Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chellappan, C.
- Energy Efficient Routing Algorithms and Performance Comparison for MANET
Abstract Views :164 |
PDF Views:3
Authors
Affiliations
1 NITTTR, IN
2 Computer Science and Engineering Department, Anna University, Chennai, IN
3 IBM, Bangalore, IN
1 NITTTR, IN
2 Computer Science and Engineering Department, Anna University, Chennai, IN
3 IBM, Bangalore, IN
Source
Wireless Communication, Vol 3, No 10 (2011), Pagination: 755-759Abstract
Mobile Ad hoc networks is a self-configuring infra structureless temporary network of mobile devices connected by wireless links. A major bottleneck in Mobile Ad hoc networks (MANETs) is the energy consumption since nodes are usually mobile and battery operated. This paper proposes an algorithm called Energy Efficient Delay Time Routing (EEDTR) which tries to increase the operational lifetime of Mobile Ad hoc networks. This algorithm is modified version of the existing Dynamic Source Routing (DSR) algorithm. This algorithm select fully distributed routes, thus balancing power consumption of the entire network and introduces a delay in forwarding the packets by nodes, which is inversely proportional to the remaining energy level of the node (EEDTR). The algorithm is designed and implemented using Global Mobile Simulator (GloMoSim), a scalable, simulation environment for network simulation. Based on the results obtained, it is concluded that the algorithm increases the lifetime of mobile ad hoc networks, at the expense of end delay and routing overhead.Keywords
DSR, EEDTR, GloMoSim and MANET.- Performance Analysis of a Future OFDMA Cellular Wireless Network to Support Large Multimedia Trafficin Downlink
Abstract Views :148 |
PDF Views:4
Authors
Affiliations
1 M.I.T Campus, Anna University, Chennai, IN
2 Anna University, Chennai, IN
3 M.I.T. Campus, Anna University, Chennai, IN
1 M.I.T Campus, Anna University, Chennai, IN
2 Anna University, Chennai, IN
3 M.I.T. Campus, Anna University, Chennai, IN
Source
Wireless Communication, Vol 1, No 1 (2009), Pagination: 8-15Abstract
The future cellular wireless network is expected to support a large variety of multimedia traffic in downlink. Orthogonal Frequency Division Multiple Access (OFDMA) technique using adaptive modulation and coding technique can increase the system capacity many fold. In this paper, the performance analysis of an OFDMA system utilizing an efficient resource allocation method, called Two Stage Rate Adaptive (TSRA) algorithm is studied. Considering wide variation in Signal to Interfering Noise Ratio (SINR) dynamically between 3 to 26 dB in Rayleigh channel, and randomly mixing of four categories of multimedia traffic, it is observed that the difference between analytical and simulated average capacity of the system gets smaller as number of user increases, and at one point the simulated average system capacity exceeds 6 b/s per Hz. Apart from spectral efficiency, Bit Error Rate (BER), and delay performance of the proposed system is evaluated here.Keywords
Multimedia, SINR, BER, Capacity, Delay.- File Type Identification and E-Mail Spam Filtering
Abstract Views :156 |
PDF Views:5
E-mail spam has become an epidemic problem that can negatively affect the usability of electronic mail as a communication means. Besides wasting users’ time and effort to scan and delete the massive amount of junk e-mails received, it consumes network bandwidth and storage space, slows down e-mail servers, and provides a medium to distribute harmful and/or offensive content. Inspired by the success of fuzzy similarity in text classification and document retrieval, the approach investigates its effectiveness in filtering spam based on the textual content of e-mail messages.
Authors
Affiliations
1 Department of Computer Science and Engineering, Anna University, Chennai, IN
1 Department of Computer Science and Engineering, Anna University, Chennai, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 2, No 7 (2010), Pagination: 86-94Abstract
The widespread use of email has provided malicious users an easy way to distribute harmful content to the internal network. Hackers can easily circumvent the protection offered by a firewall by tunneling through the email protocol, since it does not analyze email content. Organizations often fail to acknowledge that there is a great risk of crucial data being stolen from within the company. Identifying the true type of a computer file is a difficult and important problem as hackers and malicious users use either non-standard file formats or change the extensions of files while storing or transmitting them over a network bypassing the firewall from filtering. This makes recovering data out of these files difficult and confidential data being sent away from organizations in different allowable file formats. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored with the files, and proprietary descriptive file wrappers. All of these methods have significant limitations. Hence it is proposed to have an content based approach for generating “fingerprints” of file types based on a set of known input files, then using the fingerprints to recognize the true type of unknown files based on their content, rather than metadata associated with them.E-mail spam has become an epidemic problem that can negatively affect the usability of electronic mail as a communication means. Besides wasting users’ time and effort to scan and delete the massive amount of junk e-mails received, it consumes network bandwidth and storage space, slows down e-mail servers, and provides a medium to distribute harmful and/or offensive content. Inspired by the success of fuzzy similarity in text classification and document retrieval, the approach investigates its effectiveness in filtering spam based on the textual content of e-mail messages.