Arul Dalton - Academia.edu (original) (raw)
Papers by Arul Dalton
International journal of communication systems, Apr 21, 2024
Data and Knowledge Engineering, May 1, 2023
International Journal of Computer Applications, Mar 15, 2013
This paper presents an efficient algorithm for channel assignment problem in cellular radio netwo... more This paper presents an efficient algorithm for channel assignment problem in cellular radio networks. The task is to find channel assignment with minimum frequency bandwidth necessary to satisfy given demands from different nodes in a Wi-MAX network. This paper deals with a dynamic channel allocation (DCA) technique based on an energy function whose minimization gives the optimal allocation. The performance of the proposed DCA technique is here derived by computer simulations. Comparisons with a classical fixed allocation technique and a different DCA technique are shown to highlight the better performance of the proposed DCA technique.
the ambition of this study is to discover a technique to assimilate several various databases lik... more the ambition of this study is to discover a technique to assimilate several various databases like MySQL, Oracle, Sybase, Postgre, by taking the help of some of the modern Web technologies. It provides a global interface for these databases, accepts a query from the user in a natural language format (English), decodes this query into SQL using an interpreter, then retrieves data from the database, displays the result to the user and translates it into a fused format. XML is the fused format which helps to assimilate the data. To accomplish assimilation of data, we will implement an interpreter, which will take user query as its input and provides aimed appropriate data as output. The queries will be applied to core database to retrieve information from it and display to the end user. During this process, the retrieved data will be translated into XML format and piled as an XML document. The produced document can be used further for other XML processing like translating it into HTML or another XML document using XSL.
Microprocessors and Microsystems, Apr 1, 2021
Abstract Network on Chip (NoC) is growing technology whereby multiprocessor state interconnect pa... more Abstract Network on Chip (NoC) is growing technology whereby multiprocessor state interconnect patterns are formed. NoC technology is adapted to support a variety of multiprocessor requirements. The existing designs do not support the growth requirements of user applications. Because of the complex routing connections, several problems exist about traffic congestion and Power consumption contributing to a network's low efficiency. Traffic Congestion, Power consumption, and latency are a significant concern in Network on Chip architectures because of various dynamic routing connections. The existing models do not consider all the above-mentioned factors and struggle to achieve higher performance. The previous methods do not trigger the circuits according to the traffic condition and maximum power consumption. For this, the proposed High-Speed Virtual Logic Network on Chip router architecture is utilized for controlling the traffic congestion and deadlock issues, reduce the latency by selecting the minimal interval paths. In this research work, an architecture containing a Virtual router is introduced which yields low power consumption resulting in improving the performance of a network by performing the routing in a diagonal direction along with the other directions. Also, the method selects an optimal path according to various conditions that neglect the unnecessary triggering of chips which reduces the power consumption. The proposed model considers the dynamic congestion and route available to perform routing with the least power consumption. By comparing both the architectures, VC Router outperformed 15% of low power consumption for the 8-bit system, 10% of low power consumption for the 16-bit system, and 22% of low power consumption for the 32-bit system.
SSRN Electronic Journal, 2018
Data & Knowledge Engineering
ABSTRACT: The science of securing a data by encryption is Cryptography whereas the method of hidi... more ABSTRACT: The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret"s very existence is concealed. The term "Steganography" describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This system combines cryptography and steganography to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. The Data is secured by converting it into cipher text by TDES algorithm using a secret key and conceal this text in another video by steganography method. The communicated data is hidden into the multimedia file using video steganography without losing its perceptible quality using Junk space replacement method thereby quality of the video is not compromised.
To supply power for wireless sensor networks (WSNs) from renewable energy sources. In this system... more To supply power for wireless sensor networks (WSNs) from renewable energy sources. In this system we are using renewable energy sources from microbial fuel cells (MFCs) a major challenge faced by wireless sensor networks (WSNs) for monitoring purposes is their energy supply. Renewable energy sources are useful for sustainable monitoring, but still very limited today due to variousimplementationconstraints.Fortunately, microbial fuel cells (MFCs) provide a renewable power source, which can be integrated into terrains, wetlands, and some civil structures for environmental monitoring. However, as MFCs may only provide ultralow and dynamic power, an energy-neutral communication protocol is crucial for MFCpowered WSNs. Herein a duty-cycle-based energy-neutral communication protocol is proposed for MFCpowered WSNs. Mathematical models for optimal duty-cycling that minimize the probe packet reception time are first proposed. Then, an energy-neutral joint scheduling and routing protocol in ...
