A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Somasundaram, K.
- Performance Analysis of OFZ-LEACH to Extend Network Lifetime in Wireless Sensor Networks
Authors
1 Department of ECE, Nandha Engineering College, Erode, IN
2 Department of CSE, Jaya Engineering College, Chennai, IN
Source
Networking and Communication Engineering, Vol 4, No 3 (2012), Pagination: 97-101Abstract
In Wireless Sensor Network, sensor nodes life time is the most critical parameter. Many researches on these lifetime extension are motivated by LEACH scheme. Rotation based cluster head election method in LEACH-C improves the life time of the network. But that doesn't provide mobility prediction which leads to disconnection of a cluster from the network. This will create data loss and routing problem. Proposed system increases the Cluster head life time. In such network, routing is largely based on nodal contact probability. The basic idea of this WSN is to distribute the grou mobile node with similar mobility pattern into a cluster. A new energy efficient clustering protocol is used which eliminates above problem by forming Far-Zone. Far-Zone is a group of sensor nodes which are placed at locations where their energies are less than a threshold and Double Exponentially Moving Average (DEMA) scheme is employed for on-line updating nodal contact.
Keywords
Wireless Sensor Network (WSN), Cluster Head, Exponential Moving Average (EMA), Far Zone, LEACH.- Codebook Generation for Vector Quantization by Sorting the Sum of Sub Vectors
Authors
1 Department of Computer Science and Applications, Gandhigram Rural Institute, Gandhigram-624302, Tamilnadu, IN
2 Department of Computer Science, Mother Teresa Women’s University, Kodaikanal-624102, Tamilnadu, IN
Source
Digital Image Processing, Vol 2, No 8 (2010), Pagination: 266-271Abstract
Vector Quantization is a lossy image compression technique. In this paper, we propose a novel idea for generating a codebook by sorting the sum of sub vectors. The training vectors are sub divided into four sub vectors each consisting of four elements.The sum of sub vectors 2 and 4 are subtracted from the sum of sub vectors 1 and 2. The resultant values are used to sort the training vectors. From the sorted list, the training vectors at every nth position are selected to form the codebook. The experimental results and the comparisons show that this method gives better performance with respect to the time taken to generate the codebook and the PSNR value (quality of the reconstructed images). The computational complexity involved is also very less. The codebook generated using the proposed method is optimized using the iterative clustering method. The quality of the reconstructed image is improved to a significant value.
Keywords
Image Compression, Sub Vector, Training Vector, Code Vector and Codebook.- Codebook Generation for Vector Quantization with Edge Features
Authors
1 Department of Computer Science and Applications, Gadhigram Rural Institute, Gandhigram – 624302, Tamil Nadu, IN
2 Department of Computer Science, Mother Teresa Women’s University, Kodaikanal – 624 102, Tamil Nadu, IN
Source
Digital Image Processing, Vol 2, No 7 (2010), Pagination: 194-198Abstract
In this paper, we propose a new technique to retain the edges of the images while compressing them. The image is divided into small blocks of size 4 x 4 pixels. From the list of N image blocks, M (M < N and M is the desired size of codebook) representative blocks are selected to form the codebook. In ordinary codebook generation, all the image blocks are treated equally. But, in the proposed method, the image blocks are classified into high detail blocks and low detail blocks. The high detail blocks represent the edges and the low detail blocks represent the shaded blocks. The high detail blocks are given preference while generating the codebook. Categorization of image blocks improves the quality of the reconstructed images. Codebooks of sizes (M) 128 and 256 are created with the images of size 256 x 256 pixels. The proposed method gives better performance when compared with the results of few existing techniques.
