A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Visu, P.
- Enhancing JS– MR Based Data Visualisation using YARN
Authors
1 Department of CSE, Vel Tech University, Chennai-62. TamilNadu, India, IN
Source
Indian Journal of Science and Technology, Vol 8, No 11 (2015), Pagination:Abstract
Hadoop is an advanced framework with separated File storage system to organize these data’s in distributed environment.Hadoop is a form of cluster with which is subjected to wide range of visualized data. Job sequence is one of the most peculiar sequences often handled by the scheduler in order to split and merge the job and its probable environment in organizing and utilizing the data. Once the scheduler assigns the job to its sequence and then it is visualized in terms of tracking, reordering and distributing those data in any distributed environment. Here the major focus of the research is concentrated on enormous amount of data to distinguish its pattern and way of organizing those data’s. The major scope is switched in the context of analyzing the data distribution using next generation yarn structure of HADOOP. The experimental results show that the problem addressed here has a vast advantage over the existing visualization techniques.Keywords
Data Visualisation, Hadoop, Job Sequence, Scheduler, Yarn, Big Data.- Multiple Channels Utilization in Collision Free MAC Protocol for Wireless Ad Hoc Networks
Authors
1 Department of Computer Science and Engineering, Veltech Dr.RR & Dr.SR Technical University, Chennai, IN
Source
Wireless Communication, Vol 3, No 16 (2011), Pagination: 1155-1159Abstract
Wireless ad hoc network, though it is not structured by itself, represents a powerful communication infrastructure. The distributed and flexible architecture of wireless ad hoc networks is a key factor; however, their wide deployment relies on protocols capable of providing energy optimization, high channel utilization, support for real time traffic, etc. In such a context, recently a Collision Free MAC protocol has been proposed. Its effectiveness has been already investigated showing significant improvements compared to the Standard IEEE 802.11, in terms of throughput, one way packet delay, energy consumption and support of real time traffic. This paper suggests a means for utilization of multiple parallel wireless channels and proposes an enhanced version called ECF-MAC, by imposing all stations to stay awake and ready to receive during the access window. Therefore, a transmitting station will surely find awake its destination station.Keywords
Collision Free MAC, Power Saving, Wireless Networks, Variable Time Slot.- A New Random 2ACK Technique for Detection of Selfish Nodes in a Mobile Ad-Hoc Network
Authors
1 Department of CSE, Vel Tech Dr.RR & Dr.SR Technical University, Chennai, IN
2 Dept of ECE, Vel Tech Engineering College, Chennai, IN
Source
Wireless Communication, Vol 3, No 16 (2011), Pagination: 1160-1164Abstract
A mobile ad hoc network (MANET) is a temporary infrastructure less network, formed by a set of mobile hosts. It dynamically establishes its own network without relying on any central administration. In a MANET each device is free to move independently in any direction, and will therefore change its links to other devices frequently. Mobile ad hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, performing network functions consumes energy and other resources. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. These nodes must be identified and excluded from the cooperative part of the network, as they only consume resources and don’t contribute to the infrastructure. In MANET’s routing misbehavior can severely degrade the performance at the routing layer. Specifically, nodes may participate in the route discovery and maintenance process but refuse to forward data packets. Some solutions have been recently proposed to detect and mitigate such selfish nodes, but almost all these solutions rely on the watchdog technique in their monitoring components, which suffers from many problems. This paper proposes a new approach to mitigate some of the above problems. A misbehavior detection system aims at removing the MANET vulnerability. In this approach a system is built to detect misbehaving nodes in mobile ad hoc networks.