The science of securing a data by encryption is Cryptography whereas the method of hiding secret ... more The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret‟s very existence is concealed. The term „Steganography‟ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This system combines cryptography and steganography to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. The Data is secured by converting it into cipher text by TDES algorithm using a secret key and conceal this text in another video by steganography method. The communicated data is hidden into the multimedia file using video steganography without losing its perceptible quality using Junk space replacement method thereby quality of the video is not compromised.
the ambition of this study is to discover a technique to assimilate several various databases lik... more the ambition of this study is to discover a technique to assimilate several various databases like MySQL, Oracle, Sybase, Postgre, by taking the help of some of the modern Web technologies. It provides a global interface for these databases, accepts a query from the user in a natural language format (English), decodes this query into SQL using an interpreter, then retrieves data from the database, displays the result to the user and translates it into a fused format. XML is the fused format which helps to assimilate the data. To accomplish assimilation of data, we will implement an interpreter, which will take user query as its input and provides aimed appropriate data as output. The queries will be applied to core database to retrieve information from it and display to the end user. During this process, the retrieved data will be translated into XML format and piled as an XML document. The produced document can be used further for other XML processing like translating it into HTML ...
International Journal of Innovative Research in Science, Engineering and Technology, 2015
The science of securing a data by encryption is Cryptography whereas the method of hiding secret ... more The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret‟s very existence is concealed. The term „Steganography‟ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This system combines cryptography and steganography to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. The Data is secured by converting it into cipher text by TDES algorithm using a secret key and conceal this text in another video by steganography method. The communicated data is hidden into the multimedia file using video steganography without losing its perceptible quality using Junk space replacement method thereby quality of the video is not compromised.
In this paper, a method is proposed for predicting software maintainability. Prediction of mainta... more In this paper, a method is proposed for predicting software maintainability. Prediction of maintainability of a product is done by using its code complexity. Here a sample of 4 products is taken into consideration and both the absolute and relative complexity assessment are made over it. The process of measuring the code complexity is done at testing phase. We employ the fuzzy repertory table (FRT) technique to acquire the necessary domain knowledge of testers from which the software complexity analysis is made. Regression analysis is then used to predict maintainability from the product's code complexity.
2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 2021
Device to device communication is an emerging technology and considered as a significant part of ... more Device to device communication is an emerging technology and considered as a significant part of fifth generation wireless networks. It provides better communication in terms of improvement in system throughput and resource utility with shortened communication delay. Even though device to device communication improves energy and spectral efficiency by skipping the direct connection through base station, it suffers with some technical challenges. This paper summarizes the implementation challenges of spectrum allocation, and mainly focuses on resource allocation and spectrum sharing using dynamic programming approach. In addition, both single and priority based queuing models are employed to satisfy the user request. Finally, performance of the proposed approach is compared with greedy, brute force, successive and fractional approaches.
International Journal of Reasoning-based Intelligent Systems
Nowadays, technology is growing wide spread with innovate thought. Day by day changes are being m... more Nowadays, technology is growing wide spread with innovate thought. Day by day changes are being made to technology. A fast growing area in computer sciences is neural networks. Neural network is a computer system modelled on the human brain and human nervous system. Neural networks are sometimes referred to as an artificial human brain. Neural network is a subset of algorithms to construct artificial neurons. The human brain is transformed into plastic brain by neural networks. Neural networks are formed by interconnecting the number of information cells to process information. There is no guarantee that the system can work for all type of tasks. It may sometimes fail for certain tasks. To perform actions as humans, it is referred to as fuzzy logic. Today, fuzzy logic is an unprecedented popularity in technological and engineering fields. This topic teaches how computers can work as humans. This paper deals with fuzzy logic applications in the real world. Neural networks, computational intelligence techniques, intelligent control, instrument and robotics include fuzzy logics to perform the action in an easier way.
