Manish Bhardwaj | SRM UNIVERSITY (original) (raw)

Papers by Manish Bhardwaj

Research paper thumbnail of An Adaptive Algorithm to Prevent SQL Injection

American Journal of Networks and Communications, 2015

SQL Injection attacks are one of the top most threats for application written for the web. SQL In... more SQL Injection attacks are one of the top most threats for application written for the web. SQL Injection is a type of attack in which the attacker uses SQL commands to gain access or make changes to data. It allows attacker to obtain unauthorized access to the database to change the intended queries. In the web environment, end user privacy is one of the most controversial legal issues. Using SQL Injection, an attacker can leak confidential information such as credit card no. ATM Pin, User Credentials etc from the web applications or even corrupts the database. An unauthorized access to this much of confidential data by an attacker can threat to user confidentiality. In this paper, we had surveyed existing techniques against SQL Injection and analyzed their advantages and disadvantages and proposed a novel and effective solution to avoid attacks on login phase.

Research paper thumbnail of Optimum Experimental Results of AODV, DSDV & DSR Routing Protocol in Grid Environment

Procedia Computer Science, 2015

Grid computing has migrated from traditional high performance and distributed computing to pervas... more Grid computing has migrated from traditional high performance and distributed computing to pervasive and utility computing based on the advanced capabilities of the wireless networks and the lightweight, thin devices. This has as result the emergence of a new computing paradigm which is the Mobile Grid. This paper presents the simulation results in order to choose the best routing protocol to give the highest performance when implement the routing protocols in the target mobile grid application. This simulation gives the results for three ad hoc routing protocols named DSDV, DSR and AODV. In this paper these results are shown or simulated by Network Simulator (NS 2.34).The simulations have shown that the conventional routing protocols like DSR have a dramatic decrease in performance when mobility is high. However the AODV and DSDV are perform very well when mobility is high.

Research paper thumbnail of Improvement of Lifespan of Ad hoc Network with Congestion Control and Magnetic Resonance Concept

International Conference on Innovative Computing and Communications, 2018

In versatile specially appointed systems, congestion happens with restricted assets. The standard... more In versatile specially appointed systems, congestion happens with restricted assets. The standard TCP blockage control instructions cannot deal with the unique properties of a common remote channel. TCP blockage control works extremely well on the Internet. As it turned out, the incomprehensibly contrasting condition in a versatile specially appointed system is exceedingly hazardous for standard TCP. Many methodologies have been proposed to conquer these troubles. Versatile operator-based blockage control technique is proposed to maintain a strategic distance from blockage in specially appointed system. When portable operator goes into the system, the choice of it is that nodes which are less-stacked and for the same it refreshes the directing table as congestion status. With the help of above Power Efficient Congestion Control Algorithm (PECCA) save the power of the network and with another, wireless power transfer technique which recharge the portable nodes of the network so that ...

Research paper thumbnail of Improving Lifetime of WSNs Using Energy-Efficient Information Gathering Algorithms and Magnetic Resonance

This paper introduce the concept of the energy-efficient Information gathering algorithms for imp... more This paper introduce the concept of the energy-efficient Information gathering algorithms for improving lifetime of WSNs and wirelessly recharge the sensor nodes. Here we have assumed that the sensor nodes and base-station are not mobile. The more over location and initial energy of the sensor nodes is known and number of sensor nodes is randomly distributed over a monitoring region. For the heterogeneity the three types of nodes: a normal, advanced and super node with some fraction in terms of their initial energy has been taken. In this work, we have proposed new distributed energy efficient algorithms PEIPSH and ILBPSH, based on the distance from the base station and sensor residual energy as well as scheduling of sensor nodes to alternate between sleep and active mode. The simulation results shows that the proposed algorithms PEIPSH and ILBPSH balance the energy dissipation over the whole network and improve the network lifetime.

Research paper thumbnail of Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc Network With Optimum Stable Bunching Algorithm

Advances in Wireless Technologies and Telecommunication, 2021

In MANET, every hub is fit for sending message (information) progressively without prerequisite o... more In MANET, every hub is fit for sending message (information) progressively without prerequisite of any fixed framework. Portable hubs oftentimes move in/out from the system powerfully, making arrange topology unsteady in portable specially appointed system (MANET). Therefore, it turns into an incredibly moving errand to keep up stable system. In this chapter, the authors have proposed an upgraded stable bunching calculation that will give greater soundness to the system by limiting the group head changes furthermore, diminishing grouping overhead. In proposed optimum stable bunching calculation (OSBC), another hub is presented which goes about as a reinforcement hub in the bunch. Such reinforcement hub goes about as group head, when real bunch head moves out (or passed on) from the bunch. Last mentioned, the group head reelect another reinforcement hub. This training keeps arrange accessibility without aggravation. Further, the need of group head and reinforcement hub is determined ...

