A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Usha, M.
- Fast and Improved Clustering Technique with User Profile Information for Correlated Probabilistic Graphs
Authors
1 KG College of Arts and Science, Coimbatore, Tamil nadu, IN
2 Dept of Computer Application, KG College of Arts and Science, Coimbatore, Tamil Nadu, IN
Source
Indian Journal of Innovations and Developments, Vol 4, No 5 (2015), Pagination: 1-7Abstract
Objectives: The main objective of this work is to achieve the better efficiency and accuracy of the clustering along with the user profile information.
Methods: Partially Expected Edit Distance Reduction (PEEDR) technique is used for adding or eliminating vertices from the clusters. Correlated Probabilistic Graph Spectral (CPGS) is used to progress the quality of cluster. Improved attractiveness-based community clustering is a weighted clustering approach which enhances the clustering performance in superior.
Findings: The proposed method achieves high performance in terms of precision, recall and accuracy.
Application/Improvements: The proposed system is done by using improved attractiveness-based community clustering (IACC). It performs the clustering process based on the weight value node and edge in the network. The weight of node implies the core degree of the person in the network, and the weight of edge means the attractiveness between the two nodes. Additionally, this method performs the efficient graph clustering technique which combines the user profile of users.
Keywords
Clustering, Correlated, Probabilistic Graph, Improved Attractiveness-Based Community Clustering.- Acceptability of Recipes Based on New Strains of Hybrid Cholam (Sorghum Vulgare)
Authors
1 Sri Avinashilingam Home Science College, Coimbatore, IN
Source
The Indian Journal of Nutrition and Dietetics, Vol 1, No 3 (1964), Pagination: 188-191Abstract
One of the major problems facing India today is increasing food production to meet the requirements of its population. The position is more acute in food grains production because they contribute two thirds of the caloric intake of the average Indian.- Performance Analysis of Priority based Congestion Control for Heterogeneous Traffic in Multipath Wireless Sensor Networks
Authors
1 Department of Computer Science and Engineering, Sona College of Technology, Salem, Tamilnadu, IN
Source
Wireless Communication, Vol 4, No 9 (2012), Pagination: 482-487Abstract
In wireless sensor network, the highly important problem to be considered is congestion. Congestion in a wireless sensor network can cause packet loss, which in turn reduces throughput and energy efficiency. Different priorities are set for different types of data generated in heterogeneous wireless sensor networks. In multi path routing, the data flow is forwarded in multiple paths to the sink node. In this paper we analyze the performance of a priority based congestion control for heterogeneous traffic in multi path wireless sensor network. We have considered the nodes that have multiple applications running with different priorities. The parent node of each sensor node allocates the bandwidth among its child nodes based on the source traffic priority and transit traffic priority of the data from heterogeneous applications in the child nodes. Packet service ratio is used to detect the congestion. The proposed work is simulated in NS2. The results are shown based on the evaluation of delay, loss and throughput through X-graph and performance is better when compared with PCCP protocol.
Keywords
Congestion Control, Heterogeneous Traffic, Multi Path, Priority.- Performance Evaluation of Quality Based Bidirectional Reliability Protocol for Wireless Sensor Networks
Authors
1 Department of Computer Science and Engineering, Sona College of Technology, Salem, TamilNadu, IN
Source
Wireless Communication, Vol 4, No 9 (2012), Pagination: 506-512Abstract
Wireless sensor network consists of sensor nodes with limited battery power. In our protocol energy conservation is provided through clustering and bidirectional reliability. Bidirectional reliability includes event reliability and query reliability. Event detection is made possible with collective information received from many sensor nodes. But this increases congestion in the network and reduces the network life time. So we go for quality based event detection by classifying nodes as essential and non-essential nodes after which clustering is done. This classification is based on contribution degree and remaining energy. Many clusters are formed to cover the entire sensing field. In each cluster essential node communicates with sink node whereas nonessential node communicates only with essential nodes and they do not report event information to the sink node. The query information transmitted by the sink node is received only by essential nodes and then forwarded to non-essential nodes. Thus our proposed protocol achieves the bidirectional reliability between sink node and essential nodes. We have evaluated the performance of QBRP through simulation experiments. The simulation results show that QBRP achieves higher performance in terms of energy consumption, communication delay, and jitter.
