Dr. R Balakrishna - Academia.edu (original) (raw)

Papers by Dr. R Balakrishna

Research paper thumbnail of Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things

Intelligent Automation & Soft Computing

This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote... more This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote enhanced and efficient Internet of Things (IoT). The work increases the mobility as well as an opportunity for loss of IoT node meeting links due to both mobility and blockers/interferers. The proposed algorithm overcomes loss issues as well as works in dynamically allocating alternate route from other IoT nodes available in near and selecting for efficient route in the network. When the link fails, bandwidth is reduced and coverage area problems for packets sending from source to destination is managed. The proposed algorithm works with lightweight wireless mesh based route handling techniques. In such case, reduced link failure, removal of route discovery latency, communication cost and control overheads, energy consumptions and network life time are to be handled with care. To address these issues, the proposed algorithm enhances the Packet Delivery Ratio (PDR) as well as transmission packet efficiently received through destination node. The ability of Dynamic Alternate Routing (DAR) to relay node handling capabilities and to improve the communication link availability of IoT nodes has ultimately increased the PDR. Simulation work was done using Network Simulator 3 (NS3) and the results show that the performance is better when compared with existing Dynamic Source Routing (DSR) and Energy Efficient Delay Tolerant Routing (EEDTR) algorithm.

Research paper thumbnail of A New approach of Secure Aggregate Signature Scheme for Wireless Sensor Networks

International Journal of Scientific Engineering and Technology, 2017

Managing secure and effective enormous information collection strategies are extremely alluring i... more Managing secure and effective enormous information collection strategies are extremely alluring in the field of remote sensor systems. In genuine settings, the remote sensor systems have been extensively connected, for example, target following and condition remote observing. Be that as it may, information can be effectively traded off by a huge of assaults, for example, information interference and information altering and so on, and these produced information will be dropped by bunch head which will be appeared in the recreations by utilizing NS2 programming. We basically concentrate on information respectability security; give a personality based total mark conspire with an assigned verifier for remote sensor systems. As per the benefit of total marks, our plan can keep information uprightness, as well as can decrease data transfer capacity and capacity taken a toll for remote sensor systems.

Research paper thumbnail of Efficient Protocol Identification of Manet Cluster Head Formation and Selection Routing for Wireless Sensor Networks

Journal of Critical Reviews, 2020

Research paper thumbnail of Content-Based Load Balancing Using Web Clusters and Service Rankings

Advances in Intelligent Systems and Computing, 2016

Web servers have gained immense popularity currently due to its nature to cater to a huge number ... more Web servers have gained immense popularity currently due to its nature to cater to a huge number of user requests, where any number of users can get service from Web-based applications. As it comes with global accessibility, servers hosting popular websites tend to get massive load that deteriorates in efficiency to provide quality service. Currently, most servers use load balancing techniques that distribute load among multiple virtual servers hosting a website. Generally, these load balancing techniques concentrate on balancing user request load on server and ignore the type of content requested. The reason behind it is overhead on dispatcher for analyzing content request and assigning appropriate rank. This process consumes additional time for dispatcher to allocate server and users face little delay in viewing their site; however it is helpful in the long run as heavy bandwidth consuming services such as multimedia requests can be catered efficiently by high priority servers only. The priority of servers can be defined as per their configuration and capabilities. Through experimental results on J Meter software it is proved that this concept can be helpful in providing better Quality of Service (QOS) to the website users.

Research paper thumbnail of Data Mining for Healthy Tomorrow with the Implementation of Software Project Management Technique

Advances in Intelligent Systems and Computing, 2016

In the current scenario, we find many data mining-related projects being used. These projects are... more In the current scenario, we find many data mining-related projects being used. These projects are being used very widely and very effectively for the extraction of data in the organization. The usage of data mining has helped in a big way in terms of getting information where the nature of database retrieval is humongous. In this paper, we are seeing how to carry out these data mining projects by using the project management technique. The project management technique makes the project to be carried out very effectively and very efficiently by properly planning the project, organizing according to the objectives, controlling, or coordinating the projects. Hence making the project reach the objectives being framed or formulized.

