Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sheik Abdul Khader, P.
- A Framework for Academic Knowledge Repository
Abstract Views :590 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Applications, B.S.Abdur Rahman University, Vandalur, Chennai, Tamil Nadu., IN
1 Department of Computer Applications, B.S.Abdur Rahman University, Vandalur, Chennai, Tamil Nadu., IN
Source
International Journal of Knowledge Based Computer System, Vol 1, No 1 (2013), Pagination: 23-27Abstract
As computer technologies are highly emerged in today's world, leading organizations have digitalized their maximum data transferred in their organization. These leads to digital data maintenance issue as well as issue of retaining the knowledgeable data, which is considered as organization intellectual asset. Organizations are taking higher steps to build knowledge repositories to retain their knowledgeable data on centralized shared storages. The importance of maintaining knowledge repositories to preserve the intellectual capitals has made the institutions to plunge in the ease of creating knowledge repositories for holding institutional intellectual assets. This research contains a novel approach of creating an environment to build knowledge repository for institutions, which provides a mode of capturing the externalized knowledge transferred in the institutions by the stack holders.Keywords
Knowledge Management, Information Sharing, Tacit Knowledge, Virtual Learning Environment, Knowledge Externalization, Tacit Knowledge, Knowledge RepositoryReferences
- Doctor, G. (2008). Capturing intellectual capital with an institutional repository at a business school in India. Library Hi Tech, 26(1), 110-125.
- Knowles, J. (2010). Collaboration nation: The building of the Welsh Repository Network. Program: Electronic Library and Information Systems, 44(2), 98-108.
- Campbell-Meier, J. (2011). A framework for institutional repository development. In Delmus E. Williams, Janine Golden (ed.). Advances in Library Administration and Organization (30, 151-185). Emerald Group Publishing Limited.
- Rajalakshmi, S. & Wahidabanu, R. S. D. (2011). Sharing and capturing tacit knowledge in higher education-The Info-Ca-SH. International Journal of Computer Theory and Engineering, 3(3), 365-368.
- Lloyd, J. W. (2003). Logic for Learning: Learning Comprehensible Theories from Structured Data. Springer-Verlag.
- Freeze, R. D. & Kulkarni, U. (2007). Knowledge management capability: Defining knowledge assets. Journal of Knowledge Management, 11(6), 94-109.
- Laoufi, A., Mouhim, S., Megder, E. H., Cherkaoui, C. & Mammass, D. (2011). Using knowledge management in higher education: Research challenges and opportunities. Journal of Theoretical and Applied Information Technology, 31(2), 100-108.
- Koskinen, K. U. (2003). Evaluation of tacit knowledge utilization in work units. Journal of Knowledge Management, 7(5), 67-81.
- Li, M. & Gao, F. (2003). Why Nonaka highlights tacit knowledge: A critical review. Journal of Knowledge Management, 7(4), 6-14.
- Abdullah, R., Selamat, H., Sahibudin, S. & Alias, A. (2005). A framework for knowledge management system implementation in collaborative environment for higher learning institution. Journal of Knowledge Management Practice, 6.
- Trust Evaluation Model for Mobile Ad Hoc Network
Abstract Views :380 |
PDF Views:2
Authors
Source
National Journal of System and Information Technology, Vol 4, No 2 (2011), Pagination: 190-195Abstract
Securing Mobile ad hoc net work is a challenging task due to the lack of trust among nodes. In this paper we analysis various trust models for Mobile ad hoc network and then propose a trust evaluation model for mobile ad hoc network which estimating trust level of supplicant nodes by Evaluating and analysis node behavior. This model also designed to detect compromised nodes inside the environment and to isolating the compromised and misbehavior nodes from the network. This model also tested through introducing misbehavior nodes and compromised nodes into the environment and the result shows that the model is highly effective in detecting misbehavior node and compromised nodes over various other security models for Mobile ad hoc network.Keywords
MANET, Trust, Node Misbehavior, Compromised NodeReferences
- Jiang T, Baras J (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: 2nd International Workshop on Mobile Distributed Computing. USA: pp 588–593
- Jiang T, Baras J (2004) Cooperative Games, Phase Transition on Graphs and Distributed Trust MANET. In: 43rd IEEE Conference on Decision and Control
- Theodorakopoulos G, Baras J (2004) Trust Evaluation in Ad-Hoc Networks. In: ACM workshop on Wireless security. USA: pp1–10
- Zimmermann PR (1995) The Official PGP User’s Guide. MIT Press USA
- Hubaux JP, Buttyan L, Capkun S (2001) The Quest for Security in Mobile AdHoc Networks. In: 2nd ACM internatio networking & computing. USA: pp 146
- M. E. G. Moe, B. E. Helvik, and S. J. Knapskog, “TSR: Trust MANET Routing using HMMs,” Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks Canada, 27-28 Oct. 2008, pp. 83-90.
