A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kowsalya, K.
- Various Scheduling Algorithm Based on Admission Control for Wireless Sensor Networks
Authors
1 Department of Communication and Networking, Adhiparasakthi Engineering College, Melmaruvathur, IN
Source
Networking and Communication Engineering, Vol 8, No 4 (2016), Pagination: 142-145Abstract
In wireless sensor network, Admission Control (AC) is one of the key traffic management mechanisms that should be installed to afford Quality of Service (QoS) support for real-time traffic. A scheduling scheme used by each node in the sensor network plays a vital role for efficient data transfer in the network. Scheduling link transmissions in a wireless network so as to enhance one or more of the performance objectives (e.g. throughput, delay, or energy) has been the area of much interest over the previous several decades. To avoid the interference between the transmitted packets in the nodes of the networks we use the interference modelling in our system. In our proposed work we study the various scheduling algorithm which enhance the system parameters such as throughput, channel utilization and reduce the delay and packet loss ratio in sensor environment. We also analyse the packet collision rate in various scheduling algorithm.
Keywords
Admission Control, Scheduling, Wireless Sensor Networks, Throughput, Channel Utilization, Interference Modelling, Hybrid CDMA, Bandwidth.- Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources
Authors
1 Department of Computer Science, Klasalingam Institute of Technology, Krishnan koil, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 5 (2016), Pagination: 2876-2881Abstract
The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.Keywords
RMO (Routing with Minimum Overhead, DMO (Decomposition with Minimum Overhead), MPC (Multiple Routing Configuration), OSPF (Open Shortest Path).- Multi Owner Data Sharing and Outsourced Revocation Using Identity Based Encryption on Cloud
Authors
1 Department of Computer Science and Engineering, Kalasalingam Institute of Technology, Krishnan Koil, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 5 (2016), Pagination: 2899-2903Abstract
Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.Keywords
Cloud Computing, Revocation, Multi Owner Data Sharing, Identity Based Encryption.- ASIC Implementation of Efficient Error Detection for Floating Point Addition
Authors
1 Department of ECE, Tejaa Shakthi Institute of Technology for Women, Coimbatore, IN