Keywords
Wireless Sensor Network, Contribution Degree, Essential Node, Event Reliability, Query Reliability, Bidirectional Reliability.- Classifier Selection Model for Network Intrusion Detection Using Data Mining
Authors
1 Adhiyamaan College of Engineering, Hosur, IN
2 Sona College of Technology, Salem, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 12 (2011), Pagination: 744-748Abstract
Intrusion detection is one of the core technologies of computer security. It is required to protect the security of computer network systems. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of network intrusion detection becomes an important open problem. Data mining techniques are being applied in building intrusion detection systems to protect computing resources against unauthorized access. Classification methods are employed to categorize the network attacks. Usually one classifier algorithm is used to classify various network attacks. In this paper, we evaluated the performance of a comprehensive set of classifier algorithms using KDD99 dataset. It is found that certain algorithms perform better for certain attack classes. So a set of classifier algorithms namely, BayesNet, Naive Bayes, J48, Decision Table, JRip, OneR, IBk are compared based on the 10-fold cross validation test. Finally, two classifier algorithm selection models are proposed based on the evaluation results to categorize the network attacks.Keywords
Data Mining, Classifier Algorithms, Network Security, Intrusion Detection, KDD Dataset.- A Comparative Study of Cane and Palm Jaggery with Reference to Chemical Composition and Use in Food Preparations
Authors
1 Women's Christian College, Madras, IN
Source
The Indian Journal of Nutrition and Dietetics, Vol 2, No 3 (1965), Pagination: 122-124Abstract
The jaggery industry has been a very ancient cottage industry in India. The term sugar is derived from ' SARKARA ' meaning gur or jaggery, or indigenous sugar which was well known in ancient India Jaggery has been used extensively in Indian diets an energy producing food. The consumption of jaggery in India is about four times that of refined sugar.- Analytical Characterization of Wlans for Quality-of-Service with Active Queue Management
Authors
1 SonaNET Network Computing Research Center, Sona College of Technology, IN
2 Department of Computer Science, Sona College of Technology, IN
Source
ICTACT Journal on Communication Technology, Vol 5, No 3 (2014), Pagination: 970-976Abstract
Design of an Active Queue Management scheme at the Access Point to address the problem of congestion control, packet delay variation and packet loss rate is discussed. The proposed mechanism calculates and adjusts redundancy rate adaptively at the access point by considering both network traffic load and wireless channel condition. Real-time applications such as Mobile learning and smart learning need the special treatment and require differentiated QoS to satisfy the client who is ready to pay more than others. Maintaining the jitter value of the multimedia packets below the threshold is essential to guarantee the desirable quality of the video at the receiver. The work initially concentrates on minimizing the packet loss of such priority flows and they have to be given place in the queue even at the time of buffer overflow. Thus the proposed work uses push-out policy to provide differentiated services to the multimedia flow which achieves considerable improvement in the video quality at the receiver. The considerable decrease in packet loss rate and special treatment in the queue of the access point lowers the packet delay variation of the multimedia flow. The results show that the AQM used at the access point effectively achieves low packet loss, low jitter using differentiated FEC rate calculation without generating congestion in the wireless network.Keywords
Active Queue Management, Wireless Access Point, Quality of Service, Push-Out Policy.- EEMCCP - A Novel Architecture Protocol Design for Efficient Data Transmission in Underwater Acoustic Wireless Sensor Network
Authors
1 Department of MCA, MEASI Institute of Information Technology, Chennai, Tamil Nadu, IN
2 Department of Software Applications, Thiruthangal Nadar College, Chennai, Tamil Nadu, IN
3 Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore, Tamil Nadu, IN
4 School of Engineering and Computing, Western Sydney University, NSW, AU
Source
International Journal of Computer Networks and Applications, Vol 7, No 2 (2020), Pagination: 28-42Abstract
