Rhymend Uthariaraj - Academia.edu (original) (raw)
Papers by Rhymend Uthariaraj
Recently, underwater wireless sensor networks (UWSNs) have emerged as a promising networking tech... more Recently, underwater wireless sensor networks (UWSNs) have emerged as a promising networking technique for various underwater applications. An energy efficient routing protocol plays a vital role in data transmission and practical applications. However, due to the specific characteristics of UWSNs, such as dynamic structure, narrow bandwidth, rapid energy consumption, and high latency, it is difficult to build routing protocols for UWSNs. In this article we focus on surveying existing routing protocols in UWSNs. First, we classify existing routing protocols into two categories based on a route decision maker. Then the performance of existing routing protocols is compared in detail. Furthermore, future research issues of routing protocols in UWSNs are carefully analyzed.
Springer eBooks, 2011
Pervasive computing objective is to merge computing and computing applications into surroundings ... more Pervasive computing objective is to merge computing and computing applications into surroundings instead of having computers as discrete objects. Applications must adjust their behavior to every changing surroundings. Adjustment involves proper capture, management and reasoning of context. Context is represented in a hierarchical form and stored in an object relational database. Context is selected using heuristic pruning method in this
Lecture Notes in Computer Science, 2006
This paper introduces a new load balancing algorithm, called LDMA (Load balancing using Decentral... more This paper introduces a new load balancing algorithm, called LDMA (Load balancing using Decentralized decision making Mobile Agents), which distributes load among clustered web servers connected in a mesh topology, by a communications network and compares its performance with other load balancing algorithm: MALD (Mobile Agent based LoaD balancing). Architecture is developed for the same and all necessary attributes such as load deviation, system throughput and response time incurred as a result of the work are dealt with. In past works, a centralized decision making algorithm was used for dispatching requests to web servers in the distributed client/server environment. In the proposed approach, a decentralized decision making algorithm is used for distributing requests among web servers. The simulator is developed in C++ and its performance is evaluated. The analysis shows that LDMA is better than centralized decision making load balancing algorithms.
... Consider a situation to demonstrate this principle. If an instance of the model based service... more ... Consider a situation to demonstrate this principle. If an instance of the model based service is initialized by user Ajay on his hand held PDA at nine o'clock on Monday morning while walking in a corridor of a building where Classrooms and a Library are located. ...
Indian journal of science and technology, Dec 28, 2016
Objectives: Objective of this work is to explore the available solutions for cloud trust and ther... more Objectives: Objective of this work is to explore the available solutions for cloud trust and thereby to facilitate a rigid solution to address the issue in future. Methods/Statistical Analysis: Cloud Computing caters dynamic resources and on-demand services without the overhead of license, purchase and other traditional IT administration activities. Cloud is not only a buzz word in the industry but, also a most happening technological trend. While the services provided by the Cloud Computing is surplus, concern over the promising aspects are of no doubt. The barricades to cloud implementation in the reality are abundance. Findings: Amongst the barricade to cloud implementation, security and trust are considered to be the foremost issues. Trust is always a worry for the new technologies and also for distributed computing paradigm. Prospective users to Cloud Computing shall be tapped in only if the issue is precisely addressed. Minimizing the investment cost is one of the key features promised by the cloud vendors. Any security compromise towards minimizing the cost is highly intolerable. A trust solution for the Cloud Computing should balance the users worry towards trust as well as the service provision aspect. There are several promising solution to cloud trust problem exists. Application/Improvements: This work weighs some of the solutions to cloud trust and thereby highlights the potential gap between the actual requirement and the real solutions.
Journal of Computer Science, Jul 1, 2011
Problem statement: The databases introduce the digital era the fact that requirement to maintain ... more Problem statement: The databases introduce the digital era the fact that requirement to maintain large and ample data. The growth of information development and improvement that pursued it transformed the databases into a global reality. This study enquired and described the vital role of storing the context data to an appropriate database in the area of context aware computing. It also addson limitations of the existing relational and object relational databases with respect to context aware computing. Approach: This article examines traditional database like relational database, object relational database and spatial database. It helps to make an optimal decision while choosing the database for context aware applications. Results: All the traditional databases are compared with context aware features like semantic support, ease of transaction of large data, query optimization, reasoning support, formality, scalability, spatial data and xml support. Conclusion: This study confirmed that using object relational database along with ontology is more apt for storing the context data for context aware computing applications.
