Sathyabama University

Displaying 1-28 of 28 results

  • White Papers // Jun 2012

    A Fuzzy Approach to Detect and Control Congestion in Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) consists of several sensor nodes which will monitor the environmental conditions such as temperature, pressure, vibration, etc. Basically the sensor nodes sense the information and process the information. Then they transmit the information as data packets to the sink node. When an event occurs in...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    Design and Analysis of an Adaptive Selfish Scheduling Algorithm Using AODV Protocol in Manet

    Due to dynamic nature of Mobile Ad-hoc NETwork (MANETs) which results in link breaks and repeatedly changing topology the aim of scheduling algorithm becomes more complex. In this paper, the authors present an adaptive selfish aware queue scheduler for a M/M/1 and M/M/n queuing mechanism to schedule the packets for...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    Shortest Path Algorithm for Query Processing in Peer to Peer Networks

    Peer-to-Peer network implements a new environment in database by query processing system. Nowadays, a key challenging for processing the queries and query answering technique. In this paper, the authors propose a research work on how query processing can be done in a P2P system efficiently by discovering the network topology,...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    Web Service Discovery Based on Computation of Semantic Similarity Distance and QoS Normalization

    Web service discovery is an important activity in services computing paradigm. Omnipresence of internet and proliferation of web services provides an opportunity to many service providers to create, locate and access the business services. Recommending pertinent web service to the client's requirement is a complex task as numerous functionally similar...

    Provided By Sathyabama University

  • White Papers // Apr 2012

    Local Update Routing Using Hierarchical WPANs in Wireless Underwater Sensor Networks

    The developments of micro and nano sensors lead the sensor networking technology to be used in all kinds of study. In underwater communications and study, wireless sensor network plays a major role. One among the characteristics of underwater communications is propagation delay that affects the network throughput. To increase the...

    Provided By Sathyabama University

  • White Papers // Apr 2012

    Xilinx and Modelsim Habitat for Design of ECC Co-Processor Architecture

    Xilinx is a most significant synthesizing tool for controller design in various engineering field specifically industrial engineering, instrumentation engineering, robotics, telecommunication, computer science engineering etc. To verify the working functionality of devices in these engineering fields, Modelsim simulator is preferred, where the other synthesizing tools are Lattice, Altera and Actel,...

    Provided By Sathyabama University

  • White Papers // Jan 2012

    An Elastic Scheduling Algorithm for Resource Co-Allocation Based on System Generated Predictions With Priority

    Resource co-allocation is basically used to execute multiple site jobs in a large scale computing environments with secure, faultless and in transparent manner. To be precise the authors are actually allocating multiple resources for different jobs taking into account the time parameter. Here, they make use of the scheduling queue...

    Provided By Sathyabama University

  • White Papers // Jan 2012

    Improving Energy Efficiency in Wireless Sensor Networks Through Scheduling and Routing

    This paper is about the wireless sensor network in environmental monitoring applications. A Wireless Sensor Network consists of many sensor nodes and a base station. The number and type of sensor nodes and the design protocols for any wireless sensor network is application specific. The sensor data in this application...

    Provided By Sathyabama University

  • White Papers // Dec 2011

    Energy Aware Routing Algorithm for Wireless Sensor Network

    Technological advancements made major research challenges in the area of wireless sensor network. Power saving is the foremost criteria in this field. Consumption of energy is considerably reduced on properly designed protocol. This paper focuses on energy aware fuzzy based routing protocol. Protocol based on fuzzy logic computation reduces power...

    Provided By Sathyabama University

  • White Papers // Dec 2011

    Energy-Latency Improved Sensor Networks Using Mobile Agents in Textile Industry

    The key performance metrics in wireless sensor networks are both network lifetime and an average time required to report an event reliably. The optimal solution must be taken into account to meet these metrics. Considering energy-latency constraints in sensor networks, the authors have developed a cluster architecture using mobile agents...