Keywords
Vector Quantization, Training Vector, Code Vector, Codebook, Compression, Edge Block, Shade Block.- An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet
Authors
1 Department of Computer Science and Engineering, Karpagam University, Coimbatore - 641021, Tamil Nadu, IN
2 Department of Computer Science and Engineering and IT, Aarupadai Veedu Institute of Technology, Paiyanoor, Chennai - 603104, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 36 (2016), Pagination:Abstract
Objective: The various features of mobile adhoc networks (MANET’s) are open medium, dynamic topology and absence of centralized monitoring point which introduces various security challenges. One among the security attacks are defined as the black hole attack in this article. Methods: In this paper we introduce a protocol for detecting and avoiding the black hole attacks in MANET’s by an efficient Crypto-key based Black Hole Detection and Avoidance Protocol (CBHDAP). Findings: The suggested protocol generates a group key using Diffie-Hellman (DH) based key agreement black hole detection algorithm then the generated key is forwarded to the authenticated group members. The validation of the nodes in the route from the source to the destination is done before initiating the transmission. The black hole attacks are avoided during transmission by considering the parameters such as time taken for Route Reply (RREP), hop count, Packet Delivery Ratio (PDR) are used. To validate the performance of the proposed approach, it is compared with the existing protocols for the metrics such as detection probability, throughput, end-to-end delay, etc. Improvements: The validation results prove that the CBHDAP provides optimal results for all the metrics like detection probability, throughput, E2E delay etc when compared with the algorithms existed.Keywords
CBHDAP, Blackhole Attack, Diffie-Hellman Algorithm, MANET’s, Security Attacks.- Data Confidentiality and Privacy in Cloud Computing
Authors
1 CSE Department, MSRIT, Bangalore - 560054, Karnataka, IN
2 CSE Department, Vel Tech High Tech Dr. RR and Dr. SR Engineering College, Avadi, Chennai - 600052, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 4 (2016), Pagination:Abstract
Background/Objectives: We propose a cloud based computing architecture to preserve data and privacy of the user’s location information and the interests of different intruders on service user’s data. Methods/Statistical Analysis: Data confidentiality and trust is in spike when it comes to modern cloud computing as storage and means of communication. Social Networking, usage of Location based services; cloud services offered by CSPs have become part of one’s daily life with the advent of smart phones. Findings: Location information of the user can be obtained using GPS (Global Positioning System) or RFID (Radio Frequency Identification). Hacking which the access to the data of the user is obtained. This forms two limitations, 1. Works only in GPS enabled devices. 2. If mobile devices perform such heavy computations it leads to battery depletion problem. To overcome the second limitation Mobile Cloud Computing is used. Improvements/Applications: Mobile Cloud Computing offers great computing power and storage to the mobile devices. It also increases the affordability and reliability but it is still in its budding stages in providing trust guarantees to the user.Keywords
CSP (Cloud Service Provider), Data Confidentiality, Location Based Services, Location Privacy, Multi-Level Access Control, Mobile Cloud Computing- Energy Efficient in Virtual Infrastructure and Green Cloud Computing: A Review
Authors
1 Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background: Cloud computing has been widely used to refer different technologies, services and concepts. It is associated with virtualized infrastructure or hardware on-demand. There exist many challenges especially in energy management on datacenter. To analyze the energy consumptions in datacenter, monitor the types of services which are offered by cloud computing to users. Statistical analysis: The parameters are analyzed and calculate the power usages in the different states, like server level, cluster level in the datacenter and are recorded in real time. The results are obtained at different level and helps to optimize the servers in data center, the server level optimization, consolidation and load balancing between the servers are achieved which helps to consume less in power in the cloud. Findings: Based on the statistical analysis, the server consolidation and optimization are required in the cloud environment. This paper mainly focused on application virtualization and desktop virtualization in cloud environment. From the identified the gap between server consolidation and optimization, created an experimental setup and continuously monitor the CPU usage, memory usage, Disk and network usage parameters. The Power consumption was calculated based on the above mentioned parameters which help to reduce the energy consumption in data center. Applications/Improvements: The analysis parameters are experimented in the laboratory which are helped to consume less power and reduced the carbon emission in the data center. This helps to achieves green cloud environment in data center.Keywords