- S. Reidt, S. D. Wolthusen, and S. Balfe, “Robust and EfficientCommunication Overlays for Trust Authority Computations,” 2009 IEEE Sarnoff Symposium, March 2009.
- M. A. Ayachi, C. Bidan, T. Abbes, and A. Bouhoula, “MisbehaviorDetection Using Implicit Trust Relations in the AODV Routing Protocol,” Conf. on Computational Science and Engineering 2, 29-31 Aug. 2009, pp. 802-808.
- A. Adnane, C. Bidan, R. T. de Sousa, “ Securing OLSR Protocol,” 2009 Int’l Conf. on Computational Science and Engineering, Vancouver, Canada, vol. 2, 28-31 Aug. 2009,pp.745-752.
- Improving the Performance of Mobile Ad-Hoc Network Using Cross-Layer Design
Abstract Views :286 |
PDF Views:1
Authors
Affiliations
1 Sathyabama University, Chennai, IN
2 Department of CA, B.S.Abdur Rahman University, Chennai, IN
1 Sathyabama University, Chennai, IN
2 Department of CA, B.S.Abdur Rahman University, Chennai, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 427-431Abstract
Mobile ad-hoc network (MANET) is collection of wireless mobile hosts forming a temporary network with out the aid of any standalone infra structure or centralized administration. Mobile ad-hoc network have attributes such as wireless connection continuous changing topology, distributed operation and ease of deployment. Ad-hoc network has emerged as an important trend of future wireless systems that will provide ubiquitous wireless access. In this research we study that performance optimization challenges of ad-hoc network and cross layer processing to improve its performance. We implemented cross layer processing between physical (PHY), medium access control (MAC) and network (NET) layers using network simulator NS-2. The MAC layer adaptively selects a transmition data rate based on the channel signal strength information from the physical layer. The MAC layer utilization is sent to DSR routing protocol as a congestion aware routing metric for optimal route discovery.Keywords
MANET, MAC, DSR, Cellular Phones, Laptops, and PDAs.- Trust Based Authentication Key Distribution System for Mobile Ad Hoc Network
Abstract Views :208 |
PDF Views:1
Authors
Affiliations
1 Sathyabama University, Chennai 600 119, IN
2 Department of Computer Application, B. S. Abdur Rahman University, Vandalur, Chennai-600 048, IN
1 Sathyabama University, Chennai 600 119, IN
2 Department of Computer Application, B. S. Abdur Rahman University, Vandalur, Chennai-600 048, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 432-434Abstract
This paper is concerned towards providing trust based authentication key distribution system for mobile ad hoc network (MANET). Traditional authentication key distribution methods cannot be able to adopt for securing the MANET due to infrastructure less nature and lack of trust among nodes. We propose an authentication key distribution scheme for MANET which authenticates a node as well as provide a trust chain among nodes which enables secured and reliable key distribution. This paper also focuses on enhancing co-operation between nodes through trust chain.Keywords
MANET, Authentication Key, Security, Trust.- Cluster Adaptive Memory less Protocol for Anti-Collision in Low Cost Passive RFID Tags
Abstract Views :223 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Applications, B.S. Abdur Rahman University, Vandalur, Chennai – 48, IN
2 Department of Computer Applications, B.S. Abdur Rahman University, Chennai, IN
3 Department of Computer Applications, B.S. Abdur Rahman University, Chennai – 48, IN
1 Department of Computer Applications, B.S. Abdur Rahman University, Vandalur, Chennai – 48, IN
2 Department of Computer Applications, B.S. Abdur Rahman University, Chennai, IN
3 Department of Computer Applications, B.S. Abdur Rahman University, Chennai – 48, IN
Source
Wireless Communication, Vol 2, No 8 (2010), Pagination: 223-231Abstract
