Sr/No/ |
Title |
Pdf |
1 |
Cluster-Based Certificate Revocation Scheme for
MANET’s
P.Suresh Kumar, M.Aravind, N.Arjun, J.DineshPriyadarshan
Abstract-In addition to mobility, mobile devices
cooperate and forward packets for each other to extend
the limited wireless transmission range of each node by
multi hop relaying, which is used for various applications,
e.g., disaster relief, military operation, and emergency
communications security is one crucial requirement for
these network services. Mobile ad hoc networks
(MANETs) have received increasing attention in recent
years due to their mobility feature, dynamic topology, and
ease of deployment .A mobile ad hoc network is a selforganized
wireless network which consists of mobile
devices, such as laptops, cell phones, and Personal Digital
Assistants (PDAs), which can freely move in the network.
MANETs have received increasing attention in recent
years due to their mobility feature, dynamic topology, and
ease of deployment.
|
Download
|
2 |
Study of Sinkhole Attack and Its Impact on Reactive
Routing Protocol in Wireless Sensor Network
Aditya Kumar, Akansha S. Choubey
Abstract:-These days wireless sensor network (WSNs) becomes
wide employed in several areas attributable to its affordable,
energy potency, high transmission power and straightforward
implementation etc. As a consequence of the popularity of WSNs
will increase chance of attack on wireless network additionally
increase? Sinkhole attack is one in all the vital threat to the
wireless sensing element network. In sinkhole attacks a
compromised node tries to attack all the routing info from the
neighbour nodes by causing a faux routing info and diverts all
routing packet to it so as to extract network traffic info might
perform selective forwarding or may drop packets. There are
numerous solutions provided to beat sinkhole attack problem
like novel algorithm to seek out sinkhole attack and sinkhole
attack detection based on redundancy mechanism etc. This paper
concentrates on sinkhole attack and influence on DSR (reactive)
routing protocol. To deal the matter occurs due to sinkhole
attack we tend to discuss the various methodologies.
|
Download
|
3 |
Ubiquitous Healthcare system using Big
Data Framework
C.Merlin Lagnes, M.B.PrasanthYokesh, N.Vasudevan, D.Rajini Girinath
Abstract:-Ubiquitous healthcare system measure
complicated bio signals, the system is developed to
obtain data anytime and anywhere. These systems
analyse abnormality and activities of body. The
system requires long time measurement and
accumulated bio signals will have large capacity and
typical data structure. Here the bio signals are
considered as big data and a ubiquitous healthcare
system framework is proposed. The framework
includes the bio signal transmission and analysis. For
machine compatibility and data interoperability an
open standard platform is used for all service process.
The result is analysed with collected information from
acceleration sensor.
|
Download
|
4 |
Analysis of a Bulk Queuing with Non Reliable Server
Dr. Naveen Kumar
Abstract:-In this paper, we study the optimal operation of a
single removable and non-reliable server in a Markovian
queuing system under steady-state conditions. The system is
in idle state before the arrival of customer and after the
arrival of customer it is in working state, it may breakdown
and systems goes to vacation during that period. Here, there
is bulk arrival of customer and bulk service provided to
them.
|
Download
|
5 |
Mitigation of Power Quality Problems by
Using D-Statcom
N.NIKITHA
Abstract:-This paper presents the systematic procedure of the
modeling and simulation of a Distribution STATCOM
(DSTATCOM) for power quality problems, voltage sag and
swell based on Sinusoidal Pulse Width Modulation (SPWM)
technique. The electronic devices are very sensitive to
disturbances and become less tolerant to power quality
problems such as voltage sags, swells and harmonics.
|
Download
|
6 |
Improved Efficient Searching Algorithm for
Hilbert-B-Tree
Sasmita Mishra, Sarojananda Mishra
Abstract:-This paper illustrates the performance of a
searching algorithm for a multidimensional database or
spatial database. A new searching algorithm for data is
proposed by hybridizing the concept of Hilbert curve with BTree
renamed as HB tree by generating the Hilbert curve
through L-System strings. The performance of the proposed
algorithm has been compared with that of B-Tree, B* Tree,
B+ Tree R-Tree and R* Tree. Various chunks of data sizes
have been experimented for comparing the performance of
our algorithm with that of all other searching methods. The
implementation of this algorithm has been made using simple
ANSI C program. The performance time of our algorithm
gives better result in most of the data sizes than that of other
methods which have been depicted in graphs.
|
Download
|
7 |
Comparative study of Compressive and Tensile
Behaviour of Polypropylene Fibre Reinforced
Concrete (PFRC) of M15 and M20 Mix
Saman Khan, Roohul Abad Khan, Saiful Islam, Sohaib Nazar, Nadeem A Khan
Abstract:-This paper represents comparative experimental study
on mechanical performance of polypropylene fibre reinforced
concrete (PFRC) under compression and split tensile loading.
