oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 367 )

2018 ( 520 )

2017 ( 536 )

2016 ( 769 )

Custom range...

Search Results: 1 - 10 of 325333 matches for " S. Rajaram "
All listed articles are free for downloading (OA Articles)
Page 1 /325333
Display every page Item
SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks  [PDF]
S. Balaji, Y. Harold Robinson, M. Rajaram
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78173
Abstract: Wireless sensor networks applications involve a position of inaccessible metropolitan vicinity en-closed by wireless sensor nodes (WSNs)-monitors environmental parameters like battle field surveillance, home applications like fire alarm, health monitoring, etc. Energy plays a vital role in Wireless sensor networks. So, we have to concentrate more on balanced energy consumption for maximizing the network lifetime. Minimizing the whole network overhead and vigor disbursement coupled with the multi-hop data reclamation process that ensuring balanced energy consumption among SNs which results in prolonged network lifetime. This can be achieved by forwarding the sensed data to their cluster heads and then filtering the data before sending it to their tryst nodes, which is located in proximity to MS’s trajectory. Sleep and awakening of nodes periodically helps to retain their energy for some more time. The events occurring in any part of the network should be identified by the nodes, while arrangements sleep and active among the nodes. (i.e.) the nodes should be scheduled to sleep, so that the outstanding nodes can take care of the whole network. The eXtensible Randomized Matrix Arithmetic Coding (XRMAC) Technique has been used to enhance the security among all the nodes in the network. Simulation results show that our Proposed Scheme can have better Lifetime, improved throughput, reduced delay compared to other existing methods.
ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service  [PDF]
Y. Harold Robinson, S. Balaji, M. Rajaram
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78175
Abstract: Wireless sensor networks consist of many small nodes with distributing devices to monitor conditions at different locations. Usually wireless sensor nodes are sprinkled in a sensor field grouping limited areas. This paper highlights the Enhanced Cluster Based Key management (ECBK) protocol to achieve secure data delivery based on clustering mechanism. This protocol gives more importance to Cluster Coordinator node, which is used to coordinate the members and provide protective communication among the sensor nodes to enhance reliability. In Enhanced Cluster Based Key management two types of nodes are deployed. The high power nodes form clusters with surrounding nodes to enable the routing process without interference. This paper introduces ECBK protocol that balances the load among the clusters, achieves high throughput, end to end delay will be reduced, routing overhead also reduced and also it prolongs the network lifetime. Simulation results show that the presence of high transmission nodes reduces the delay, load balance, routing overhead, and enhances the throughput increased by 45% compared to other similar methods.
Software Process Improvement Through Secured Development Lifecycle
S. Chitra,M. Rajaram
Asian Journal of Information Technology , 2012,
Abstract: This study discusses the software process improvement through Secured Development Lifecycle (or SDL), a process adopted for the development of software that needs to withstand malicious attack. The process encompasses the addition of a series of security-focused activities and deliverables to each of the phases of software development process. These activities and deliverables include the development of threat models during software design, the use of static analysis code-scanning tools during implementation and the conduct of code reviews and security testing during a focused `security push`.
Some Factors Associated with Number of Children Ever Born in Uttar Pradesh : A Comparative Results under Multiple Regression Analysis and Multilevel Analysis
Dwivedi SN,Rajaram S
Indian Journal of Community Medicine , 2004,
Abstract:
Seasonal variabilities of low-latitude mesospheric winds
R. Rajaram,S. Gurubaran
Annales Geophysicae (ANGEO) , 2003,
Abstract: Observations of mesospheric winds over a period of four years with the partial reflection radar at Tirunelveli (8.7°N, 77.8°E), India, are presented in this study. The emphasis is on describing seasonal variabilities in mean zonal and meridional winds in the altitude region 70–98 km. The meridional winds exhibit overall transequatorial flow associated with differential heating in the Northern and Southern Hemispheres. At lower altitudes (70–80 km) the mean zonal winds reveal easterly flow during summer and westerly flow during winter, as expected from a circulation driven by solar forcing. In the higher altitude regime (80–98 km) and at all altitudes during equinox periods, the mean zonal flow is subjected to the semi-annual oscillation (SAO). The interannual variability detected in the occurrence of SAO over Tirunelveli has also been observed in the data sets obtained from the recent UARS satellite mission. Harmonic analysis results over a period of two years indicate the presence of long-period oscillations in the mean zonal wind at specific harmonic periods near 240, 150 and 120 days. Results presented in this study are discussed in the context of current understanding of equatorial wave propagation. Key words. Meteorological and atmospheric dynamics · General circulation · Middle atmosphere dynamics · waves and tides.
A Novel Medium Access Control Protocol for Routing Multimedia Traffic in Optical Networks by exploiting Delays with improved Dynamic Bandwidth Allocation
R. Deepalakshmi,S. Rajaram
ARPN Journal of Systems and Software , 2011,