Research paper thumbnail of Secure Authenticated Key Exchange Protocol for Credential Services

DESIDOC Journal of Library & Information Technology, 2009

Remote user authentication and key agreement system through smartcard is a viable practical solut... more Remote user authentication and key agreement system through smartcard is a viable practical solution to validate the eligibility of a remote user and thus to provide a secure communication. This paper suggests a Secure Authenticated Key Exchange Protocol (SAKEP) for Credential Services. The major intrinsic worth of this scheme include that, the system do not require any verification table and the user is at liberty to choose and change the password. Further, with this system, the computation and communication costs are lower as the scheme adopts one-way hash functions, block ciphers and smartcard. In addition, the proposed scheme offers mutual authentication between the server and the user by a nonce-based plan and is free from timesynchronisation problem. The proposed scheme is secured against Id-theft, also resists to replay attacks, stolen verifier attacks, guessing attacks, reflection attack, and offers forward secrecy and known-key security.

Research paper thumbnail of Energy Efficient and Secured Clustering Algorithm using Fuzzy Logic with K-means Method in MANET

Indian Journal of Science and Technology, 2019

Background/Objective: To identify and survey more suitable routing protocol for MANET. Methods/Fi... more Background/Objective: To identify and survey more suitable routing protocol for MANET. Methods/Finding: In this study, we present a fuzzy bunching calculation which improves the vitality proficiency of LEACH convention by utilizing a superior group head determination arrangement. For this proposes, we apply the quantity of live neighboring nodes and remaining vitality of system nodes to choose better nodes for grouping. Application: By making progressively symmetric groups, our plan decreases the vitality utilization of the sensors and this at long last builds the lifetime of the sensor arrange.

Research paper thumbnail of Service Delivery Mechanism on Content Based Cluster using Similarity of Services

Transactions on Networks and Communications, 2015

Load balancing on web servers has become a major area of research due to ever increasing internet... more Load balancing on web servers has become a major area of research due to ever increasing internet users' population and heavy load on popular website servers. Content based load balancing is proved to be a good mechanism to balance load on servers providing high quality services to the users' requesting for different category of content. On-demand creation of virtual servers has solved the complexity of load distribution and clusterization helps in grouping of same category servers. We propose a novel mechanism which works on clusterization of different grade servers intended to provide content based services to the users. Through experimental results it is found that this technique is helpful in increasing throughput and provides better quality of service to the users.

Research paper thumbnail of Incognito-authentication for preserving information on cloud with distributed approach control

International Journal of Engineering & Technology, 2018

A new distributed approach control methods which are considered on preserve information repositor... more A new distributed approach control methods which are considered on preserve information repository in clouds in order to back incognito authentication. In the current method, the cloud checks the credibility of the series by not getting the user’s integrity formerly saving the information. In this work we developed a method which include major aspects like approach control for all authentic users who can able to decode the preserved knowledge. This method blocks epitomize barrage along with backing formation, alteration as well as educating information reposted in the cloud. We moreover deal customer repudiation, verification and approach control methods are distributed and vigorous, unlike alternative approach control methods created for clouds which are unify. The conversation, calculation along with repository aloft which is as good as to unify access.

Research paper thumbnail of Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks

International Journal of Electrical and Computer Engineering (IJECE), 2018

At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum num... more At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% ...

