A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kadhar Nawaz, G. M.
- Secure Data Transfer through Audio Signal with LSA
Authors
1 Bharathiar University, Coimbatore, Tamilnadu, IN
2 Department of MCA, Sona College of Technology, Salem-5, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 1 (2015), Pagination: 17-22Abstract
Today's large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the attractive solution for this problem is steganography. Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as image, video or audio. Cryptography is used to encrypt the data so that it is unreadable by a third party. So to add another layer of protection we can encrypt the key of the hidden message. This paper proposes a new algorithm to hide the data in Audio signal and it uses Linear Subsequence Algorithm (LSA) which increases data protection.Keywords
Cryptography, Encryption, Linear Subsequence Algorithm (LSA), Steganography.- Quality Enhancement of Agricultural Industry using MANETS
Authors
1 Master of Computer Applications Department, Sona College of Technology, Salem, Tamil Nadu, IN
2 Department of Master of Computer Applications Department, Sona College of Technology, Salem, Tamil Nadu, IN
Source
Wireless Communication, Vol 5, No 1 (2013), Pagination: 32-36Abstract
We propose a work to enrich the life of farmers and thereby improving the economy of the country. Major income for most of the countries is through agriculture. To increase the productivity, developed countries follow precision agriculture. Precision agriculture is to enable a fast and precise response to changes in environmental conditions. It is made possible by embedding processing tools in the monitoring region. Wireless networks allow the deployment of sensing systems and actuation mechanisms at a much finer level of granularity, and in a more automated implementation than has been possible before. Sensors and actuators are used to precisely control various agricultural activities. By integrating the sensors using MANETs with location aware routing using GPS will attain the increased quality of the product and precise controlling system.Keywords
Precision Agriculture, Sensors, Actuators, MANET-Mobile Ad Hoc Network, GPS-Global Positioning System.- Performance Evaluation of QoS for WiMAX Mesh Networks using Centralized Scheduling Algorithm
Authors
1 Bannari Amman Institute of Technology, Sathyamangalam-638401, Tamilnadu, IN
2 Amman Institute of Technology, Sathyamangalam- 638401, Tamilnadu, IN
3 Ericsson Global Services India, Bangalore, IN
4 Department of MCA, Sona College of Technology, Salem, Tamilnadu, IN
Source
Wireless Communication, Vol 3, No 4 (2011), Pagination: 270-275Abstract
Among the recent upcoming air interface technologies which promise to deliver high transmission data rates, BWA systems become an attractive solution. One such BWA technology is the WiMAX technology or IEEE 802.16 standard which provides wireless solutions to remote areas. For both service provider and potential customers, it is necessary to know its basic capabilities, such as the number of supported subscriber per BS or transferred data rate that may be delivered. This paper is aimed at providing algorithms for centralized scheduling of real and non-real time traffic with the objective of providing QoS within the framework of the IEEE 802.16 mesh mode. Performance analysis is done for QoS improvement for various types of services like unsolicited grant service(UGS), real time polling service(rtPS) and best effort (BE) service. The scheduling algorithms used were Round Robin, Weighted Round Robin and mSIR. The various network characteristics viz throughput, delay and average throughput for different modulation techniques are performed. It is concluded that the throughput for rtPS is relatively high and delay is minimum among other services. Among different scheduling schemes, mSIR algorithm provided better performance for the cyclic prefix value of 0.125. In addition to the network parameters analysis, energy model is also considered and the energy consumption per node is analyzed with respect to the received packets.Keywords
BE, RR, WRR, mSIR, Coding Rate, QOS.- Fuzzy-Ant Based Dynamic Routing on Large Road Networks
Authors
1 Department of MCA, Sona College of Technology, Salem–635 301, IN
Source
Networking and Communication Engineering, Vol 4, No 6 (2012), Pagination: 337-342Abstract
Route selection is essential in everyday life. We have several algorithms for detecting efficient route on Large Road Networks. This paper introduce the hierarchical community, is presented. It splits large road networks into hierarchical structure. It introduces a multi parameter route selection system which employs Fuzzy Logic (FL) and ant’s behavior in nature is applied for the dynamic routing. The important rates of parameters such as path length and traffic are adjustable by the user. The purposes of new hierarchical routing algorithm significantly reduce the search space. We develop a community-based hierarchical graph model that supports Dynamic efficient route computation on large road networks.Keywords
Hierarchical Community, Traffic Routing, Dynamic Parameters, Fuzzy Logic, Ant-Colony Algorithm.- Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels
Authors
1 Centre for Computer Applications, Sri Krishna College of Technology, Coimbatore - 42, TamilNadu, IN
2 Department of MCA, Sona College of Technology, Salem, TamilNadu, IN
Source
Networking and Communication Engineering, Vol 4, No 3 (2012), Pagination: 123-130Abstract
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the shortterm fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on the "Reciprocity based key exchange model" allows two parties jointly establish physically secure key combined with a (standard) computationally secure key, over an insecure communication channel. This key can then be used to encrypt subsequent communications. The channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical Wi-Fi channel that reliable secret key establishment can be accomplished at rates on the order of 11 b/s.
