scispace - formally typeset
T

T. Poongodi

Researcher at Galgotias University

Publications -  47
Citations -  301

T. Poongodi is an academic researcher from Galgotias University. The author has contributed to research in topics: Computer science & Big data. The author has an hindex of 5, co-authored 30 publications receiving 121 citations.

Papers
More filters
Book ChapterDOI

Wearable Devices and IoT

TL;DR: This part of chapter will contribute towards understanding the recent research work, issues, challenges, and opportunities in applying enabling technologies for WIoT, as well as how well the security and privacy can be incorporated is also discussed.
Journal ArticleDOI

Heart Disease Prediction using Exploratory Data Analysis

TL;DR: The risk factors that causes heart disease is considered and predicted using K-means algorithm and the analysis is carried out using a publicly available data for heart disease.
Journal ArticleDOI

Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks

TL;DR: A novel technique using Localized Secure Architecture for MANET (LSAM) routing protocol is proposed to detect and prevent co-operative black hole attack and it is shown that the proposed protocol is more secured and efficient.
Book ChapterDOI

IoT Sensing Capabilities: Sensor Deployment and Node Discovery, Wearable Sensors, Wireless Body Area Network (WBAN), Data Acquisition

TL;DR: This chapter presents the overview of wearable sensors for tracking physiological and physical changes in daily life, their basics and applications, the significance of localization in on-body area network and it gives an overview about evaluating the performance of localization systems.
Journal ArticleDOI

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

TL;DR: A resistive to selective drop attack (RSDA) scheme to provide effective security against selective drop attacks is presented and a lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular drop attack.