Research paper thumbnail of Beca De Doctorado De Montenegro Gonzalez Catalina Betzabe

Research paper thumbnail of Comparative analysis of delay and throughput using IEEE 802.11 and receiver centric-MAC protocol in wireless sensor networks

2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017

Wireless Sensor Network is a collection of sensor nodes, which are used for sending and receiving... more Wireless Sensor Network is a collection of sensor nodes, which are used for sending and receiving data packets from one sensor node to another sensor node. Wireless sensor networks have wide range of applications in various fields like agriculture, military, medical and health care. Data can be transmitting through different sensor nodes to the receiver's node. In this research work considering parameters throughput, end to end delay and packet delivery ratio, these are the main quality of services for wireless sensor networks. In this novel approach comparing the parametric measures like throughput, end to end delay and packet delivery ratio with existing MAC IEEE 802.11 protocol and novel approach RC-MAC protocol. This research work is implemented by using NS 2.35 simulator. Results show that performance of RC-MAC is better than MAC IEEE 802.11, 94.08% of less delay, more packet delivery ratio and throughput improved by 2.4 % compared with MAC IEEE 802.11.

Research paper thumbnail of Quantitative Analysis of Surface Enhanced Raman Spectra

University of Texas at Arlington, 2013

Quantitative analysis of Raman spectra using surface-enhanced Raman scattering (SERS) nanoparticl... more Quantitative analysis of Raman spectra using surface-enhanced Raman scattering (SERS) nanoparticles has shown the potential and promising trend of development in vivo molecular imaging. One of the key job is from the intensities of Raman signals to predict the quantities of analytes. Direct classical least squares (DCLS) and multivariate calibration (MC) are commonly used methods. DCLS relies on source Raman signals as the references. But the inherent Instability of Raman signals make the DCLS model not robust enough. MC model relies on a batch of training mixture Raman signals together with the ground truth mixing concentrations to build the multivariate multiple linear regression models, so as to reduce the bias from the instability of source Raman signals. But it also brings in the more variables than observations problem. Latent variable regression (LVR) model avoids that problem by extracting low dimensional latent variables (LVs) (or extracted features) to do regression with concentrations. Among several LVR methods, partial least squares regression (PLSR) algorithms are more robust, since their LVs both represent original Raman signals and predict concentrations. In this thesis, quantitative analysis models and methods are compared to show why PLSR algorithms are more robust for the purpose of quantitative analysis of Raman spectra. Only PLSR cannot handle the instable background of Raman signals. Baseline correction methods are commonly used as the preprocessing to find a slowly changed baseline under the signal as the estimated background. Raman peaks are extracted then by subtracting the baseline from the Raman signal. But baseline correction methods are usually time consuming iterative processes, and normally they cannot deal with the multi-scale property of Raman peaks. We designed a simple algorithm, called continuous wavelet transform (CWT) based partial least squares regression (CWT-PLSR) that uses the average CWT coefficients of mixture Raman signals to do PLSR with mixing concentrations. It extracts the multi-scale information of Raman peaks and so is more robust than traditional baseline correction methods. The features extracted by PLSR give more weights to those Raman peaks that both representing Raman signals and predicting concentrations well. But the portion of each purpose is fixed in the objective function of PLSR. To improve the flexibility of PLSR, we designed a new continuum regression (CR) method that use a tuning parameter to control the portion of each purpose in the objective function and it gives more reasonable weights to Raman peaks. It beats other two CR methods by embracing PCR, RRR and PLS as three special cases, and is simply achieved by NIPALS algorithm. Tuning parameters of PLSR and CR methods are normally decided by time-consuming cross-validation methods. And some parameters have infinite numbers of possible values in continuous ranges. There is no way to test every value by cross-validation methods. Nonparametric Bayesian models of these methods are needed to decide the parameters automatically from the training data. As a foundation work, we design a probabilistic PLS regression model to give a probabilistic view of the PLSR methods. Future Bayesian models can be achieved by adding reasonable priors of the parameters.