Green Cloud, Server consolidation, Virtualization, Virtual Desktop- Study on Reliable and Secure Routing Protocols on Manet
Authors
1 Department of Computer Science Engineering, Karpagam University, Coimbatore – 641021, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Vel Tech High Tech Dr. RR Dr. SR Engineering College, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 14 (2016), Pagination:Abstract
Objectives: This survey article intent presents knowledge into the security execution issues related to steering in wireless networking like MANET’s (Mobile Ad hoc Networks). Findings: The mobile adhoc networks are exposed to attacks at all the layers especially at the network layer. This study specially provides a set of solutions for the issues of various attacks like attacks on modifications, impersonation attacks, fabrication and rushing attacks. A few methodologies are analysed for prevention, detection and reaction on various attacks by malicious nodes. The study of this article has examined the methodologies meant for fathoming the implementation issues like, changes in topology, vitality utilization of stations, delay, throughput, transmit time, packet transmission ratio, systems or nodes security and administration. Conclusion: This article presents a comparison table specifying that every protocol provides security only to a limited access. Thus, there is still a prerequisite of more secured belief that can deal with the diverse asking for necessities like reliable protocols for security issues of MANET.Keywords
Attacks, Detection, Malicious Nodes, Network Layer, Prevention, Protocols, Security, Throughput- Enhancement of Network Lifetime by Improving the Leach Protocol for Large Scale WSN
Authors
1 Department of CSE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamil Nadu, IN
2 Department of ECE, Nandha College of Technology, Erode - 638052, Tamil Nadu, IN
3 Department of IT, Nandha Engineering College, Erode - 638052, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 16 (2016), Pagination:Abstract
Background: Wireless Sensor Network (WSN) is a network of self-configurable nodes. Nodes are operated using irreplaceable and small energy source. Node's operation includes sensing and transferring of data towards base station. Methods: Network Lifetime depends on lifespan of nodes in that network. LEACH is the basic protocol for cluster based routing algorithm. Many proposals with modification of LEACH are proposed and have some suggestion for future work. Optimized Far-Zone LEACH and EAR are few of that and tried to modify the LEACH to augment the network lifetime. Findings: The proposed work covers the efficient usage of energy, nodes mobility, hidden zone issues and routing in WSN design. Nodal contact probability and Weighted moving average concepts are used to reduce the impact on mobility issue. Residual energy of the sensing node, distance towards base and adaptive sleep scheduling algorithm are used to reduce the node early dead issue and also improve the lifespan of the network. Multi-hop communication and uneven clustering concepts are used to provide energy efficient transmission and routing. Improvements/Applications: The proposed work is developed to cover all these issues with the consideration of above mentioned parameters. Simulation results show the 10-15% improvement in lifetime of network and average delay.Keywords
Lifetime, Network Lifetime, Residual Energy, Routing Protocol, Wireless Sensor Network- Cloud Computing Security through Symmetric Cipher Model
Authors
1 Karpagam University, Computer Science and Engineering, Pollachi Main Road, Eachanari Post, Coimbatore 641021, IN
2 Karpagam University, Department of Computer Science and Engineering, Jaya Engineering College, CTH Road, Prakash Nagar, Thiruninravur, Thiruvallur - Dist, Tamilnadu, IN
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 6, No 3 (2014), Pagination: 57-66Abstract
Cloud computing can be defined as an application and services which runs on distributed network using virtualized and it is accessed through internet protocols and networking. Cloud computing resources and virtual and limitless and information's of the physical systems on which software running are abstracted from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the users the concept is to incorporate technologies which have the common theme of reliance on the internet Software and data are stored on the servers whereas cloud computing services are provided through applications online which can be accessed from web browsers. Lack of security and access control is the major drawback in the cloud computing as the users deal with sensitive data to public clouds. Multiple virtual machine in cloud can access insecure information flows as service provider; therefore to implement the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud computing security through symmetric cipher model. This article proposes symmetric cipher model in order to implement cloud computing security so that data can accessed and stored securely.Keywords
Cloud Computing, Virtualized Resources, Virtual Machines, Symmetric Cipher Model, Cloud Security, Cloud Services.- Analysis of Imaging Artifacts in MR Brain Images
Authors
1 Image Processing Lab, Department of Computer Science and Applications, Gandhigram Rural Institute-Deemed University Gandhigram – 624 302, Tamil Nadu, IN