    Provided By Sathyabama University

  • White Papers // Sep 2011

    An Quantitative Study on the Impact of N -Tiers in the Performance of Topology Control Algorithms for Wireless Sensor Network S

    Recent years showed a wide range of applications in Wireless Sensor Networks (WSN). For a WSN, Topology Control is crucial to obtain an energy efficient network without affecting the connectivity and other properties. In this paper the sequence of strategies carried out to obtain a better scheme for a topology...

    Provided By Sathyabama University

  • White Papers // Aug 2011

    Implementation of Data Security in Cloud Computing

    Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for one to develop the cloud computing application. On one hand, an...

    Provided By Sathyabama University

  • White Papers // May 2011

    On-Demand Multicasting in Ad-hoc Networks: Performance Evaluation of AODV, ODMRP and FSR

    Adhoc networks are characterized by connectivity through a collection of wireless nodes and fast changing network topology. Wireless nodes are free to move independent of each other which makes routing much difficult. This calls for the need of an efficient dynamic routing protocol. Mesh-based multicast routing technique establishes communications between...

    Provided By Sathyabama University

  • White Papers // Jan 2011

    Analysis of Web Logs and Web User in Web Mining

    Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a...

    Provided By Sathyabama University

  • White Papers // Dec 2010

    Performance Comparison and Analysis of Preemptive-DSR and TORA

    The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Preemptive DSR(PDSR) is the modified version of DSR. The main objective of this paper is to analyze and compare the performance of Preemptive DSR...

    Provided By Sathyabama University

  • White Papers // Sep 2010

    Secured Preemptive DSR(S-PDSR): An Integration of SRP and SMT With Preemptive DSR for Secured Route Discovery

    In Contrast with traditional networks, ad hoc networks not require any previously built infrastructure, they are distributed and fully self-organized systems. Due to absence of any fixed node, each node acts as a router, providing routing capabilities of the MANET. In a distributed network, without any infrastructure communicating peers have...

    Provided By Sathyabama University

  • White Papers // Sep 2010

    An Analysis of Various Parameters in Wireless Sensor Networks Using Adaptive FEC Technique

    In Wireless sensor network, since the media is wireless there will be burst errors which leads to high bit error rate that affect the throughput. Wireless sensor networks drop the packets due to propagation errors that lead to retransmission traffic. This paper evaluates the effect of adaptive FEC in Wireless...

    Provided By Sathyabama University

  • White Papers // Aug 2010

    Trends and Issues in Integrating Enterprises and Other Associated Systems Using Web Services

    A Web service is defined as an autonomous unit of application logic that provides either some business functionality or information to other applications through an Internet connection. Web services are based on a set of XML standards such as Simple Object Access Protocol (SOAP), Universal Description, Discovery and Integration (UDDI)...

    Provided By Sathyabama University

  • White Papers // Jun 2010

    A Survey on Neighborhood Dependant Topology Control in Wireless Sensor Networks

    Wireless sensor networks are the ultimate technology for communication that allows network nodes to communicate without the need for a fixed infrastructure and wires. They use electromagnetic waves, as the information transmission. The development of network technologies has prompted sensor folks to consider alternatives that reduce costs and complexity and...

    Provided By Sathyabama University

  • White Papers // Apr 2010

    Improved Lossless Embedding and Extraction - A Data Hiding Mechanism

    This paper proposes a reversible data hiding mechanism based on multiresolution analysis with difference expansion algorithm. Based on the multiresolution analysis of an image, gradient information of crude original image is exploited to select proper embedding areas. Adaptively embedding method based on Difference Expansion Algorithm is proposed to embed data...

    Provided By Sathyabama University

  • White Papers // Mar 2010

    Neoteric Technique for Database Security

    The proposed method is a mixture of two security methods namely authentication followed by cryptography of database. A novel encryption algorithm, much superior, less complex and easier to implement in any system, for securing a Database. The encryption algorithm is built based on the concepts of genetic algorithm operators. This...

    Provided By Sathyabama University

  • White Papers // Feb 2010

    Performance Comparison and Analysis of DSDV and AODV for MANET

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus...