Abstract: Traditional Medium Access control (MAC) Protocol achieves better performance for the traffic type actually they have been assigned for but inadequate for other traffic types. The prevailing multimedia applications need that the MAC protocol should execute all traffic types unvaryingly. To ensure efficient transmission, an optical network should make use of a MAC protocol to arbitrate access to the shared medium in order to avoid data collisions and at the same time efficiently share the transmission bandwidth among different traffic classes to guarantee the quality of service (QoS).However, the performance of all these schemes is significantly degraded when the round-trip times (RTTs) of the optical network units (ONUs) are dissimilar, due to the large number of gaps in the transmission schedule. Unfortunately, in real networks, RTTs are usually dissimilar. In this paper we propose a new MAC protocol which accommodates a range of multimedia traffic with dissimilar characteristics and QoS demands. The new MAC protocol employs a new algorithm to exploits the RTTs resemblance and restructures the ONUs service order and an additional algorithm to support the requests that cause the minimum scheduling latency.
Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET
A. Rajaram,S Vaithiyalingam
International Journal of Computer Science Issues , 2011,
Abstract: Mobile Ad Hoc Network is a collection of mobile nodes forming an ad hoc network without the assistance of any centralized structures. There are many algorithms to improve data accessibility and reduce delay in MANETs. The basic idea is to distributively group mobile nodes with similar mobility pattern into a cluster, which can then interchangeably share their resources for overhead reduction and load balancing, aiming to achieve efficient and scalable routing in MANET. Due to lack of continues communication Distributed Adaptive Clustering Algorithm (DACA) is proposed to further improve the performance of data accessibility and reduce delay. The experimental results in the NS-2 simulation environment demonstrate that the proposed approach achieves higher delivery ratio and significantly lower overhead compared with its non-clustering counterpart.
A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks
A. Rajaram,S. Palaniswami
International Journal of Computer Science Issues , 2010,
Abstract: In mobile ad hoc networks (MANETs), it is easy to launch wormhole, man-in-the-middle and denial of service (DoS) attacks, or to impersonate another node. Trust based cross layer approach established a network consisting confidentiality and authentication of packets in both routing and link layers., in this paper, we propose to develop an enhanced distributed certificate authority scheme to provide data integrity, thus making the network more secure from both inside and outside attacks. The proposed scheme makes use of Shamir's secret sharing scheme along with a redundancy technique to support certificate renewal and revocation. The malicious nodes are detected by the trusting mechanism by monitoring the behavior hop by hop. By simulation results, we show that the proposed scheme achieves more packet delivery ratio while attaining less delay and overhead, compared with the trust based cross layer approach.
Accomplishing Consummate Throughput with Delay and Power Control in MANET  [PDF]
Dr. K. Saravanan, Dr. S. Silas Sargunam, Dr. M. Rajaram
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78158
Abstract: Mobile Ad Hoc Network is a self-configuring, autonomous, infrastructure less network of movable nodes which will be automatically connected by wireless connection with no access point. The nodes are free to move anywhere in the set of connections and the topology of MANET remains unpredictable. The major complexity with the available two hop relay protocols in MANET environment is to achieve the optimized throughput with reduced packet delivery delay. A generalized collection based two-hop relay and redundancy of the packet is used to attain the reduced delay. The complex process of packet delivery in MANET utilizes Routine Response Control and Modified Markov chain model. Tuning carefully the parameters, the transmission range, the packet redundancy and the group size help to achieve the optimized throughput with the reduced packet delivery delay. Transmission power of a node is controlled which helps in achieving the optimized throughput and reduced delay.
An Automated Semantic Negotiation for Cloud Service Level Agreements  [PDF]
Dr. K. Saravanan, Dr. S. Silas Sargunam, Dr. M. Rajaram
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.79211
Abstract: Mostly, cloud agreements are signed between the consumer and the provider using online click-through agreements. Several issues and conflicts exist in the negotiation of cloud agreement terms due to the legal and ambiguous terms in Service Level Agreements (SLA). Semantic knowledge applied during the formation and negotiation of SLA can overcome these issues. Cloud SLA negotiation consists of numerous activities such as formation of SLA templates, publishing it in registry, verification and validation of SLA, monitoring for violation, logging and reporting and termination. Though these activities are interleaved with each other, semantic synchronization is still lacking. To overcome this, a novel SLA life cycle using semantic knowledge to automate the cloud negotiation has been formulated. Semantic web platform using ontologies is designed, developed and evaluated. The resultant platform increases the task efficiency of the consumer and the provider during negotiation. Precision and recall scores for Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) SLAs were calculated. And it reveals that applying semantic knowledge helps the extraction of meaningful answers from the cloud actors.
Page 1 /325333
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.