Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jayashree, L. S.
- Queuing Delay Analysis in Wireless Networks
Abstract Views :75 |
PDF Views:2
Authors
Affiliations
1 Karpagam College of Engineering, Coimbatore, IN
2 RVS College of Engineering and Technology, Coimbatore, IN
1 Karpagam College of Engineering, Coimbatore, IN
2 RVS College of Engineering and Technology, Coimbatore, IN
Source
Wireless Communication, Vol 4, No 3 (2012), Pagination: 127-132Abstract
The wireless networks provides Best Effort of Service. Traffic analysis is processed as quickly as possible, but there is no guarantee of timelines or actual delivery due to delay. The medium access layer (MAC) is needed to schedule the links carefully so that packets can be transmitted with minimal collisions. Many scheduling policies have been studied at the MAC layer with the objective of maximizing throughput and reducing delay. These schemes are often called throughput optimal scheduling schemes. We will analyze the delay performance in multi-hop wireless networks. In the MAC layer the delay estimation is at the lower and upper bounds of the queue using queuing analysis. This paper focuses only a comparison of queuing delay analysis in wireless networks using various well known queuing techniques and also extend to identify the low complexity distributed scheduling algorithm for multi-hop wireless networks.Keywords
Low Complexity and Distributed Algorithms, Queuing Analysis, Multi-Hop Wireless Networks, Lower and Upper Bounds, Maximal Matching, Queuing Delay.- A Study on Query Processing in Wireless Sensor Networks
Abstract Views :104 |
PDF Views:2
Authors
Affiliations
1 Department of Information Technology, Kumaraguru College of Technology, Coimbatore-641 049, IN
2 RVS College of Engineering & Technology, Coimbatore-02, IN
1 Department of Information Technology, Kumaraguru College of Technology, Coimbatore-641 049, IN
2 RVS College of Engineering & Technology, Coimbatore-02, IN
Source
Wireless Communication, Vol 3, No 15 (2011), Pagination: 1084-1088Abstract
Micro Electro Mechanical Systems (MEMS) and low-cost manufacturing have resulted in development of small, inexpensive, battery powered sensors with embedded processing and wireless networking capability. Such wireless sensor networks can be used in many new applications, ranging from military applications to scientific and research applications to monitor and collect data. Query processing is one of the active research areas in wireless sensor networks. User queries in declarative forms are received at a central sink or base station, optimized and then disseminated among the sensor nodes, which process the queries and the results are sent back to the user ends for further processing. One of the major challenges in sensor network is to maximize the network life time under various resource constraints. This article presents various issues when processing a query and various query processing approaches used in sensor networks.Keywords
Wireless Sensor Network, Query Processing Architecture, Energy Efficiency.- Survey of Routing Protocols and Attacks for Mobile Ad Hoc Networks
Abstract Views :78 |
PDF Views:4
Authors
L. S. Jayashree
1,
I. Kala
2
Affiliations
1 Department of CSE/IT, RVS College of Engineering and Technology, Coimbatore, IN
2 Department of Computer Science and Engineering, Anna university of Technology, Coimbatore, IN
1 Department of CSE/IT, RVS College of Engineering and Technology, Coimbatore, IN
2 Department of Computer Science and Engineering, Anna university of Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 3, No 15 (2011), Pagination: 999-1002Abstract
Mobile ad hoc network are collection of mobile nodes communicating in a multi hop way without any fixed infrastructure with restricted broadcast range. One main challenge in the design of these networks is their vulnerability to malicious attacks. In this paper we have discussed some basic routing protocols in MANET like Proactive and Reactive Routing protocols and the security challenges in ad hoc networks are analyzed.- A Survey on Resource Management in Cloud Computing Using Ontology Approach
Abstract Views :96 |
PDF Views:3
Authors
Affiliations
1 Research and Development Center, Bharathiar University, Coimbatore, IN
2 Department of Computer Science and Engineering, RVS College of Engineering and Technology, Sulur, IN
1 Research and Development Center, Bharathiar University, Coimbatore, IN
2 Department of Computer Science and Engineering, RVS College of Engineering and Technology, Sulur, IN
Source
Networking and Communication Engineering, Vol 3, No 14 (2011), Pagination: 915-919Abstract
Cloud computing is a new computing technology of this Internet World. Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services) and accessed via standard protocols and interface with respect to the cloud architecture. Aggregating and monitoring these resources and matching suitable resources for the application become a challenging issue. This paper suggests a semantic component in the cloud architecture to support ontology-based representation and facilitates context-based information retrieval that complements cloud schedulers for effective resource management.Keywords
Cloud Computing, Semantics, Ontology, Resource Management, Resource Allocation.- A Survey on Mammogram Enhancement and Denoising Techniques
Abstract Views :97 |
PDF Views:2
Authors
K. Akila
1,
L. S. Jayashree
2
Affiliations
1 Kumaraguru College of Technology, Coimbatore, IN
2 Department of CSE & IT, RVS College of Engineering and Technology, Coimbatore, IN
1 Kumaraguru College of Technology, Coimbatore, IN
2 Department of CSE & IT, RVS College of Engineering and Technology, Coimbatore, IN