    Provided By Sathyabama University

  • White Papers // Feb 2010

    Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffic over ATM Network

    Network reliability analysis receives considerable attention for the design, validation, and maintenance of many real world systems, such as computer, communication, or power networks. The components of a network are subject to random failures, as more and more enterprises become dependent upon CCN or networked computing applications. Failure of a...

    Provided By Sathyabama University

  • White Papers // Jan 2010

    Collaborative Web Recommendation Systems -A Survey Approach

    This paper is a survey of recent work in the field of web recommendation system for the benefit of research on the adaptability of information systems to the needs of the users. This issue is becoming increasingly important on the Web, as non-expert users are overwhelmed by the quantity of...

    Provided By Sathyabama University

  • White Papers // Aug 2009

    QoS Constrained Multicast Routing for Mobile Ad Hoc Networks

    QoS is essential in MANET to satisfy the communication constraints. Due to the fully mobile infrastructure and limited resources provided by the MANETs, qos techniques need to optimize the scarce resource. To meet the qos requirements of the applications, multicast routing protocols are required to construct the routes, with the...

    Provided By Sathyabama University

  • White Papers // Jun 2009

    Seamless Flow of Voluminous Data in High Speed Network Without Congestion Using Feedback Mechanism

    Continuously growing needs for Internet applications that transmit massive amount of data have led to the emergence of high speed network. Data transfer must take place without any congestion and hence feedback parameters must be transferred from the receiver end to the sender end so as to restrict the sending...

    Provided By Sathyabama University

  • White Papers // Jan 2009

    Polynomial Discriminant Radial Basis Function for Intrusion Detection

    With the immense growth of network-based services and sensitive information on networks, network security plays an important role. Intrusion poses a serious security risk in a network environment. An Intrusion Detection System (IDS) inspects the activities in a system for suspicious behavior or patterns that may indicate system attack or...

    Provided By Sathyabama University

  • White Papers // Jan 2009

    A Comprehensive Mechanism to Reduce the Detection Time of SYN Flooding Attack

    The explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This has increased the need to protect the data and the resources from disclosure and to protect the entire network from...

    Provided By Sathyabama University

  • White Papers // Sep 2010

    Secured Preemptive DSR(S-PDSR): An Integration of SRP and SMT With Preemptive DSR for Secured Route Discovery

    In Contrast with traditional networks, ad hoc networks not require any previously built infrastructure, they are distributed and fully self-organized systems. Due to absence of any fixed node, each node acts as a router, providing routing capabilities of the MANET. In a distributed network, without any infrastructure communicating peers have...

    Provided By Sathyabama University

  • White Papers // Dec 2010

    Performance Comparison and Analysis of Preemptive-DSR and TORA

    The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Preemptive DSR(PDSR) is the modified version of DSR. The main objective of this paper is to analyze and compare the performance of Preemptive DSR...

    Provided By Sathyabama University

  • White Papers // Apr 2010

    Improved Lossless Embedding and Extraction - A Data Hiding Mechanism

    This paper proposes a reversible data hiding mechanism based on multiresolution analysis with difference expansion algorithm. Based on the multiresolution analysis of an image, gradient information of crude original image is exploited to select proper embedding areas. Adaptively embedding method based on Difference Expansion Algorithm is proposed to embed data...

    Provided By Sathyabama University

  • White Papers // May 2011

    On-Demand Multicasting in Ad-hoc Networks: Performance Evaluation of AODV, ODMRP and FSR

    Adhoc networks are characterized by connectivity through a collection of wireless nodes and fast changing network topology. Wireless nodes are free to move independent of each other which makes routing much difficult. This calls for the need of an efficient dynamic routing protocol. Mesh-based multicast routing technique establishes communications between...

    Provided By Sathyabama University

  • White Papers // Jun 2009

    Seamless Flow of Voluminous Data in High Speed Network Without Congestion Using Feedback Mechanism

    Continuously growing needs for Internet applications that transmit massive amount of data have led to the emergence of high speed network. Data transfer must take place without any congestion and hence feedback parameters must be transferred from the receiver end to the sender end so as to restrict the sending...