Keywords
Mobile Ad Hoc Networks, Routing Misbehavior, Selfishness, Network Security.- A Narrative Loom to Secured Strewn Assorted Milieu in Network Architecture
Authors
1 Department of Computer Science and Engineering, Veltech Dr.RR & Dr.SR Technical University, Chennai, IN
2 Panimalar Engineering College, Chennai, IN
Source
Networking and Communication Engineering, Vol 3, No 15 (2011), Pagination: 995-998Abstract
Service oriented steganography is a framework based on, on which a logical transparent steganographic layer development. In this paper the works on steganography and its approach is studied and divided on Work Breakdown Structure into simple rational services allotted to network infrastructure. Service oriented architecture is also described which service oriented architecture communicates each and everything through a common language to desired compositions. It also reuses, outsource, maintain and make simple and available all the system attributes. In addition to this a related ADL model in the form of framework is also developed to describe and clarify the above proposed approach of steganographic algorithms which can be supported by different services on the network. This service based steganography system implements encoding service to hide a secret image inside a cover image automated by cover image selection service and decoding service which performs the extraction process.Keywords
Service Oriented Architecture, Slightest Momentus Crub Inclusion, Application Programming Interfaces, Granular and Distributed Service Oriented Systems.- Knowledge Extraction Technique from Web Documents Using Domain Ontologies for Decision Support
Authors
1 Department of CSE, Vel Tech Dr.RR & Dr.SR Technical University, Chennai-62, IN
2 Department of CSE, Dr. MGR University, Chennai, IN
3 Department of CSE, Vel Tech Dr.RR & Dr.SR Technical University, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 16 (2011), Pagination: 970-973Abstract
The Semantic Web aims to extend the existing Web with conceptual metadata that are more accessible to machines and thereby more effectively communicate the proposed meaning of Web resources. We need efficient ways to access and extract knowledge from Web documents in order to make the Semantic Web to life and provide advanced knowledge services. Specialized knowledge services therefore require tools that can search and extract specific knowledge directly from unstructured text on the Web, guided by an ontology that details what type of knowledge to harvest. This paper links acknowledge-extraction tool with ontology to achieve continuous knowledge support and guide information extraction. The extraction tool is applied onto web documents and extracts knowledge that matches the given Web Query. Knowledge extraction is further enhanced using a lexicon-based term expansion mechanism that provides extended ontology terminology. It provides this knowledge in an XML format that will be automatically maintained in knowledge base (KB). This knowledge base can be used for further inferences (i.e.) to produce a narrative generation. The user interface is designed in such a manner that it receives the relevant interests of the user and the ontology aware query.Keywords
Ontology, Knowledge Extraction, Web Page Annotations, Semantic Web, Web Search.- Efficient Traffic Free Routing Protocol for Mobile Ad-hoc Networks
Authors
1 Vel Tech Dr.RR Dr.SR Technical University, Avadi, Chennai, IN
2 Department of CSE, Dr.M.G.R University, Chennai, IN
3 Department of CSE, Vel Tech Dr.RR & Dr.SR Technical University, Chennai-62, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 3, No 13 (2011), Pagination: 878-881Abstract
Mobile Ad-hoc Networks shows unexpected behavior with multiple data streams under heavy traffic load such as multimedia data when it is sent to common destination. The main reason for packet loss in mobile ad hoc networks is due to congestion. In the current design, routing is not congestion-adaptive. Routing may let a congestion happen which is detected by congestion control, but dealing with congestion in this reactive manner results in longer delay and unnecessary packet loss and requires significant overhead if a new route is needed. This problem becomes more visible especially in large-scale transmission of heavy traffic such as multimedia data, where congestion is more probable and the negative impact of packet loss on the service quality is of more significance. In the current design, the routing protocols are not congestion adaptive. The way in which the congestion is handled results in longer delay and more packet loss. When a new route is needed the routing protocols take significant overhead in finding it. In this paper we propose an Efficient congestion Adaptive Routing Protocol for Mobile Ad-hoc Networks, which out performs even during constrained situation. In order to analyze the performance we have chosen popular routing protocols such as AODV and DSR. We strongly argue that routing should not only be aware of but also be adaptive to network congestion.
Keywords
Ad-Hoc Networks, Routing Protocols, Mobile Computing, Congestion Adaptivity.- Brainwave Based Accident Avoidance System for Drowsy Drivers
Authors
1 Department of CSE, Vel Tech University, Avadi, Chennai - 600062, Tamil Nadu, IN
2 Department of IT, Vel Tech University, Avadi, Chennai - 600062, Tamil Nadu, IN