Research paper thumbnail of Effective Resource Allocation for Green Computing

International Journal of Web Technology, 2016

Research paper thumbnail of Callus Induction and Efficient Regeneration Through Organogenesis from Foliar Explants in Different Species of Mulberry

Nous avons etudie l'induction de cals chez differentes especes de murier, c'est-a-dire, M... more Nous avons etudie l'induction de cals chez differentes especes de murier, c'est-a-dire, M.multicaulis. M. bombycis, M. latifolia, M. nigra, M. alba et M. indica. Le taux d'induction de cals est tres eleve chez M. indica par comparaison aux especes exotiques. On maintient les cals de differentes especes pendant plus d'une annee. La frequence d'initiation de cals est elevee sur du milieu de Murashige et Skoog, modifie avec 2 mg de 2,4 D par litre, 100 mg d'hydrolysat acide de caseine par litre et 15 ml par l d'eau de noix de coco. La regeneration par l'organogenese a ete obtenue seulement chez M. indica et M. alba.

Research paper thumbnail of Feature Classification and Analysis of Acute and Chronic Pancreatitis Using Supervised Machine Learning Algorithm

Supervised Machine learning algorithms play a vital role in prediction of diseases, and the death... more Supervised Machine learning algorithms play a vital role in prediction of diseases, and the death rate comparatively reduced in twenty-first century; one of the most predominant diseases is acute and chronic Pancreatitis in which only 7% of patients were alive after treatment since the cancerous cells spread to all other parts of the pancreas gland. This marks the importance of diagnosing cancer at an incipient stage and as a result in this work more than 3000 CT scan tumor images from 82 patients around the world are considered. In preprocessing stage the speckle noise is removed using wiener’s filter and then the normalized images are partitioned by enhanced region-based active contour (ERBAC) to find the region of interest (ROI). The features are extracted from the segmented images by gray Llevel co-occurrence matrix (GLCM) and the extracted features are classified by using KNN and SVM classification algorithm. Based upon the results it is found that KNN produces 97.2% of accurac...

Research paper thumbnail of Ceaseless Rule‐Based Learning Methodology for Genetic Fuzzy Rule‐Based Systems

Research paper thumbnail of Performance Analysis of Reliability and Throughput Using an Improved Receiver—Centric MAC Protocol and Itree-MAC Protocol in Wireless Sensor Networks

Wireless sensor networks have been identified as one of the key areas in the field of wireless co... more Wireless sensor networks have been identified as one of the key areas in the field of wireless communication. When an event has occurred, the number of data packets will be generated. A MAC protocol considered for this category of wireless sensor networks, here MAC protocols able to adapt to both light and heavy traffic load situations of the network. Accessible MAC protocols are used for light traffic for the energy efficiency concern. Our proposed systems An Improved Receiver-Centric MAC protocol and Itree-MAC protocol implemented in NS2 Simulator, the significance of this paper is highlight the idle listening, infrequent, and light weight synchronization in wireless sensor networks. Here evaluating the performance analysis of Improved Receiver-Centric MAC protocol and Itree-MAC protocol; considering comparing parameters like throughput, reliability and end-to-end delay in different sensor nodes in wireless sensor networks. Comparing MAC, receiver-centric MAC, Improved Receiver-Ce...

Research paper thumbnail of Soft Computing Analysis for Detection of Pancreatic Cancer Using MATLAB

Diagnosis and Prognosis are the two main objection facets taken into consideration for evaluating... more Diagnosis and Prognosis are the two main objection facets taken into consideration for evaluating cancer. The survival of Cancer patients depend upon the diagnosis of Cancer at the early stages (either in Stage I or Stage II). If the cancer diagnosed in Stage III or later stages, the chances of survival of the patient will become more critical. Prognosis will acknowledge the durability arrangement for contrasting aspects i.e., for particular medicine, past as well as future analysis, a more enhanced diagnosis and prognosis, gives exceptional analysis result for Cancer. Current paper presents medical CT scan image feature analysis, creation of data bank to detect the pancreatic cancer at an early stage. A dataset of known pancreas CT scan images with their clinical diagnosis were composed. A special diagnosis tool was used for pancreatic cancer and all images were subjected for image textual characters, which were statistically calculated in numerical MATLAB environment with syntax. ...

Research paper thumbnail of Studies in Indian economic problems : selected essays

Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto REDVET R... more Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto REDVET Rev. electrón. vet.

