Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sreenivasa Rao, D.
- Removal of Flooding Attacks in Ad Hoc Wireless Networks to Provide Security against Availability Security Service
Abstract Views :142 |
PDF Views:2
Authors
A. Vani
1,
D. Sreenivasa Rao
2
Affiliations
1 ECE Department, Chaitanya Bharathi Institute of Technology, Hyderabad, Andhra Pradesh, IN
2 ECE Department, Jawaharlal Nehru Technological University, Hyderabad, Andhra Pradesh, IN
1 ECE Department, Chaitanya Bharathi Institute of Technology, Hyderabad, Andhra Pradesh, IN
2 ECE Department, Jawaharlal Nehru Technological University, Hyderabad, Andhra Pradesh, IN
Source
Wireless Communication, Vol 3, No 5 (2011), Pagination: 308-313Abstract
Ad hoc wireless networks are infrastructure less networks and formed by mobile nodes. These networks are gaining popularity because of low cost mobiles devices and its ability to provide instant wireless networking capabilities. The communication in ad hoc wireless networks functions properly only if the participating nodes cooperate in routing without any malicious intention. But the ad hoc wireless networks are vulnerable to various attacks because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denial of service type of attacks are possible in ad hoc wireless networks and one of these types of attack is Flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all almost all on demand routing protocols. Due to this flooding attack the interruption of the network is caused and hence availability of the network service is reduced. The current solutions for these types of attacks are mainly cryptographic, which suffer from heavy computational complexity. In this paper RREQ Flooding attack is detected based on Signal strength and time threshold is used to prevent the flooding attack. The performance of the proposed technique is tested in an On-Demand routing protocol(AODV).The results shows that the proposed techniques reduces the effect of the attack by increasing the packet deli vary ratio.Keywords
Ad Hoc Wireless Networks, Availability, Security, Flooding Attack.- Optical Character Recognition Using Hybrid Classifiers
Abstract Views :154 |
PDF Views:2
A method has been developed for single font clear printed documents. This system is primarily designed for Telugu and used the Uniform Sampling Method as the basis for extraction of low-level, structural and stroke-type features and also used the nearest neighbor classifier for classification. The accuracy rate was 96%. The Objective of the current project is to improve the accuracy using different types of hybrid classifiers. This algorithm used segmentation process to isolate words. In this process the process of clipping has been applied to by deleting al zero rows and columns of the image matrix. K-means clusting algorithm is used to determine cluster k and centroids.
Authors
Affiliations
1 Avanthi's Scientific Technological and Research Academy, IN
2 ASRA, Hyderabad, IN
1 Avanthi's Scientific Technological and Research Academy, IN
2 ASRA, Hyderabad, IN
Source
Digital Image Processing, Vol 4, No 9 (2012), Pagination: 453-456Abstract
Optical character recognition (OCR) refers to a process whereby printed documents are transformed into ASCII files for the purpose of compact storage, editing, fast retrieval, and other file manipulations through the use of a computer. The principle motivation for the development of OCR Systems is the need to cope with the enormous flood of paper in the form of documents, bank cheques, commercial forms, government records, credit card imprints and mail sorting, generated by expanding technological society.A method has been developed for single font clear printed documents. This system is primarily designed for Telugu and used the Uniform Sampling Method as the basis for extraction of low-level, structural and stroke-type features and also used the nearest neighbor classifier for classification. The accuracy rate was 96%. The Objective of the current project is to improve the accuracy using different types of hybrid classifiers. This algorithm used segmentation process to isolate words. In this process the process of clipping has been applied to by deleting al zero rows and columns of the image matrix. K-means clusting algorithm is used to determine cluster k and centroids.
Keywords
Nearest Neighbor, K Means Algorithm, Centroids, Filters, Mmse, Skewing, Clipping, Training Patterns, Feature Extraction, Veronoi Diagram, Uniform Sampling.- Multiple frequency Polyhedron Ring Slot Microstrip Antenna
Abstract Views :196 |
PDF Views:1
Authors
Affiliations
1 Vasavi College of Engineering, ECE department, Hyderabad, IN
2 CBIT, Hyderabad, IN
3 JNTUH, Hyderabad, IN
1 Vasavi College of Engineering, ECE department, Hyderabad, IN
2 CBIT, Hyderabad, IN
3 JNTUH, Hyderabad, IN
Source
International Journal of Research in Signal Processing, Computing & Communication System Design, Vol 1, No 1 (2015), Pagination: 24-26Abstract
A polyhedron shaped annular ring slot antenna is presented. A simple 50 ohms Microstrip line is used to excite the slot. Parametric Design and Analysis is carried out with permutations of the feed length from edge to the centre of annular ring. RT-duriod substrate is used because of its high directivity and high power radiation.Keywords
Microstrip Antenna, Wideband, Annular Slot- Algorithm for SNR Estimation In Rician Fading Channels
Abstract Views :161 |
PDF Views:4
Authors
D. Sreenivasa Rao
1,
Ch. Jessy Beulah
1,
G. Kumar Chaitanya
1,
G. Tataiah Babu
1,
A. S. Chalapathi Rao
1,
G. Vamsi Krishna
1
Affiliations
1 Department of ECE, St. Anns College of Engg and Tech., JNTUK, Chirala, IN
1 Department of ECE, St. Anns College of Engg and Tech., JNTUK, Chirala, IN