Service-based systems that are dynamically composed at runtime to provide complex, adaptive funct... more Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be managed in an equally adaptive and predictable way. To address this need, we introduce a novel, tool-supported framework for the development of adaptive servicebased systems called QoSMOS (QoS Management and Optimization of Service-based systems). QoSMOS can be used to develop service-based systems that achieve their QoS requirements through dynamically adapting to changes in the system state, environment, and workload. QoSMOS service-based systems translate high-level QoS requirements specified by their administrators into probabilistic temporal logic formulae, which are then formally and automatically analyzed to identify and enforce optimal system configurations. The QoSMOS self-adaptation mechanism can handle reliability and performance-related QoS requirements, and can be integrated into newly developed solutions or legacy systems. The effectiveness and scalability of the approach are validated using simulations and a set of experiments based on an implementation of an adaptive service-based system for remote medical assistance.
Lecture Notes in Computer Science, 2003
... Notes in Computer Science, pp. 535-541. 3. R. Elijah Blessing, V. Rhymend Uthariaraj, LeaSel... more ... Notes in Computer Science, pp. 535-541. 3. R. Elijah Blessing, V. Rhymend Uthariaraj, LeaSel: An Efficient Key Management Model for Scalable Multicast System, in Proc. ICORD 2002, Dec 2002. 4. R. Elijah Blessing, V ...
Grid computing has been cited as one of the potential technologies that can offer mammoth computi... more Grid computing has been cited as one of the potential technologies that can offer mammoth computing power in the future. The greatness of grid technology lies in the efficient harnessing of idle resources of the distributed environment, leading to better resource utilization. Security is one of the key aspects of the grid technology. Secure group communication in the grid is
Embedded systems such as handheld devices don't have the direct printing facility. Whenever ... more Embedded systems such as handheld devices don't have the direct printing facility. Whenever a new system is built it should have a provision to connect to the various devices. Device driver is a program to control a particular device that is connected to your system. This paper presents a complete description of the printer driver for the handheld device, focusing mainly to write a generic printer driver so that the data in the device is sent directly to the printer through universal serial bus. However, it is possible to address a whole family of USB printers (such as HP, Epson, Canon and Lexmark). Previously handheld device had to connect to the printer through personal computer. Now, the device can connect directly to the printer. Mobile printing is the term used for printing from mobile devices such as a Palm handheld, a laptop, a Pocket PC or similar device, directed towards any USB printer. With mobile devices having smaller footprints of memory, display and other resources, the size of the printer driver should be small. To enable quick deployment on all kinds of devices, it should support for portability. The driver must be extensible to allow for future enhancement. The paper covers the complete design aspects and the implementation of the device driver for ARM based devices
... Gunasekaran R, Sumitha P Department of Information Technology Anna University Chennai, Tamiln... more ... Gunasekaran R, Sumitha P Department of Information Technology Anna University Chennai, Tamilnadu, India. ... Hidden Node (HN) allows to transmit but interferes with the receiver causes collision and Exposed Node (EN) does not allows to transmit although they would not ...
Lecture Notes in Computer Science, 2004
F. Bomarius and H. Iida (Eds.): PROFES 2004, LNCS 3009, pp. 185202, 2004. © Springer-Verlag Berl... more F. Bomarius and H. Iida (Eds.): PROFES 2004, LNCS 3009, pp. 185202, 2004. © Springer-Verlag Berlin Heidelberg 2004 ... Measuring the Object-Oriented Properties in Small ... S. Kanmani1, V. Rhymend Uthariaraj2, V. Sankaranarayanan3, and P. Thambidurai1
Social Science Research Network, Jan 27, 2011
ABSTRACT The main goal of Grid Computing (GC) is to aggregate the power of widely distributed res... more ABSTRACT The main goal of Grid Computing (GC) is to aggregate the power of widely distributed resources and provide non-trivial services to users. GC has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications and high performance orientation. In some cases, a few resources may be unavailable at any time, mainly due to the wide range of policies for contributing these resources to the grid. Since high availability is a key requirement in the design and development of grid systems in which resources are heterogeneous and are not continuously available for computation, this paper presents an architecture called ‘Availability-aware Resource Management System’ (ARMS). This architecture distributes the Resource Management (RM) problem among distinct RM servers to exchange information about different resource requirements. In order to address complex RM issues, a framework is proposed for resource allocation and for regulating supply and demand in GC environments.
