作者:
M. RajendiranS.K. SrivatsaPh. D. Research scholar
Department of Computer Science and Engineering Sathyabama University Chennai-600119.India Associate Professor
Department of Master of Computer Applications Panimalar Engineering College Chennai -600123 India Senior Professor
Department of Computer Science and Engineering St. Josephs College of Engineering Chennai-600119 India
Mobile ad hoc networks (MANET) are provisionally connected networks with no permanent infrastructure. A mobile ad hoc network is a self-organized and energetically reconfigurable wireless network without wired infrast...
详细信息
Mobile ad hoc networks (MANET) are provisionally connected networks with no permanent infrastructure. A mobile ad hoc network is a self-organized and energetically reconfigurable wireless network without wired infrastructure and central administration. Nodes in the mobile ad hoc network can immediately create a communication structure while each node moves in a random way. Multicasting is capable of performing required services for ad hoc applications. The dynamic nature of the network topology and limited resources, maintaining and finding the path for multicasting data is still further challenging. Several protocols have been designed for multicasting in mobile ad hoc networks. On demand multicast routing protocol is one such protocol. ODMRP is mesh based and on-demand protocol that uses forwarding group to communicate a mesh for each multicasting group. The aim of the proposed algorithm is to find the stable path selection in ODMRP for forwarding packets. The basic on demand multicast routing protocol path selection uses minimum delay principle. The proposed algorithm considers node energy in path selection from source to destination. This article discusses the studies on output parameters such as control overhead and end to end delay by varying the input parameters viz., multicast groups size and mobility in the developed algorithm. Experimental results confirm that this approach can improve stability of path due to node energy consumption.
Recently, the necessity for power saving in Wireless Sensor Networks (WSNs) is crucial particularly in mission essential fields like military and medical applications. A communication network consists of nodes, every ...
详细信息
Recently, the necessity for power saving in Wireless Sensor Networks (WSNs) is crucial particularly in mission essential fields like military and medical applications. A communication network consists of nodes, every of that has computing power and may transmit and receive messages over communication links, in wireless. During this paper think about zigbee network formation and provides network protection and application service disbursed with table formation. We show that through this decision process, nodes with higher energy level are more likely to be assigned to parents with a less depth. Mac layer utilize the tree formula to see tree configuration subsequently and also the state maintenance procedures are stored within the table that is taken to the routing layer power aware protocol.
In this paper, we present an on-line electronic payment system for low-value transaction. We use the concept of signcryption for each communication between any pair of entities and offers token updation instantly as a...
详细信息
In this paper, we present an on-line electronic payment system for low-value transaction. We use the concept of signcryption for each communication between any pair of entities and offers token updation instantly as an add-on feature to existing on-line e-cash systems where token is the payment instrument (containing electronic cash) which acts as an electronic wallet. In our system, the token is issued and authenticated by Issuing Bank (token issuer). Merchant verifies the user and sends authenticated transaction details to Issuing Bank. Later Issuing Bank verifies approval of both customer and merchant. The merchant is also verified by its financial institution. Unlike the existing e-payment system question of double spending of e-cash arises because each transaction are made uniquely identifiable and updation is instantly done by Issuing bank. Hence no separate protocols are needed to be developed for handling disputes. The proposed scheme provide anonymity, authenticity, confidentiality and fairness.
Text mining is a growing innovative field that endeavors to collect significant information from natural language processing term. It might be insecurely distinguished as the course of examining texts to extract infor...
详细信息
The infrastructureless nature of communication in Mobile Ad hoc NETworks (MANET) pose many challenges to the researchers in terms of improving the reliability within the constraints of limited resources. Most of the p...
详细信息
The infrastructureless nature of communication in Mobile Ad hoc NETworks (MANET) pose many challenges to the researchers in terms of improving the reliability within the constraints of limited resources. Most of the performance measures and evaluation on different protocols in various network conditions proved the trustworthiness of the routing schemes as well as their limitations. In the present investigation, a statistical analysis of the simulated network characteristics was performed using response surface method for a possible prediction of the influence of network conditions on the response variables by using AODV and its multi-path variant AOMDV as the routing protocol. The mobility and workload was primarily varied at different levels and the responses such as throughput and end-to-end delay was measured. The optimization of the given input data provided a clear understanding of the effect of mobility and workload on the response variables.
