A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Wahida Banu, R. S. D.
- Automatic Switching of Mobile Phone Profile Based on Current Speed of the Vehicle and Mobile Phone Security
Authors
1 Anna University, Coimbatore, IN
2 Department of Electronics and Communication, Government College of Engineering, Salem, IN
Source
Wireless Communication, Vol 1, No 5 (2009), Pagination: 205-209Abstract
Talking on the phone and sending text messages while driving are obvious distractions that can lead to fatal accidents on the road. To overcome this, present invention is directed to prevent accidents which occur because of usage of mobile phone while driving. The main objective of the invention is to prevent the user from getting call’s when the user in driving by automatically change the profile of the mobile phone depends upon the speed of the vehicle, at the same time it also provides the facilities to attend the emergency call's. The present invention also propose an approach to prevent mobile phone from being stolen and also to find the culprit if it lost.
Keywords
Mobile Phones Safety, Automatic Switching of Mobile Phone Profile Based on Current Speed of Vehicle, Identify Mobile Phone Stolen Culprit.- A Novel QoS Aware Wavelength Assignment Algorithm with Dedicated Path Protection Consideration for all Optical Networks
Authors
1 Bharat Sanchar Nigam Limited, Tamilnadu, IN
2 Government College of Engineering, Salem, IN
Source
Networking and Communication Engineering, Vol 4, No 3 (2012), Pagination: 135-139Abstract
As regeneration capability is not available in all optical networks, the physical layer impairments (PLI) accumulate in the network. During transmission, Quality of Service (QoS) of signals as measured by their Bit Error Rates (BER) is degraded due to propagation in the fibers, amplifier noise, and crosstalk between channels arising from the switches and demultiplexers which cannot be removed at the physical layer. It is possible to mitigate physical layer effects at the network layer using appropriate QoS aware Wavelength Assignment (WA) algorithm. In this paper a WA Scheme based on wavelength pre ordering is presented with dedicated path protection consideration that mitigates PLI. The wavelength preordering technique expected to improve BER performances, due to crosstalk reductions. The proposed WA scheme is performed on a standard regional area network with standard network parameters by defining a realistic physical layer transmission model. The proposed technique is evaluated using simulations and simulations show that the proposed algorithm performs better in terms of blocking rate and BER.
Keywords
Routing and Wavelength Assignment (RWA), Physical Layer Impairments, Optical Networks, Dedicated Path Protection, Cross Talk, QoS Aware, Wavelength Assignment (WA).- Role-Based Access Control Architecture in Grid Environments
Authors
1 Anna University, Chennai, IN
2 Govt Coll of Engg, Salem, IN
Source
Networking and Communication Engineering, Vol 2, No 2 (2010), Pagination: 20-27Abstract
Grid technologies enable large-scale sharing of resources within formal or informal consortia of individuals and/or institutions: what are sometimes called virtual organizations. In these settings, the discovery, characterization, and monitoring of resources, services, and computations can be challenging due to the considerable diversity ,large numbers, dynamic behavior, and geographical distribution of the entities in which a user might be interested. Authorization and access control; the significant aspects of security, have attracted increased attention in grid computing. In authorization an essential part to protect the information and all other resources from unauthorized access by controlling the access via a particular system. Role-Based Access Control (RBAC) is a fairly novel access control technique that provides a centralized, dynamic, and consistent authorization management specifically for the requirements of a particular industry to improve its security. RBAC was developed in the Globus toolkit(GT). Access control is formed by the support of Community Authorization Service (CAS) and this CAS was used and developed in many problems grid research. The major problem with the CAS is that the user credentials are revealed to the virtual organization (VO).In this paper, analyzes the unique security requirements grid computing and develops a security policy and a corresponding security architecture. We also evaluate the performance of Role Based access control architecture.Keywords
Grid Computing, Grid Security, Authorization and Access Control, Role Based Access Control (Rbac), Globus Toolkit (Gt), Community Authorization Server (Cas), Virtual Organization (Vo)S.- A New Approach for Internet Congestion Avoidance and Traffic Splitting
Authors
1 Anna University, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 1, No 1 (2009), Pagination: 14-18Abstract