Underwater communication is a newer addition to the ad hoc network arena as it opens several avenues of research that can be carried out under water. It has a varied range of applications which it carries out with the help of Autonomous Underwater Vehicles (AUV).Acoustic waves are used for sending out the network signals because they tend to have a lower attenuation under water. Underwater Acoustic Communication (UWAC) is used to send and receive signals underwater. Since UWAC is a relatively new field, there are still a lot of challenges to overcome. Unlike terrestrial communication, UWAC has to encounter factors like limited bandwidth, longer propagation delay, Doppler Effect, and channel availability problems. All of these factors have a direct effect on the throughput. Clustering the network can effectively help in managing the network efficiently. We have proposed an Energy Efficient Minimum Cost Cluster routing Protocol (EEMCCP), which routes packets with the help of clusters. The clustering of the network is efficiently achieved by using the Chaotic Algae Algorithm (CAA).After clustering the network, one node from each cluster acts as the Cluster Head (CH). The proposed protocol does not require any node position information and also ensures that, only a minimal number of nodes are involved in the end to end routing process. Some of the Cluster Heads are selected as gateway nodes based on their RSSI (Received Signal Strength Indictor) values of the Hello packets. Selected CHs are appointed as gateway nodes that are responsible for supplying the data to the AUV nodes that are nearer to them. When these gateway CH nodes exhaust their energy, back up nodes act as gateway nodes thus making the protocol a flexible one. In fact, the node location and position are not taken into consideration. The AUV nodes transfer the acquired information to a communication link which in turn transfers the data to a terrestrial destination. The EEMCCP focuses towards a cost effective solution for transmitting data. The performance of EEMCCP is compared with the existing protocols employed for underwater communication. From the analysis, we find that EEMCCP achieves a good throughput and PDR than the existing protocols.Keywords
EEMCCP, AEERP, EEDBR, AUV, Gateway Nodes, RSSI, Routing, Cluster, Cluster Head, CAA.References
- AG. A. Hollinger, S. Choudhary, P. Qarabaqi, C. Murphy, U. Mitra, G. S. Sukhatme, M. Stojanovic, H. Singh, and F. Hover, "Communication protocols for underwater data collection using a robotic sensor network," IEEE GLOBECOM Workshops, 2011, pp. 1308-1313.
- Seokhoon Yoon, Abul K. Azad, Hoon Oh and Sunghwan Kim, "AURP: An AUV-Aided Underwater Routing Protocol for Underwater Acoustic Sensor Networks", Sensors 2012, 12(2), 1827- 1845.
- F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: research challenges", Ad Hoc Networks, vol. 3, no. 3, pp. 257-279, 2005
- E. M. Sozer, M. Stojanovic, and J. G. Proakis, "Initialization and Routing Optimization for Ad-Hoc Underwater Acoustic Networks," Optical network - 2000
- Caiti A, Grythe K, Hovem JM, Jesus SM, Lie A, Munafo A, Reinen TA, Silva A, Zabel F. Linking acoustic communications and network performance: integration and experimentation of an underwater acoustic network. IEEE Journal of Oceanic Engineering. 2013 Oct; 38(4):758-71.
- W. Zhang, M. Stojanovic, and U. Mitra, "Analysis of a simple Multihop underwater acoustic network," in Proceedings of the Third ACM International Workshop on Underwater Networks, ser. WuWNeT ’08. New York, NY, USA: ACM, 2008, pp. 3-10.
- A. Stefanov and M. Stojanovic, "Design and performance analysis of underwater acoustic networks," IEEE Journal on Selected Areas in Communications, vol. 29, no. 10, pp. 2012-2021, December 2011.
- C. W. Ahn and J.-H. Lee, "Wireless cooperative communication: A survey," in Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ser. ICUIMC ’11. New York, NY, USA: ACM, 2011, pp. 78:1-78:6.
- Dario Pompili and Tommaso Melodia, "Routing algorithms for delay-insensitive and delay-sensitive applications in underwater sensor networks," in Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, ser. MobiCom ’06. New York, NY, USA: ACM, 2006, pp. 298-309.
- Federico Favaro, Paolo Casari, Federico Guerra, Michele Zorzi, "Data Upload from a Static Underwater Network to an AUV: Polling or Random Access," IEEE Oceans 2012.
- D.A. Paley, F. Zhang, and N.E. Leonard, "Cooperative Control for Ocean Sampling: The Glider Coordinated Control System," IEEE Trans. Control Systems Technology, vol. 16, no. 4, pp. 735-744, July 2008.