The cube compressive strength and cylinder split tensile
strength of conventional concrete and polypropylene fibre
reinforced concrete were determined in the laboratory. The
M15 and M20 grades of concrete mixes and polypropylene
mono-filament macro-fibers of length 35 mm at volume
fractions of 0.0%, 0.5%. 1.0%, 1.5%, 2.0%, 2.5% and 3.0%
were used in the research. All specimens were tested at curing
age of 28 days. In this paper the relationship between cube
compressive strength and cylinder split tensile strength for
conventional and polypropylene fibre reinforced concrete were
established and compared with standards. The study suggested
the significant improvement in compressive and tensile strength
for concrete mixes reinforced with polypropylene fibers. The
samples with added polypropylene fibers of 1% showed better
results in comparison with the others.
|
Download
|
8 |
ZVS Inverter System for an Induction Motor
Drive with Interconnection of PV Cell
China Subba Rao Mamidi, Ch Narendra Kumar, Ch. RamBabu
Abstract:-Renewable Energy Sources are increasingly
integrated at the distribution level due to increase in
load demand which utilize power electronic converters.
A novel active clamping zero voltage switching SVM
controlled three-phase grid connected inverter is
proposed in this paper. The inverter can realize zero
voltage switching (ZVS) operation for all switching
devices. In addition, the anti-parallel diode reverse
recovery current of all switch devices is suppressed
well. Space vector modulation can be realized with all
the switching devices operating at the fixed switching
frequency. And the switching voltage stress of all the
power switch devices is equal to the DC link voltage, no
additional voltage stresses is added on the power
devices. The ZVS inverter can work both under Gridconnected
condition and with independent loads. . In
grid-connected application, the inverter can achieve
ZVS in all the switches under the load with unity
power factor or less. The different techniques of
modelling and control of grid connected photovoltaic
system with objective to help intensive penetration of
photovoltaic (PV) production into the grid have been
proposed so far in different papers. In this paper SVM
can be realized at the fixed switching frequency. And
the switching voltage stress across all the power switch
devices is the same as the dc link voltage. The ZVS can
be achieved in the grid-connected ZVS inverters under
the load with unity power factor or less. The reduced
switching loss increases its efficiency and makes it
suitable for practical applications.
|
Download
|
9 |
Reducing Packet Transmission Delay in Mobile Ad Hoc
Networks Using EQOD Routing
Anand.J, Hemalatha.P, Amsavalli.K, Rajini Girinath.D
Abstract:-MANETs (Mobile Ad hoc Networks) are highly
mobile wireless ad hoc networks and it’s play an
important role in public safety communications, commercial
applications and Mission critical Monitoring. Routing
information in MANETs is a challenging task, because
dynamically changing topology. In this paper, we propose
Enhanced QOS Oriented Distributed Routing (EQOD)
provisioning with both end-to-end reliability and delay
constraints in Ad hoc networks. This paper contains a detailed
description of our Methodology. The simulation results using
ns2.24 and it’s show that minimized end to end delay in
packet transmission, In compared to current routing protocols
of MANET.
|
Download
|
10 |
Online Auction Business Model
TejashreeChidanand, Sana Shaikh, ShaguftaWadkar
Abstract:-The online auction business model includes one party
that sells products, while another party bids to purchase them.
This is strength of the online auction business model that is
inherent by the fact that it is "online." The Internet allows sellers
and bidders to participate in online auctions from anywhere in
the world. This paper is aimed at eliminating the problems faced
by the Conventional Auction House as well as the online auction
websites. We try to improve the efficiency of the website by
improving the user participation by generating an alert through
SMS as well as improving the user feedback.
|
Download
|
11 |
Anonymizing User Profiles for Enhanced Knowledge
Mining
Srividhya.K, Saminathan.A, Sathiya.S
Abstract:-In this paper the search is based on the user
conception. It also deals with the privacy of the user while
searching. With an enormous amount and wide variety of data
available on the web today, web search has emerged as one of the
most important services. In the recent past, the prevalent
practice followed by search engines of logging and analysing
users' web search queries has received considerable attention
from media and public as well as researchers all over the world.
|
Download
|