ABSTRACT Inter-domain routing protocol routes network reachability information between autonomous... more ABSTRACT Inter-domain routing protocol routes network reachability information between autonomous systems (ASs) in the network. Network reachability information contains the details about the neighbors of the ASs and it contains messages used to maintain the connection between ASs. On one hand, given the size and the rapid growth of the Internet, any inter-domain routing protocol should satisfy basic desirable algorithmic properties, such as scalability, robustness and rapid convergence by Griffin, T., and Wilford, G. 1999. On the other hand, for economic reasons inter-domain routing should support policy routing, where Internet service providers (ISPs) have the flexibility to implement a wide variety of private routing policies that ISPs choose not to reveal. Moreover, the routing protocol should provide sufficient information to enable ISPs to make informed policy decisions. Border gateway protocol (BGP) by Goodell, G. et al. (2003) is the inter-domain routing protocol that is currently being used. BGP has a number of problems which includes scalability and large convergence time by Labovitz, C et al. (2000). This paper explains in detail the alternative to BGP which is the hybrid optimized link-state path-vector routing protocol (HLP) [1] and gives a comparison based on the simulation of these protocols. The comparison shows us that HLP overcomes some of the important problems faced in BGP.
International Journal of Communication Networks and Distributed Systems, 2011
Internet has become a worldwide data network that is used for mission critical applications. The ... more Internet has become a worldwide data network that is used for mission critical applications. The global internet implies several important challenges. The first challenge is the size of the internet which grows enormously in a rapid rate. Hence the traffic on the internet work also increases day to day. Traffic engineering is performed by means of a set of techniques that can be used to better control the flow of packets inside an IP network. This paper proposes a throughput optimisation of both inter-and intra-autonomous systems traffic engineering. Also the optimisation concepts are compared by implementing in various strategies such as sequential, nested and integrated techniques.
Wireless Personal Communications, Oct 12, 2011
ABSTRACT The recent advancements in the field of wireless communications makes the mobile devices... more ABSTRACT The recent advancements in the field of wireless communications makes the mobile devices to communicate with each other in a self organized manner without relying on stable infrastructure. It requires cooperation between the mobile devices in order to find routes between them when the nodes are not in the communication range of each other. The misbehaving node comes into existence due to scarcely available resources such as battery, bandwidth and computational power. When the nodes collude to misbehave then it further makes the routing process difficult due to frequent network partitioning and it also degrades the overall network throughput. This paper proposes a Collaborative Polling based Routing Security Scheme to detect and isolate the colluding misbehaving nodes in mobile ad hoc networks. The proposed system employs a timeout approach to detect the active neighbors in the neighborhood before monitoring the transmissions which involves it. It ensures that the false detection of a good node as a bad one has been greatly reduced which in turn decreases the send buffer drop because of the availability of alternate routes. The simulation result shows that the measured parameters such as packet drop ratio and malicious drop has been reduced due to the efficient detection and isolation of misbehaving nodes. This paper also presents an analytical and simulation results of the impact of node misbehavior.
Multimedia Tools and Applications, Nov 14, 2013
The advance of modern network technologies has made Digital TV systems available throughout the w... more The advance of modern network technologies has made Digital TV systems available throughout the world. To provide secure media delivery in Digital TV systems, a large number of messages are exchanged for key updates in the conventional key distributed schemes of conditional access systems (CAS). In this paper, proposed a new multicast key distribution scheme based on Huffman grouping scheme of access control for conditional access system (CAS) in digital television multicast. The proposed key distribution scheme can greatly reduce the computation using fast Fourier transform and acquire higher efficiency and security using extended Euclidean algorithm. With this scheme, only authorized subscribers can watch the subscriber programs correctly. Unauthorized subscribers have no information to retrieve the correct programs over the networks. Moreover, the proposed scheme is more flexible in processing subscribers joining and leaving which is achieved by using Huffman based grouping scheme and is very important for service provider to dynamic manage the subscriber.