Research paper thumbnail of Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things

Intelligent Automation & Soft Computing

This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote... more This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote enhanced and efficient Internet of Things (IoT). The work increases the mobility as well as an opportunity for loss of IoT node meeting links due to both mobility and blockers/interferers. The proposed algorithm overcomes loss issues as well as works in dynamically allocating alternate route from other IoT nodes available in near and selecting for efficient route in the network. When the link fails, bandwidth is reduced and coverage area problems for packets sending from source to destination is managed. The proposed algorithm works with lightweight wireless mesh based route handling techniques. In such case, reduced link failure, removal of route discovery latency, communication cost and control overheads, energy consumptions and network life time are to be handled with care. To address these issues, the proposed algorithm enhances the Packet Delivery Ratio (PDR) as well as transmission packet efficiently received through destination node. The ability of Dynamic Alternate Routing (DAR) to relay node handling capabilities and to improve the communication link availability of IoT nodes has ultimately increased the PDR. Simulation work was done using Network Simulator 3 (NS3) and the results show that the performance is better when compared with existing Dynamic Source Routing (DSR) and Energy Efficient Delay Tolerant Routing (EEDTR) algorithm.

Research paper thumbnail of A New approach of Secure Aggregate Signature Scheme for Wireless Sensor Networks

International Journal of Scientific Engineering and Technology, 2017

Managing secure and effective enormous information collection strategies are extremely alluring i... more Managing secure and effective enormous information collection strategies are extremely alluring in the field of remote sensor systems. In genuine settings, the remote sensor systems have been extensively connected, for example, target following and condition remote observing. Be that as it may, information can be effectively traded off by a huge of assaults, for example, information interference and information altering and so on, and these produced information will be dropped by bunch head which will be appeared in the recreations by utilizing NS2 programming. We basically concentrate on information respectability security; give a personality based total mark conspire with an assigned verifier for remote sensor systems. As per the benefit of total marks, our plan can keep information uprightness, as well as can decrease data transfer capacity and capacity taken a toll for remote sensor systems.

Research paper thumbnail of Efficient Protocol Identification of Manet Cluster Head Formation and Selection Routing for Wireless Sensor Networks

Journal of Critical Reviews, 2020

Research paper thumbnail of Content-Based Load Balancing Using Web Clusters and Service Rankings

Advances in Intelligent Systems and Computing, 2016

Web servers have gained immense popularity currently due to its nature to cater to a huge number ... more Web servers have gained immense popularity currently due to its nature to cater to a huge number of user requests, where any number of users can get service from Web-based applications. As it comes with global accessibility, servers hosting popular websites tend to get massive load that deteriorates in efficiency to provide quality service. Currently, most servers use load balancing techniques that distribute load among multiple virtual servers hosting a website. Generally, these load balancing techniques concentrate on balancing user request load on server and ignore the type of content requested. The reason behind it is overhead on dispatcher for analyzing content request and assigning appropriate rank. This process consumes additional time for dispatcher to allocate server and users face little delay in viewing their site; however it is helpful in the long run as heavy bandwidth consuming services such as multimedia requests can be catered efficiently by high priority servers only. The priority of servers can be defined as per their configuration and capabilities. Through experimental results on J Meter software it is proved that this concept can be helpful in providing better Quality of Service (QOS) to the website users.

Research paper thumbnail of Data Mining for Healthy Tomorrow with the Implementation of Software Project Management Technique

Advances in Intelligent Systems and Computing, 2016

In the current scenario, we find many data mining-related projects being used. These projects are... more In the current scenario, we find many data mining-related projects being used. These projects are being used very widely and very effectively for the extraction of data in the organization. The usage of data mining has helped in a big way in terms of getting information where the nature of database retrieval is humongous. In this paper, we are seeing how to carry out these data mining projects by using the project management technique. The project management technique makes the project to be carried out very effectively and very efficiently by properly planning the project, organizing according to the objectives, controlling, or coordinating the projects. Hence making the project reach the objectives being framed or formulized.