    Provided By Sathyabama University

  • White Papers // Jun 2010

    A Survey on Neighborhood Dependant Topology Control in Wireless Sensor Networks

    Wireless sensor networks are the ultimate technology for communication that allows network nodes to communicate without the need for a fixed infrastructure and wires. They use electromagnetic waves, as the information transmission. The development of network technologies has prompted sensor folks to consider alternatives that reduce costs and complexity and...

    Provided By Sathyabama University

  • White Papers // Feb 2010

    Performance Comparison and Analysis of DSDV and AODV for MANET

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus...

    Provided By Sathyabama University

  • White Papers // Jan 2012

    Improving Energy Efficiency in Wireless Sensor Networks Through Scheduling and Routing

    This paper is about the wireless sensor network in environmental monitoring applications. A Wireless Sensor Network consists of many sensor nodes and a base station. The number and type of sensor nodes and the design protocols for any wireless sensor network is application specific. The sensor data in this application...

    Provided By Sathyabama University

  • White Papers // Sep 2011

    An Quantitative Study on the Impact of N -Tiers in the Performance of Topology Control Algorithms for Wireless Sensor Network S

    Recent years showed a wide range of applications in Wireless Sensor Networks (WSN). For a WSN, Topology Control is crucial to obtain an energy efficient network without affecting the connectivity and other properties. In this paper the sequence of strategies carried out to obtain a better scheme for a topology...

    Provided By Sathyabama University

  • White Papers // Dec 2011

    Energy-Latency Improved Sensor Networks Using Mobile Agents in Textile Industry

    The key performance metrics in wireless sensor networks are both network lifetime and an average time required to report an event reliably. The optimal solution must be taken into account to meet these metrics. Considering energy-latency constraints in sensor networks, the authors have developed a cluster architecture using mobile agents...

    Provided By Sathyabama University

  • White Papers // Aug 2011

    Implementation of Data Security in Cloud Computing

    Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for one to develop the cloud computing application. On one hand, an...

    Provided By Sathyabama University

  • White Papers // Mar 2010

    Neoteric Technique for Database Security

    The proposed method is a mixture of two security methods namely authentication followed by cryptography of database. A novel encryption algorithm, much superior, less complex and easier to implement in any system, for securing a Database. The encryption algorithm is built based on the concepts of genetic algorithm operators. This...

    Provided By Sathyabama University

  • White Papers // Jan 2009

    Polynomial Discriminant Radial Basis Function for Intrusion Detection

    With the immense growth of network-based services and sensitive information on networks, network security plays an important role. Intrusion poses a serious security risk in a network environment. An Intrusion Detection System (IDS) inspects the activities in a system for suspicious behavior or patterns that may indicate system attack or...

    Provided By Sathyabama University

  • White Papers // Apr 2012

    Local Update Routing Using Hierarchical WPANs in Wireless Underwater Sensor Networks

    The developments of micro and nano sensors lead the sensor networking technology to be used in all kinds of study. In underwater communications and study, wireless sensor network plays a major role. One among the characteristics of underwater communications is propagation delay that affects the network throughput. To increase the...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    Web Service Discovery Based on Computation of Semantic Similarity Distance and QoS Normalization

    Web service discovery is an important activity in services computing paradigm. Omnipresence of internet and proliferation of web services provides an opportunity to many service providers to create, locate and access the business services. Recommending pertinent web service to the client's requirement is a complex task as numerous functionally similar...

    Provided By Sathyabama University

  • White Papers // Apr 2012

    Xilinx and Modelsim Habitat for Design of ECC Co-Processor Architecture

    Xilinx is a most significant synthesizing tool for controller design in various engineering field specifically industrial engineering, instrumentation engineering, robotics, telecommunication, computer science engineering etc. To verify the working functionality of devices in these engineering fields, Modelsim simulator is preferred, where the other synthesizing tools are Lattice, Altera and Actel,...