Keywords
Wireless, Wi-Fi, Cryptography, MOPI.- Influence of Signaling Protocols in MPLS-TE Performance
Authors
1 Department of Computer Applications, Karpagam University, Coimbatore, IN
2 Department of Applications, Sona College of Technology, Salem, IN
3 Department of Computer Science, Karpagam University, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 2, No 3 (2010), Pagination: 76-79Abstract
Multiprotocol Label Switching (MPLS) is an Internet Engineering Task Force (IETF)-specified framework that provides for the designation, routing, forwarding and switching of traffic flows through the network. MPLS is a versatile solution to address the problems faced by present-day networks-speed, scalability, quality-of-service (QoS) management, and traffic engineering. Constraint-based Routing Label Distribution Protocol (CR-LDP) and Resource Reservation Protocol - Traffic Extension(RSVP-TE) are two label distribution protocols that provide support for Traffic Engineering. The operation of two protocols is different although the two protocols provide a similar level of service. The choice of signaling protocol is crucial for the success of MPLS performance.Keywords
CR-LDP, MPLS, QoS, RSVP-TE.- Influences of Statistical Techniques in Data Mining and Warehousing Applications
Authors
1 Anna University of Technology, Coimbatore, IN
2 Department of MCA, Sona College of Technology, Salem, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 16 (2011), Pagination: 974-980Abstract
The significance of statistics plays a major role in society, business and government. In commercial applications, software tools are effectively applying the statistical techniques in order to improve the performance as well as to minimize the cost by drawing timely decisions. This paper focuses the significances of statistics in three main systems namely decision support system, data mining system and data warehousing system. This paper prominently contributes the roles of statistical techniques in DSS, DM and DW systems.Keywords
Decision Support Systems, Data Mining, Data Warehousing, Business Intelligence, Data Cube, OLAP, MDDB.- Research Community Mining by Using Brush Structure Model
Authors
1 Department of MCA, Sona College of Technology, Salem-635301, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 8 (2011), Pagination: 479-483Abstract
Since research trends can change dynamically,researchers have to keep up with these new trends and undertake new research topics. Therefore, research communities for new research domains are important. Domain-specific search engines (or vertical search engines) alleviate the problem to some extent, by allowing researchers to perform searches in a particular domain and providing customized community researchers. In this paper, we propose a method to discover research communities. The key features of our method are a network model of papers and a word assignment technique for the communities obtained. This research work is focused on evaluating a bibliometrics search engine called Domain Expert, which produces list of community researchers e-mail addresses of cyber domain experts available freely in the Web. This exploits techniques such as bibliometrics and community mining using Brush structure, which is a new data structure model for indexing by community formation.Keywords
Information Retrieval Engine, E-Mail ID Harvester, Research Community, Brush Datastructure, Web Structure Mining, Bi-Partite Graph.- Construction of a New DMQL to Extract Knowledge from a Data Warehouse through Easy Miner (Version 2)
Authors
1 Department of Master of Computer Application, Sree Saraswathi Thyagaraja College, Pollachi, IN
2 Department of Master of Computer Application, Sona College of Technology, Salem, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 5 (2011), Pagination: 314-317Abstract
The proposed EasyMiner (version 2) will extract knowledge from the data warehouse. The traditional data mining query language (DMQL) requires (a) the set of task-relevant data to be mined, (b) the kind of knowledge to be mined, (c) the background knowledge to be used in the discovery process, (d) the interestingness measures and thresholds for pattern evaluation and (e) the expected representation for visualizing the discovered patterns. These lengthy processes should be minimized so that the query processing time could be reduced. The ultimate goal is to simplify the data mining process by using a simple DMQL through EasyMiner. Normally, DMQL adopt several methodologies at each stage of knowledge mining. But the new DMQL propose some sort of eliminated or updated or simplified model of these methodologies namely concept hierarchy, association rules, classification, data cube, etc., Here the supervised learning ie., classification techniques are used. The user will realize the simplicity of the data mining process through EasyMiner. The outcome of the proposed EasyMiner is that expected knowledge from given data warehouse by saving more amount of query processing time. Further, the level of mining the knowledge might be indicated. The multi-dimensional database could be controlled to 3Ds only in order to maintain the simplification process of the EasyMiner. At last, the EasyMiner will extract the required and/or expected knowledge from the data warehouse by using simplified query processing models.Keywords
Data Mart, Data Mining, Data Warehouse, Query Processing.- User-Based Intelligent Decision Support System in Route Selection on Road Network
Authors
1 Sona College of Technology (Autonomous), Department of MCA,Salem - 636 005, Tamilnadu, IN
2 Sona College of Technology (Autonomous), Department of MCA, Salem - 636 005, Tamilnadu, IN