A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Malathi, M.
- Effective Replica Allocation to Minimize Performance Degradation in MANET
Authors
1 Computer Science and Engineering, Kalasalingam Institute of Technology, Krishnankoil, Virudhunagar District, Tamil Nadu, IN
Source
Wireless Communication, Vol 5, No 4 (2013), Pagination: 148-153Abstract
In MANET, most of them assume that all mobile nodes cooperate fully in terms of sharing their resources. But, some nodes may act as selfish. It may selfishly decide only to cooperate partially, or not fully cooperate with other nodes. These selfish nodes also known as misbehaving nodes. It could then decrease the overall data accessibility in the network. We examine selfish replica allocation such that impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. We develop a selfish node detection algorithm that considers partial selfishness and replica allocation techniques to properly cope with selfish replica allocation. The simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost, and average query delay.
Keywords
Data Accessibility, Degree of Selfishness, Mobile Ad Hoc Networks, Replica Allocation, Selfish Nodes.- A Reflex Self-Directive System for Enclosed Location
Authors
1 P.A. College of Engineering and Technology, Pollachi, IN
2 Department of ECE, P. A. College of Engineering and Technology, Pollachi, IN
Source
Software Engineering, Vol 7, No 5 (2015), Pagination: 132-135Abstract
With the development of many technologies for guiding a person, the electronic indoor guidance is widely expected. The guidance is required for a person who is unfamiliar with the place. The shortest path to reach the destination is given to user. The system uses the push button through which the person can type the destination. The microcontroller gets data from the buttons. The voice storage and playback APR9600 is used for recording the voice and playback. Then the microcontroller is connected to the LCD display to display the destination which is given as an input from the buttons. The way to the destination is stored in voice recorder as a voice signal. The output is played in the speaker. From this the user can easily get a direction for a particular place through the voice signal. When the voice is playing in background related to voice, route image is displayed in desktop according to the .NET software. A RS232 serial port is used for interfacing the microcontroller and a monitor. Through RS232 serial communication port the played sound signal itinerary is displayed in a monitor.
Keywords
Push Button, Microcontroller, APR9600 and LCD Display, RS232, .NET Software.- Robust Fault Secure Data Transmission System for Nanomemory Applications
Authors
1 PSN College of Technology, Tirunelveli, IN
Source
Programmable Device Circuits and Systems, Vol 3, No 1 (2011), Pagination: 48-56Abstract
Memory cells and supporting circuitry (encoder & decoder) have been protected from transient errors for more than a decade. Due to the increase in the transient error rate in logic circuits, the encoder and decoder circuitry around the memory blocks have become susceptible to transient errors as well and must also be protected. We introduce a new approach to design fault-secure encoder and decoder circuitry for memory designs. We introduce a nanowire-based, sublithographic memory architecture tolerant to transient faults. The key novel contribution of this project is identifying and defining a new class of error-correcting codes whose redundancy makes the design of fault-secure detectors (FSD) particularly simple. Both the storage elements and the supporting encoder and corrector are implemented in dense, nanowire based technology. We further quantify the importance of protecting encoder and decoder circuitry against transient errors. We explore scrubbing designs and show the overhead for serial error correction and periodic data scrubbing. We prove that Hamming codes have the fault-secure detector capability. Using some of the smaller Hamming codes, we can tolerate nanowire defect rates with nanowire pitch of 10 nm for memory blocks of 10 Mb or larger. Larger Hamming codes can achieve even higher reliability. We present a design which describes the error-correction coding and circuitry used for permanent defect and transient fault tolerance with the help of VHDL modeling.- Efficient Run-Time Task Allocation for Reconfigurable Multiprocessor System-On-Chip with Network-On-Chip
Authors
1 Adhiparasakthi Engineering College, Melamaruvathur, IN
2 Department of ECE, Adhiparasakthi Engineering College, Melmaruvathur, IN
Source
Networking and Communication Engineering, Vol 2, No 4 (2010), Pagination:Abstract
In this paper, we propose a SOPC (System on a Programmable Chip) design based on multicore embedded system. Under our proposed scheme, in addition to conventional processor cores, we introduce dynamically reconfigurable accelerator cores to boost the performance of the system. We have built the prototype of the system using FPGAs (Field-Programmable Gate Arrays). Simulation results demonstrate significant system efficiency of the proposed system in terms of computation and power consumption. Our approach is to develop a highly flexible and scalable network design that easily accommodates the various needs. This paper presents the design of our NoC (Network on Chip) which is a part of the platform that we are developing for a reconfigurable system.Keywords
Multicore System, System on a Programmable Chip (SOPC), Network-On-Chip (NoC), Multiprocessor System-On-Chip (MPSOC).- Dynamic Cloud Allocation by Managing Web Services and by Implementing Portfolio Thinking and Design Diversity
Authors
Source
Software Engineering, Vol 8, No 6 (2016), Pagination: 160-162Abstract
Web services have gained growing interest due to their importance in developing Business to Business (B2B) or web applications. Simultaneously, cloud computing promises the delivery of reliable, affordable and on-demand services, which can be leased or traded. The popularity of the cloud and its distinctive economies of scale computation advantages make a cloud-based market a plausible and attractive option for publishing and trading web services. Conversely, offering web services through a cloud-based market has underlying risks associated with probable service failure – for instance, because of undependable service provision of the cloud service provider, hardware malfunctions or unpredicted fluctuations in demands for the traded service as a shared resource, etc. All these factors may increase the risks associated with Service Level Agreement (SLA) violations for web applications benefiting from the cloud-based market. Our work views the cloud as a marketplace for trading in-stances of web services, which web applications can explore trade and use as substitutable and compassable entities in the architecture of cloud-based service applications.
Keywords
Web Services, Storage System, Portfolio Thinking.- Obtaining Feasible Paths with Obstacle Avoidance using Watershed Algorithm through Simulation
Authors
1 Department of Computer Science and Engineering, Vaigai College of Engineering, Madurai – 625106, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Einstein College of Engineering, Seethaparpanalur, Tirunelveli – 627012, Tamil Nadu, IN
3 Department of Mechanical Engineering, Thiagarajar College of Engineering, Madurai – 625005, IN