A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saranya, V.
- Dynamic Security in Wireless Networks by Using Multiple Path Routing Algorithm
Authors
1 IT Department, Sri Krishna College of Engineering and Technology, Coimbatore, IN
2 IT Department, Adhiyamaan College of Engineering, Hosur, IS
Source
Wireless Communication, Vol 3, No 15 (2011), Pagination: 1093-1096Abstract
Wireless sensor networks (WSN) has two basic attacks while transferring packets from source to destination. They are Compromise Node (CN) attack and Denial of Service (DOS) attack. CN will cooperate with the hacker so that they can find the paths of neighbour routes easily, in DOS the hacker finds the node and block the information. In both CN and DOS black holes are generated which will not transmit the received packets. To overcome these attacks in WSN randomized multiple path algorithm is used. So, every node in the network receives the packets and retransmits it once. Even though the hacker finds the randomized multiple path routes they cannot point out the routes traversed by each packet which is not feasible. By using this algorithm the routes become highly dispersive and it becomes energy efficient. In the proposed system the black holes formed in CN and DOS are overcome by using DSDV (Destination Sequenced Distance Vector Routing) and RIP(Routing Information Protocol)protocols. Instead of selecting pre-computed set of routes, multiple paths are set by the nodes randomly. So, at each time the information packets are send in different paths by which the packets can be sent securely. Large numbers of routes are generated for each source and destinations where the hackers cannot hack the packets easily. Thus, it is difficult for the hackers to compromise or jam all possible routes from source to destination which is practically infeasible.Keywords
Wireless Sensor Networks, Black Holes, Multiple Path Routing, Secure Packet Delivery.- High Speed Floating Point Multiplier
Authors
1 P.A. College of Engineering and Technology, IN
Source
Software Engineering, Vol 7, No 3 (2015), Pagination: 80-83Abstract
Multiplication is a basic operation in most of the signal processing algorithms. Multipliers have large Area, long latency and consume considerable power. The purpose of a good multiplier is to provide a physically compact, good speed and should consume low power. In this paper speed of the IEEE 754 standard single precision floating point multiplier is increased by using compressors. Because compressors are special kind of adders to add more number of bits at a time. In this paper compressors are used for mantissa calculation. So that speed of the multiplier is increased as compared to the conventional multiplier. It is implemented using Verilog HDL and it is targeted to Xilinx virtex-5 FPGA.Keywords
Compressors, Floating Point Multiplier, Mantissa, IEEE754 Standard, Verilog HDL.- Tracking Dynamic Target in Wireless Sensor Networks
Authors
1 Department of Information Technology, Vel Tech Multitech Engineering College, Chennai - 600062, Tamil Nadu, IN
2 Department of Information Technology, Eloka Enterprise Private Limited, Chennai - 600020, Tamil Nadu, IN
3 Department of Computer Science and Engineering, Vel Tech Multitech Engineering College, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 1 (2016), Pagination:Abstract
Background/Objectives: Wireless sensor network deployed over a geological area for monitoring environment and it communicates with connected nodes in the network for processing and gathering information. Methods/Statistical Analysis: This system proposes a framework for tracking, called Energy Efficient Tracking (EET), which defines the nodes of the spatial region around a target, called face. Instead of finding the target location in a face, we estimate movement of a target. Energy efficiency obtained due to tracking being performed by different clusters instead of using a faces. Findings: This system helps to reduce the energy consumption. Brink detection algorithm that enables the sensor network to be aware of target entering the face bit earlier, and to work in a timely fashion. An optimal selection algorithm is to select an appropriate sensor, which can result in having the best detection and low energy cost of transmitting data across the faces. This framework presented an efficient movement tracking system using clustering to overcome the communication latency among nodes. Application/Improvements: Energy efficiency is an important challenge in wireless sensor networks for target tracking applications. This framework proposed efficient tracking using clustering.Keywords
Brink Detection, Clustering, Energy, Optimal Selection, Spatial, Tracking- Phramacognostical Studies of Stem Bark of Zanthoxylum tetraspermum wignt and Arn
Authors
1 Department of Pharmacognosy, The Erode College of Pharmacy and Research, Perunduari Main Road, Veppampalayam, Erode – 638 112, Tamilnadu, IN