In this paper we propose a bursty traffic splitting algorithm splits the traffic flows over multiple parallel paths, based on a split vector. In this algorithm, instead of switching packets or flows, it switches packet bursts. Since the packet bursts are smaller in size, the algorithm splits the traffic dynamically and accurately. At the same time, the condition forced on their latency difference, ensures that no packets are reordered. To achieve fair bandwidth allocations, load balancing is attained in the system since the high-rate aggressive traffic flows are splitted along multiple parallel paths. The proposed switching technique is executed in the edge and core routers. We will show by simulations that our adaptive packet scheduler performs better than the standard fair-queuing techniques.Keywords
Load Balancing, Splitting, Bursty Traffic, Aggressive Flows, Scheduler, RED.- Improved Performance of Clusters using Job Grouping
Authors
1 Anna University, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 1, No 1 (2009), Pagination: 19-23Abstract
Cluster computing is best characterized as the integration of a number of off-the-shelf commodity computers and resources integrated through hardware, networks, and software to behave as a single computer. The processes that are running on different processors on clusters may be in need of communicated with each other. If the processes that are going to communicate are not allotted to a single processor may suffer some performance penalties due to the communication overhead. A new scheduling algorithm is proposed using proper job grouping which is mainly based on the communication cost between the processes and are allotted to the same processor in the clusters and thus the performance is tuned such that the time taken for communication overhead is avoided. The experimental setup is done using Java and the results are analyzed which proves the effectiveness of the algorithm.Keywords
Scheduling, Bandwidth, Cache Memory, Scheduling Algorithms.- Inter-Channel Correlation Based Color Image Compression
Authors
1 Department of Electronics and Communication Engineering, Government College of Engineering, Salem, Tamilnadu, IN
2 Government College of Engineering, Salem, Tamilnadu, IN
Source
Digital Image Processing, Vol 2, No 8 (2010), Pagination: 244-249Abstract
Most of the color image compression techniques reduce the redundancy between color components (R, G, B) by transforming the color primaries into a de-correlated color space, such as YIQ or YUV. As the human visual system is more sensitive to details in luminance than to details in chrominance, the chrominance components can be compressed at high rate. Instead of de-correlating the color planes, high regional correlation between the components of color images is used as a basis for a new coding technique. The high correlation of color channels implicitly suggests a localized functional relation between the components. It could be used in an alternative compression approach, by approximating subordinate colors as functions of the base color instead of coding each color planes. The 9 by 7 wavelet filter and Set Partitioning in Hierarchical Tree (SPIHT) coding for encoding the base color are used. The linear three channel Discrete Cosine Transform (DCT) is applied to the RGB image to obtain the color channels C1C2C3. Taking C1 as base color and the other two channels are approximated as linear functions of the base color, only two parameters are transmitted for each block N*N of C2 and C3. A significant Peak Signal to Noise Ratio improvement is achieved compared to the traditional coding scheme for the same compression rate. The proposed algorithm allows the reduction of complexity for both coding and decoding of color images.Keywords
Color Image Coding, Inter-Channel Correlation, Linear Approximation, SPHIT Coding, Wavelet Filter.- Load Balancing For P2P Systems in Video Over Internet
Authors
1 IT Department, VMU University, IN
2 Electronics and Communication Engineering, Government College of Engineering, Salem, IN
Source
Data Mining and Knowledge Engineering, Vol 1, No 2 (2009), Pagination: 60-64Abstract
The efficient distribution of stored information has become a major concern in the web which has increasingly become a vehicle for transport of stored video. In this paper we improved the efficiency of the streamed video using caches. Caches have been created for every client, optimistic to join this proxy based peer to peer system. The proxy server also contains a separate cache memory that is used to store the media files available in the main server. The cache size depends upon the media file’s size. Streaming video applications are commonly used by most clients to watch video. The currently implemented streaming functionality, however, presents many technical challenges at the client side, server side and thenetwork that have not yet been efficiently resolved. In the internet the time taken to receive the media file is very high. To provide efficient streaming, to the client is the goal. The client in a distributed environment is connected to the server through a network. In the paper the client machines in an intranet are self-organized into a structured P2P system to provide a large media storage and to actively participate in the streaming media delivery, where the proxy is also embedded as an important member to ensure the quality of streaming service. The coordination and collaboration in the system re efficiently done by our P2P management structure and replacement policies. This paper encompasses the design of a streaming media which is both performances effective and cost effective. The proxy is a member of the P2P network managed by the distributed hash table. In addition, the proxy also plays an important and unique role to ensure the quality of media delivery due to its dedicated and stable nature.Keywords
