Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shukla, Piyush Kumar
- A Comprehensive Survey of Routing Strategies for Vehicular Ad-Hoc Networks
Abstract Views :292 |
PDF Views:4
Authors
Affiliations
1 University Institute of Technology–RGPV, Bhopal, IN
1 University Institute of Technology–RGPV, Bhopal, IN
Source
Wireless Communication, Vol 5, No 8 (2013), Pagination: 328-333Abstract
Vehicular Ad Hoc Networks is an emerging new technology which incorporates ad hoc network, wireless LAN (WLAN) and cellular technology, which has been taken huge attention in the recent years to enhance active and preventive traffic safety on the road as well as travel comfort. In Vehicular Ad Hoc Network, vehicles acts as nodes, this can be treated equally for data delivery.VANET provides wireless communication among vehicles (V2V) and vehicle to roadside infrastructure (V2I). In VANETs nodes are highly mobile, so the network topology changes frequently. Due to dynamic topology, network partitioning and high vehicular speed characteristics make it difficult to design an efficient routing protocol for propagating data, Therefore design of an efficient routing protocol has taken significant attention and that is the reason it is extremely necessary to identify pros and cons of routing protocols which may be used for additional enhancement or development of the new routing protocol. In this paper we provide a brief review of the main 6 types of routing strategy for VANET along with major classifications, open issues and challenges. The protocols have been compared in a tabulated form based upon their essential characteristics.Keywords
GPS, MANETs, VANETs.- MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network
Abstract Views :142 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science & Engineering, UIT, RGPV, Bhopal, IN
2 Department of Computer Science & Engineering, RGPV, Bhopal, IN
3 Department of Electronic & Communication, MITS, RGPV, Gwalior, IN
1 Department of Computer Science & Engineering, UIT, RGPV, Bhopal, IN
2 Department of Computer Science & Engineering, RGPV, Bhopal, IN
3 Department of Electronic & Communication, MITS, RGPV, Gwalior, IN
Source
Networking and Communication Engineering, Vol 3, No 7 (2011), Pagination: 507-509Abstract
We can’t say anything about behavior of a node in a wireless network scenario. We always aspect a good and gentle behavior from a node irrespective of channel utilization or throughput degradation by a particular node. We can easily declare a node as a non- legitimate/suspicious node but we can’t say what we should do with a node responsible for increasing throughput and reducing unused slots if it is not a legitimate/suspicious node. Throughputs may decrease because of suspicious nodes working as a malicious node, but it can also increase because of not following back-of rules will called as an opportunist node. We have emphasis on identification scheme for node characterization. In our model we have identified some parameters at the MAC Sub layer. We can realize and declare a node as an attacker in the network and can be discard it from the network if it crossed the predefine threshold value calculated on the basis of identified parameters. Before a standard threshold value calculated it can be punished by increasing back-off period by a predefined calculated value. Declared opportunist nodes can be promoted by decreased back-off values. We have proposed an algorithm for declaring, blocking and discarding a node if it is a malicious node and also we will give reward to opportunist nodes. The Defense algorithm increasing the received bandwidth and reducing the packet loss of legitimate users.Keywords
BEB, MAC, Malicious, Attack, Suspicious, Opportunist, Penalty, Rewards.- Various Techniques of DDoS Attacks Detection and Prevention at Cloud: A Survey
Abstract Views :145 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Sant Hirdaram Girls College, Bhopal, 462030, IN
2 Computer Science and Application, Barkatullah University, Bhopal, 462001, IN
3 Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal, Airport Bypass Road, Gandhi Nagar, Bhopal 462033, IN
1 Department of Computer Science, Sant Hirdaram Girls College, Bhopal, 462030, IN
2 Computer Science and Application, Barkatullah University, Bhopal, 462001, IN
3 Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal, Airport Bypass Road, Gandhi Nagar, Bhopal 462033, IN
Source
Oriental Journal of Computer Science and Technology, Vol 8, No 2 (2015), Pagination: 110-120Abstract
Cloud Computing is one of the fastest growing concept of transmitting the data or storing data so that the user can access data from anywhere. But with the advancement of growing new technology various challenges have emerged such as security from various attacks, computational cost and power consumption. One of the major issues is the Distributed Denial of Service Attack. It is a type of attack where a multitude of compromised systems start attacking on a single target that enables denial of services for the user of the targeted system. Hence, various techniques are implemented for the detection and prevention of these attacks; some of the techniques work better while some have issues, concerns and problems. In this paper, a complete survey and analysis of various Distributed Denial of Service Attack detection and prevention technique is analyzed and discussed so that on the basis of issues surfaced, a new, reformed and efficient technique is implemented for the detection and prevention of Distributed Denial of Service Attack especially in Cloud Computing System.Keywords
