SARANATHAN COLLEGE OF ENGINEERING

Displaying 1-3 of 3 results

  • White Papers // May 2011

    DDos Attack and Defense Scheme in Wireless Ad Hoc Networks

    The wireless ad hoc networks are highly vulnerable to Distributed Denial of Service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the Quality of Service(QoS) to end systems gradually rather than...

    Provided By SARANATHAN COLLEGE OF ENGINEERING

  • White Papers // Oct 2010

    An Adaptive Energy Efficient and Reliable Gossip Routing Protocol for Mobile Adhoc Networks

    The current ad hoc network routing protocols require all the nodes to be awake and keep listening which results in waste of energy. The existing energy efficient routing protocols and topology management schemes increase the computing complexity and acquire extra overhead or equipments. To overcome these drawbacks, in this paper,...

    Provided By SARANATHAN COLLEGE OF ENGINEERING

  • White Papers // Nov 2009

    Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach

    This paper presents the effectiveness of perceptual features and iterative clustering approach for performing both speech and speaker recognition. Procedure used for formation of training speech is different for developing training models for speaker independent speech and text independent speaker recognition. So, this work mainly emphasizes the utilization of clustering...

    Provided By SARANATHAN COLLEGE OF ENGINEERING

  • White Papers // Nov 2009

    Text Independent Speaker Recognition and Speaker Independent Speech Recognition Using Iterative Clustering Approach

    This paper presents the effectiveness of perceptual features and iterative clustering approach for performing both speech and speaker recognition. Procedure used for formation of training speech is different for developing training models for speaker independent speech and text independent speaker recognition. So, this work mainly emphasizes the utilization of clustering...

    Provided By SARANATHAN COLLEGE OF ENGINEERING

  • White Papers // Oct 2010

    An Adaptive Energy Efficient and Reliable Gossip Routing Protocol for Mobile Adhoc Networks

    The current ad hoc network routing protocols require all the nodes to be awake and keep listening which results in waste of energy. The existing energy efficient routing protocols and topology management schemes increase the computing complexity and acquire extra overhead or equipments. To overcome these drawbacks, in this paper,...

    Provided By SARANATHAN COLLEGE OF ENGINEERING

  • White Papers // May 2011

    DDos Attack and Defense Scheme in Wireless Ad Hoc Networks

    The wireless ad hoc networks are highly vulnerable to Distributed Denial of Service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the Quality of Service(QoS) to end systems gradually rather than...

    Provided By SARANATHAN COLLEGE OF ENGINEERING