Because of various appealing focal points, agreeable correspondences have been broadly viewed as ... more Because of various appealing focal points, agreeable correspondences have been broadly viewed as one of the promising systems to enhance throughput and scope execution in remote interchanges. The hand-off hub (RN) assumes a key part in helpful interchanges, and RN determination may considerably influence the execution pick up in a system with agreeable media get to control (MAC). In this paper, we address the issue of RN choice while considering MAC overhead, which is brought about by handshake motioning as well as casing retransmissions because of transmission disappointment too. We outline a helpful MAC component with our ideal RN determination calculation, which is called ideal hand-off choice MAC, and utilize a hypothetical model. To investigate the collaboration execution picks up. We direct recreation tests in view of Network Simulator To assess our proposed agreeable MAC. Numerical outcomes approve the adequacy of our investigative model and demonstrate that our composed MAC ...
This paper presents an algorithm for channel assignment problem in wireless cellular networks. Th... more This paper presents an algorithm for channel assignment problem in wireless cellular networks. This algorithm is based on directional channel locking strategy. The task is to find channel assignment which reduces call blocking probability in wireless cellular network. This paper deals with a channel assignment technique and release technique based on borrowing channel from neighboring cell under heavy traffic condition. The performance of the proposed technique is here derived by computer simulations. Comparison with a Borrowing with Channel Ordering (BCO) technique under uniform and non-uniform traffic is shown to highlight the better performance of the proposed technique.
International Journal of Computer Applications, Mar 15, 2013
This paper presents an efficient algorithm for channel assignment problem in cellular radio netwo... more This paper presents an efficient algorithm for channel assignment problem in cellular radio networks. The task is to find channel assignment with minimum frequency bandwidth necessary to satisfy given demands from different nodes in a Wi-MAX network. This paper deals with a dynamic channel allocation (DCA) technique based on an energy function whose minimization gives the optimal allocation. The performance of the proposed DCA technique is here derived by computer simulations. Comparisons with a classical fixed allocation technique and a different DCA technique are shown to highlight the better performance of the proposed DCA technique.
Microprocessors and Microsystems
International journal of communication systems, Apr 21, 2024
Data and Knowledge Engineering, May 1, 2023
International Journal of Computer Applications, Mar 15, 2013
This paper presents an efficient algorithm for channel assignment problem in cellular radio netwo... more This paper presents an efficient algorithm for channel assignment problem in cellular radio networks. The task is to find channel assignment with minimum frequency bandwidth necessary to satisfy given demands from different nodes in a Wi-MAX network. This paper deals with a dynamic channel allocation (DCA) technique based on an energy function whose minimization gives the optimal allocation. The performance of the proposed DCA technique is here derived by computer simulations. Comparisons with a classical fixed allocation technique and a different DCA technique are shown to highlight the better performance of the proposed DCA technique.
the ambition of this study is to discover a technique to assimilate several various databases lik... more the ambition of this study is to discover a technique to assimilate several various databases like MySQL, Oracle, Sybase, Postgre, by taking the help of some of the modern Web technologies. It provides a global interface for these databases, accepts a query from the user in a natural language format (English), decodes this query into SQL using an interpreter, then retrieves data from the database, displays the result to the user and translates it into a fused format. XML is the fused format which helps to assimilate the data. To accomplish assimilation of data, we will implement an interpreter, which will take user query as its input and provides aimed appropriate data as output. The queries will be applied to core database to retrieve information from it and display to the end user. During this process, the retrieved data will be translated into XML format and piled as an XML document. The produced document can be used further for other XML processing like translating it into HTML or another XML document using XSL.