Research paper thumbnail of Secure Authenticated Key Exchange Protocol for Credential Services

DESIDOC Journal of Library & Information Technology, 2009

Remote user authentication and key agreement system through smartcard is a viable practical solut... more Remote user authentication and key agreement system through smartcard is a viable practical solution to validate the eligibility of a remote user and thus to provide a secure communication. This paper suggests a Secure Authenticated Key Exchange Protocol (SAKEP) for Credential Services. The major intrinsic worth of this scheme include that, the system do not require any verification table and the user is at liberty to choose and change the password. Further, with this system, the computation and communication costs are lower as the scheme adopts one-way hash functions, block ciphers and smartcard. In addition, the proposed scheme offers mutual authentication between the server and the user by a nonce-based plan and is free from timesynchronisation problem. The proposed scheme is secured against Id-theft, also resists to replay attacks, stolen verifier attacks, guessing attacks, reflection attack, and offers forward secrecy and known-key security.

Research paper thumbnail of Energy Efficient and Secured Clustering Algorithm using Fuzzy Logic with K-means Method in MANET

Indian Journal of Science and Technology, 2019

Background/Objective: To identify and survey more suitable routing protocol for MANET. Methods/Fi... more Background/Objective: To identify and survey more suitable routing protocol for MANET. Methods/Finding: In this study, we present a fuzzy bunching calculation which improves the vitality proficiency of LEACH convention by utilizing a superior group head determination arrangement. For this proposes, we apply the quantity of live neighboring nodes and remaining vitality of system nodes to choose better nodes for grouping. Application: By making progressively symmetric groups, our plan decreases the vitality utilization of the sensors and this at long last builds the lifetime of the sensor arrange.

Research paper thumbnail of Service Delivery Mechanism on Content Based Cluster using Similarity of Services

Transactions on Networks and Communications, 2015

Load balancing on web servers has become a major area of research due to ever increasing internet... more Load balancing on web servers has become a major area of research due to ever increasing internet users' population and heavy load on popular website servers. Content based load balancing is proved to be a good mechanism to balance load on servers providing high quality services to the users' requesting for different category of content. On-demand creation of virtual servers has solved the complexity of load distribution and clusterization helps in grouping of same category servers. We propose a novel mechanism which works on clusterization of different grade servers intended to provide content based services to the users. Through experimental results it is found that this technique is helpful in increasing throughput and provides better quality of service to the users.

Research paper thumbnail of Incognito-authentication for preserving information on cloud with distributed approach control

International Journal of Engineering & Technology, 2018

A new distributed approach control methods which are considered on preserve information repositor... more A new distributed approach control methods which are considered on preserve information repository in clouds in order to back incognito authentication. In the current method, the cloud checks the credibility of the series by not getting the user’s integrity formerly saving the information. In this work we developed a method which include major aspects like approach control for all authentic users who can able to decode the preserved knowledge. This method blocks epitomize barrage along with backing formation, alteration as well as educating information reposted in the cloud. We moreover deal customer repudiation, verification and approach control methods are distributed and vigorous, unlike alternative approach control methods created for clouds which are unify. The conversation, calculation along with repository aloft which is as good as to unify access.

Research paper thumbnail of Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks

International Journal of Electrical and Computer Engineering (IJECE), 2018

At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum num... more At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% ...

