Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jangra, Ajay
- Ca-LEACH: a Communication Controlling Agent Based Low Energy Adaptive ClusteringHierarchy Algorithm for Wireless Sensor Network
Abstract Views :175 |
PDF Views:4
Authors
Ajay Jangra
1,
Amisha Dhiman
1
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
Source
Wireless Communication, Vol 5, No 7 (2013), Pagination: 281-287Abstract
Energy efficiency is a major concern in designing a protocol for WSN. Clustering sensor nodes is an important and effective way of achieving this goal. However LEACH is an elegant example of clustered based structure which uses TDMA based MAC protocol for preserving energy still it has some drawbacks. One of the main drawback is it has no optimal data aggregation technique and it provides no reliability in terms of data transportation. Better data aggregation technique may reduce the overall energy dissipation for a cluster in LEACH as battery consumption is important fact taken to be in consideration which is a scarce resource and can‟t replace further in the network after battery loss. By introducing role of controlling agenta novel protocol Ca-LEACH is developed which basically relies on two main factors i.e. reliability in terms of all data packet delivery and energy efficiency which is based on optimal data aggregation technique which helps to reduce the energy dissipation and reducing delay in terms of data delivery to BS. MATLAB simulation shows that considering controlling agent for selection of CH and for measuring packet loss ratio in between the communication path of each CH to BS provides a significant way to reduce the energy consumption and reliability in the network.Keywords
WSN, Energy Efficiency, Reliability, Clustering, LEACH, Communication Controlling Agent (Ca), MATLAB.- Robust Location Aware Wormhole Detection Technique for Wireless Sensor Network
Abstract Views :195 |
PDF Views:3
Authors
Ajay Jangra
1,
Bhavana
1
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
Source
Wireless Communication, Vol 5, No 7 (2013), Pagination: 288-293Abstract
The Wireless Sensor Networks are typically deployed in ubiquitous and pervasive applications that make them susceptible to various forms of security attacks. In addition, due to the limited battery capacity, processing and memory powered sensor nodes make it difficult to devise the security protocols that are inherently resource intensive. Due to lack of security, nodes tend to get compromised by the adversaries. These nodes attract the data towards itself and either modifies the data and denies forwarding it. This paper ensures that the sensor network is secure to large extend by eliminating the compromised nodes. One of the potent forms of attacks is the Wormhole attacks - a Denial of Service attack on the network layer. Wormhole attacks enable an attacker with limited resources and no cryptographic material to disrupt wireless networks. In wormhole attack, an attacker records packet at one location in the network, tunnels them (possibly selectively) to another location and retransmits them there into the network. In this paper, present an algorithm for detecting wormhole attacks in wireless sensor network.Keywords
GPS, Range Free Localization, Wormhole Attack, WSN.- Performance Enhancement of ZRP Using Uniform BER Factor in MANETs
Abstract Views :140 |
PDF Views:3
Authors
Ajay Jangra
1,
Manisha
1
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
Source
Wireless Communication, Vol 5, No 7 (2013), Pagination: 294-299Abstract
Wireless Ad-Hoc networks are usually defined as an autonomous system of nodes connected by wireless links and communicating in a multi-hop fashion. The benefits of ad-hoc networks are many, but the most important one is their ease of deployment without centralized administration or fixed infrastructure, thereby enabling an inexpensive way to achieve the goal of ubiquitous communications. Ad hoc network uses different types of protocols like reactive protocols and proactive protocols. It can also use the combination of these two types, called hybrid protocol. Hybrid protocol uses limited scope proactive approach to maintain routes towards a surrounding zone and reactive approach to communicate with farther destinations. In this paper, the concept Bit Error Ratio (BER) factor is introduced to improve the performance of hybrid protocol.Keywords
Wireless Mobile Ad-Hoc Networks, QoS, MANET, Hybrid, Reactive, Proactive.- Prosperity, Risks and Challenges in Cloud Computing
Abstract Views :132 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
2 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
1 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
