Sunday, November 11, 2012

About Us:

Rakesh Kumar Jha (PhD)

www.svnit.ac.in

www.rakeshjha.com
About-Me
Mr. Jha Rakesh presently is Research Scholar at S. V. National Institute of Technology, Surat, INDIA. He has completed his B.Tech. (Hon’s in Electronics and Communication) from Bhopal and obtained M.Tech. (Hon’s in Wireless Communications) from NIT, Jalandhar, India. He have done live project in development and support both in Industries also. He has published more than 20 International conferences and journal papers. His one concept related to Router of Wireless Communication has been accepted by ITU (International Telecommunication Union) in 2010. He has received Young Scientist Author award by ITU for this work. He has received APAN fellowship in 2011. He is member of IEEE, GISFI and SIAM, International Association of Engineers (IAENG) and ACCS (Advance Computing and Communication Society). He is now pursuing PhD in S. V. National Institute of Technology, Surat, INDIA. Surat. His research interest’s area is Wireless and Optical Communication (OPTI SYSTEM). Currently he is doing his research work in WiMAX and its Security issues. He is working on OPNET Modeler simulation tool and open source LTE-SIM and NS2 tools for Wireless Communication.
www.rakeshjha.inwww.rakeshjha.comFree-to contact:
jharakesh.45@gmail.com


