17 research outputs found

    Dynamic and Efficient Routing Algorithm for Multi-Sink Wireless Sensor Networks

    Get PDF
    ABSTRACT: Sensor networks are dense wireless networks where information is gathered by sensor elements spread out in an interest area. Wireless sensors applications cover large fields such as surveillance and security, target tracking, agriculture, health and military purposes. As wireless sensor network protocols are application specific. The three main categories explored are data-centric, hierarchical and location-based. Each of the routing schemes and algorithms has the common objective of trying to get better throughput and to extend the lifetime of the sensor network. The key objective of the proposed mechanism is to achieve traffic-balancing by detecting the congested areas along the route and distributing the packets along the paths that have idle and under loaded nodes

    Detection and Prevention of Data Hacking in Net Banking Using Visual Cryptography Technique

    Get PDF
    ABSTRACT: In net banking system it is not guaranteed that every transaction will be carried out very much securely because of increasing the problem of hacking the data of authorized users. To provide security to such types of hacking activities in this project it aims to achieve the authenticity by visual cryptography technique namely 2 out of 2 scheme technique. It takes scanned signature image as an input. While creating new bank account, the bank will generate splits then bank will be given one split to user and another will be stored in bank database. The user needs to present the split during every transactions then the stacking of splits will be taking place. Decision of access granted or denied will be confirmed based on comparison of stacked and original image. If both are same then it will be confirmed that the user is authorized user otherwise unauthorized user

    A Survey of Clustering In Mobile Ad-Hoc Networks

    Get PDF
    ABSTRACT: An ad-hoc network is used to establish a connection wirelessly in a network without any routers or access points. When there is a large network, the complexity to gather the routing information increases. In such a case, the clustering techniques are much useful in reducing the complexity. This paper discusses the use of clustering and its techniques in mobile ad-hoc networks

    Recovery of Chromium from Ferrochrome Slag

    Get PDF
    ABSTRACT: Ferrochrome slag generated from alumino-thermi method piles up in large quantities poses many problems to the environment and contaminates ground water on long run, needs to be addressed very urgently. It principally contains chromium, alumina, Iron, magnesium, calcium in small quantities. This paper deals with extraction of chromium and renders the slag harmless. In this paper industrial waste was collected from GTS industries and used in the subsequent experimentation. Ferrochrome slag is treated with lime to conduct slag-lime solid-solid reaction. Chromium present in the slag reacts with lime to form mixed chromates. The reaction is conducted at 973K, soluble chromium ion was extracted with water and is subsequently separated by adsorbing fly ash based zeolite which can be recovered. The recovery of chromium metal in the slag is 64%. The method is viable for the commercial recovery of chromium from slag

    AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE

    No full text
    Abstract: MANETs are the set of small, low infrastructure communication setup that operates by consuming the energy of batteries. Thus, it is very much important for MANETs to perform efficiently. For efficient transmission, routing is of much concerned and should be performed intelligently. For this, artificial intelligence can be used to select the most optimized path. In this paper, optimized path is termed to path with no congestion. Thus, in the paper, we have proposed an artificial intelligence based on demand routing protocol (AIBODR) that eliminates the congestion in MANETs and applies the concept of artificial intelligence for selection of optimized path and also it solves the issues regarding congestion. We have used the NS-2 simulator for performing simulation regarding routing and MATLAB for artificial intelligence analysis

    A Fusion Sorting Technique Using Multithreading Approach

    No full text
    ABSTRACT: Sorting is one of the most common operations performed by computers especially in database applications where uploading is done by sorting transactions and merging them with a master file. People prefer relevant data to be sorted before wading through various pages of data. It is ubiquitous in engineering applications in all disciplines. There is only one basic strategy of sorting but the variations are of a great number. Algorithms like bubble sort remain favorite of people especially beginners as they first strike their mind when they sort not keeping in mind the factors such as time complexity which will be discussed extensively in our paper. Here we have discussed a few sorting algorithms with their complexities and have proposed a fusion method of sorting which uses the popular bubble sort in combination with merge sort using the multi-threading approach

    Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems

    No full text
    Abstract Increasing smart phone penetration combined with the wide coverage of cellular infrastructures, renders smart phone based traffic information systems (TISs) an attractive option. The main purpose of such systems is to alleviate traffic congestion that exists in every major city. Nevertheless, to reap the benefits of smart phonebased TISs, we need to ensure their security and privacy and their effectiveness (e.g., accuracy). This is the motivation of this paper: We leverage state-of-theart cryptographic schemes and readily available telecommunication infrastructure. We present a comprehensive solution for smart phone-based traffic estimation that is proven to be secure and privacy preserving. We provide a full-blown implementation on actual smart phones, along with an extensive assessment of its accuracy and efficiency. Our results confirm that smart phone-based TISs can offer accurate traffic state estimation while being secure and privacy preserving. Traffic congestion deteriorates the quality of life of citizens and contributes significantly to environmental pollution and economic loss. Traffic information systems (TISs)aim at solving this problem by collecting traffic data, producing traffic estimates, and providing drivers with location-specific information. The increasing smart phone penetration, along with the wide coverage of cellular networks, defines an unprecedented large-scale network of sensors, with extensive spatial and temporal coverage, able to serve as traffic probes for TISs. This is a task that cannot be achieved only by relying on the security of the mobile-to-cellular infrastructure communication

    Voxel-based Representation, Display and Thickness Analysis of Intricate Shapes Abstract

    No full text
    This paper presents a novel voxel-based representation scheme coupled with voxelisation, display and geometric algorithms for the purpose of thickness analysis of very complex free form shapes. The binary voxel model is stored as a stack of voxel layers represented as bit-arrays. Polygonal solid models obtained from a CAD system or 3D scanning are converted into voxel format with a maximum resolution of 1000 (overall volume of 1 billion voxels) in less than 2 minutes. Near realtime visualization of the voxel model is achieved by direct point rendering using a look-up table based on a finite set of neighbour voxel configurations. This gives better images than simple cube face display that has blocky appearance. Geometric computation functions have been developed to perform thickness analysis in terms of cross-sectional visualisation, progressive skin removal and radiography with minimum, maximum and total thickness along an orthographic direction. Testing of the algorithms for intricate shapes like a Ganesha idol, pelvic bone and cylinder block gave satisfactory results. The voxel based framework can be coupled to a standard CAD system, providing additional capabilities to product designers. Keywords: Voxel, Solid modeling, Geometric reasoning, Computer-Aided Design. 1
    corecore