A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Muthukumar, B.
- Optimizing the Usage of Bandwidth in Heterogeneous Wireless Networks Using CTSP Mechanism
Authors
1 Kathir College of Engineering, Coimbatore, Tamilnadu, IN
Source
Wireless Communication, Vol 2, No 11 (2010), Pagination: 436-439Abstract
The main objective of this paper is to reduce the total bandwidth consumption and to share the unused bandwidth in wireless networks. In this paper we use a mechanism to select the cells and wireless technologies for video multicasting. This mechanism formulate cell and technology selection problem (CTSP) as an optimization problem CTSP. To solve this problem we use Legrangian based distributed algorithm. In this paper we propose a new hierarchical bandwidth sharing based on the auction theory. In our proposed model, Wi-Fi and UMTS serve the WLAN APs as primary networks, sharing their licensed spectrum as double auction. Simulation results show the proposed scheme could improve the utility of PNs’ spectrum, and provide good services to the WLAN users.
Keywords
Hierarchical Bandwidth Sharing, Double Action, Licensed Spectrum, Auction Theory.- Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor
Authors
1 Sathyabama University, Chennai, IN
2 Department of Electrical and Electronics Engineering, Pondicherry Engineering College, Pondicherry, IN
Source
Networking and Communication Engineering, Vol 4, No 1 (2012), Pagination: 8-15Abstract
Elliptic Curve Cryptography (ECC) rules communication where the requirements of security, speed, key length and area constraints become main objective such as the portable device. Scalar multiplication becomes the key operation in any ECC, not only because it munches out major time, power and chip area, it is also a fact that the triumph of the Elliptic Curve Encryption Algorithm depends on the difficulty of calculating the multiplication. Hence the type of multiplier and its functional behavior become crux of the ECC architecture. This paper paves a way by developing a ECC architectures over GF(2160), which is bequeathed with three different multipliers namely array multiplier, modified booth multiplier and hybrid low power encoded multiplier. These multipliers are used in the Montgomery scalar multiplication algorithm to perform point addition and point doubling. The proposed ECC processor can perform the 160 bit point multiplication and coordinates conversion with 575mW, 511mW and 373mW in 100 MHz and 19176, 16260 and 8743 LUTs respectively in array multiplier, modified booth multiplier and hybrid multiplier. The architecture is implemented using spartan3E family device XC3S1600E using Modelsim 5.7 and Xilinx 9.2i.Keywords
Array Multiplier, Elliptic Curve Cryptography, Hybrid Low Power Encoded Multiplier, Montgomery Multiplication Algorithm, Modified Booth Multiplier, Point Double, Point Addition.- A Process of Delivering the Mail Message in Domain Level Authentication Framework Using Grid Computing
Authors
1 Kathir College of Engineering, Coimbatore, Tamilnadu, IN
2 Anna University of Technology, Coimbatore, Tamilnadu, IN
3 Pondicherry University, Pondicherry, IN
Source
Networking and Communication Engineering, Vol 3, No 4 (2011), Pagination: 248-252Abstract
SPAM (UBE) is email sent to groups of recipients who have not requested it or have "opted out" of group email subscriptions and continue to receive email from the sender. So we devise a DKIM (Domain Key Identified Mail), which is a domain level authentication framework for email using public-key cryptography and key server technology to permit verification of the source and contents of messages by either Mail Transfer Agents (MTAs) or Mail User Agents (MUAs). The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, thus protecting message signer identity and the integrity of the messages they convey while retaining the functionality of Internet email as it is known today. Protection of email identity may assist in the global control of "spam" and "phishing".Keywords
DKIM, Mail Transfer Agent (MTA), DNS Resolution.- Segmentation of Image Feature Using Level Set–Contour Region Based Segmentation Algorithm
Authors
1 Kathir College of Engineering, Coimbatore - 62, IN
2 Department of ECE in Dr.M.G.R. University, Chennai - 95, IN
Source
Digital Image Processing, Vol 2, No 11 (2010), Pagination: 458-463Abstract
Level set-contour region based segmentation methods are the numerical techniques for tracking interfaces and shapes. They have been successfully used in image segmentation. It consists of an internal energy term that penalizes deviations of the level set function from a signed distance function, and an external energy term that drives the motion of the zero level set toward the desired image feature. The energy to be re-formulated in a local way. It considers local rather than global image statistics and evolves a contour based on local information. Localized contours are capable of segmenting objects with heterogeneous feature profiles that would be difficult to capture correctly using a standard global method.Keywords
Level Set, Curve Evolution, Contour-Region Based Segmentation.- Artificial Neural Network Technique, Statistical and FFT in Identifying Defect in Plain Woven Fabric
Authors
1 Dept. of CSE, Kathir College of Engg., Coimbatore, IN
2 Dept. of CS, Chikkanna Government Arts College, Tirupur, IN
3 Syed Ammal College of Engineering, Ramanathapuram, IN