2 The Erode College Of Pharmacy and Research, Erode-638 112, Tamilnadu, IN
3 Mother Theresa Post graduate and Research Institute of Health Sciences, Pondicherry, IN
4 Sastra University, Thanjaour, Tamilnadu, IN
Source
Research Journal of Pharmacognosy and Phytochemistry, Vol 2, No 5 (2010), Pagination: 368-371Abstract
The stem bark of Zanthoxylum tetraspermum wight and arn (Rutaceae) are reported to have a great medicinal value. The present study glimpses the pharmacognostical evaluation for the examination of morphological and microscopical characters, Determination of ash values and extractive values. Phytochemical screening including qualitative chemical examination was also carried out. This data reveals easy identification for the future investigators and an important aspect of drug studies.Keywords
Zanthoxylum tetraspermum wight and Arn, Stem Bark, Pharmacognostical, Phytochemical.- Duty Cycle and Link Life Time Prediction Routing In Wireless Sensor Network
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 3 (2014), Pagination:Abstract
The nodes in sensor networks have limited battery power and it is not feasible or possible to recharge or replace the Batteries, therefore power consumption should be minimized so that overall Network lifetime will be increased. In order to minimize power consumed during idle listening, some nodes which can be considered redundant can be put to sleep. This paper presents a life time prediction routing protocol for WSN that maximizes the network life time. Link Life Time Prediction Algorithm (LLP) is proposed and Compared to Three energy-efficient online traffic scheduling algorithms in terms of sensor ratio and time averaged coverage. Offline scheduling results are presented that provide lower bounds on the energy needed to satisfy the communication requirements.
Keywords
duty cycle control, energy efficiency, Link Lifetime prediction, Wireless Sensor Networks- On the Achievable Throughput of Per Chunk User Scheduling for MIMO-OFDM Downlink Using Opportunistic Feedback
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 3 (2014), Pagination:Abstract
Future mobile communication systems will adopt the multiple antennas at both transmitter and receiver to improve system capacity and spectral efficiency. In our proposed system a Per-chunk user scheduling with opportunistic feedback for multiple-input–multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM) is considered. In this system we provide a solution for achievable throughput by grouping adjacent subcarriers into chunks, the amount of required feedback information is reduced. Based on the net throughput criterion, which accounts for the reduction in sum rate due to the feedback overhead, it is shown that there exists an optimal chunk size that maximizes the net throughput. In which, for each chunk, only users with achievable rates higher than a predetermined threshold report back their rates. Analytical expressions for the net throughput are derived, which enable finding the optimum threshold that maximizes the average net throughput. The results show that increasing the total number of users in the system results in the net throughput of most existing MIMO-OFDM downlink schemes decreasing to zero for moderate-size user pools, whereas the net throughput of per-chunk user scheduling with opportunistic feedback increases with the total number of users even that number is very large.
- Cultivation, Composting, Biochemical and Molecular Characterization of Calocybe indica (C and A)
Authors
1 Department of Botany and Microbiology, A.V.V.M. Sri Pushpam College [Autonomous], Poondi, Thanjavur, IN
2 Dept of Microbiology, Thanthai Hans Roever College of Arts and Science, Perambalur-621212, Tamil Nadu, IN
Source
Asian Journal of Pharmaceutical Research, Vol 1, No 3 (2011), Pagination: 55-57Abstract
Investigation on the cultivation of milky mushroom, Calocybe indica was conducted to find out the growth and yield performance on different substrates. The yield of fresh mushroom obtained from paddy straw, teak leaves and sugarcane trash substrates were 1140, 745 and 570 g/kg respectively. The nutritional significance of Calocybe indica cultivated on different substrates was assessed in terms of protein, carbohydrate, amino acids and lipids. The cellulolytic activity and coir pith compost was also tested using Calocybe indica. The present result suggest, the lignocellulosic substrate like paddy straw, teak leaves and sugarcane trash shown great potential for use as a raw material since this substrate provides an economically acceptable production for Calocybe indica.Keywords
Calocybe indica, Sugarcane Trash, Teak Leaves, Composting of Coir Pith.- Optimal placement and sizing of active power line conditioners
Authors
1 PG Scholar, EEE department, Thiagarajar college of engineering, Madurai - 625015, IN
2 Assistant Professor, EEE department, Thiagarajar college of engineering, Madurai - 625015, IN