List of Publications, Award and Fellowship

During the period of program, several research paper was published/Accepted for publication in peer reviewed international journal and conference proceeding. The detailed lists of these papers relevant to the present PhD program are appended below.
Book Chapter:
1. “A Performance of Security Aspect in WiMAX Physical Layer with Different modulation schemes “Communications (CCIS), 1, Volume 125, Advances in Computing, Communication and Control, 2011, Part 2, Pages 433-440, Springer Verlag/Heidelberg
2. “Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology” Lecture Notes in Computer Science (LNCS), 2012, Volume 7135, Advanced Computing, Networking and Security, Pages 279-28, Springer Verlag/Heidelberg
3. “An Effective Defense Mechanism for Detection of DDoS Attack on Application Layer Based on Hidden Markov Model” Advances in Intelligent and Soft Computing(AISC), 2012, Volume 132, Proceedings of the International Conference on Information Systems Design and Intelligent Applications 2012 (INDIA 2012) held in Visakhapatnam, India, January 2012, Pages 943-950, Springer Verlag/Heidelberg
4. “An Optimum Approach for Radio Resource Allocation (RRA) in Mobile WiMAX Network” Lecture Notes in Computer Science (LNCS), 2012, Volume 7135, Advanced Computing, Networking and Security, Pages 357-365, Springer Verlag/Heidelberg
Journal Publication:
1."Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," Int'l J. of Communications, Network and System Sciences, Vol. 5 No. 6, 2012, pp. 353-367.
2. “Fair Resource Allocation in Mobile WiMAX Network: An Optimum Approach”, IJCISIM, Vol 6, 2013 (Accepted with revised version)
3."WiMAX System Simulation and Performance Analysis under the Influence of Jamming," Wireless Engineering and Technology, Vol. 1 No. 1, 2010, pp. 20-26.
4. “A Survey of Mobile WiMAX IEEE 802.16m Standard “Vol 8, No.1; IJCSIS, 2010, pp. 125-131 
5. “A Survey of Mobile WiMAX IEEE 802.16e Standard” Vol 2, No 2,'IJCNE', 2010, pp. 17-23
6. “How WiMAX will deploy in our country India”, Vol 1, No 1, IJACSA 2010, pp. 50-54 
7. “A Journey on WiMAX and its security Issues” Vol 1, No 4, IJCSIT 2010, pp. 256-263 
8. “A Performance Comparison with Modulation Schemes in WiMAX Physical Layer Security Aspect”, International Journal of Computer Applications Vol 6, No 8, PP.24–27, September 2010, Published By Foundation of Computer Science.
9. Location based Radio Resource Allocation (LBRRA) for WiMAX Network, Revised Version Accepted for ICST Transaction, In July 2013(Expected)
10. Investigation of Internet Key Exchange (IKE) in terms of Security Gateway Security (GSE) In WiMAX Network”, IJCA Special Issue on Network Security and Cryptography’s (1), pp. 59-66, December 2011,Published by Foundation of Computer Science, New York, USA
11. Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS)," Wireless Engineering and Technology, Vol. 2 No. 3, 2011, pp. 135-145.
Conference Publication:
1 Performance Comparison of Intelligent Jamming In RF (Physical) LAYER with WLAN Ethernet Router and WLAN Ethernet Bridge, Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services, Dec-2010 ITU-T, pp. 1-6 ITU (International Telecommunication Union)-T 2010* -- Young Author Award, By ITU-T IEEE Xplore, IEEE Kaleidoscope Magazine 
2. “Location Based Radio Resource Allocation (LBRRA) In WiMAX and WiMAX-WLAN Interface network”, Communication Systems and Networks (COMSNETS), Fourth International Conference , Jan 2012, COMSNET 2012, IEEE Xplore(Student Grant), 2012
3.Location based Radio Resource Allocation (LBRRA) in Mobile WiMAX Network: A Best Possible Approach with Algorithm Analysis” APAN Proceeding, Nominated for Student Paper, Fellowship by APAN-NSW, Sri Lanka 2012.
4. “Location Based Radio Resource Allocation (LBRRA) for WiMAX Networks”, Advanced Networks and Telecommunication Systems (ANTS), 2011 IEEE 5th International Conference on, Dec 2011, pp. 1-6, IEEE ANTS 2011, IEEE Xplore
5. " Security analysis of WiMAX network: With Misbehavior Node attack", Information and Communication Technologies (WICT), 2011 World Congress on, pp. 391-398, IEEE Xplore
6. “Location based WiMAX network optimization: power consumption with traffic load”, ACWR’11,Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, pp. 503-508, ACM New York, NY, USA ©2011 
7. “A Performance comparison for QoS with different WiMAX environment for video application”, ICWET '11 Proceedings of the International Conference & Workshop on Emerging Trends in Technology ICWET1, pp. 785-790, ACM New York, NY, USA ©2011 
8. “Resource Allocation Algorithm for WiMAX Systems”, Computers & Informatics (ISCI), 2011 IEEE Symposium on, March 2011, pp 753-758, IEEE Xplore
9. “Performance Analysis under the Influence of Jamming for WiMAX System”, Emerging Applications of Information Technology (EAIT), pp. 292-297, Feb 2011 ,IEEE Xplore
10. “Performance of location based WiMAX network for QoS with optimal base stations (BS)”,
11. “Resource Allocation Downlink OFDMA in WiMAX Systems”, ICCCS '11 Proceedings of the 2011 International Conference on Communication, Computing & Security, pp.   82-85, ACM, New York, NY, USA ©2011  
12. “Role of Scalable OFDM for VoIP in Mobile WiMAX,’WASET' 2010
13.  “Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network”, 3rd International Conference on Computer and Communication Technology (ICCCT-2012), Accepted, Nov 2012, IEEE Xplore
14. “Security Comparison between Wired and Wireless network through VPN and firewall” International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), 2010  'ITC' 2010, pp. 281-283, IEEE Xplore 
15. “Geo-Encryption - A New Direction to Secure Traditional SSL VPN”, Eighth International Conference on Information Technology: New Generations (ITNG), April 2011, pp. 1170-1171, IEEE Xplore  
My Achievement in Research:
1. Received Young Author Award by ITU-T 2010
2. Received fellowship by APAN 2011
3. Received Student grant by COMSNET 2012.
4. Selected fellowship by APAN-NSW 2012
5. PhD work has been accepted by Doctoral Consortium in NIT, Suratkal --- Proceeding in LNCS Springer
6. PhD work has been accepted by ACWR-2011 in PhD Forum and Proceeding for ACM/IEEE,
PhD Forum and Presentation:
1. WiMAX and Its Security Issues: Performance Analysis, Cross Layer Optimization and Security issues – Tutorial Session in NIT, Suratkal
2. WiMAX and Its Security Issues: Location Based Performance Optimization and Security Analysis
3. A Performance, Optimization and Security Algorithms Analysis: For WiMAX Networks, Accepted in SecurIT 2012 - First International Conference on Security of Internet of Things, August 2012.
Book Published:
 Security Issues in AD-HOC and Infrastructure (WLAN) Networks-Wireless communication and Its Security Issues with OPNET Modeler-- ISBN NO-- ISBN 978-3-8465-1395-8