    Provided By Sathyabama University

  • White Papers // Dec 2011

    Energy Aware Routing Algorithm for Wireless Sensor Network

    Technological advancements made major research challenges in the area of wireless sensor network. Power saving is the foremost criteria in this field. Consumption of energy is considerably reduced on properly designed protocol. This paper focuses on energy aware fuzzy based routing protocol. Protocol based on fuzzy logic computation reduces power...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    Design and Analysis of an Adaptive Selfish Scheduling Algorithm Using AODV Protocol in Manet

    Due to dynamic nature of Mobile Ad-hoc NETwork (MANETs) which results in link breaks and repeatedly changing topology the aim of scheduling algorithm becomes more complex. In this paper, the authors present an adaptive selfish aware queue scheduler for a M/M/1 and M/M/n queuing mechanism to schedule the packets for...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    Shortest Path Algorithm for Query Processing in Peer to Peer Networks

    Peer-to-Peer network implements a new environment in database by query processing system. Nowadays, a key challenging for processing the queries and query answering technique. In this paper, the authors propose a research work on how query processing can be done in a P2P system efficiently by discovering the network topology,...

    Provided By Sathyabama University

  • White Papers // Jun 2012

    A Fuzzy Approach to Detect and Control Congestion in Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) consists of several sensor nodes which will monitor the environmental conditions such as temperature, pressure, vibration, etc. Basically the sensor nodes sense the information and process the information. Then they transmit the information as data packets to the sink node. When an event occurs in...

    Provided By Sathyabama University

  • White Papers // Jan 2012

    An Elastic Scheduling Algorithm for Resource Co-Allocation Based on System Generated Predictions With Priority

    Resource co-allocation is basically used to execute multiple site jobs in a large scale computing environments with secure, faultless and in transparent manner. To be precise the authors are actually allocating multiple resources for different jobs taking into account the time parameter. Here, they make use of the scheduling queue...

    Provided By Sathyabama University

  • White Papers // Aug 2009

    QoS Constrained Multicast Routing for Mobile Ad Hoc Networks

    QoS is essential in MANET to satisfy the communication constraints. Due to the fully mobile infrastructure and limited resources provided by the MANETs, qos techniques need to optimize the scarce resource. To meet the qos requirements of the applications, multicast routing protocols are required to construct the routes, with the...

    Provided By Sathyabama University

  • White Papers // Jan 2009

    A Comprehensive Mechanism to Reduce the Detection Time of SYN Flooding Attack

    The explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This has increased the need to protect the data and the resources from disclosure and to protect the entire network from...

    Provided By Sathyabama University

  • White Papers // Aug 2010

    Trends and Issues in Integrating Enterprises and Other Associated Systems Using Web Services

    A Web service is defined as an autonomous unit of application logic that provides either some business functionality or information to other applications through an Internet connection. Web services are based on a set of XML standards such as Simple Object Access Protocol (SOAP), Universal Description, Discovery and Integration (UDDI)...

    Provided By Sathyabama University

  • White Papers // Jan 2010

    Collaborative Web Recommendation Systems -A Survey Approach

    This paper is a survey of recent work in the field of web recommendation system for the benefit of research on the adaptability of information systems to the needs of the users. This issue is becoming increasingly important on the Web, as non-expert users are overwhelmed by the quantity of...

    Provided By Sathyabama University

  • White Papers // Feb 2010

    Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffic over ATM Network

    Network reliability analysis receives considerable attention for the design, validation, and maintenance of many real world systems, such as computer, communication, or power networks. The components of a network are subject to random failures, as more and more enterprises become dependent upon CCN or networked computing applications. Failure of a...

    Provided By Sathyabama University

  • White Papers // Jan 2011

    Analysis of Web Logs and Web User in Web Mining

    Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a...

    Provided By Sathyabama University

  • White Papers // Sep 2010

    An Analysis of Various Parameters in Wireless Sensor Networks Using Adaptive FEC Technique

    In Wireless sensor network, since the media is wireless there will be burst errors which leads to high bit error rate that affect the throughput. Wireless sensor networks drop the packets due to propagation errors that lead to retransmission traffic. This paper evaluates the effect of adaptive FEC in Wireless...

    Provided By Sathyabama University