Load Balancing, Splitting, Proxy Server, Content Delivery Network, Main Server, Intermediate Server, Proxy to Proxy.- Design of Neuro Fuzzy System for Identification and Control of Nonlinear Systems
Authors
1 Government Engineering College, Salem, Tamilnadu, IN
2 Sethu Institute of Technology, Kariapatti, Tamilnadu, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 3, No 4 (2011), Pagination: 222-226Abstract
The inverted pendulum is a highly nonlinear and open-loop unstable system. This means that standard linear techniques cannot model the nonlinear dynamics of the system, Inverted pendulum system is often used as a benchmark for verifying the performance and effectiveness of a new control method because of the simplicities of the structure. In this paper an accurate model of the inverted pendulum system, a neural network controller and ANFIS (Adaptive Neuro-Fuzzy Inference System) controller to stabilize the system have been developed. A control law that removes some of the nonlinearities from the process and allows the process to exhibit its dynamics has been developed. This aids in stabilizing the nonlinear pendulum. The quality of the data input has also been improved, since only limited number of variables that can be measured accurately are included in the system identification Simulation results establishes that the proposed controller has good set point tracking and disturbance rejection properties.Keywords
Inverted Pendulum, Neural Network, ANFIS, Nonlinear System Control.- Centralised Enhanced forward Error Correction Mechanism on the Contention Window to Improve the Transmission Quality in Vehicular AD Hoc Networks
Authors
1 Anna University, Chennai - 600025, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 20 (2015), Pagination:Abstract
Background: Vanet the recent emerging technology in the recent industry has grabbed the attention with advanced techniques and extricate framework of sophisticated equipments. Initially absence of an infrastructure in this network has communication constraints for the nodes involved therein. Adding to this the dynamic topology makes the network more vulnerable for potential targets of security and reliability of data diffusion within these nodes. The communication standard i.e. 802.11p have some optional channel rejection in the Orthogonal Frequency Division Multiplexing in the Physical layer which motivated to work on the reliability methods of data dissemination. Methods: To start with the hidden terminal issues of these networks have to be addressed which can be resolved by frame capture. This frame capture quality in turn is determined by the Contention window of the Physical layer. Hence an adaptive mechanism that involves forward Error correction (AFEC) which helps to overcome packet losses in an efficient way in midst of channel fluctuation, burst packet loss. The results are simulated in NS2 (2.34) with static packet size of 512 bytes. Findings: The experimental results demonstrated that the FEC mechanism is more adaptive in adjusting and controlling the data redundancy across the network for static and dynamic channel fluctuations. The redundancy rate was further reduced with an adaptive technique on the Contention Window size, which had considerable effects of every transmission on the delay, through put and jitter. The centralized FEC algorithm is set on an adaptive platform where each vehicle updates its back off window size at the end of each Observation Time depending on the priority of the message received. The feasible part of this algorithm is that it can be implemented on the MAC layer, which has a Reception Module. Consequently, the proposed mechanism under various network conditions performs well in terms of QoS for emergency messages than the conventional methods for a less volume of data. Application/Improvements: The algorithm can be analyzed from a traffic scenario of two-way highway and rural areas. The progress of the work can also be carried out for multimedia messages.Keywords
Contention Window, Data dissemination, Forward Error Correction Mechanism, QoS of message, Vanets- Survey on Signatured Xml Encryption for Multi-Tier Web Services Security
Authors
1 Anna University, Sarder Patel Road, Old Highways Building, Guindy, Chennai - 600 025, Tamil Nadu, IN
2 GEC, NH 7, Banglore Highways, Salem - 636011, Tamil Nadu, IN
3 CS Department, Kunthavai Nachiar Govt. Arts College for Women, Arulananda Nagar West Extension, Thanjavur -613007, Tamil Nadu, IN