A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Palaniammal, S.
- Novel Security in Client Server Using Job Scheduling with Queuing Petri Net and Bulk Service Model
Authors
1 Department of Computer Applications, Sri Krishna College of Engineering and Technology, Coimbatore-641008, IN
2 Department of Science and Humanities, Sri Krishna College of Technology, Coimbatore-641042, IN
Source
Wireless Communication, Vol 4, No 6 (2012), Pagination: 323-327Abstract
Communication across a network is increasingly important in the work environment. Similar to processors or disks of the system, the behavior of the network has an impact on the operation of the computer. Network devices have become a ubiquitous fixture in the modern home and corporate networks as well as in the global communication infrastructure. Devices like Hub, Switch, Bluetooth, Wifi and Wimax reside on the same networks as the personal computers and enterprise servers and together form the world-wide communication infrastructure. To fully appreciate the scope and scale of such devices it is required to move beyond analysis of individual devices and their vulnerabilities. The analysis of such devices and the performance impact of a network are taken as the research work. This has been done using the queuing network, Job scheduling, petri nets and Markov model.Keywords
Client Server, Wired and Wireless Devices, Queuing Petri Net, Job Scheduling, Markov Model.- Application of Client Server Networking in Wireless Technologies by Using Markov Algorithm and Queueing Petri Nets with the Security of Steganography
Authors
1 Department of MCA, V.L.B. Janakiammal College of Arts and Science, IN
2 Department of Science and Humanities, VLB Janakiammal College of Engineering and Technology, IN
Source
Wireless Communication, Vol 1, No 1 (2009), Pagination: 52-56Abstract
This paper focuses on how the wireless technologies such as wibree, wimax, wifi and mobile-fi can be used for application of client server modeling using Queueing Petri net models and markov algorithm with the security of Steganography. Using M/M(1,b)/1 bulk service queueing model, performance of client-server model is been studied and the results obtained are very efficient for implementation. Also waiting time is reduced in this model when compare to other models like M/M/1 and M/M/C. QPNs facilitate the integration of both hardware and software aspects of the system behavior in the improved model. This lends itself very well to modeling distributed component-based systems, such as modern e-business applications(New order, Change order, Order status, Customer status). Simultaneous resource possession, synchronization, blocking and contentions for software resources can be easily modelled by adding the wireless technologies in the systems and by using QPNs. The purpose of stegonagraphy is hiding information; QPNs are very powerful as a performance analysis and prediction tool. By demonstrating the power of QPNs as a modeling paradigm in further fore coming technologies we hope to motivate further research in this area.Keywords
Wibree, Wimax, Wifi, Mobile-Fi, Queueing Network, Petri-Nets, Queueing Petri-Nets, Markov Algorithm, Bulk Service, Steganography.- Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography
Authors
1 Department of MCA, Sri Krishna College of Engineering and Technology,Coimbatore-641008, IN
2 Department of Science and Humanities, VLB Janakiammal College of Eng and Tech, Coimbatore-641042, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 319-322Abstract
The main theme of this paper is to derive the performance of the Hub, Switch,Bluetooth,Wi-Fi and Wimax technology using the Queueing Petri-net model and the Markov model with applying of RSA and Algorithm. This paper mainly focuses on comparison of M/M/1 AND M/M(a,b)/1 using mat lab to find performance on wired and wireless technologies in terms of service rate, arrival rate, Expected waiting time and Busy period. When comparing the service rates from the Hub network, switch network, the Bluetooth, Wi-Fi and Wimax technology. Wimax technology it has been found that the arrival rate, service rate, Expected waiting time and Busy period is very efficient in M/M (a, b)/1 for implementation. The values obtained from the Wimax technology can use for calculating the performance of other wireless technologies. QPNs facilitate the integration of both hardware and software aspects of the system behavior in the improved model. The purpose of Cryptography is to send the secured information from one system to another through the Wimax technology with security measures. Steganography is the art of hiding information in images, sounds or any other file format than the routine format. Queueing Petri Nets are very powerful as a performance analysis and prediction tool. By demonstrating the power of QPNs as a modeling paradigm in further fore coming technologies we hope to motivate further research in this area.
Keywords
Client Server, Hub, Switch, Bluetooth, Wi-Fi, Queueing Petri-Nets, Markov Algorithm, RSA.- Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks
Authors
1 Dept of Computer Science & Engineering, Karpagam College of Engineering, Coimbatore, IN
2 Dept of Science & Humanities, VLB Janakiammal College of Engineering & Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 1, No 6 (2009), Pagination: 268-272Abstract
In wireless networks, to provide quality of service by means of resource allocation the protocols need to be evaluate a lingering bandwidth estimation for further allocationHowever, there is no standardized mechanism or method has been proposed to accurately evaluate the amount of available resources on a given channel. Such an evaluation would, lead to optimize bandwidth utilization for applications of mobile adhoc networks like multimedia dataflow. We proposes a new techniques to estimate a bandwidth of a node in IEEE 802. 11 based mobile adhoc networks. We show by simulations that our technique provides we show by simulations that our technique provides an accurate estimation of the lingering bandwidth on wireless links in many ad hoc configurations and an efficient delivery ratio & reduce delay time in the environment.
Keywords
Ad hoc Networks, Available Bandwidth Estimation, IEEE 802. 11, Quality of Service.- On Measuring the Reliability of K-Mediods with Obstacles, Facilitators Constraints and Edge Detection on Spatial Clustering
Authors
1 Department of Master of Computer Applications, VLB Janakiammal College of Engineering and Technology, Coimbatore, IN
2 Department of Science and Humanities, VLB Janakiammal College of Engineering and Technology, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 1, No 7 (2009), Pagination: 364-369Abstract
Clustering spatial data is a well-known problem that has been extensively studied. Grouping similar data in large 2-dimensional spaces to find hidden patterns or meaningful sub-groups has many applications such as satellite images, geographic information systems, medical image analysis, marketing, computer visions, etc. Spatial clustering has been an active research area in Spatial Data Mining (SDM). Many methods on spatial clustering have been proposed in the literature, but few of them have taken into account constraints that may be present in the data clustering. In this paper, we discuss the problem of spatial clustering with obstacles constraints and propose a novel spatial clustering using edge detection method and K-Mediods, which objective is to cluster the spatial data (images) with the constraints and also comparing the result with the various constraints based clustering algorithms in terms of number of clusters and its execution time.The Edge detection based K-Mediods algorithms can not only given attention to higher speed and stronger global optimum search, but also get down to the obstacles and facilitator constraints and practicalities of spatial clustering. Taking into account these constraints during the clustering process is costly and the modeling of the constraints is paramount for good performance. The results on real datasets shown that the Edge detection based spatial clustering with the constraints are performs better than the existing constraint based clustering.
Keywords
Constraints Based Clustering, Data Mining, Edge Detection, Obstacle and Facilitators, Spatial Clustering.- Performance Modeling in Client Server Network Comparison of Hub, Switch and Bluetooth Technology Using Markov Algorithm and Queuing Petri Nets with the Security of Steganography
Authors
1 Department of MCA, Sri Krishna College of Engineering and Technology, Coimbatore, IN
2 Department of Science and Humanities, VLB Janakiammal College of Eng and Tech, Coimbatore, IN