Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Radha, S.
- Detection and Avoidance of Node Misbehavior in MANET Based on CLAODV
Abstract Views :465 |
PDF Views:120
Authors
Affiliations
1 Sathyabama University, Chennai -600119, IN
2 ECE Department SSN College of Engineering, Chennai- 603110, IN
1 Sathyabama University, Chennai -600119, IN
2 ECE Department SSN College of Engineering, Chennai- 603110, IN
Source
Indian Journal of Science and Technology, Vol 4, No 10 (2011), Pagination: 1340-1346Abstract
This paper depicts a model which not only evaluates the node's reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation. Curves such as throughput and jitter are plotted to analyse the performance of the MANET.Keywords
RTS, CTS, Clone Node, Jitter , ThroughputReferences
- Abderrezak Rachedi (2007) Cross-Layer approach to improve the monitoring process for mobile ad hoc networks based on IEEE 802.11. IEEE Globecom Proc. pp: 1086-1091.
- Dipanjan Anupam J, Yelena Y and Tim F (2006) Toward distributed service discovery in pervasive computing environments. IEEE Trans. Mobile Computing. 5 (2), 97–112.
- Marti S, Giuli TJ, Lai K and Baker M (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the 6th Annual ACM/IEEE Intl. Conf. on Mobile Computing & Networking. pp: 255– 265.
- Mian AN, Baldoni R and Beraldi R (2009) A survey of service discovery protocols in multihop mobile ad hoc networks. IEEE Pervasive Computing. 8 (1), 66– 74.
- Shakkottai S, Rappaport TS and Karlsson PC (2003) Wireless networks. IEEE Commun. Mag. 41, 74-80.
- Ververidis CN and Polyzos GC (2008) Service discovery for mobile ad hoc networks: a survey of issues and techniques. IEEE Commun. Surveys &Tutorials. 10(3), 30–45.
- Wang Y and Garcia-Luna-Aceves JJ (2002) Performance of collision avoidance protocols in single-channel ad hoc networks. In: Proc. of IEEE ICNP.
- Xu K, Gerla M and Bae S (2003) Effectiveness of RTS/CTS Handshake in IEEE 802.11 based ad hoc networks. Ad Hoc Network.pp: 98-106.
- A Multi Way Acknowledgment Protocol to Detect Misbehaving Nodes in Manets
Abstract Views :397 |
PDF Views:1
Authors
Source
National Journal of System and Information Technology, Vol 3, No 1 (2010), Pagination: 79-88Abstract
Quality Function Deployment (QFD) is a product development process that encompasses a sheer amount of data gathered from customers through several market research techniques like personal interview, focus groups, surveys, video conferencing etc. This massive, unsorted and unstructured data is required to be transformed into a limited number of structured information to represent the actual 'Customer Needs'. However the process is tedious and time consuming and cannot be dealt with manually. In order to address these issues, this paper proposes a futuristic software framework based on an Affinity Process. The paper begins with the topic introduction and outlines the QFD process. The paper then describes the Affinity Process, builds the data structure and then makes an attempt to build the proposed framework using tools Visual Basic (VB) and MS-Access. The proposed framework is developed as a part of QFD software and it is anticipated that when completely developed, it would act as a vital component of QFD software.Keywords
QFD, Affinity Process, Visual Basic, MS-Access, Software, Customer NeedsReferences
- L. Buttyan and J.-P. Hubaux,(2000) “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. MobiHoc.
- L. Buttyan and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM .
- S. Zhong, J. Chen, and Y.R. Yang, (2003)“Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc.INFOCOM.
- S. Marti, T. Giuli, K. Lai, and M. Baker,(2000) “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom.
- S. Buchegger and J.-Y. Le Boudec,(2002) “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc. MobiHoc.
- K. Balakrishnan, J. Deng, and P.K. Varshney, (2005 ) “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05).
- S. Zhong, J. Chen, and Y.R. Yang,(2005) “Sprite: A Simple, Cheat-Proof, Proc. IEEE Wireless Comm. and Networking Conf.
- Y. Hu, D.B. Johnson, and A. Perrig, (2003)“SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 175-192.
- D. Johnson, D. Maltz, Y.C. Hu, and J. Jetcheva, (2002) “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Internet draft.
- B. Awerbuch, D. Holmer, C.-N. Rotaru, and H. Rubens,( 2002 ) “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,” Proc. ACM Workshop Wireless Security (WiSe).
- L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks, (2003)” IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999. Proc. INFOCOM.
- H. Miranda and L. Rodrigues, (2002) “Preventing Selfishness in OpenMobile Ad Hoc Networks,” Proc. Seventh CaberNet RadicalsWorkshop.
- (13)L. Buttyan and J.-P. Hubaux, (2006) “Security and Cooperation in Wireless Networks,” http://secowinet.epfl.ch,
- S. Buchegger and J.-Y. L. Boudec, (2002 )“Performance analysis of the CONFIDANT protocol: Cooperation of nodes -fairness in dynamic ad-hoc networks,” in Proceedings ofIEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). IEEE.
- The network simulator http://www.isi.edu/nsnam/ns
- MANET Based, Cross layer Monitoring Process to Improve the Performance of IEEE 802.11
Abstract Views :165 |
PDF Views:1
Authors
Affiliations
1 Sri Sairam Engineering College, Department of Information Technology, IN
2 Department of Electronics and Communication Engineering at SSN College of Engineering, Chennai
1 Sri Sairam Engineering College, Department of Information Technology, IN
2 Department of Electronics and Communication Engineering at SSN College of Engineering, Chennai
Source
Wireless Communication, Vol 3, No 3 (2011), Pagination: 214-217Abstract
Mobile ad hoc networks are this newly evolved networking concept primarily due to the increase in use of wireless technology for communication. But the MANET concept faces issues over resource sharing, volatility of the network and erroneous data transmission. Thus a new cross layer design approach is being proposed where service discovery and routing functions are coupled for optimization. Congestion avoidance adopted due to the noise resulting from interference rather than from actual congestion or packet loss results in low bandwidth utilization. The new approach adopted in this paper will try and overcome these issues by sharing the information among various levels and minimizing data retransmissions and losses by making appropriate responses for the events.Keywords
MANET, Congestion, Packet Loss, Wireless Networks and Cross Layer.- A National Web Conference on Integrated Siddha Approach in Clinical Practice and Research on COVID-19 Pandemic (ISACC)- Tirupati, December 2020
Abstract Views :259 |
PDF Views:110
Authors
Affiliations
1 Siddha Clinical Research Unit, Central Council for Research in Siddha, Tirupati – 517507, Andhra Pradesh, IN
2 Central Council for Research in Siddha, Chennai – 600106, Tamil Nadu, IN
1 Siddha Clinical Research Unit, Central Council for Research in Siddha, Tirupati – 517507, Andhra Pradesh, IN
2 Central Council for Research in Siddha, Chennai – 600106, Tamil Nadu, IN
Source
Journal of Natural Remedies, Vol 21, No 3 (2021), Pagination: 259-263Abstract
Siddha Clinical Research Unit (SCRU) Tirupati, working under the Central Council for Research in Siddha (CCRS), Ministry of AYUSH, Govt. of India, conducted a National Web conference titled “Integrated Siddha Approach in Clinical Practice and Research on COVID-19 Pandemic (ISACC)” on 23rd Dec 2020, as a part of the fourth Pre-Siddha Day observance. Totally, 256 participants from Siddha colleges and various institutes of CCRS attended the Web conference and 9 eminent Speakers share their knowledge at the conference. The Technical session was separated by three panels, (i)Siddha Standalone and Integrative Clinical trials on COVID-19, (ii)Siddha Preventive and Prophylactic Measures on COVID-19, (iii)Experiences in Siddha Integrative Clinical Practice on COVID-19. The take home message of the conference insisted upon the three facts - the need for more clinical trials , need for increased experience sharing platforms for Siddha medical system and finally that Siddha standalone as well as integration for COVID-19 management gave significant outcome in both preventive and promotive healthcare. Central Council for Research in Siddha (CCRS), Ministry of AYUSH, Govt. of India and Directorate of Indian Medicine and Homeopathy (DIM&H), Government of Tamil Nadu, contributed a lot in Research and services in COVID-19 pandemic.Keywords
Siddha Medicine, Integrative Medicine, COVID-19, CCRS, 4th Siddha Day- A Perspective Review on Siddha System of Medicine in the Management of Corona Virus Disease 2019
Abstract Views :303 |
PDF Views:142
Authors
Affiliations
1 Siddha Clinical Research Unit, Tirupati – 517507, Andhra Pradesh, IN
2 Santhigiri Siddha Medical College, Thiruvananthapuram – 695589, Kerala, IN
3 Sri Padmavathi Medical College for Women, Tirupati – 517507, Andhra Pradesh, IN
1 Siddha Clinical Research Unit, Tirupati – 517507, Andhra Pradesh, IN
2 Santhigiri Siddha Medical College, Thiruvananthapuram – 695589, Kerala, IN
3 Sri Padmavathi Medical College for Women, Tirupati – 517507, Andhra Pradesh, IN