- B. Liu, P.B.O. Dousse, P. Nain, and D. Towsley, "Mobility Improves Coverage of Sensor Networks," Proc. ACM MobiHoc, 2005
- Y. Yu and J.L. Rittle, "Utility-Driven Spatiotemporal Sampling in Mobile Sensor Networks," Proc. IEEE INFOCOM ’08, Apr. 2008.
- Geoffrey A. Hollinger, Sunav Choudhary, Parastoo Qarabaqi, Christopher Murphy, Urbashi Mitra, Gaurav S. Sukhatme, Milica Stojanovic, Hanumant Singh, Franz Hover, "Autonomous Data Collection from Underwater Sensor Networks using Acoustic Communication," IEEE Journal on Selected Areas in Communication 2012.
- E. Balas, "The Prize Collecting Traveling Salesman Problem," Networks, vol. 19, pp. 621-636, 1989.
- H. Bojinov, A. Casal, and T. Hogg, "Emergent structures in modular self-reconfigurable robots," in Proceedings of the IEEE International Conference on Robotics and Automation, pp. 1734-1741, San Francisco, Calif, USA, April 2000.
- AG. A. Hollinger, S. Choudhary, P. Qarabaqi, C. Murphy, U. Mitra, G. S. Sukhatme, M. Stojanovic, H. Singh, and F. Hover, "Communication protocols for underwater data collection using a robotic sensor network," IEEE GLOBECOM Workshops, 2011, Dec. 2011, pp. 1308-1313.
- Sathiamoorthy, J., and B. Ramakrishnan. "Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs." Wireless Personal Communications 95, no. 2 (2017): 1531-1552.
- Harb H, Makhoul A, Couturier R. An enhanced K-means and ANOVA-based clustering approach for similarity aggregation in underwater wireless sensor network. IEEE Sensors Journal. 2015 Oct; 15(10):5483-93.
- Sathiamoorthy, J., and B. Ramakrishnan. "A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs." Soft Computing 22, no. 19 (2018): 6545-6565.
- Sathiamoorthy, J., B. Ramakrishnan, and M. Usha. "A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm." In 2015 International Conference on Computing and Communications Technologies (ICCCT), pp. 144-151. IEEE, 2015.
- Forghani, Azadeh, Amir Masoud Rahmani, and Ahmad Khademzadeh. "QCTC: QoS-based clustering topology control algorithm for wireless sensor networks." In 2008 International Conference on Advanced Computer Theory and Engineering, pp. 966-970. IEEE, 2008.
- Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144-151.
- Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energyaware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469-1481.
- Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. Applied Soft Computing, 13(4), 1741-1749.
- Pranay Kumar Baghel and Anil Kumar Mishra (2016), Comparative Analysis of Different Approaches for Navigation and Path Planning, International Journal of Emerging Technologies in Engineering Research (IJETER), Volume 4, Issue 6,2016.
- Ravinder Kaurand Dr. Neeraj Sharma (2015), A Node Authentication Mechanism to Enhance the Security in VANETs, International Journal of Emerging Technologies in Engineering Research (IJETER), Volume 1, Issue 2,2015
- Er. Jagdeep Kaurand Prof. (Dr.) Jatinder Singh (2015), Particle Swarm Optimization Based Neural Network, International Journal of Emerging Technologies in Engineering Research (IJETER), Volume 3, Issue 2, 2015
- Linfeng Liu, Ye Liu," On Exploiting Signal Irregularity with Topology Control for Mobile Underwater Wireless Sensor Networks", proc. IEEE Globecom - Ad Hoc and Sensor Networking Symposium, pp. 522-527, 2013.
- Seokhoon Yoon, Abul K. Azad, Hoon Oh and Sunghwan Kim, "AURP: An AUV-Aided Underwater Routing Protocol for Underwater Acoustic Sensor Networks", Sensors 2012, 12(2), 1827- 1845.
- Chen, Yuh-Shyan, and Yun-Wei Lin. "Mobicast routing protocol for underwater sensor networks." IEEE Sensors journal 13, no. 2 (2012): 737-749.
- Favaro, Federico, Paolo Casari, Federico Guerra, and Michele Zorzi. "Data upload from a static underwater network to an AUV: Polling or random access?." In 2012 Oceans-Yeosu, pp. 1-6. IEEE, 2012.