Cloud computing, Denial of Service, Distributed Denial of Service, Security, Detection, Prevention.- A Proficient Video Compression Method Based on DWT & HV Partition Fractal Transform Function
Abstract Views :202 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Engineering, UIT RGPV, Bhopal, IN
2 MITS, Gwalior, IN
1 Department of Computer Science & Engineering, UIT RGPV, Bhopal, IN
2 MITS, Gwalior, IN
Source
International Journal of Scientific Engineering and Technology, Vol 7, No 2 (2018), Pagination: 20-24Abstract
Transform based function play vital role in video compression. In this paper used two transform functions for video compression one is discrete wavelet transform function and other is fractal transform function. The discrete wavelet transform function is very promising image compression technique. Instead of discrete wavelet transform fractal transform is fast image compression technique. Here both wavelet transform function and fractal transform function used for video compression. The H-V partition technique is used for fast processing of video data in terms of row and column. The process of compressing produce good PSNR value and the compression ratio instead of DWT transform function. The DWT transform function creates group of frames in terms of layer for the processing of lower and higher band data of process video. The major contribution of H-V partition technique in video compression due to represents of domain and range blocks for the processing of video components. The processing of transform generates the similarity property of range and the compression process is fast. The both methods DWT and H-V partition techniques simulated in MATLAB software and measure some standard parameter such as PSNR, Compression ratio, encoding time, and MSE.Keywords
Video Compression, DWT, Fractal Transform, H-V Partitioning, MATLAB, MSE.References
- i. Rakhi Ashok Aswani and Prof.S.D.Kamble “Fractal Video Compression using Block Matching Motion Estimation - A Study”, IOSR, 2014, Pp 82-90.
- ii. Ehsan Lotfi “A Novel Hybrid System Based on Fractal Coding for Soccer Retrieval from Video Database”, Majlesi Journal of Electrical Engineering, 2012, Pp 40-47.
- iii. Nevart A. Minas and Faten H. Mohammed Sediq “Compression of an AVI Video File Using Fractal System”, IJCSI, 2013, Pp 182-189.
- iv. R. E. Chaudhari and S. B. Dhok “Review of Fractal Transform based Image and Video Compression”, International Journal of Computer Applications, 2012, Pp 23-31.
- v. Vitor de Lima, William Robson Schwartz and HelioPedrini “3D Searchless Fractal Video Encoding at Low Bit Rates”, J Math Imaging Vis, 2013, Pp 239–250.
- vi. Shiping Zhu, Liyun Li, Juqiang Chen and KamelBelloulata “An Efficient Fractal Video Sequences Codec with Multiviews”, Hindawi Publishing Corporation, 2013, Pp 1-9.
- vii. vii Ravindra E. Chaudhari and Sanjay B. Dhok “Fractal Video Coding Using Fast Normalized Covariance Based Similarity Measure”, Hindawi Publishing Corporation, 2016, Pp 1-12.
- viii. R. E. Chaudhari and S. B. Dhok “Fast Quadtree Based Normalized Cross Correlation Method for Fractal Video Compression using FFT”, JEET, 2016, Pp 709-718.
- ix. MambayeNdiaye, Lisa Terranova, Romain Mallet, Guillaume Mabilleau and Daniel Chappard “Three-dimensional arrangement of b-tricalcium phosphate granules evaluated by microcomputed tomography and fractal analysis”, Acta Biomaterialia, 2015, Pp 404–411.
- x. Shailesh D. Kamble, Nileshsingh V. Thakur and Preeti R. Bajaj “A Review on Block Matching Motion Estimation and Automata Theory based Approaches for Fractal Coding”, IJIMAI, 2016, Pp 91-104.
- xi. Shiping Zhu, Liyun Li, Juqiang Chen and KamelBelloulata “An automatic region-based video sequence codec based on fractal compression”, Int. J. Electron. Commun. 2014, Pp 1-12.
- xii. KamelBelloulata, Amina Belalia and Shiping Zhu “Object-based stereo video compression using fractals and shape-adaptive DCT”, Int. J. Electron. Commun., 2014, Pp 687–697.
- xiii. G.Sandhiya, M.Rajkumar and S.G.Vishnu Prasad “Hardware Implementation of 2D - DWT for Video Compression using Bit Parallel Architecture”, IJSETR, 2015, Pp 1211-1215.
- xiv. Dr. Fadhil Salman Abed and Iraq-Diyala-Jalawla “A Proposed Encoding and Hiding Text in an Image by using Fractal Image Compression”, IJCSE, 2013, Pp 1-13.
- xv. Ryan Rey M. Daga and John Paul T. Yusiong “Image Compression Using Harmony Search Algorithm”, IJCSI, 2012, Pp 16-23.
- xvi. Tanudeep Kaur and Anupam Garg “Review of various Fractal Detection Techniques in X-Ray Images”, IJEDR, 2016, Pp 553-559