2 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
Source
Wireless Communication, Vol 3, No 8 (2011), Pagination: 577-582Abstract
Cloud Computing is a recent inclination in IT that shift the computer handling, storage and delivery of software away from desktops and laptops into large data centers which results in adding another layer of separation in information processing. Apart from this, the magnificence of cloud computing to make these services accessible everywhere, designated cloud as cordial all the way along and dynamically allocate, install, uninstall and canceling the cloud services makes cloud computing one of the hot research topic. With each momentary day, cloud is working sincerely to reach its goal when “computing power” is provided on the utility basis such as water and electricity for the user. In this paper, we discuss the concept of “cloud” computing, reason for its evolution, address its various issues, and try to understand the difference between various computing. This paper also highlights the friendly nature of cloud along its various assets meanwhile removing all its convolutions of demerits and finally focusing on security factors for cloud based on the architecture and concludes by pinpointing the areas that researchers may examine in future.Keywords
Cloud Computing, Cluster Computing, Grid Computing, Pervasive Computing, Distributed Systems.- Automated Monitoring Framework (AMF): An Approach to High Availability
Abstract Views :219 |
PDF Views:1
Authors
Ajay Jangra
1,
Pooja Gupta
2
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering and Technology (UIET), Kurukshetra University, Kurukshetra -136119, IN
2 Department of Computer Science and Engineering, University Institute of Engineering and Technology (UIET), Kurukshetra University, Kurukshetra-136119, IN
1 Department of Computer Science and Engineering, University Institute of Engineering and Technology (UIET), Kurukshetra University, Kurukshetra -136119, IN
2 Department of Computer Science and Engineering, University Institute of Engineering and Technology (UIET), Kurukshetra University, Kurukshetra-136119, IN
Source
Automation and Autonomous Systems, Vol 3, No 10 (2011), Pagination: 462-466Abstract
High-availability has been a long-term topic in IT business environment and achieving the high availability goal is very critical and complex. This paper analyzes the factors which need to be considered before planning any high availability solution and monitoring is one of the most important factor The main of this paper is to design an automated monitoring framework which can be used to reduce the error detection and correction time which in turn reduce the planned and unplanned outages. This paper implemented oracle Standby database on virtual machine and studied the behavior of oracle standby database, including the data movement from primary production site to standby location. Monitoring the data movement from primary to standby location is an important part in Oracle Data Guard architecture hence designed automated monitoring framework for oracle standby database and analyzed the results and find very effective.Keywords
AMF, HACMP, MAA, SOP, VMFS.- FC-QIA:Fingerprint-Classification based Quick Identification Algorithm
Abstract Views :149 |
PDF Views:1
Authors
Affiliations
1 CSE Department, UIET, Kurukshetra University, Kurukshetra, IN
2 ECE Department, UIET, Kurukshetra University, Kurukshetra, IN
1 CSE Department, UIET, Kurukshetra University, Kurukshetra, IN
2 ECE Department, UIET, Kurukshetra University, Kurukshetra, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 212-220Abstract
Fingerprint is one of the most important biometric techniques for identification and authentication, which may also reduce the complexity (cost/time) of searching data in large database. Over the past several years various methods have been proposed for fingerprint identification, on the same way, this paper propose a new efficient method for fingerprint identification based on ridge and valley pattern of fingers and corresponding result shows that proposed scheme is several times faster than previous scheme.Keywords
Fingerprint Identification, Fingerprint Classification, Biometric Authentication, Fingerprint Verification, Henry’s Scheme.- Data Shield Algorithm (DSA) for Security against Phishing Attacks
Abstract Views :147 |
PDF Views:2
Authors
Affiliations
1 Electrical Engg. Department, UIET, Kurukshatra University, Kurukshetra, IN
2 CSE Department, UIET, Kurukshatra University, Kurukshetra, IN
1 Electrical Engg. Department, UIET, Kurukshatra University, Kurukshetra, IN
2 CSE Department, UIET, Kurukshatra University, Kurukshetra, IN