Microprocessors and Microsystems, Apr 1, 2021
Abstract Network on Chip (NoC) is growing technology whereby multiprocessor state interconnect pa... more Abstract Network on Chip (NoC) is growing technology whereby multiprocessor state interconnect patterns are formed. NoC technology is adapted to support a variety of multiprocessor requirements. The existing designs do not support the growth requirements of user applications. Because of the complex routing connections, several problems exist about traffic congestion and Power consumption contributing to a network's low efficiency. Traffic Congestion, Power consumption, and latency are a significant concern in Network on Chip architectures because of various dynamic routing connections. The existing models do not consider all the above-mentioned factors and struggle to achieve higher performance. The previous methods do not trigger the circuits according to the traffic condition and maximum power consumption. For this, the proposed High-Speed Virtual Logic Network on Chip router architecture is utilized for controlling the traffic congestion and deadlock issues, reduce the latency by selecting the minimal interval paths. In this research work, an architecture containing a Virtual router is introduced which yields low power consumption resulting in improving the performance of a network by performing the routing in a diagonal direction along with the other directions. Also, the method selects an optimal path according to various conditions that neglect the unnecessary triggering of chips which reduces the power consumption. The proposed model considers the dynamic congestion and route available to perform routing with the least power consumption. By comparing both the architectures, VC Router outperformed 15% of low power consumption for the 8-bit system, 10% of low power consumption for the 16-bit system, and 22% of low power consumption for the 32-bit system.
SSRN Electronic Journal, 2018
Data & Knowledge Engineering
ABSTRACT: The science of securing a data by encryption is Cryptography whereas the method of hidi... more ABSTRACT: The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret"s very existence is concealed. The term "Steganography" describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This system combines cryptography and steganography to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. The Data is secured by converting it into cipher text by TDES algorithm using a secret key and conceal this text in another video by steganography method. The communicated data is hidden into the multimedia file using video steganography without losing its perceptible quality using Junk space replacement method thereby quality of the video is not compromised.
To supply power for wireless sensor networks (WSNs) from renewable energy sources. In this system... more To supply power for wireless sensor networks (WSNs) from renewable energy sources. In this system we are using renewable energy sources from microbial fuel cells (MFCs) a major challenge faced by wireless sensor networks (WSNs) for monitoring purposes is their energy supply. Renewable energy sources are useful for sustainable monitoring, but still very limited today due to variousimplementationconstraints.Fortunately, microbial fuel cells (MFCs) provide a renewable power source, which can be integrated into terrains, wetlands, and some civil structures for environmental monitoring. However, as MFCs may only provide ultralow and dynamic power, an energy-neutral communication protocol is crucial for MFCpowered WSNs. Herein a duty-cycle-based energy-neutral communication protocol is proposed for MFCpowered WSNs. Mathematical models for optimal duty-cycling that minimize the probe packet reception time are first proposed. Then, an energy-neutral joint scheduling and routing protocol in ...
The science of securing a data by encryption is Cryptography whereas the method of hiding secret ... more The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret‟s very existence is concealed. The term „Steganography‟ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This system combines cryptography and steganography to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. The Data is secured by converting it into cipher text by TDES algorithm using a secret key and conceal this text in another video by steganography method. The communicated data is hidden into the multimedia file using video steganography without losing its perceptible quality using Junk space replacement method thereby quality of the video is not compromised.
the ambition of this study is to discover a technique to assimilate several various databases lik... more the ambition of this study is to discover a technique to assimilate several various databases like MySQL, Oracle, Sybase, Postgre, by taking the help of some of the modern Web technologies. It provides a global interface for these databases, accepts a query from the user in a natural language format (English), decodes this query into SQL using an interpreter, then retrieves data from the database, displays the result to the user and translates it into a fused format. XML is the fused format which helps to assimilate the data. To accomplish assimilation of data, we will implement an interpreter, which will take user query as its input and provides aimed appropriate data as output. The queries will be applied to core database to retrieve information from it and display to the end user. During this process, the retrieved data will be translated into XML format and piled as an XML document. The produced document can be used further for other XML processing like translating it into HTML ...
International Journal of Innovative Research in Science, Engineering and Technology, 2015
The science of securing a data by encryption is Cryptography whereas the method of hiding secret ... more The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret‟s very existence is concealed. The term „Steganography‟ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This system combines cryptography and steganography to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. The Data is secured by converting it into cipher text by TDES algorithm using a secret key and conceal this text in another video by steganography method. The communicated data is hidden into the multimedia file using video steganography without losing its perceptible quality using Junk space replacement method thereby quality of the video is not compromised.