Defence Science Journal, Nov 13, 2014
Wireless sensor networks (WSNs) are extensively used in military applications for border area mon... more Wireless sensor networks (WSNs) are extensively used in military applications for border area monitoring, battlefield surveillance, tracking enemy troops, where the sensor nodes run on battery power. Localisation of sensor nodes is extremely important to identify the location of event in military applications for further actions. Existing localisation algorithms consume more energy by heavy computation and communication overheads. The objective of the proposed research is to increase the lifetime of the military sensor networks by reducing the power consumption in each sensor node during localisation. For the state-of-the-art, we propose a novel intelligent unmanned aerial vehicle anchor node (IUAN) with an intelligent arc selection (IAS)-based centralised localisation algorithm, which removes computation cost and reduces communication cost at every sensor node. The IUAN collects the signal strength, distance data from sensor nodes and the central control station (CCS) computes the position of sensor nodes using IAS algorithm. Our approach significantly removes computation cost and reduces communication cost at each sensor node during localisation, thereby radically extends the lifetime and localisation coverage of the military sensor networks.
Information & Software Technology, May 1, 2007
This paper introduces two neural network based software fault prediction models using Object-Orie... more This paper introduces two neural network based software fault prediction models using Object-Oriented metrics. They are empirically validated using a data set collected from the software modules developed by the graduate students of our academic institution. The results are ...
ABSTRACT A major proliferating architecture, that extends its services globally in wireless netwo... more ABSTRACT A major proliferating architecture, that extends its services globally in wireless networks, is ad hoc network, which endows more research areas to work with. In next generation networks, user can be accurately determined and maintained by the network on per-user basis. This paper investigates the design of ad hoc network architecture that exploits user profiles to maximize network efficiency and promote better quality of service by differentiated bandwidth reservation and resource allocation to different classes of users. A model called high-privileged and low-privileged architecture (HPLP) for the forthcoming ad hoc network is proposed through which differentiated services can be achieved for different class of users. A new MAC protocol named as D-MACAW, is also suggested for the proposed architecture. Among the various factors influencing the differentiated services, bandwidth reservation is only considered and different factors that can influence the efficiency of the bandwidth reservation are identified. Two classes of users are considered as high-privileged, a high-cost and efficient service users and low-privileged, low-cost and best effort service users. The differentiated service provided for the different classes of users is proved through simulation analysis. The results obtained using ns2 show that efficient quality of service is guaranteed to users who subscribe high-privileged profile
Recently, underwater wireless sensor networks (UWSNs) have emerged as a promising networking tech... more Recently, underwater wireless sensor networks (UWSNs) have emerged as a promising networking technique for various underwater applications. An energy efficient routing protocol plays a vital role in data transmission and practical applications. However, due to the specific characteristics of UWSNs, such as dynamic structure, narrow bandwidth, rapid energy consumption, and high latency, it is difficult to build routing protocols for UWSNs. In this article we focus on surveying existing routing protocols in UWSNs. First, we classify existing routing protocols into two categories based on a route decision maker. Then the performance of existing routing protocols is compared in detail. Furthermore, future research issues of routing protocols in UWSNs are carefully analyzed.
Springer eBooks, 2011
Pervasive computing objective is to merge computing and computing applications into surroundings ... more Pervasive computing objective is to merge computing and computing applications into surroundings instead of having computers as discrete objects. Applications must adjust their behavior to every changing surroundings. Adjustment involves proper capture, management and reasoning of context. Context is represented in a hierarchical form and stored in an object relational database. Context is selected using heuristic pruning method in this
Lecture Notes in Computer Science, 2006
This paper introduces a new load balancing algorithm, called LDMA (Load balancing using Decentral... more This paper introduces a new load balancing algorithm, called LDMA (Load balancing using Decentralized decision making Mobile Agents), which distributes load among clustered web servers connected in a mesh topology, by a communications network and compares its performance with other load balancing algorithm: MALD (Mobile Agent based LoaD balancing). Architecture is developed for the same and all necessary attributes such as load deviation, system throughput and response time incurred as a result of the work are dealt with. In past works, a centralized decision making algorithm was used for dispatching requests to web servers in the distributed client/server environment. In the proposed approach, a decentralized decision making algorithm is used for distributing requests among web servers. The simulator is developed in C++ and its performance is evaluated. The analysis shows that LDMA is better than centralized decision making load balancing algorithms.
... Consider a situation to demonstrate this principle. If an instance of the model based service... more ... Consider a situation to demonstrate this principle. If an instance of the model based service is initialized by user Ajay on his hand held PDA at nine o'clock on Monday morning while walking in a corridor of a building where Classrooms and a Library are located. ...