Research paper thumbnail of Beca De Doctorado De Montenegro Gonzalez Catalina Betzabe

Research paper thumbnail of Comparative analysis of delay and throughput using IEEE 802.11 and receiver centric-MAC protocol in wireless sensor networks

2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017

Wireless Sensor Network is a collection of sensor nodes, which are used for sending and receiving... more Wireless Sensor Network is a collection of sensor nodes, which are used for sending and receiving data packets from one sensor node to another sensor node. Wireless sensor networks have wide range of applications in various fields like agriculture, military, medical and health care. Data can be transmitting through different sensor nodes to the receiver's node. In this research work considering parameters throughput, end to end delay and packet delivery ratio, these are the main quality of services for wireless sensor networks. In this novel approach comparing the parametric measures like throughput, end to end delay and packet delivery ratio with existing MAC IEEE 802.11 protocol and novel approach RC-MAC protocol. This research work is implemented by using NS 2.35 simulator. Results show that performance of RC-MAC is better than MAC IEEE 802.11, 94.08% of less delay, more packet delivery ratio and throughput improved by 2.4 % compared with MAC IEEE 802.11.

Research paper thumbnail of Quantitative Analysis of Surface Enhanced Raman Spectra

University of Texas at Arlington, 2013

Quantitative analysis of Raman spectra using surface-enhanced Raman scattering (SERS) nanoparticl... more Quantitative analysis of Raman spectra using surface-enhanced Raman scattering (SERS) nanoparticles has shown the potential and promising trend of development in vivo molecular imaging. One of the key job is from the intensities of Raman signals to predict the quantities of analytes. Direct classical least squares (DCLS) and multivariate calibration (MC) are commonly used methods. DCLS relies on source Raman signals as the references. But the inherent Instability of Raman signals make the DCLS model not robust enough. MC model relies on a batch of training mixture Raman signals together with the ground truth mixing concentrations to build the multivariate multiple linear regression models, so as to reduce the bias from the instability of source Raman signals. But it also brings in the more variables than observations problem. Latent variable regression (LVR) model avoids that problem by extracting low dimensional latent variables (LVs) (or extracted features) to do regression with concentrations. Among several LVR methods, partial least squares regression (PLSR) algorithms are more robust, since their LVs both represent original Raman signals and predict concentrations. In this thesis, quantitative analysis models and methods are compared to show why PLSR algorithms are more robust for the purpose of quantitative analysis of Raman spectra. Only PLSR cannot handle the instable background of Raman signals. Baseline correction methods are commonly used as the preprocessing to find a slowly changed baseline under the signal as the estimated background. Raman peaks are extracted then by subtracting the baseline from the Raman signal. But baseline correction methods are usually time consuming iterative processes, and normally they cannot deal with the multi-scale property of Raman peaks. We designed a simple algorithm, called continuous wavelet transform (CWT) based partial least squares regression (CWT-PLSR) that uses the average CWT coefficients of mixture Raman signals to do PLSR with mixing concentrations. It extracts the multi-scale information of Raman peaks and so is more robust than traditional baseline correction methods. The features extracted by PLSR give more weights to those Raman peaks that both representing Raman signals and predicting concentrations well. But the portion of each purpose is fixed in the objective function of PLSR. To improve the flexibility of PLSR, we designed a new continuum regression (CR) method that use a tuning parameter to control the portion of each purpose in the objective function and it gives more reasonable weights to Raman peaks. It beats other two CR methods by embracing PCR, RRR and PLS as three special cases, and is simply achieved by NIPALS algorithm. Tuning parameters of PLSR and CR methods are normally decided by time-consuming cross-validation methods. And some parameters have infinite numbers of possible values in continuous ranges. There is no way to test every value by cross-validation methods. Nonparametric Bayesian models of these methods are needed to decide the parameters automatically from the training data. As a foundation work, we design a probabilistic PLS regression model to give a probabilistic view of the PLSR methods. Future Bayesian models can be achieved by adding reasonable priors of the parameters.