In this paper, a method is proposed for predicting software maintainability. Prediction of mainta... more In this paper, a method is proposed for predicting software maintainability. Prediction of maintainability of a product is done by using its code complexity. Here a sample of 4 products is taken into consideration and both the absolute and relative complexity assessment are made over it. The process of measuring the code complexity is done at testing phase. We employ the fuzzy repertory table (FRT) technique to acquire the necessary domain knowledge of testers from which the software complexity analysis is made. Regression analysis is then used to predict maintainability from the product's code complexity.
2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 2021
Device to device communication is an emerging technology and considered as a significant part of ... more Device to device communication is an emerging technology and considered as a significant part of fifth generation wireless networks. It provides better communication in terms of improvement in system throughput and resource utility with shortened communication delay. Even though device to device communication improves energy and spectral efficiency by skipping the direct connection through base station, it suffers with some technical challenges. This paper summarizes the implementation challenges of spectrum allocation, and mainly focuses on resource allocation and spectrum sharing using dynamic programming approach. In addition, both single and priority based queuing models are employed to satisfy the user request. Finally, performance of the proposed approach is compared with greedy, brute force, successive and fractional approaches.
International Journal of Reasoning-based Intelligent Systems
Nowadays, technology is growing wide spread with innovate thought. Day by day changes are being m... more Nowadays, technology is growing wide spread with innovate thought. Day by day changes are being made to technology. A fast growing area in computer sciences is neural networks. Neural network is a computer system modelled on the human brain and human nervous system. Neural networks are sometimes referred to as an artificial human brain. Neural network is a subset of algorithms to construct artificial neurons. The human brain is transformed into plastic brain by neural networks. Neural networks are formed by interconnecting the number of information cells to process information. There is no guarantee that the system can work for all type of tasks. It may sometimes fail for certain tasks. To perform actions as humans, it is referred to as fuzzy logic. Today, fuzzy logic is an unprecedented popularity in technological and engineering fields. This topic teaches how computers can work as humans. This paper deals with fuzzy logic applications in the real world. Neural networks, computational intelligence techniques, intelligent control, instrument and robotics include fuzzy logics to perform the action in an easier way.
Because of various appealing focal points, agreeable correspondences have been broadly viewed as ... more Because of various appealing focal points, agreeable correspondences have been broadly viewed as one of the promising systems to enhance throughput and scope execution in remote interchanges. The hand-off hub (RN) assumes a key part in helpful interchanges, and RN determination may considerably influence the execution pick up in a system with agreeable media get to control (MAC). In this paper, we address the issue of RN choice while considering MAC overhead, which is brought about by handshake motioning as well as casing retransmissions because of transmission disappointment too. We outline a helpful MAC component with our ideal RN determination calculation, which is called ideal hand-off choice MAC, and utilize a hypothetical model. To investigate the collaboration execution picks up. We direct recreation tests in view of Network Simulator To assess our proposed agreeable MAC. Numerical outcomes approve the adequacy of our investigative model and demonstrate that our composed MAC ...
This paper presents an algorithm for channel assignment problem in wireless cellular networks. Th... more This paper presents an algorithm for channel assignment problem in wireless cellular networks. This algorithm is based on directional channel locking strategy. The task is to find channel assignment which reduces call blocking probability in wireless cellular network. This paper deals with a channel assignment technique and release technique based on borrowing channel from neighboring cell under heavy traffic condition. The performance of the proposed technique is here derived by computer simulations. Comparison with a Borrowing with Channel Ordering (BCO) technique under uniform and non-uniform traffic is shown to highlight the better performance of the proposed technique.
International Journal of Computer Applications, Mar 15, 2013
This paper presents an efficient algorithm for channel assignment problem in cellular radio netwo... more This paper presents an efficient algorithm for channel assignment problem in cellular radio networks. The task is to find channel assignment with minimum frequency bandwidth necessary to satisfy given demands from different nodes in a Wi-MAX network. This paper deals with a dynamic channel allocation (DCA) technique based on an energy function whose minimization gives the optimal allocation. The performance of the proposed DCA technique is here derived by computer simulations. Comparisons with a classical fixed allocation technique and a different DCA technique are shown to highlight the better performance of the proposed DCA technique.
Microprocessors and Microsystems