Memories are the most defect sensitive parts in a machine computer. Conventionally, variations of March test are extensively used for functional test of SRAMs and DRAMs. In this work, we propose a CA (Cellular Automat...
Memories are the most defect sensitive parts in a machine computer. Conventionally, variations of March test are extensively used for functional test of SRAMs and DRAMs. In this work, we propose a CA (Cellular Automata) based scheme for efficient implementation of March test with the target to realize fault detection in high speed memories. The special class of CA referred to as the SACA is used for the purpose. The regular structure of CA enables low cost implementation of test logic for the memory chip that is inherently regular in structure. Utilization of the existing memory cells, while designing the CA based test logic, ensures drastic reduction in the test overhead.
With the memorable start and massive adoption of cloud concepts, infrastructures and platforms, there is a paradigm shift in the IT landscape. That is, IT solutions and services are being developed, debugged, deployed...
详细信息
ISBN:
(纸本)9781457715808;9781457715839
With the memorable start and massive adoption of cloud concepts, infrastructures and platforms, there is a paradigm shift in the IT landscape. That is, IT solutions and services are being developed, debugged, deployed and delivered from clouds to be conveniently consumed by global users via the open and public web. The point is that the web and the cloud resources are smartly combined and leveraged to ring in a series of delectable improvements and improvisations in the ways and means in which IT is being approached, analyzed, and articulated. With the availability of slim and sleek devices in our hands and pockets, the cloud idea is to enter into a totally exotic and eerie phase. One noteworthy derivative out of all these hot happenings in the cloud world is the eruption of service oriented cloud applications (SOCAs) due to the cool convergence of service orientation and cloud paradigms. In this paper, we have explained the performance bottlenecks of SOCAs by taking into account a number of diverse scenarios. Further on, we have presented a new performance calculation as well as enhancement mechanism for this type of flexible and futuristic cloud-based applications.
Component based software engineering advocates acquisition, variation and integration of reusable software components to rapidly develop complex systems with minimum effort and cost. Components are essential part of c...
详细信息
Component based software engineering advocates acquisition, variation and integration of reusable software components to rapidly develop complex systems with minimum effort and cost. Components are essential part of component based software development. Researchers are striving hard to identify metrics that help in estimating complexity of component based system. Interactions /interfaces among components play a major role in contributing complexity to a component based system. In this paper, we have proposed two metrics for measuring complexity of interface and interface dependency of component based system. These metrics are based on different constituents of an interface like interface methods and instance variables with different weights assigned to them. These interfaces can be represented by adjacency matrix used in graph theory. Strength of proposed metrics is computed using weighted assignment technique. Empirical evaluation is done using a case study. The metrics are also validated on Java Beans. Result of present study is quite encouraging and may further help in estimating complexity of components.
In data mining, frequent itemsets plays an important role which is used to identify the correlations among the fields of *** this paper, we propose a new association rule mining algorithm called Double Hashing Based F...
详细信息
In data mining, frequent itemsets plays an important role which is used to identify the correlations among the fields of *** this paper, we propose a new association rule mining algorithm called Double Hashing Based Frequent Itemsets, (DHBFI) in which hashing technology is used to store the database in vertical data format. This double hashing technique is mainly preferred for avoiding the major issues of hash collision and secondary clustering problem in frequent itemset generation. Hence this proposed hashing technique makes the computation easier, faster and more *** this algorithm eliminates unnecessary redundant scans in the database and candidate itemset generation which leads to less space and time complexity.
This paper presents a Steganography Telecom System for data cryptography, based on a Chua's Circuit Chaotic Noise Generator. The cipher text is randomly distributed on a cover image in a stochastic mode. To achiev...
详细信息
暂无评论