A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bedi, R. P. S.
- Performance Analysis of ZHLS-GF Routing Protocol for MANETs through Simulations
Authors
1 RIEIT, Ropar, IN
2 PTU, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 5 (2011), Pagination: 181-192Abstract
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Many routing protocols have been developed for MANETs over the past few years. This paper will help us in analyzing performance of ZHLS-GF routing protocol i.e. Zone-Based Hierarchical Link State Routing Protocol with Gateway Flooding (ZHLS-GF) in which a new flooding scheme, called Gateway Flooding was used. ZHLS-GF is based on ZHLS, a Zone-Based Hierarchical Link State Routing Protocol. ZHLS is a hierarchical protocol; the network is divided into non-overlapping zones. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The zone level topological information is distributed to all nodes. All network nodes in ZHLS construct two routing tables, an intrazone routing table and an interzone routing table, by flooding NodeLSPs within the zone and ZoneLSPs throughout the network. This incurs a large communication overhead in the network.
ZHLS-GF floods ZoneLSPs only to the gateway nodes of zones thus reduce the communication overhead significantly. Furthermore in ZHLS-GF, only the gateway nodes store ZoneLSPs and construct interzone routing tables therefore the total storage capacity required in the network is less than ZHLS. Different performance aspects were investigated in this project including; packet delivery ratio, power consumption no. of hops and average end-to-end delay. A test bed has been developed for ZHLS routing protocol and the performance parameters of ZHLS-GF and ZHLS are compared. Power consumption parameter is discussed for power that is for simulation purpose. This test bed confirms that which protocol has the more power consumption. It also confirms that how simulation in ZHLS and ZHLS-GF differs. This thesis uses Windows operating system based platform and vb.net language to develop the test bed and to compare two hierarchical routing protocols.
Keywords
Mobile Ad-Hoc Network (MANET), Routing Protocols, Evaluation Parameters.- Plagiarism Detection in Regional Languages – Its Challenges in Context to Punjabi Documents
Authors
1 Punjab Technical University, Kapurthala Road, Jalandhar, IN
2 Dept of Comp. Sc, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 5 (2011), Pagination: 296-304Abstract
Plagiarism detection has always been a challenging task for researchers and developers across the world. A number of researchers have contributed to this task by suggesting methods to detect plagiarism in research publications, books and software. Subsequently some applications based on these methods are also available in open source as well as commercial marketplace. Majority of these applications are performing well with English language documents, but fail to give satisfactory results with documents written in regional languages. This paper deals with investigating the challenges in plagiarism detection in regional languages, with specific case study of documents written in Punjabi language.- Evaluation of Fault Proneness of Modules in Open Source Software Systems Using k-NN Clustering
Authors
1 Department of Computer Science and IT, Rayat Institute of Engineering and IT, Railmajra, Ropar, IN
2 Rayat Institute of Engineering and IT, Railmajra, Ropar, IN
3 Punjab Technical University, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 4 (2011), Pagination: 555-565Abstract
Fault-proneness of a software module is the probability that the module contains faults. A correlation exists between the fault-proneness of the software and the measurable attributes of the code (i.e. the static metrics) and of the testing (i.e. the dynamic metrics). Early detection of fault-prone software components enables verification experts to concentrate their time and resources on the problem areas of the software system under development. This paper introduces the evaluation of the fault proneness of modules in open source software system using k-NN clustering algorithm with Object-Oriented metrics and ck metrics. The contribution of this paper is that it has used Metric values of JEdit open source software for generation of the rules for the classification of software modules in the categories of Faulty and non faulty modules and thereafter empirically validation is performed. The results shows that algorithm approach can be used for finding the fault proneness in object oriented software components.Keywords
k-NN Clustering Algorithms, Software Fault, Classification, Object Oriented Metrics, CK Metrics.- Automated Stopwords Identification in Punjabi Documents
Authors
1 Punjab Technical University, Kapurthala Road, Jalandhar, IN
2 Dept of Comp. Sc, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 8 (2013), Pagination: 119-125Abstract
Many information retrieval tasks deal with the classification of huge amount of data before giving final results. The data being processed in IR tasks may or may not be useful for the researchers. There has to be some method to identify such data (called stop words) and remove it from data set before beginning with the IR task. This gives dual benefits – Reducing the overall vector space, thereby leading to performance improvements in terms of execution speed and the relevance of results. The purpose of this paper is to find a suitable, automated method for identification of stop words in Punjabi Text.Keywords
Punjabi Stop Words List, Statistical Modeling, Borda Count, Information Processing, Text Classification.- Intrusion Detection Using the Hop Count Inspection Method (HCIM) Algorithm
Authors
1 PTU, Jalandhar, IN
Source
Research Cell: An International Journal of Engineering Sciences, 2010, Pagination:Abstract
Intrusion Detection and Cloud Computing are the latest buzzword now a day's and emerges as one of the key service of the Utility computing which builds on decade of research in the field of networking, web and software services. Cloud Computing offers a service oriented architecture, reduced information technology overhead for the end-user, great flexibility and reduced total cost of ownership. Depending on the type of resources provided by the Cloud, distinct layers can be defined as Infrastructure as a Service (IaaS), Platform as service (PaaS) and Software as a Service (SaaS), from which later will deliver various Applications to the clients over the Web. SaaS has become a vital service for the technology vendors to provide a wide variety of application services, application products and on-demand services to their clients according to their utility and demand over the web as a key channel. But recent attacks on the clouds especially Distributed Denial of Service (DDoS) poses as a crucial threat to this key technology of the future.- Intrusion Detection Using Cloud Computing
Authors
1 PTU, Jalandhar, IN