41 research outputs found

    Impact of malicious node on secure incentive based advertisement distribution (SIBAD) in VANET

    Get PDF
    Last decade has seen an increasing demand for vehicle aided data delivery. This data delivery has proven to be beneficial for vehicular communication. The vehicular network provisions safety, warning and infotainment applications. Infotainment applications have attracted drivers and passengers as it provides location based entertainment services, a value add to the traveling experience. These infotainment messages are delivered to the nearby vehicles in the form of advertisements. For every advertisement disseminated to its neighboring vehicle, an incentive is awarded to the forwarder. The incentive based earning foresee a security threat in the form of a malicious node as it hoards the incentives, thus are greedy for earning incentives. The malicious behavior of the insider has an adverse effect on the incentive based advertisement distribution approach. In this paper, we have identified the malicious nodes and analyzed its effect on incentive based earning for drivers in vehicular networks. © 2017 IEEE

    An Efficient Storage Mechanism to Distribute Disk Load in a VoD Server

    Get PDF
    In this paper, a storage mechanism is devised to balance the load and to provide immediate service to the clients with a start-up delay of 2ms to 7 ms. The video storage is based on the probability of the clients requesting for the video. Videos with higher probability of being requested are stored and replicated to ensure guaranteed retrieval. Parity generation scheme is employed to provide reliability to non-popular videos. The system is also capable of handling disk failures transparently and thereby providing a reliable service to the clients

    Newer drugs for the treatment of hepatitis B viral infection

    Get PDF
    One of the main disadvantages of hepatitis B virus treatment is the persistence of the virus even after treatment. The main causes of this viral persistence can be an inadequacy of the immune function as well as some viral factors. The currently available drugs for hepatitis B are five oral nucleoside/nucleotide analogs (lamivudine, adefovir dipivoxil, tenofovir, entecavir, telbivudine) and two interferon drugs (interferon alfa-2b, pegylated interferon alfa-2a). However, these therapies do not lead to sustained remission, requiring indefinite treatment as viral load frequently rebounds once suppressive therapy is stopped

    An Integrated Quality-of-Service Model for Video-on-Demand Application.

    Get PDF
    The tremendous growth of the Internet paradigm has given rise to Quality of Service (QoS) problems in heterogeneous, ubiquitous, distributed real time applications such as video-on-Demand (VoD). The challenging task in VoD applications is to satisfy diverse client requests for discrete videos with restrained resources by invoking versatile QoS schemes. In this paper, a hybrid QoS strategy, which is a combination of batching and recursive patching is implemented in the local server to ensure starvation-free resource management thereby enhancing the throughput. Batching shares network resources efficiently whereas recursive patching is adopted to reduce the time difference between the requests. The suggested algorithm delivers the complete video to the users based on one of the three communication channels: broadcast, multicast and unicast depending on whether the video is very popular, average popular and least popular respectively. The experimental results show that our strategy accomplishes 35% - 40% reduction in terms of blocking ratio and throughput is 10% - 15% higher than the Poon’s strategy, which guarantees that not only the resources are efficiently utilized but also a suitable Quality of Service is provided to each user

    A convenient and eco-friendly one-pot synthesis of 3-triazolyl-2-iminochromenes and investigation of their antioxidant properties

    Get PDF
    A simple, green and efficient procedure for the synthesis of highly functionalized 3-triazolyl-2-iminochromenes by using a one-pot three component reaction of 2-azido acetonitrile, phenylacetylene and salicylaldehyde in water using CuI/K2CO3 is described. The present protocol offers advantages like high atom economy, simple methodology, shorter reaction time, easy product isolation, no chromatographic purification and avoidance of environmentally hazardous solvents. Compounds 4a-d, 4g-h and 6a-b have been investigated for antioxidant activity. Compound 4c is found to be the most active among the series showing high reducing power and free radical scavenging activity

    Design of Techniques to Enhance the Services for Mobile Video-on-Demand Applications

    Get PDF
    The current generation of mobile clients have incessant demand for services. Providing Video-on-Demand (VoD) services to these clients require a new paradigm. This paper presents an architecture for Mobile Video-on-Demand. Several schemes that reduces the load on the video server, thereby increasing the number of requests that need to be served is proposed. The Distributed Indexing reduces the storage load on the server and reduces the time to search for a video. The Chaining Technique increases the acceptance of requests and thereby reduces the rejection rate. Two types of hand-offs are defined :Video Server Hand-off and a Client Hand-off. These provide the continuity of services to the mobile clients. The Windowing Scheme which includes Session Management is proposed. This scheme control the flow of segments. All these schemes have been simulated and the results are presente

    SOM based Face Recognition using Steganography and DWT Compression Techniques

    Get PDF
    Biometrics is used in day to day life of human beings to access mobile phones, computers, vehicles etc. In this paper, we propose SOM based Face Recognition using Steganography and DWT Compression Techniques. The various available standard face databases such as ORL, JAFFE, NRI, YALE, Indian male and Indian female are used to test the performance of the algorithm. The number of face images per person is reduced using stenography compression technique. The preprocessing techniques such as resize and Gaussian filter are applied on reduced number of face images for uniform size and good quality of images. The initial features are extracted using Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The DWT and LBP features are fused using arithmetic additions and connected to input of Self Organizing Map (SOM). The final features are extracted from SOM. The test image features are compared with face database images using Euclidian Distance (ED) to compute performance parameters. It is observed that the performance of the proposed method is better than the existing methods
    corecore