Indian journal of science and technology, Dec 28, 2016
Objectives: Objective of this work is to explore the available solutions for cloud trust and ther... more Objectives: Objective of this work is to explore the available solutions for cloud trust and thereby to facilitate a rigid solution to address the issue in future. Methods/Statistical Analysis: Cloud Computing caters dynamic resources and on-demand services without the overhead of license, purchase and other traditional IT administration activities. Cloud is not only a buzz word in the industry but, also a most happening technological trend. While the services provided by the Cloud Computing is surplus, concern over the promising aspects are of no doubt. The barricades to cloud implementation in the reality are abundance. Findings: Amongst the barricade to cloud implementation, security and trust are considered to be the foremost issues. Trust is always a worry for the new technologies and also for distributed computing paradigm. Prospective users to Cloud Computing shall be tapped in only if the issue is precisely addressed. Minimizing the investment cost is one of the key features promised by the cloud vendors. Any security compromise towards minimizing the cost is highly intolerable. A trust solution for the Cloud Computing should balance the users worry towards trust as well as the service provision aspect. There are several promising solution to cloud trust problem exists. Application/Improvements: This work weighs some of the solutions to cloud trust and thereby highlights the potential gap between the actual requirement and the real solutions.
Journal of Computer Science, Jul 1, 2011
Problem statement: The databases introduce the digital era the fact that requirement to maintain ... more Problem statement: The databases introduce the digital era the fact that requirement to maintain large and ample data. The growth of information development and improvement that pursued it transformed the databases into a global reality. This study enquired and described the vital role of storing the context data to an appropriate database in the area of context aware computing. It also addson limitations of the existing relational and object relational databases with respect to context aware computing. Approach: This article examines traditional database like relational database, object relational database and spatial database. It helps to make an optimal decision while choosing the database for context aware applications. Results: All the traditional databases are compared with context aware features like semantic support, ease of transaction of large data, query optimization, reasoning support, formality, scalability, spatial data and xml support. Conclusion: This study confirmed that using object relational database along with ontology is more apt for storing the context data for context aware computing applications.
Service-based systems that are dynamically composed at runtime to provide complex, adaptive funct... more Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be managed in an equally adaptive and predictable way. To address this need, we introduce a novel, tool-supported framework for the development of adaptive servicebased systems called QoSMOS (QoS Management and Optimization of Service-based systems). QoSMOS can be used to develop service-based systems that achieve their QoS requirements through dynamically adapting to changes in the system state, environment, and workload. QoSMOS service-based systems translate high-level QoS requirements specified by their administrators into probabilistic temporal logic formulae, which are then formally and automatically analyzed to identify and enforce optimal system configurations. The QoSMOS self-adaptation mechanism can handle reliability and performance-related QoS requirements, and can be integrated into newly developed solutions or legacy systems. The effectiveness and scalability of the approach are validated using simulations and a set of experiments based on an implementation of an adaptive service-based system for remote medical assistance.
Lecture Notes in Computer Science, 2003
... Notes in Computer Science, pp. 535-541. 3. R. Elijah Blessing, V. Rhymend Uthariaraj, LeaSel... more ... Notes in Computer Science, pp. 535-541. 3. R. Elijah Blessing, V. Rhymend Uthariaraj, LeaSel: An Efficient Key Management Model for Scalable Multicast System, in Proc. ICORD 2002, Dec 2002. 4. R. Elijah Blessing, V ...
