A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prasanth, K.
- Reducing Routing Overhead in Vehicular Ad hoc Networks using EBGR Algorithm
Authors
1 Department of Information Technology, K.S. Rangasamy College of Technology, Tamilnadu, IN
2 K.S. Rangasamy College of Technology, Tamilnadu, IN
Source
Wireless Communication, Vol 2, No 9 (2010), Pagination: 267-275Abstract
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Potential Edge Node Based Greedy Routing), a greedy position based routing approach which uses potential score based strategy to forward packets to the node present in the edge of the transmission range of source/forwarding node as most suitable next hop. We propose Revival Mobility model (RMM) to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results using ns 2.33 shows that routing overhead is reduced considerably compared to other routing techniques of VANET.Keywords
Vehicular Ad hoc Networks, Greedy Position Based Routing, EBGR, Revival Mobility Model, Routing Overhead.- Biometric Encryption to Enhance Confidentiality in Cloud Computing
Authors
1 Department of Electronic and Communication, IN
Source
Biometrics and Bioinformatics, Vol 7, No 4 (2015), Pagination: 99-103Abstract
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the cost of dedicated servers. However, virtualization and Cloud computing contain many security weaknesses that affects the biometric data confidentiality in the Cloud computing. Those security issues are VM ware escape, hopping, mobility, diversity monitoring and etc. Furthermore, the privacy of a particular user is an issue in biometric data i.e. the face reorganization data for a famous and important people. Therefore, this paper proposed biometric encryption to improve the confidentiality in Cloud computing for biometric data. Also, this paper discussed virtualization for Cloud computing, as well as biometrics encryption. Indeed, this paper overviewed the security weaknesses of Cloud computing and how biometric encryption can improve the confidentiality in Cloud computing environment. Apart from this, confidentiality is enhanced in Cloud computing by using biometric encryption for biometric data. The novel approach of biometric encryption is to enhance the biometric data confidentiality in Cloud computing.
- Blur and Illumination Robust Face Recognition and Facial Expressions
Authors
1 Kathir College of Engineering, Coimbatore, IN
Source
Biometrics and Bioinformatics, Vol 6, No 6 (2014), Pagination: 159-162Abstract
Facial expression is the natural means for human beings to show their emotions and motivations. The problem of unconstrained face recognition from remotely acquired images is addressed. When blurring comes to picture, face recognition becomes difficult. The main factors that make this problem challenging are image degradation due to blur and the appearance variations due to illumination and pose. Many of the approaches concentrate mainly on the blurring part alone. A blur-robust face recognition algorithm DRBF (Direct Recognition of Blurred Faces) and IRBF (Illumination-Robust Recognition of Blurred Faces) is proposed in this paper. This algorithm can easily incorporate prior knowledge on the type of blur as constraints. In addition to this, the illumination defects are also considered along with the blur problems. And the features of facial components such as eyes, nose, and mouth in gray images of faces are extracted and the facial expressions are identified.Keywords
Unconstrained Face Recognition, Remote Biometrics, Direct Recognition of Blurred and Illuminated Faces, Facial Expression and Facial Expression Classifier.- Packet Transmission Analysis in Vehicular Ad Hoc Networks Using Revival Mobility Model
Authors
1 Dept of IT, K.S.Rangasamy College of Technology, Tiruchengode (T.N), IN
2 Dept of CSE, K.S.Rangasamy College of Technology, Tiruchengode (T.N), IN
3 Dept of Computer Applications, K.S.R College of Engineering, Tiruchengode (T.N), IN
4 Periyar University, Salem (T.N), IN