A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kadhar Nawaz, G. M.
- Fuzzy-Ant Based Dynamic Routing on Large Road Networks
Authors
1 Department of MCA, Sona College of Technology, Salem–635 301, IN
Source
Networking and Communication Engineering, Vol 4, No 6 (2012), Pagination: 337-342Abstract
Route selection is essential in everyday life. We have several algorithms for detecting efficient route on Large Road Networks. This paper introduce the hierarchical community, is presented. It splits large road networks into hierarchical structure. It introduces a multi parameter route selection system which employs Fuzzy Logic (FL) and ant’s behavior in nature is applied for the dynamic routing. The important rates of parameters such as path length and traffic are adjustable by the user. The purposes of new hierarchical routing algorithm significantly reduce the search space. We develop a community-based hierarchical graph model that supports Dynamic efficient route computation on large road networks.Keywords
Hierarchical Community, Traffic Routing, Dynamic Parameters, Fuzzy Logic, Ant-Colony Algorithm.- Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels
Authors
1 Centre for Computer Applications, Sri Krishna College of Technology, Coimbatore - 42, TamilNadu, IN
2 Department of MCA, Sona College of Technology, Salem, TamilNadu, IN
Source
Networking and Communication Engineering, Vol 4, No 3 (2012), Pagination: 123-130Abstract
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the shortterm fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on the "Reciprocity based key exchange model" allows two parties jointly establish physically secure key combined with a (standard) computationally secure key, over an insecure communication channel. This key can then be used to encrypt subsequent communications. The channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical Wi-Fi channel that reliable secret key establishment can be accomplished at rates on the order of 11 b/s.
Keywords
Wireless, Wi-Fi, Cryptography, MOPI.- Influence of Signaling Protocols in MPLS-TE Performance
Authors
1 Department of Computer Applications, Karpagam University, Coimbatore, IN
2 Department of Applications, Sona College of Technology, Salem, IN
3 Department of Computer Science, Karpagam University, Coimbatore, IN