Kongu Engineering College

Displaying 1-14 of 14 results

  • White Papers // May 2014

    Enhancing Accuracy in Cross-Domain Sentiment Classification by Using Discounting Factor

    Sentiment analysis involves in building a system to collect and examine opinions about the product made in blog posts, comments, reviews or tweets. Automatic classification of sentiment is important for applications such as opinion mining, opinion summarization, contextual advertising and market analysis. Sentiment is expressed differently in different domains and...

    Provided By Kongu Engineering College

  • White Papers // Jul 2013

    An Efficient Job Scheduling Algorithm for Grid Environment

    Grid computing deals with the effective utilization of the globally distributed computer resources to solve large problems. Effective scheduling algorithms are used for the effective utilization of the unused CPU cycles that are distributed geographically. The existing algorithms mainly focus on system performance rather than the user satisfaction. In this...

    Provided By Kongu Engineering College

  • White Papers // Mar 2013

    Efficient Resource Allocation Strategies Using DRIVE for Cloud

    A new Economic resource allocation model has been designed, that is efficient enough to allocate resource. Current existing economic resource allocation model has been criticized for their performance limitations and high overheads. This paper addresses the poor performance of current economic allocation models, by reducing the failure rate, reallocation rate,...

    Provided By Kongu Engineering College

  • White Papers // May 2012

    Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection

    Based on the analysis and distribution of network attacks in KDDCup99 dataset and real time traffic, this paper proposes a design of multi stage filter which is an efficient and effective approach in dealing with various categories of attacks in networks. The first stage of the filter is designed using...

    Provided By Kongu Engineering College

  • White Papers // Feb 2012

    Improved Energy Efficient ADCC for Home Automation Networks in High Volume Sensed Data

    A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. There is a growing interest in the wireless sensor network technology...

    Provided By Kongu Engineering College

  • White Papers // Dec 2011

    Distributed Denial of Service (DDOS) Attacks Detection Mechanism

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to...

    Provided By Kongu Engineering College

  • White Papers // Oct 2011

    An Efficient Low Power VLSI Architecture for Viterbi Decoder Using Null Convention Logic

    In 3G mobile terminals the Viterbi decoder consumes approximately one third of the power consumption of a base band mobile transceiver. Viterbi decoders employed in digital wireless communications are complex and dissipate large power. In this paper, to reduce the power consumption, and to increase the speed, an asynchronous technique...

    Provided By Kongu Engineering College

  • White Papers // Dec 2010

    Increasing the Lifetime of Wireless Sensor Networks by Using AR (Aggregation Routing) Algorithm

    In this paper, the authors identified several advantages of a heterogeneous architecture for Wireless Sensor Networks (WSNs) .It consists of some resource rich mobile relay nodes and a many number of simple undynamic nodes. The mobile relays have high energy than the undynamic nodes. The mobile relays can dynamically move...

    Provided By Kongu Engineering College

  • White Papers // Sep 2010

    A Delay-Tolerant Distributed Query Processing Architecture for Mobile Environment

    The intermittent connectivity modifies the "Always on" network assumption made by all the distributed query processing systems. In modern-day systems, the absence of network connectivity is considered as a fault. Since the last upload, it might not be feasible to transmit all the data accumulated right away over the available...

    Provided By Kongu Engineering College

  • White Papers // Aug 2010

    An Approach for Reducing the End-to-End Delay and Increasing Network Lifetime in Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which form a communication network with no preexisting wiring or infrastructure. Multiple routing protocols have been developed for MANETs. As MANETs gain popularity, their need to support real time applications is growing as well. Such applications have stringent Quality of...

    Provided By Kongu Engineering College

  • White Papers // May 2010

    Performance Analysis of Hybrid Swarm Intelligence Rule Induction Algorithm

    Data mining is used to extract potential information from data base. Rule induction is used to extract information from data base and display it in IF-THEN rule format. First the classification algorithm builds a predictive model from the training data set and then measure the accuracy of the model by...

    Provided By Kongu Engineering College

  • White Papers // Feb 2010

    Reducing Power Consumption in Wireless Sensor Networks by Using Terrain Based Probabilistic Forwarding Scheme (TBPFS)

    In this paper, the authors consider the problem of discovery of information in a densely deployed Wireless Sensor Network (WSN), where the initiator of search is unaware of the location of target information. They propose a protocol: Increasing Ray Search (IRS), an energy efficient and scalable search protocol. The priority...

    Provided By Kongu Engineering College

  • White Papers // Jan 2010

    An Autonomous Framework for Early Detection of Spoofed Flooding Attacks

    One of the challenging tasks on the Internet is differentiating the attack traffic from legitimate traffic. Tackling this challenge would aid in the detection of Denial of Service/Distributed DoS (DoS/DDoS) attacks. In this paper, the authors propose a flow profiling scheme that adopts itself to detect these flooding attacks by...

    Provided By Kongu Engineering College

  • White Papers // Dec 2008

    Efficient Routing for Intermittently Connected Mobile Ad Hoc Network

    A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate with each other using Multihop wireless links without using any fixed infrastructure and centralized controller. Communication links are susceptible to frequent failures due to intervening objects, which can cause intermittent connectivity. Due to Intermittent connectivity,...

