Skip to main content

Showing 1–12 of 12 results for author: Jhaveri, R H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.07912  [pdf, other

    cs.HC cs.AI

    Spatial Computing: Concept, Applications, Challenges and Future Directions

    Authors: Gokul Yenduri, Ramalingam M, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Rutvij H Jhaveri, Ajay Bandi, Junxin Chen, Wei Wang, Adarsh Arunkumar Shirawalmath, Raghav Ravishankar, Weizheng Wang

    Abstract: Spatial computing is a technological advancement that facilitates the seamless integration of devices into the physical environment, resulting in a more natural and intuitive digital world user experience. Spatial computing has the potential to become a significant advancement in the field of computing. From GPS and location-based services to healthcare, spatial computing technologies have influen… ▽ More

    Submitted 30 January, 2024; originally announced February 2024.

    Comments: Submitted to peer reviewe

  2. arXiv:2305.10435  [pdf, other

    cs.CL cs.AI

    Generative Pre-trained Transformer: A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions

    Authors: Gokul Yenduri, Ramalingam M, Chemmalar Selvi G, Supriya Y, Gautam Srivastava, Praveen Kumar Reddy Maddikunta, Deepti Raj G, Rutvij H Jhaveri, Prabadevi B, Weizheng Wang, Athanasios V. Vasilakos, Thippa Reddy Gadekallu

    Abstract: The Generative Pre-trained Transformer (GPT) represents a notable breakthrough in the domain of natural language processing, which is propelling us toward the development of machines that can understand and communicate using language in a manner that closely resembles that of humans. GPT is based on the transformer architecture, a deep neural network designed for natural language processing tasks.… ▽ More

    Submitted 21 May, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: Submitted to peer review

  3. BC-IoDT: Blockchain-based Framework for Authentication in Internet of Drone Things

    Authors: Junaid Akram, Awais Akram, Rutvij H. Jhaveri, Mamoun Alazab, Haoran Chi

    Abstract: We leverage blockchain technology for drone node authentication in internet of drone things (IoDT). During the authentication procedure, the credentials of drone nodes are examined to remove malicious nodes from the system. In IoDT, drones are responsible for gathering data and transmitting it to cluster heads (CHs) for further processing. The CH collects and organizes data. Due to computational l… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 6 pages, 3 figures, ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond

    Journal ref: 2022 ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond

  4. arXiv:2209.04160  [pdf

    cs.AI

    Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions

    Authors: Rajeswari Chengoden, Nancy Victor, Thien Huynh-The, Gokul Yenduri, Rutvij H. Jhaveri, Mamoun Alazab, Sweta Bhattacharya, Pawan Hegde, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu

    Abstract: The rapid progress in digitalization and automation have led to an accelerated growth in healthcare, generating novel models that are creating new channels for rendering treatment with reduced cost. The Metaverse is an emerging technology in the digital space which has huge potential in healthcare, enabling realistic experiences to the patients as well as the medical practitioners. The Metaverse i… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

    Comments: In peer review

  5. arXiv:2207.13419  [pdf, other

    cs.CR

    EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

    Authors: Chintan Patela, Ali Kashif Bashirb, Ahmad Ali AlZubic, Rutvij H Jhaveri

    Abstract: Industrial IoT (IIoT) aims to enhance services provided by various industries such as manufacturing and product processing. IIoT suffers from various challenges and security is one of the key challenge among those challenges. Authentication and access control are two notable challenges for any Industrial IoT (IIoT) based industrial deployment. Any IoT based Industry 4.0 enterprise designs networks… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  6. arXiv:2206.03585  [pdf, other

    cs.CR cs.AI

    XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions

    Authors: Gautam Srivastava, Rutvij H Jhaveri, Sweta Bhattacharya, Sharnil Pandya, Rajeswari, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Jon G. Hall, Mamoun Alazab, Thippa Reddy Gadekallu

    Abstract: In the past few years, artificial intelligence (AI) techniques have been implemented in almost all verticals of human life. However, the results generated from the AI models often lag explainability. AI models often appear as a blackbox wherein developers are unable to explain or trace back the reasoning behind a specific decision. Explainable AI (XAI) is a rapid growing field of research which he… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

    Comments: Submitted to peer review

  7. arXiv:2004.06380  [pdf

    cs.NI

    A Survey of Energy Efficient Schemes in Ad-hoc Networks

    Authors: Priya P. Patel, Rutvij H. Jhaveri

    Abstract: Ad hoc network is a collection of different types of nodes, which are connected in heterogeneous or homogeneous manner. It is also known as self-organizing-wireless network. The dynamic nature of ad hoc networks make them more attractive, which is used in many different applications. Every coin has two sides: one is the advantage part and other is disadvantages, in the same manner nature of ad hoc… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

  8. arXiv:2004.06378  [pdf

    cs.NI

    Various Secure Routing Schemes for MANETs: A Survey

    Authors: Priya R. Soni, Charmi A. Joshi, Dhwani R. Bhadra, Nikita P. Vyas, Rutvij H. Jhaveri

    Abstract: MANET is an infrastructure less as well as self configuring network consisting of mobile nodes communicating with each other using radio medium. Its exclusive properties such as dynamic topology, decentralization, and wireless medium make MANET to become very unique network amongst other traditional networks, thereby determining security to be a major challenge. In this paper, we have carried out… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

  9. Addressing Packet Drop** Misbehavior using Metaheuristic Approach: A Survey

    Authors: Kishan N. Patel, Rutvij H. Jhaveri

    Abstract: A Mobile Ad hoc Network can be said as a collection of mobile nodes, which builds a dynamic topology and a resource constrained network. Due to dynamic nature routing is challenging in MANET. In Mobile Ad hoc Networks different type of attack is possible. By manipulation in routing and attacks against data are reasoned by malicious nodes. MANETs are susceptible to various attacks from selfish node… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

  10. Managing Industrial Communication Delays with Software-Defined Networking

    Authors: Rutvij H. Jhaveri, Rui Tan, Arvind Easwaran, Sagar V. Ramani

    Abstract: Recent technological advances have fostered the development of complex industrial cyber-physical systems which demand real-time communication with delay guarantees. The consequences of delay requirement violation in such systems may become increasingly severe. In this paper, we propose a contract-based fault-resilient methodology which aims at managing the communication delays of real-time flows i… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

  11. Real-time QoS Routing Scheme in SDN-based Robotic Cyber-Physical Systems

    Authors: Rutvij H. Jhaveri, Rui Tan, Sagar V. Ramani

    Abstract: Industrial cyber-physical systems (CPS) have gained enormous attention of manufacturers in recent years due to their automation and cost reduction capabilities in the fourth industrial revolution (Industry 4.0). Such an industrial network of connected cyber and physical components may consist of highly expensive components such as robots. In order to provide efficient communication in such a netwo… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

  12. arXiv:1003.4070  [pdf

    cs.NI

    Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols

    Authors: Viral V. Kapadia, Sudarshan N. Patel, Rutvij H. Jhaveri

    Abstract: Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a collection of nodes. We will discuss a few problems introduced by the RTS/CTS mechanism of collision avoidance and focus on the virtual jamming problem, which allows a malicious node to effectively jam a large fragment of a wireless network at minimum expense of power. We have also discussed WiCCP (Wireless… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/