Research paper thumbnail of Performance analysis of mobile ad hoc routing protocols using extensive metrics

International Journal of Knowledge-based and Intelligent Engineering Systems, 2012

A Mobile ad hoc network MANET is an autonomous system of mobile nodes connected by wireless links... more A Mobile ad hoc network MANET is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. Routing is critical issue in MANET. Simulation is the research tool of choice for a majority of the mobile ad hoc networks community. We have conducted survey of simulation results of various MANET routing algorithm and analyzed them. The routing algorithms considered are classified into two categories proactive and reactive. The algorithms considered are AODV, DSDV, DSR, and TORA. Research has shown that these ad-hoc routing protocols work well for MANETs with different characteristics and requirements. In this paper, we investigate how these ad-hoc routing protocols perform in terms of these extensive metrics like Packet delivery fraction, Average end to end delay, Routing load, Data packet loss, Throughput, Simulation time, Transmission range, Terrain range.

Research paper thumbnail of Energy-centric enabling tecumologies for wireless sensor networks

IEEE Wireless Communications, 2002

Distributed networks of thousands of collaborating microsensors promise a maintenancefree, fault-... more Distributed networks of thousands of collaborating microsensors promise a maintenancefree, fault-tolerant platform for gathering rich multidimensional observations of the environment. Because a microsensor node must oper

Research paper thumbnail of Optimization of Network Lifetime with Extreme Lifetime Control Proficient Steering Algorithm and Remote Power Transfer

DEStech Transactions on Computer Science and Engineering, 2018

A versatile Ad-hoc Network for which every hub is free to all hub of the system. In MANETs hub ar... more A versatile Ad-hoc Network for which every hub is free to all hub of the system. In MANETs hub are not having legitimate framework. The power wellspring of the Mobile Ad hoc arrange is battery control. As we as a whole know battery control have a specific point of confinement and reasons. This paper executes the idea of remote power exchange between the hubs of Ad hoc system to exchange the ability to these hubs remotely and utilize the most extreme lifetime control proficient steering Algorithm (ELPSA) to diminish the utilization of energy utilized by the hubs. The remote power exchange can be accomplished with the assistance of one kind of near field methods called magnetic resonance. This system is non radiative in nature. This paper decreases the issue of energy of the specially appointed system hubs about 70 to 80 % from the customary idea utilized for lifetime improvement of these hubs. Execution streamlining can be investigations with the assistance of some vitality productive conventions.

Research paper thumbnail of Prolong Lifespan of Wireless Sensor Network with Optimized Information Compression Algorithm and Magnetic Resonant Concept

Remote sensor systems maintain numerous applications in various fields. Sparing vitality in such ... more Remote sensor systems maintain numerous applications in various fields. Sparing vitality in such systems is continuously a basic issue that should be considered to delay the network lifespan. Bunching in the systems is additionally considered as a vitality sparing directing strategy. This manuscript, propose the two technique by which the vitality problem of a remote sensor can be resolved. In first Strategy, with the help of wireless power transfer recharge all the node of the network and in the second strategy a new information gathering strategy, called firmness technique, keeping in mind the end goal to altogether diminish information transmitting among grouped systems for vitality sparing reason. In the strategy, Wavelet essential is utilized in each group to pack information to be sent to the base-station (BS). At the BS, all the detecting information can be remade in light of the compacted tests gathered from groups. We additionally investigate what’s more, plan the aggregate...

Research paper thumbnail of Power Management of Ad Hoc Routing Protocols Using Mobility Impact and Magnetic Resonance

Advances in Networks

The performance of an ad hoc routing protocol is highly dependent on the mobility model used in t... more The performance of an ad hoc routing protocol is highly dependent on the mobility model used in the ad hoc networks. Most of previous work used only Random Waypoint mobility model, which is unrealistic in many situations. The mobile nodes are often power constrained so that energy conservation is also an important issue on evaluating protocols performance. This issue can be sort out in this paper with the help of two concepts: energy conservation based on different mobility models and concept of wirelessly recharges the networks node. Most of them focused on metrics such as packet delivery ratio, delay, and route optimality. In this paper, three on demand routing protocols AODV, DSR and TORA would be evaluate at power management metrics. These protocols are simulated and compared under three different mobility models: Random Waypoint, RPGM, and Manhattan Grid and various scenarios.

Research paper thumbnail of Enhance Lifespan of WSN Using Power Proficient Data Gathering Algorithm and WPT

DEStech Transactions on Computer Science and Engineering

Manuscript presents the idea of the vitality effective data gathering calculations to enhance the... more Manuscript presents the idea of the vitality effective data gathering calculations to enhance the lifespan of WSNs and remotely revives sensor hubs. Here we make an assumption that the sensor hubs and main-station are not versatile. To make the system heterogeneity three sorts of hubs: Traditional, advance, super hub as far as their underlying vitality has been considered. The manuscript proposed new circulated vitality effective calculations PPDPSH and DLAPSH, in light of the separation from the base station and sensor lingering vitality and also booking of sensor hubs to substitute amongst rest and dynamic mode. This manuscript also introduces another concept for resolving the power problem of WSN is Wireless Power Transfer with Magnetic Resonance concept. The recreation comes about demonstrates that the proposed calculations PPDPSH and DLAPSH adjust the vitality scattering over the entire system and enhance the system lifespan.

Research paper thumbnail of Wireless Power Transmission with Short and Long Range Using Inductive Coil

Wireless Engineering and Technology

In today's time each individual needs remote framework, yet at the same time control transmission... more In today's time each individual needs remote framework, yet at the same time control transmission for low power gadgets are wired in nature. Consistent power supply is one of the real issues in the motivation behind the utilization of remote sensor network. Yet, in the power arrangement of remote Sensor Network, the battery has an extremely constrained lifetime and is not supplanted yet by some other persistent power framework. There are separate techniques proposed for shorter and more separate power transmission: Inductive coupling, resonant inductive coupling and air ionization for short separations; microwave and Laser transmission for longer separations. The pioneer of the field, Tesla endeavoured to make a capable, remote electric transmitter more than a century back that has now observed an exponential development. This paper overall lights up all the effective strategies proposed for transmitting power without wires. This study is important for find out the future ways of power transmission. These methods are so important in today's world because of drastic wastage of power. Common wireless power transmission is a point-to-point control transmission. It was demonstrated that the power transmission effectiveness could approach near 100%.

Research paper thumbnail of Maximization of Lifetime of Wireless Sensor Network with Sensitive Power Dynamic Protocol

International Journal of Engineering & Technology

A vitality effective protocol configuration is a key testing issue in a network of Wireless Senso... more A vitality effective protocol configuration is a key testing issue in a network of Wireless Sensor. A portion of the few existing vitality effective protocols plots dependably forward the bundles through the base vitality based ideal course to the sink to limit vitality utilization. It causes a disturbed dispersion of remaining vitality between sensor nodes, which prompts partitioning of the network. The prime objective of this method is to pass the data packets to destination node through the vitality denser range within Sensor Networks Lifetime. The current procedure Energy Balanced Routing Protocol (EBRP) neglects to accomplish Throughput, Delay part, keeping in mind the end goal to enhance the Network Lifetime and Performance so the proficient steering convention is required with the abilities of both the Power Efficient and Power Balancing. To resolve this problem, this manuscript proposed Impediment Sensitive Power Unbiased Dynamic Routing Protocol (ISPUDRP). The proposed stee...

Research paper thumbnail of Secure Route Selection in Manet Using Ant Colony Optimization

American Journal of Networks and Communications

A Mobile Adhoc network is a collection of nodes that are dynamically and arbitrarily located in s... more A Mobile Adhoc network is a collection of nodes that are dynamically and arbitrarily located in such a manner that the inter connections between nodes are capable of changing on a continual basis. Ad hoc wireless networks are increasing in popularity, because of the spread of laptops, sensor devices, personal digital assistants, and other mobile electronic devices, these devices will eventually need to communicate with each other. For the implementation of MANET, the important factor which is concern is the routing of data from source to destination via various nodes as a mediator due to mobility of mobile nodes. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network topology is u structured and nodes may enter or leave at their will. For mobile ad hoc networks, the complexity of routing increases because of its characteristics such as dynamic topology, absence of centralized authority, time varying quality of service (QoS) requirements, etc. Ant Colony Optimization (ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network. ACO helps in finding the paths between two nodes in a network and selection of path can be changed dynamically according to co dition of the wireless network in case of network congestion.

Research paper thumbnail of Efficient Routing with Reduced Routing Overhead and Retransmission of Manet

American Journal of Networks and Communications

Adhoc network is a collection of mobile nodes that dynamically form a temporary network and are c... more Adhoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure. In manet nodes can change location and configure itself, the mobility of nodes causes continuous link breakage due to which frequent path failure occur and route discovery is required. The fundamental construction for a route discoveries is broadcasting in which the receiver node blindly rebroadcast the first received route request packet unless it has route to the destination. The routing overhead associated with route discovery is very high which leads to poor packet delivery ratio and a high delay to be victorious this type of routing overhead we are proposing the new technique using NCPR. To intended NCPR method is used to determine the rebroadcast order and obtain the more precise additional coverage ratio by sensing neighbor coverage knowledge. We can also define connectivity factor to provide node density adaptation. By combining the additional coverage ratio and connectivity factor, rebroadcast probability is determined. The approach can signify improvement in routing performance and decrease the routing overhead by decreasing the number of retransmission.

Research paper thumbnail of C2 Torus New Interconnection Network Topology Based on 2D Torus

American Journal of Networks and Communications

Mesh and Torus are most popular interconnection topologies based on 2D-mesh. Comparison between M... more Mesh and Torus are most popular interconnection topologies based on 2D-mesh. Comparison between Mesh and Torus will be considered and new interconnection topology will be proposed to provide better performance. The C 2 Mesh is an enhanced mesh interconnected network. This paper enhances the Performance of torus network based on the theme of C 2 Mesh. Topological Properties of new network will be analyzed and implemented by simulation. The new routing Algorithm will be designed for new proposed network (C 2 Torus).

Research paper thumbnail of Selection of Efficient Relay for Energy-Efficient Cooperative Ad Hoc Networks

American Journal of Networks and Communications

The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously t... more The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. This paper identify the challenges in the development of a centralized topology control scheme, named Cooperative Bridges, which reduces transmission power of nodes as well as increases network connectivity. Previous research on topology control with CC only focuses on maintaining the network connectivity, minimizing the transmission power of each node, whereas ignores the energy efficiency of paths in constructed topologies. This may cause inefficient routes and hurt the overall network performance in cooperative ad hoc networks. With the help of studied topology control problem for energy-efficient topology with cooperative communication. This paper proposed optimum relay nodes selection for CC network to reduce overall power consumption of network.

Research paper thumbnail of Ontology Based Fuzzy Query Execution

American Journal of Networks and Communications, 2015

Database engineering has been progressed up to the Relational database stage. Fuzzy information a... more Database engineering has been progressed up to the Relational database stage. Fuzzy information administration in databases is a complex process in view of adaptable information nature and heterogeneous database frameworks. Relational Database Management System (RDBMS) can just handle fresh information but cannot handle precise data information. Structured Query Language (SQL) is a very powerful tool but can handle data which is crisp and precise in nature. It is not able to fulfill the requirements for information which is indeterminate, uncertain, inapplicable and imprecise and vague in nature. The goal of this work is to use Fuzzy technique in RDBMS. But, Fuzzy Relational Database Management System (FRDB) requires complex data structures, in most cases, are dependent on the platform in which they are implemented. A solution that involves representing an FRDB using an Ontology as an interface has been defined to overcome this problem. A new Fuzzy Query Ontology is proposed in this dissertation with implementation. The implementation layer, which is responsible for parsing and translating user requests into the corresponding DB implementations in transparent, is required to establish communication between the Ontology and the relational databases management system (RDBMS). This ontology defines a framework for storing fuzzy data by defining those using classes, slots, and instances. An Ontology is an explicit and formal specification of a conceptualization. Ontologies provides a shared understanding of a domain which allows interoperability between semantics.

Research paper thumbnail of Enhance Life Time of Mobile Ad-hoc Network Using WiTriCity and Backpressure Technique

Procedia Computer Science, 2015

Research paper thumbnail of Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

American Journal of Networks and Communications, 2015

To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud... more To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data uct keyword search. Related works on searchable encryption emphasis on single keyword based search or Boolean keyword based search, and hardly work on sorting the search results. Our work focuses on realizing secure semantic search through query keyword semantic extension. We mix-ups and used architecture of two clouds, explicitly private cloud and public cloud. The search process is distributed into two steps. The leading step develops the question keyword upon warehoused database in the private cloud. The subsequent step uses the drawn-out query keywords set to recover the index on public cloud. Finally the matched files are resumed in order. Complete security analysis shows that our explanation is privacypreserving and secure. Trial evaluation determines the efficiency and effectiveness of the scheme.

Research paper thumbnail of An Adaptive Algorithm to Prevent SQL Injection

American Journal of Networks and Communications, 2015

SQL Injection attacks are one of the top most threats for application written for the web. SQL In... more SQL Injection attacks are one of the top most threats for application written for the web. SQL Injection is a type of attack in which the attacker uses SQL commands to gain access or make changes to data. It allows attacker to obtain unauthorized access to the database to change the intended queries. In the web environment, end user privacy is one of the most controversial legal issues. Using SQL Injection, an attacker can leak confidential information such as credit card no. ATM Pin, User Credentials etc from the web applications or even corrupts the database. An unauthorized access to this much of confidential data by an attacker can threat to user confidentiality. In this paper, we had surveyed existing techniques against SQL Injection and analyzed their advantages and disadvantages and proposed a novel and effective solution to avoid attacks on login phase.

Research paper thumbnail of Optimum Experimental Results of AODV, DSDV & DSR Routing Protocol in Grid Environment

Procedia Computer Science, 2015

Grid computing has migrated from traditional high performance and distributed computing to pervas... more Grid computing has migrated from traditional high performance and distributed computing to pervasive and utility computing based on the advanced capabilities of the wireless networks and the lightweight, thin devices. This has as result the emergence of a new computing paradigm which is the Mobile Grid. This paper presents the simulation results in order to choose the best routing protocol to give the highest performance when implement the routing protocols in the target mobile grid application. This simulation gives the results for three ad hoc routing protocols named DSDV, DSR and AODV. In this paper these results are shown or simulated by Network Simulator (NS 2.34).The simulations have shown that the conventional routing protocols like DSR have a dramatic decrease in performance when mobility is high. However the AODV and DSDV are perform very well when mobility is high.

Research paper thumbnail of Improvement of Lifespan of Ad hoc Network with Congestion Control and Magnetic Resonance Concept

International Conference on Innovative Computing and Communications, 2018

In versatile specially appointed systems, congestion happens with restricted assets. The standard... more In versatile specially appointed systems, congestion happens with restricted assets. The standard TCP blockage control instructions cannot deal with the unique properties of a common remote channel. TCP blockage control works extremely well on the Internet. As it turned out, the incomprehensibly contrasting condition in a versatile specially appointed system is exceedingly hazardous for standard TCP. Many methodologies have been proposed to conquer these troubles. Versatile operator-based blockage control technique is proposed to maintain a strategic distance from blockage in specially appointed system. When portable operator goes into the system, the choice of it is that nodes which are less-stacked and for the same it refreshes the directing table as congestion status. With the help of above Power Efficient Congestion Control Algorithm (PECCA) save the power of the network and with another, wireless power transfer technique which recharge the portable nodes of the network so that ...

Research paper thumbnail of Improving Lifetime of WSNs Using Energy-Efficient Information Gathering Algorithms and Magnetic Resonance

This paper introduce the concept of the energy-efficient Information gathering algorithms for imp... more This paper introduce the concept of the energy-efficient Information gathering algorithms for improving lifetime of WSNs and wirelessly recharge the sensor nodes. Here we have assumed that the sensor nodes and base-station are not mobile. The more over location and initial energy of the sensor nodes is known and number of sensor nodes is randomly distributed over a monitoring region. For the heterogeneity the three types of nodes: a normal, advanced and super node with some fraction in terms of their initial energy has been taken. In this work, we have proposed new distributed energy efficient algorithms PEIPSH and ILBPSH, based on the distance from the base station and sensor residual energy as well as scheduling of sensor nodes to alternate between sleep and active mode. The simulation results shows that the proposed algorithms PEIPSH and ILBPSH balance the energy dissipation over the whole network and improve the network lifetime.

Research paper thumbnail of Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc Network With Optimum Stable Bunching Algorithm

Advances in Wireless Technologies and Telecommunication, 2021

In MANET, every hub is fit for sending message (information) progressively without prerequisite o... more In MANET, every hub is fit for sending message (information) progressively without prerequisite of any fixed framework. Portable hubs oftentimes move in/out from the system powerfully, making arrange topology unsteady in portable specially appointed system (MANET). Therefore, it turns into an incredibly moving errand to keep up stable system. In this chapter, the authors have proposed an upgraded stable bunching calculation that will give greater soundness to the system by limiting the group head changes furthermore, diminishing grouping overhead. In proposed optimum stable bunching calculation (OSBC), another hub is presented which goes about as a reinforcement hub in the bunch. Such reinforcement hub goes about as group head, when real bunch head moves out (or passed on) from the bunch. Last mentioned, the group head reelect another reinforcement hub. This training keeps arrange accessibility without aggravation. Further, the need of group head and reinforcement hub is determined ...

Research paper thumbnail of Performance analysis of mobile ad hoc routing protocols using extensive metrics

International Journal of Knowledge-based and Intelligent Engineering Systems, 2012

A Mobile ad hoc network MANET is an autonomous system of mobile nodes connected by wireless links... more A Mobile ad hoc network MANET is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. Routing is critical issue in MANET. Simulation is the research tool of choice for a majority of the mobile ad hoc networks community. We have conducted survey of simulation results of various MANET routing algorithm and analyzed them. The routing algorithms considered are classified into two categories proactive and reactive. The algorithms considered are AODV, DSDV, DSR, and TORA. Research has shown that these ad-hoc routing protocols work well for MANETs with different characteristics and requirements. In this paper, we investigate how these ad-hoc routing protocols perform in terms of these extensive metrics like Packet delivery fraction, Average end to end delay, Routing load, Data packet loss, Throughput, Simulation time, Transmission range, Terrain range.

Research paper thumbnail of Energy-centric enabling tecumologies for wireless sensor networks

IEEE Wireless Communications, 2002

Distributed networks of thousands of collaborating microsensors promise a maintenancefree, fault-... more Distributed networks of thousands of collaborating microsensors promise a maintenancefree, fault-tolerant platform for gathering rich multidimensional observations of the environment. Because a microsensor node must oper

Research paper thumbnail of Optimization of Network Lifetime with Extreme Lifetime Control Proficient Steering Algorithm and Remote Power Transfer

DEStech Transactions on Computer Science and Engineering, 2018

A versatile Ad-hoc Network for which every hub is free to all hub of the system. In MANETs hub ar... more A versatile Ad-hoc Network for which every hub is free to all hub of the system. In MANETs hub are not having legitimate framework. The power wellspring of the Mobile Ad hoc arrange is battery control. As we as a whole know battery control have a specific point of confinement and reasons. This paper executes the idea of remote power exchange between the hubs of Ad hoc system to exchange the ability to these hubs remotely and utilize the most extreme lifetime control proficient steering Algorithm (ELPSA) to diminish the utilization of energy utilized by the hubs. The remote power exchange can be accomplished with the assistance of one kind of near field methods called magnetic resonance. This system is non radiative in nature. This paper decreases the issue of energy of the specially appointed system hubs about 70 to 80 % from the customary idea utilized for lifetime improvement of these hubs. Execution streamlining can be investigations with the assistance of some vitality productive conventions.

Research paper thumbnail of Prolong Lifespan of Wireless Sensor Network with Optimized Information Compression Algorithm and Magnetic Resonant Concept

Remote sensor systems maintain numerous applications in various fields. Sparing vitality in such ... more Remote sensor systems maintain numerous applications in various fields. Sparing vitality in such systems is continuously a basic issue that should be considered to delay the network lifespan. Bunching in the systems is additionally considered as a vitality sparing directing strategy. This manuscript, propose the two technique by which the vitality problem of a remote sensor can be resolved. In first Strategy, with the help of wireless power transfer recharge all the node of the network and in the second strategy a new information gathering strategy, called firmness technique, keeping in mind the end goal to altogether diminish information transmitting among grouped systems for vitality sparing reason. In the strategy, Wavelet essential is utilized in each group to pack information to be sent to the base-station (BS). At the BS, all the detecting information can be remade in light of the compacted tests gathered from groups. We additionally investigate what’s more, plan the aggregate...

Research paper thumbnail of Power Management of Ad Hoc Routing Protocols Using Mobility Impact and Magnetic Resonance

Advances in Networks

The performance of an ad hoc routing protocol is highly dependent on the mobility model used in t... more The performance of an ad hoc routing protocol is highly dependent on the mobility model used in the ad hoc networks. Most of previous work used only Random Waypoint mobility model, which is unrealistic in many situations. The mobile nodes are often power constrained so that energy conservation is also an important issue on evaluating protocols performance. This issue can be sort out in this paper with the help of two concepts: energy conservation based on different mobility models and concept of wirelessly recharges the networks node. Most of them focused on metrics such as packet delivery ratio, delay, and route optimality. In this paper, three on demand routing protocols AODV, DSR and TORA would be evaluate at power management metrics. These protocols are simulated and compared under three different mobility models: Random Waypoint, RPGM, and Manhattan Grid and various scenarios.

Research paper thumbnail of Enhance Lifespan of WSN Using Power Proficient Data Gathering Algorithm and WPT

DEStech Transactions on Computer Science and Engineering

Manuscript presents the idea of the vitality effective data gathering calculations to enhance the... more Manuscript presents the idea of the vitality effective data gathering calculations to enhance the lifespan of WSNs and remotely revives sensor hubs. Here we make an assumption that the sensor hubs and main-station are not versatile. To make the system heterogeneity three sorts of hubs: Traditional, advance, super hub as far as their underlying vitality has been considered. The manuscript proposed new circulated vitality effective calculations PPDPSH and DLAPSH, in light of the separation from the base station and sensor lingering vitality and also booking of sensor hubs to substitute amongst rest and dynamic mode. This manuscript also introduces another concept for resolving the power problem of WSN is Wireless Power Transfer with Magnetic Resonance concept. The recreation comes about demonstrates that the proposed calculations PPDPSH and DLAPSH adjust the vitality scattering over the entire system and enhance the system lifespan.

Research paper thumbnail of Wireless Power Transmission with Short and Long Range Using Inductive Coil

Wireless Engineering and Technology

In today's time each individual needs remote framework, yet at the same time control transmission... more In today's time each individual needs remote framework, yet at the same time control transmission for low power gadgets are wired in nature. Consistent power supply is one of the real issues in the motivation behind the utilization of remote sensor network. Yet, in the power arrangement of remote Sensor Network, the battery has an extremely constrained lifetime and is not supplanted yet by some other persistent power framework. There are separate techniques proposed for shorter and more separate power transmission: Inductive coupling, resonant inductive coupling and air ionization for short separations; microwave and Laser transmission for longer separations. The pioneer of the field, Tesla endeavoured to make a capable, remote electric transmitter more than a century back that has now observed an exponential development. This paper overall lights up all the effective strategies proposed for transmitting power without wires. This study is important for find out the future ways of power transmission. These methods are so important in today's world because of drastic wastage of power. Common wireless power transmission is a point-to-point control transmission. It was demonstrated that the power transmission effectiveness could approach near 100%.

Research paper thumbnail of Maximization of Lifetime of Wireless Sensor Network with Sensitive Power Dynamic Protocol

International Journal of Engineering & Technology

A vitality effective protocol configuration is a key testing issue in a network of Wireless Senso... more A vitality effective protocol configuration is a key testing issue in a network of Wireless Sensor. A portion of the few existing vitality effective protocols plots dependably forward the bundles through the base vitality based ideal course to the sink to limit vitality utilization. It causes a disturbed dispersion of remaining vitality between sensor nodes, which prompts partitioning of the network. The prime objective of this method is to pass the data packets to destination node through the vitality denser range within Sensor Networks Lifetime. The current procedure Energy Balanced Routing Protocol (EBRP) neglects to accomplish Throughput, Delay part, keeping in mind the end goal to enhance the Network Lifetime and Performance so the proficient steering convention is required with the abilities of both the Power Efficient and Power Balancing. To resolve this problem, this manuscript proposed Impediment Sensitive Power Unbiased Dynamic Routing Protocol (ISPUDRP). The proposed stee...

Research paper thumbnail of Secure Route Selection in Manet Using Ant Colony Optimization

American Journal of Networks and Communications

A Mobile Adhoc network is a collection of nodes that are dynamically and arbitrarily located in s... more A Mobile Adhoc network is a collection of nodes that are dynamically and arbitrarily located in such a manner that the inter connections between nodes are capable of changing on a continual basis. Ad hoc wireless networks are increasing in popularity, because of the spread of laptops, sensor devices, personal digital assistants, and other mobile electronic devices, these devices will eventually need to communicate with each other. For the implementation of MANET, the important factor which is concern is the routing of data from source to destination via various nodes as a mediator due to mobility of mobile nodes. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network topology is u structured and nodes may enter or leave at their will. For mobile ad hoc networks, the complexity of routing increases because of its characteristics such as dynamic topology, absence of centralized authority, time varying quality of service (QoS) requirements, etc. Ant Colony Optimization (ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network. ACO helps in finding the paths between two nodes in a network and selection of path can be changed dynamically according to co dition of the wireless network in case of network congestion.

Research paper thumbnail of Efficient Routing with Reduced Routing Overhead and Retransmission of Manet

American Journal of Networks and Communications

Adhoc network is a collection of mobile nodes that dynamically form a temporary network and are c... more Adhoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure. In manet nodes can change location and configure itself, the mobility of nodes causes continuous link breakage due to which frequent path failure occur and route discovery is required. The fundamental construction for a route discoveries is broadcasting in which the receiver node blindly rebroadcast the first received route request packet unless it has route to the destination. The routing overhead associated with route discovery is very high which leads to poor packet delivery ratio and a high delay to be victorious this type of routing overhead we are proposing the new technique using NCPR. To intended NCPR method is used to determine the rebroadcast order and obtain the more precise additional coverage ratio by sensing neighbor coverage knowledge. We can also define connectivity factor to provide node density adaptation. By combining the additional coverage ratio and connectivity factor, rebroadcast probability is determined. The approach can signify improvement in routing performance and decrease the routing overhead by decreasing the number of retransmission.

Research paper thumbnail of C2 Torus New Interconnection Network Topology Based on 2D Torus

American Journal of Networks and Communications

Mesh and Torus are most popular interconnection topologies based on 2D-mesh. Comparison between M... more Mesh and Torus are most popular interconnection topologies based on 2D-mesh. Comparison between Mesh and Torus will be considered and new interconnection topology will be proposed to provide better performance. The C 2 Mesh is an enhanced mesh interconnected network. This paper enhances the Performance of torus network based on the theme of C 2 Mesh. Topological Properties of new network will be analyzed and implemented by simulation. The new routing Algorithm will be designed for new proposed network (C 2 Torus).

Research paper thumbnail of Selection of Efficient Relay for Energy-Efficient Cooperative Ad Hoc Networks

American Journal of Networks and Communications

The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously t... more The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. This paper identify the challenges in the development of a centralized topology control scheme, named Cooperative Bridges, which reduces transmission power of nodes as well as increases network connectivity. Previous research on topology control with CC only focuses on maintaining the network connectivity, minimizing the transmission power of each node, whereas ignores the energy efficiency of paths in constructed topologies. This may cause inefficient routes and hurt the overall network performance in cooperative ad hoc networks. With the help of studied topology control problem for energy-efficient topology with cooperative communication. This paper proposed optimum relay nodes selection for CC network to reduce overall power consumption of network.

Research paper thumbnail of Ontology Based Fuzzy Query Execution

American Journal of Networks and Communications, 2015

Database engineering has been progressed up to the Relational database stage. Fuzzy information a... more Database engineering has been progressed up to the Relational database stage. Fuzzy information administration in databases is a complex process in view of adaptable information nature and heterogeneous database frameworks. Relational Database Management System (RDBMS) can just handle fresh information but cannot handle precise data information. Structured Query Language (SQL) is a very powerful tool but can handle data which is crisp and precise in nature. It is not able to fulfill the requirements for information which is indeterminate, uncertain, inapplicable and imprecise and vague in nature. The goal of this work is to use Fuzzy technique in RDBMS. But, Fuzzy Relational Database Management System (FRDB) requires complex data structures, in most cases, are dependent on the platform in which they are implemented. A solution that involves representing an FRDB using an Ontology as an interface has been defined to overcome this problem. A new Fuzzy Query Ontology is proposed in this dissertation with implementation. The implementation layer, which is responsible for parsing and translating user requests into the corresponding DB implementations in transparent, is required to establish communication between the Ontology and the relational databases management system (RDBMS). This ontology defines a framework for storing fuzzy data by defining those using classes, slots, and instances. An Ontology is an explicit and formal specification of a conceptualization. Ontologies provides a shared understanding of a domain which allows interoperability between semantics.

Research paper thumbnail of Enhance Life Time of Mobile Ad-hoc Network Using WiTriCity and Backpressure Technique

Procedia Computer Science, 2015

Research paper thumbnail of Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

American Journal of Networks and Communications, 2015

To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud... more To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data uct keyword search. Related works on searchable encryption emphasis on single keyword based search or Boolean keyword based search, and hardly work on sorting the search results. Our work focuses on realizing secure semantic search through query keyword semantic extension. We mix-ups and used architecture of two clouds, explicitly private cloud and public cloud. The search process is distributed into two steps. The leading step develops the question keyword upon warehoused database in the private cloud. The subsequent step uses the drawn-out query keywords set to recover the index on public cloud. Finally the matched files are resumed in order. Complete security analysis shows that our explanation is privacypreserving and secure. Trial evaluation determines the efficiency and effectiveness of the scheme.