Research paper thumbnail of Effective Resource Allocation for Green Computing

International Journal of Web Technology, 2016

Research paper thumbnail of Callus Induction and Efficient Regeneration Through Organogenesis from Foliar Explants in Different Species of Mulberry

Nous avons etudie l'induction de cals chez differentes especes de murier, c'est-a-dire, M... more Nous avons etudie l'induction de cals chez differentes especes de murier, c'est-a-dire, M.multicaulis. M. bombycis, M. latifolia, M. nigra, M. alba et M. indica. Le taux d'induction de cals est tres eleve chez M. indica par comparaison aux especes exotiques. On maintient les cals de differentes especes pendant plus d'une annee. La frequence d'initiation de cals est elevee sur du milieu de Murashige et Skoog, modifie avec 2 mg de 2,4 D par litre, 100 mg d'hydrolysat acide de caseine par litre et 15 ml par l d'eau de noix de coco. La regeneration par l'organogenese a ete obtenue seulement chez M. indica et M. alba.

Research paper thumbnail of Feature Classification and Analysis of Acute and Chronic Pancreatitis Using Supervised Machine Learning Algorithm

Supervised Machine learning algorithms play a vital role in prediction of diseases, and the death... more Supervised Machine learning algorithms play a vital role in prediction of diseases, and the death rate comparatively reduced in twenty-first century; one of the most predominant diseases is acute and chronic Pancreatitis in which only 7% of patients were alive after treatment since the cancerous cells spread to all other parts of the pancreas gland. This marks the importance of diagnosing cancer at an incipient stage and as a result in this work more than 3000 CT scan tumor images from 82 patients around the world are considered. In preprocessing stage the speckle noise is removed using wiener’s filter and then the normalized images are partitioned by enhanced region-based active contour (ERBAC) to find the region of interest (ROI). The features are extracted from the segmented images by gray Llevel co-occurrence matrix (GLCM) and the extracted features are classified by using KNN and SVM classification algorithm. Based upon the results it is found that KNN produces 97.2% of accurac...

Research paper thumbnail of Ceaseless Rule‐Based Learning Methodology for Genetic Fuzzy Rule‐Based Systems

Research paper thumbnail of Performance Analysis of Reliability and Throughput Using an Improved Receiver—Centric MAC Protocol and Itree-MAC Protocol in Wireless Sensor Networks

Wireless sensor networks have been identified as one of the key areas in the field of wireless co... more Wireless sensor networks have been identified as one of the key areas in the field of wireless communication. When an event has occurred, the number of data packets will be generated. A MAC protocol considered for this category of wireless sensor networks, here MAC protocols able to adapt to both light and heavy traffic load situations of the network. Accessible MAC protocols are used for light traffic for the energy efficiency concern. Our proposed systems An Improved Receiver-Centric MAC protocol and Itree-MAC protocol implemented in NS2 Simulator, the significance of this paper is highlight the idle listening, infrequent, and light weight synchronization in wireless sensor networks. Here evaluating the performance analysis of Improved Receiver-Centric MAC protocol and Itree-MAC protocol; considering comparing parameters like throughput, reliability and end-to-end delay in different sensor nodes in wireless sensor networks. Comparing MAC, receiver-centric MAC, Improved Receiver-Ce...

Research paper thumbnail of Soft Computing Analysis for Detection of Pancreatic Cancer Using MATLAB

Diagnosis and Prognosis are the two main objection facets taken into consideration for evaluating... more Diagnosis and Prognosis are the two main objection facets taken into consideration for evaluating cancer. The survival of Cancer patients depend upon the diagnosis of Cancer at the early stages (either in Stage I or Stage II). If the cancer diagnosed in Stage III or later stages, the chances of survival of the patient will become more critical. Prognosis will acknowledge the durability arrangement for contrasting aspects i.e., for particular medicine, past as well as future analysis, a more enhanced diagnosis and prognosis, gives exceptional analysis result for Cancer. Current paper presents medical CT scan image feature analysis, creation of data bank to detect the pancreatic cancer at an early stage. A dataset of known pancreas CT scan images with their clinical diagnosis were composed. A special diagnosis tool was used for pancreatic cancer and all images were subjected for image textual characters, which were statistically calculated in numerical MATLAB environment with syntax. ...

Research paper thumbnail of Studies in Indian economic problems : selected essays

Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto REDVET R... more Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto REDVET Rev. electrón. vet.