comparative analysis between such real time vision based hand gesture recognition systems which are based on interaction using single and multiple hand gestures. Single hand gesture based recognition systems (SHGRS) have fewer complexes to implement, with a constraint to the count of different gestures which is large enough with various permutations and combinations of gesture, which is possible with multiple hands in multiple hand gesture recognition systems (MHGRS). The thorough comparative analysis has been done on various other vital parameters for the recognition systems.

[...] Read more.
Distributed Denial of Service Attacks: A Review

By Sonali Swetapadma Sahu Manjusha Pandey

DOI: https://doi.org/10.5815/ijmecs.2014.01.07, Pub. Date: 8 Jan. 2014

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

[...] Read more.
Other Articles