    Provided By Kongu Engineering College

  • White Papers // Feb 2012

    Improved Energy Efficient ADCC for Home Automation Networks in High Volume Sensed Data

    A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. There is a growing interest in the wireless sensor network technology...

    Provided By Kongu Engineering College

  • White Papers // Mar 2013

    Efficient Resource Allocation Strategies Using DRIVE for Cloud

    A new Economic resource allocation model has been designed, that is efficient enough to allocate resource. Current existing economic resource allocation model has been criticized for their performance limitations and high overheads. This paper addresses the poor performance of current economic allocation models, by reducing the failure rate, reallocation rate,...

    Provided By Kongu Engineering College

  • White Papers // Dec 2008

    Efficient Routing for Intermittently Connected Mobile Ad Hoc Network

    A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate with each other using Multihop wireless links without using any fixed infrastructure and centralized controller. Communication links are susceptible to frequent failures due to intervening objects, which can cause intermittent connectivity. Due to Intermittent connectivity,...

    Provided By Kongu Engineering College

  • White Papers // Sep 2010

    A Delay-Tolerant Distributed Query Processing Architecture for Mobile Environment

    The intermittent connectivity modifies the "Always on" network assumption made by all the distributed query processing systems. In modern-day systems, the absence of network connectivity is considered as a fault. Since the last upload, it might not be feasible to transmit all the data accumulated right away over the available...

    Provided By Kongu Engineering College

  • White Papers // Aug 2010

    An Approach for Reducing the End-to-End Delay and Increasing Network Lifetime in Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which form a communication network with no preexisting wiring or infrastructure. Multiple routing protocols have been developed for MANETs. As MANETs gain popularity, their need to support real time applications is growing as well. Such applications have stringent Quality of...

    Provided By Kongu Engineering College

  • White Papers // Dec 2010

    Increasing the Lifetime of Wireless Sensor Networks by Using AR (Aggregation Routing) Algorithm

    In this paper, the authors identified several advantages of a heterogeneous architecture for Wireless Sensor Networks (WSNs) .It consists of some resource rich mobile relay nodes and a many number of simple undynamic nodes. The mobile relays have high energy than the undynamic nodes. The mobile relays can dynamically move...

    Provided By Kongu Engineering College

  • White Papers // Feb 2010

    Reducing Power Consumption in Wireless Sensor Networks by Using Terrain Based Probabilistic Forwarding Scheme (TBPFS)

    In this paper, the authors consider the problem of discovery of information in a densely deployed Wireless Sensor Network (WSN), where the initiator of search is unaware of the location of target information. They propose a protocol: Increasing Ray Search (IRS), an energy efficient and scalable search protocol. The priority...

    Provided By Kongu Engineering College

  • White Papers // Jan 2010

    An Autonomous Framework for Early Detection of Spoofed Flooding Attacks

    One of the challenging tasks on the Internet is differentiating the attack traffic from legitimate traffic. Tackling this challenge would aid in the detection of Denial of Service/Distributed DoS (DoS/DDoS) attacks. In this paper, the authors propose a flow profiling scheme that adopts itself to detect these flooding attacks by...

    Provided By Kongu Engineering College

  • White Papers // Oct 2011

    An Efficient Low Power VLSI Architecture for Viterbi Decoder Using Null Convention Logic

    In 3G mobile terminals the Viterbi decoder consumes approximately one third of the power consumption of a base band mobile transceiver. Viterbi decoders employed in digital wireless communications are complex and dissipate large power. In this paper, to reduce the power consumption, and to increase the speed, an asynchronous technique...

    Provided By Kongu Engineering College

  • White Papers // Dec 2011

    Distributed Denial of Service (DDOS) Attacks Detection Mechanism

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to...

    Provided By Kongu Engineering College

  • White Papers // May 2010

    Performance Analysis of Hybrid Swarm Intelligence Rule Induction Algorithm

    Data mining is used to extract potential information from data base. Rule induction is used to extract information from data base and display it in IF-THEN rule format. First the classification algorithm builds a predictive model from the training data set and then measure the accuracy of the model by...

    Provided By Kongu Engineering College

  • White Papers // May 2012

    Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection

    Based on the analysis and distribution of network attacks in KDDCup99 dataset and real time traffic, this paper proposes a design of multi stage filter which is an efficient and effective approach in dealing with various categories of attacks in networks. The first stage of the filter is designed using...

    Provided By Kongu Engineering College

  • White Papers // Jul 2013

    An Efficient Job Scheduling Algorithm for Grid Environment

    Grid computing deals with the effective utilization of the globally distributed computer resources to solve large problems. Effective scheduling algorithms are used for the effective utilization of the unused CPU cycles that are distributed geographically. The existing algorithms mainly focus on system performance rather than the user satisfaction. In this...

    Provided By Kongu Engineering College

  • White Papers // May 2014

    Enhancing Accuracy in Cross-Domain Sentiment Classification by Using Discounting Factor

    Sentiment analysis involves in building a system to collect and examine opinions about the product made in blog posts, comments, reviews or tweets. Automatic classification of sentiment is important for applications such as opinion mining, opinion summarization, contextual advertising and market analysis. Sentiment is expressed differently in different domains and...

    Provided By Kongu Engineering College