Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Helen, D.
- Power Saving Mechanism for Ad-Hoc Network using 3G Fast Dormancy Technology
Abstract Views :236 |
PDF Views:0
Authors
D. Helen
1,
D. Arivazhagan
1
Affiliations
1 Department of Information Technology, AMET University, Chennai, IN
1 Department of Information Technology, AMET University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 7, No S6 (2014), Pagination: 74-77Abstract
The 3G devices known for higher energy consumption. The energy demand can be minimized by avoiding unnecessary listening between the nodes using fast dormancy. The fast dormancy mechanism has been implemented in ad-hoc network. Thus the channel access done by introducing Ad-hoc Traffic Indication Window(ATIM) in ad-hoc network. The ATIM window size is defined in an optimal way. According to the ATIM window behavior the node may enter into awake / sleep state. Making the node in sleep state avoid the nodes overhearing in the network traffic as a result node failure will be avoided and network topology may maintain. The stimulation has been done with 100 nodes based on nodes throughput, energy and delay. The result shows long lived nodes in the network. Thus, the network structure has been maintained by saving nodes energy by implementing fast dormancy. The fast dormancy release the ad-hoc network channel when they no longer needed. The 90 % of nodes alive active to maintain network topology.Keywords
Channel, Energy, Fast Dormancy, Transmission- An Intelligent Energy Efficient Routing Protocol for Mobile Ad-Hoc Network
Abstract Views :171 |
PDF Views:0
Authors
D. Helen
1,
D. Arivazhagan
1
Affiliations
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), AMET University 135 East Coast Road, Kanathur, Chennai - 603112, IN
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), AMET University 135 East Coast Road, Kanathur, Chennai - 603112, IN
Source
Indian Journal of Science and Technology, Vol 9, No 45 (2016), Pagination:Abstract
Objectives: To develop an energy-efficient routing protocol for Mobile Ad Hoc Network (MANET). Methods: The research work includes the Bee Colony Optimization (BCO) technique for evolving energy efficient routing algorithm. The Intelligent Cross-Layer approach based Bee Routing (ICLBR) is inspired by BCO in order to discover the optimal path for data transmission. The ICLBR Intelligent Cross Layer Approach based Bee Routing algorithm is used to overcome the congestion problem, link failure and energy loss using cross layer approach. The effectiveness of the route has been evolved with the parameter of node degree and connectivity ratio. Findings: This paper proposes an ICLBR algorithm to discover the energy efficient route in order to increase the network lifetime for MANET. The ICLBR is experimented in NS2.34, to systematically validate the routing algorithm. The experimental results show that the ICLBR improves the packet delivery ratio by 9.08% and minimizes the average end-to-end delay is by 5.16% over the Ad hoc On-Demand Distance Vector (AODV) routing protocol. Improvement: The proposed ICLBR mechanism able to enhance the network resource and also improves the network lifetime as compared to the state-of-art works.Keywords
Connectivity, Mobility, Node Degree, Optimization, Systematically.- Survey on Encryption Techniques used to Secure Cloud Storage System
Abstract Views :173 |
PDF Views:0
Authors
Affiliations
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 36 (2015), Pagination:Abstract
Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.Keywords
Cryptographic Approaches, Cloud Storage System- Analysis of Cloud Computing Technology
Abstract Views :125 |
PDF Views:0
Authors
Affiliations
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN