International Journal of Advances in Engineering Sciences
Not a member yet
    138 research outputs found

    Survey of Energy Efficient Clustering Mechanisms in Wireless Sensor Networks

    Get PDF
    Advancements in wireless communications and Micro-Electro-Mechanical structures have enabled the improvement of wireless sensor networks (WSN), which in flip have fostered the emergence of a plethora of programs in diverse fields together with agriculture, healthcare supervision, and transportation systems. However, because of the strength dilemma of battery-powered sensors, these packages nonetheless face a major energy issue that save you their giant adoption. In this thesis, we contributed to conquer this challenge via several contributions. In this paper we've got surveyed the various techniques to power efficient strategies in wi-fi sensor networks

    Survey of Vertical Handoff Decision Criteria in LTE Cellular Networks

    Get PDF
    Vertical handover advantage brilliant importance because of the upgrades in mobility fashions by way of the Fourth era (4G) technology. A handover desire scheme in LTE networks both based totally on unmarried or multiple criteria. The wide variety of standards is right away depending on the overall handover time. In addition, the time required for deciding on a target network at some point of handover is also extended with the growth in a number of parameters. Conventional handover choice Strategies are specifically based at the unmarried parameter. But, with the advent of heterogeneous Wi-Fi networks, the overall performance of those unmarried parameter choice schemes is highly decreased. Consequently, researchers introduce multirequirements handover selection schemes. those enhancements are restricted to specific situations and for this reason do now not offer help for mounted mobility. Further, numerous schemes are proposed

    Survey on Image intensification using Canny Edge Technique

    Get PDF
    Image Processing is generally done in form of Signal Processing. In this images, pictures, video frame etc are given in Input form and the Output appears with certain set of features or parameters in relation to the input given. Edge Detection using Canny Technique is an set of Mathematical Functions whose main goal is to detect points in the Digital input i.e. image and detect how brightness changes variably , and where are discontinuities. Edge detection is an essential stage in processing the image. Mostly image-processing techniques consider the image as a two-dimensional signal then put standard signal-processing techniques to it. Generally it means Digital Image being processed but analog and digital signals can also be processed

    VANET: Analysis of Black hole Attack using CBR/UDP Traffic Pattern with Hash Function and GPSR Routing Protocol

    Get PDF
    With momentum of time huge development occurred in the field of MANET and VANET. As we know when new technology emerges it came with many advanages but definitely some limitation must be there. In WSN security is one of biggest challenges which we need to tackle to implement adhoc network. Main reason behind this is dynamic topology of sensing node because nodes are dynamic in nature rather than static. As technology came into existence side by side unethical activity also take place which try to access the data illegally to gain personnel profit. There are so many types of attack possibilities are there in adhoc network. Attack can be classified into active and passive. In our research article oue main concern is on black hole attack. According to this attack a malicious node with high priority number is deployed in between other nodes. Now this malicious node access the data and sends acknowledgement to source that data received. Source node will think that acknowledgement is sent by destination node but actually it is sent by malicious node.  In this research article performance analysis of the black hole attack in Vehicular Ad Hoc Network is executed

    EFFICIENT SCALE INVARIENT FEATURE BASED METHOD FOR CROWD LOCALIZATION

    Get PDF
    Visual surveillance has been a very active research topic in the last few decade due to growing importance for security in the public areas. With the increasing number of CCTV networks in public areas, the enhancement in the computing power of modern computers and increase the possibility to entrust an automatic system with the security and the monitoring of events involving large crowds is within reach. Crowd detection and localization in the surveillance video is the first step in automatic crowd monitoring system. The performance of the whole system depends on this step. Detecting the crowd is a challenging task because the crowds come in different shape, size and color, against cluttered background and varying illumination conditions. As the size of the crowd increases managing the crowd becomes more complex

    Vertical Handoff Decision Criteria with LTE Network

    Get PDF
    A handover decision scheme in LTE networks either based on single or multiple criteria. The number of criteria is directly depending on the totalhandovertime.A vertical handover decision algorithm based on the fuzzy control theory. The algorithm takes into consider the factors of Power Level, Cost and Bandwidth. After establishing the membership functions, membership degrees of corresponding factors can be determined, which are processed by the Weight Vector. Finally, the Fuzzy Vertical Handoff Decision Vector is derived and vertical handover decision can be made. It is shown through simulation that the algorithm realizes the optimized vertical handover by evaluating and analyzing various input parameters

    Heat Transfer of slip boundary layer flow of non-Newtonian fluid over a flat plate with Viscous Dissipation

    No full text
    This article numerically studies the effects of viscous dissipation and magnetic effects of an incompressible non-Newtonian power-law fluid over a flat plate convective thermal and slip boundary conditions. The governing boundary layer partial differential equations along with boundary conditions are first cast into a dimensionless form by a similarity transformation and the resulting ordinary differential equations are then solved numerically using implicit finite difference scheme. The solution takes Knudsen number Knx, heat transfer parameter, magnetic field parameter M, power-law fluid index n, Eckert number Ec and Prandtl number Pr effects into consideration. The influence of these parameters governing the flow on non-dimensional velocity and temperature fields are discussed graphically. The variation of the Knudsen number Knx, heat transfer parameter  and Eckert number Ec on the skin friction, temperature at the wall  and the rate of heat transfer  is presented in tabular form

    A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

    No full text
    Compressing an image is significantly different than compressing raw binary data. If we used general or outdated technique to compression images then result would be not optimal as it should be. This is because images have definitely statistical properties which can be triggered or exploited by encoders which are implemented or design for them. In image we have to give up some fine details for the sake of saving a little more bandwidth or storage space. So we can say that lossy compression technology. In this dissertation compression of digital images are done with the help of DCT. Several encoding technique have also been used together with DCT to improve the performance of compression. A computational analysis of picture quality is also made with respect to compression ratio and PSN

    Design of Reversible Barrel Shift Register for Low Power VLSI

    No full text
    Throughout the world, the numbers of hardware designer struggle for the reducing of power dissipation in VLSI systems. In case of designing of low power VLSI systems, the heat or energy is dissipated due to the irreversible or conventional design approach of digital VLSI system at the logical level. In this dissertation, a new approach of designing the digital systems at logical level is discussed. Reversible logics are the logic which does not dissipate the power, uses this concept in designing of digital VLSI system. The reversible logic has the promising applications in emerging computing paradigm such as quantum computing, quantum dot cellular automata, optical computing, etc. In reversible logic gates there is a unique one-to-one mapping between the inputs and outputs. To generate an useful gate function the reversible gates require some constant ancillary inputs called ancilla inputs. Also to maintain the reversibility of the circuits some additional unused outputs are required that are referred as the garbage outputs. The number of ancilla inputs, number of garbage outputs and quantum cost plays an important role in the evaluation of reversible circuits. Thus minimizing these parameters are important for designing an efficient reversible circuit. Barrel shifter is an integral component of many computing systems due to its useful property that it can shift and rotate multiple bits in a single cycle. The main contribution of this thesis is a set of design methodologies for the reversible realization of RBS where the designs are based on the Fredkin gate and the Feynman gate. The Fredkin gate can implement the 2:1 MUX with minimum quantum cost, minimum number of ancilla inputs and minimum number of garbage outputs and the Feynman gate can be used so as to avoid the fanout, as fanout is not allowed in reversible logic. The design methodologies considered in this work targets 1.) Reversible logical right shifter(RLRS), 2.) Reversible universal right shifter(RURS) that supports logical right shift, arithmetic right shift and the right rotate, 3.) Reversible bidirectional logical shifter(RBLS), 4.) Reversible bidirectional arithmetic and logical shifter(RBALS), 5) Reversible universal bidirectional shifter(RUBS) that supports bidirectional logical and arithmetic shift and rotate operation

    An Improved Approach for Wormhole Attack Detection in MANET

    No full text
    Advancement in wireless technologies and improved use ofwireless devices demand more and more infrastructure-less networks likeMobile Ad hoc Networks (MANET). MANETs are becoming common,since they can be deployed easily in a cost effective manner whereverneeded. The high usage of MANET demands more security andconfidentiality of the data communicated through MANET. Thesenetworks are inherently vulnerable to various attacks due to the absence ofconcealed channel. Wormhole attack is a great threat to MANET, as it iscapable of launching several other types of attacks like black-hole attack,gray-hole attack, sink-hole attack, DDoS, etc. A strategically placedwormhole node can disrupt the entire communication in the network [1].In this paper, wormhole attack launched by exploiting AODV protocol inMANET, is detected and eliminated in two phases. The preliminary phasein the process of identifying wormhole attack is done, based on timinganalysis and hop count. After suspecting the attack, a Clustering-basedapproach is used to confirm the presence of attack, and also to identify theattacker nodes. The entire network is divided into different clusters andeach cluster will have a Cluster Head, which controls all the nodes in thecluster and plays the role of a controlling authority in MANET

    6

    full texts

    138

    metadata records
    Updated in last 30 days.
    International Journal of Advances in Engineering Sciences
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