RFID unlike barcodes enables simultaneous detection of multiple distant and non-line of sight objects. These characteristics make them exceptional and broaden its scope and utility of RFID systems. Signal transmissions from multiple tags result in tag collisions or confusion causing increase in identification delay, communication overhead and power consumption. In general conventional protocols, utilisation of time slots are in rise, when the tag population increases exponentially. The protocols suggested in recent years follow a “win one – loose other agreement”. Though BT, QT, variants of QT, AQS and ABS who show superiority in minimizing collision, identification delay and transmitting bits, they are no longer memoryless. Cluster Adaptive Memoryless Protocol (CAMP) proposed in this paper takes account of all requirements of a good collision protocol. The grouping procedure and tree construction adopted makes the algorithm to stand apart.Keywords
Anti Collision, RFID, Passive Tag Identification, Tree Based Algorithm.- Performance Evaluation Study of Intelligent Vehicular Ad Hoc Networks
Abstract Views :222 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
2 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
1 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
2 Department of Computer Applications, B.S. Abdur Rahman Crescent Engineering College, Vandalur, Chennai-600048, Tamilnadu, IN
Source
Wireless Communication, Vol 2, No 8 (2010), Pagination: 232-238Abstract
Recently, vehicular networks have begun to attract much attention in industry as well as academia. The IEEE 802.11p is known as Wireless Access in Vehicular Environment (WAVE) to provide the vehicle-to-vehicle and vehicle-to-infrastructure communications. The objective of this paper is to give a study and compare the protocols IEEE 802.11p with IEEE 802.11a. NS2 simulation framework has been developed to evaluate the performance of wireless access technologies and study the packet loss occurred during transmission. Also, this framework is developed to meet the requirements for vehicle to infrastructure communications and it is extended to vehicle to vehicle communications for vehicular ad hoc networks.Keywords
Dedicated Short Range Communications, Wireless Access in Vehicular Environment, IEEE 802.11p.- An Efficient Reliable Protocol in AD-Hoc Network Using A Cross Layer Approach via TCP
Abstract Views :263 |
PDF Views:3
Authors
Affiliations
1 Department of CA, B.S Abdur Rahman University, Chennai, IN
1 Department of CA, B.S Abdur Rahman University, Chennai, IN
Source
Networking and Communication Engineering, Vol 3, No 6 (2011), Pagination: 415-417Abstract
Mobile Ad-hoc Networks (MANETS) operate in highly dynamic environments with limited resources. Due to ever-changing network topology and unreliable wireless channels the performance of the Ad-hoc network is poor. A key challenge is to create a mechanism that can provide good delivery performance and high quality of service in network. The key components of the approach include a cross layer design to improve information sharing between the different protocol layers. In order to improve the performance of MANET, it is planned to implement the cross-layer mechanism from data link layer to the routing layer which can improve the performance of mobile Ad-hoc Network (MANET) routing protocols. It involves allowing the MAC layer of mobile node to learn of the route layer to MAC address mapping of nodes from destination that it receives. This mechanism may improve the reliable transport using the TCP protocol. Simulation of this work is carried out in NS2.Keywords
MANETS, Cross-Layer, Route Failure.- Adaptive Routing for QoS in Manet by Using Cross Layer Architecture
Abstract Views :251 |
PDF Views:1
Authors
Affiliations
1 Department of CA, B.S Abdur Rahman University, Chennai, IN
1 Department of CA, B.S Abdur Rahman University, Chennai, IN