Grid computing has been cited as one of the potential technologies that can offer mammoth computi... more Grid computing has been cited as one of the potential technologies that can offer mammoth computing power in the future. The greatness of grid technology lies in the efficient harnessing of idle resources of the distributed environment, leading to better resource utilization. Security is one of the key aspects of the grid technology. Secure group communication in the grid is
Embedded systems such as handheld devices don't have the direct printing facility. Whenever ... more Embedded systems such as handheld devices don't have the direct printing facility. Whenever a new system is built it should have a provision to connect to the various devices. Device driver is a program to control a particular device that is connected to your system. This paper presents a complete description of the printer driver for the handheld device, focusing mainly to write a generic printer driver so that the data in the device is sent directly to the printer through universal serial bus. However, it is possible to address a whole family of USB printers (such as HP, Epson, Canon and Lexmark). Previously handheld device had to connect to the printer through personal computer. Now, the device can connect directly to the printer. Mobile printing is the term used for printing from mobile devices such as a Palm handheld, a laptop, a Pocket PC or similar device, directed towards any USB printer. With mobile devices having smaller footprints of memory, display and other resources, the size of the printer driver should be small. To enable quick deployment on all kinds of devices, it should support for portability. The driver must be extensible to allow for future enhancement. The paper covers the complete design aspects and the implementation of the device driver for ARM based devices
... Gunasekaran R, Sumitha P Department of Information Technology Anna University Chennai, Tamiln... more ... Gunasekaran R, Sumitha P Department of Information Technology Anna University Chennai, Tamilnadu, India. ... Hidden Node (HN) allows to transmit but interferes with the receiver causes collision and Exposed Node (EN) does not allows to transmit although they would not ...
Lecture Notes in Computer Science, 2004
F. Bomarius and H. Iida (Eds.): PROFES 2004, LNCS 3009, pp. 185202, 2004. © Springer-Verlag Berl... more F. Bomarius and H. Iida (Eds.): PROFES 2004, LNCS 3009, pp. 185202, 2004. © Springer-Verlag Berlin Heidelberg 2004 ... Measuring the Object-Oriented Properties in Small ... S. Kanmani1, V. Rhymend Uthariaraj2, V. Sankaranarayanan3, and P. Thambidurai1
Social Science Research Network, Jan 27, 2011
ABSTRACT The main goal of Grid Computing (GC) is to aggregate the power of widely distributed res... more ABSTRACT The main goal of Grid Computing (GC) is to aggregate the power of widely distributed resources and provide non-trivial services to users. GC has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications and high performance orientation. In some cases, a few resources may be unavailable at any time, mainly due to the wide range of policies for contributing these resources to the grid. Since high availability is a key requirement in the design and development of grid systems in which resources are heterogeneous and are not continuously available for computation, this paper presents an architecture called ‘Availability-aware Resource Management System’ (ARMS). This architecture distributes the Resource Management (RM) problem among distinct RM servers to exchange information about different resource requirements. In order to address complex RM issues, a framework is proposed for resource allocation and for regulating supply and demand in GC environments.
ABSTRACT Inter-domain routing protocol routes network reachability information between autonomous... more ABSTRACT Inter-domain routing protocol routes network reachability information between autonomous systems (ASs) in the network. Network reachability information contains the details about the neighbors of the ASs and it contains messages used to maintain the connection between ASs. On one hand, given the size and the rapid growth of the Internet, any inter-domain routing protocol should satisfy basic desirable algorithmic properties, such as scalability, robustness and rapid convergence by Griffin, T., and Wilford, G. 1999. On the other hand, for economic reasons inter-domain routing should support policy routing, where Internet service providers (ISPs) have the flexibility to implement a wide variety of private routing policies that ISPs choose not to reveal. Moreover, the routing protocol should provide sufficient information to enable ISPs to make informed policy decisions. Border gateway protocol (BGP) by Goodell, G. et al. (2003) is the inter-domain routing protocol that is currently being used. BGP has a number of problems which includes scalability and large convergence time by Labovitz, C et al. (2000). This paper explains in detail the alternative to BGP which is the hybrid optimized link-state path-vector routing protocol (HLP) [1] and gives a comparison based on the simulation of these protocols. The comparison shows us that HLP overcomes some of the important problems faced in BGP.
International Journal of Communication Networks and Distributed Systems, 2011
Internet has become a worldwide data network that is used for mission critical applications. The ... more Internet has become a worldwide data network that is used for mission critical applications. The global internet implies several important challenges. The first challenge is the size of the internet which grows enormously in a rapid rate. Hence the traffic on the internet work also increases day to day. Traffic engineering is performed by means of a set of techniques that can be used to better control the flow of packets inside an IP network. This paper proposes a throughput optimisation of both inter-and intra-autonomous systems traffic engineering. Also the optimisation concepts are compared by implementing in various strategies such as sequential, nested and integrated techniques.
Wireless Personal Communications, Oct 12, 2011
ABSTRACT The recent advancements in the field of wireless communications makes the mobile devices... more ABSTRACT The recent advancements in the field of wireless communications makes the mobile devices to communicate with each other in a self organized manner without relying on stable infrastructure. It requires cooperation between the mobile devices in order to find routes between them when the nodes are not in the communication range of each other. The misbehaving node comes into existence due to scarcely available resources such as battery, bandwidth and computational power. When the nodes collude to misbehave then it further makes the routing process difficult due to frequent network partitioning and it also degrades the overall network throughput. This paper proposes a Collaborative Polling based Routing Security Scheme to detect and isolate the colluding misbehaving nodes in mobile ad hoc networks. The proposed system employs a timeout approach to detect the active neighbors in the neighborhood before monitoring the transmissions which involves it. It ensures that the false detection of a good node as a bad one has been greatly reduced which in turn decreases the send buffer drop because of the availability of alternate routes. The simulation result shows that the measured parameters such as packet drop ratio and malicious drop has been reduced due to the efficient detection and isolation of misbehaving nodes. This paper also presents an analytical and simulation results of the impact of node misbehavior.
Multimedia Tools and Applications, Nov 14, 2013
The advance of modern network technologies has made Digital TV systems available throughout the w... more The advance of modern network technologies has made Digital TV systems available throughout the world. To provide secure media delivery in Digital TV systems, a large number of messages are exchanged for key updates in the conventional key distributed schemes of conditional access systems (CAS). In this paper, proposed a new multicast key distribution scheme based on Huffman grouping scheme of access control for conditional access system (CAS) in digital television multicast. The proposed key distribution scheme can greatly reduce the computation using fast Fourier transform and acquire higher efficiency and security using extended Euclidean algorithm. With this scheme, only authorized subscribers can watch the subscriber programs correctly. Unauthorized subscribers have no information to retrieve the correct programs over the networks. Moreover, the proposed scheme is more flexible in processing subscribers joining and leaving which is achieved by using Huffman based grouping scheme and is very important for service provider to dynamic manage the subscriber.
Defence Science Journal, Nov 13, 2014
Wireless sensor networks (WSNs) are extensively used in military applications for border area mon... more Wireless sensor networks (WSNs) are extensively used in military applications for border area monitoring, battlefield surveillance, tracking enemy troops, where the sensor nodes run on battery power. Localisation of sensor nodes is extremely important to identify the location of event in military applications for further actions. Existing localisation algorithms consume more energy by heavy computation and communication overheads. The objective of the proposed research is to increase the lifetime of the military sensor networks by reducing the power consumption in each sensor node during localisation. For the state-of-the-art, we propose a novel intelligent unmanned aerial vehicle anchor node (IUAN) with an intelligent arc selection (IAS)-based centralised localisation algorithm, which removes computation cost and reduces communication cost at every sensor node. The IUAN collects the signal strength, distance data from sensor nodes and the central control station (CCS) computes the position of sensor nodes using IAS algorithm. Our approach significantly removes computation cost and reduces communication cost at each sensor node during localisation, thereby radically extends the lifetime and localisation coverage of the military sensor networks.
Information & Software Technology, May 1, 2007
This paper introduces two neural network based software fault prediction models using Object-Orie... more This paper introduces two neural network based software fault prediction models using Object-Oriented metrics. They are empirically validated using a data set collected from the software modules developed by the graduate students of our academic institution. The results are ...
ABSTRACT A major proliferating architecture, that extends its services globally in wireless netwo... more ABSTRACT A major proliferating architecture, that extends its services globally in wireless networks, is ad hoc network, which endows more research areas to work with. In next generation networks, user can be accurately determined and maintained by the network on per-user basis. This paper investigates the design of ad hoc network architecture that exploits user profiles to maximize network efficiency and promote better quality of service by differentiated bandwidth reservation and resource allocation to different classes of users. A model called high-privileged and low-privileged architecture (HPLP) for the forthcoming ad hoc network is proposed through which differentiated services can be achieved for different class of users. A new MAC protocol named as D-MACAW, is also suggested for the proposed architecture. Among the various factors influencing the differentiated services, bandwidth reservation is only considered and different factors that can influence the efficiency of the bandwidth reservation are identified. Two classes of users are considered as high-privileged, a high-cost and efficient service users and low-privileged, low-cost and best effort service users. The differentiated service provided for the different classes of users is proved through simulation analysis. The results obtained using ns2 show that efficient quality of service is guaranteed to users who subscribe high-privileged profile