V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering
|
|
- Randolph Campbell
- 5 years ago
- Views:
Transcription
1 V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : International Journals : Sl. Name of the Title of the paper Impact No, Journal Name No Faculty Member published Factor Issue No, Year Manuscript No: AeroJ R1 Paper Entitled Large Scale Data Analysis Aeronautical Journal 1 Dr.V.Shunmughavel on Aviation Accident (Updated List 2016). No:121 - Database using (Accepted for Issue:1235 different Data Mining Publication) Jan 2017 Techniques The Aeronautical Journal2 2 Dr.V.Shunmughavel Information Retrieval based on Query Expansion and Latent Semantic Indexing Danish Medical journal in Annexure I Journal (Updated List 2016) Manuscript No: AeroJ R1 Paper Entitled Large Scale Data Analysis Aeronautical Journal 3 Dr.A.B.Arockia on Aviation Accident (Updated List 2016). No:121 - Christopher Database using (Accepted for Issue:1235 different Data Mining Techniques The Aeronautical Journal2 Publication) Jan 2017 Information 4 Retrieval based on Danish Medical journal Dr.A.B.Arockia Query Expansion and in Annexure I Journal Christopher Latent Semantic (Updated List 2016) Indexing EUTOME To 5 Dr.A.B.Arockia Solve Ties in Information Science in October - Christopher Decision Tree Annexure I Journal 2016 Induction Algorithm 6 S.Abirami Reduplication of SSRG International 2.15 May 2017
2 7 S.Abirami Cloud Storage with Encrypted Big Data Identify the Unusual Behaviors of Internet Users By STP Journal Computer Science and SSRG International Journal Computer Science and 2.15 ISSN: May 2017 ISSN:
3 V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : 2016 International Journals : Sl. No Name of the Faculty Member 1 Dr.P.Shanthakumar 2 A.P.V Raghavendra 3 A.Yuvarani 4 Dr.M.Shivakumar 5 Dr.M.Shivakumar 6 Mr.A.P.V.Raghavendra 7 Mr.A.P.V.Raghavendra 8 Mr.A.P.V.Raghavendra Title of the paper published Brain tumor Detection and diagnosis Using ANFIS Classifier Money Saving and Payment Alert Application Enhancing energy efficient sleep scheduling and aggregation approach in wireless LAN A Comparative Study of Various Protocols and their Enhancements in Wireless Sensor Networks Hiding Virtualization From Attacks Vibrant Rule Base Erection and Continuance plot for Ailment Profecy Proficient Pattern Selection for Supervised Tagging Real Time Algorithm for Resources Journal Name International journal of Imaging systems and Technology/Wiley Publication future Innovative Science and Technology/IST Publications Technology and Management Applied Advanced in and and Technology Impact Factor No, Issue No, Year 4,5 June /2 May /6 10/20 4/11
4 9 Mr.A.P.V.Raghavendra 10 Mr.S.Gunasekaran 11 Mr.I.Vasudevan 12 Mr.U.Gowrisankar 13 Mrs.C.Suguna 14 Mr.M.Senthilkumar 15 Ms.M.Mythili 16 Dr.V.Shunmughavel 17 Dr.V.Shunmughavel 18 Dr.V.Shunmughavel migration in cloud Query Based Level Enabling Comparisons for Apathetical Groups Robust Construction of Multiday Itinerary Planning Proficient Pattern Selection for Supervised Tagging Strict Privacy with enhanced Utility Preservation By N,T Closeness Through Microaggregation An Efficient Detection of Selfish nodes Based on Collaborative Contact Based Method Proficient Pattern Selection for Supervised Tagging Vibrant Rule Base Erection and Continuance plot for Ailment Profecy A concept based ontology mapping method for effective retrieval of bio medical documents A Neighbor Based Dynamic Estimate Rebroadcasting Approach for Efficient Routing In Mobile Adhoc Networks Privacy Protection in Personalized Web Search Using Exponential Ratio Technology and and and International Journal of Emerging Trends in Multidisciplinary and and Journal of Medical Imaging and Health Informatics Advanced and Innovative Advanced and Innovative /11 Dec 5/5 4/3 4/3
5 Sl. No V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : - International Journals : Name of the Faculty Member 1 Mr.A.P.V.Raghavendra 2 Mr.A.P.V.Raghavendra 3 Mr.A.P.V.Raghavendra 4 Mr.A.P.V.Raghavendra 5 Mr.A.P.V.Raghavendra Mr.A.P.V.Raghavendra Mr.A.P.V.Raghavendra Mr.A.P.V.Raghavendra Title of the paper published Dynamic Resource privilege with security based Distributed Database Authentication Over Large-scale scrabble in Social Network Authentic Data Provision in Decentralized Disruption-tolerant Military Networks Private Access Control With Random Authentication of Data stored in clouds Novel Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Reputation Based Data Validation Enhanced Utility in Search Log publishing of Infrequent Items Protecting Global Records Sharing with Identity Based Access Control List Proficient Hash Sensitivity Growth for optimized Image Forgery Detection Journal Name Technology Technology Technology Technology Innovative in Information Technology and Web Impact Factor No, Issue No, Year 10/9 September 9/2 June 9 Mr.A.P.V.Raghavendra Tagging based /10
6 10 Mr.A.P.V.Raghavendra 11 Mr.A.P.V.Raghavendra 12 Mr.A.P.V.Raghavendra 13 Mr.A.P.V.Raghavendra 14 Mr.A.P.V.Raghavendra 15 Mr.S.Gunasekaran 16 Mr.I.Vasudevan 17 Ms.C.Anoor Selvi 18 Mr.P.Leveenbose 19 Mr.P.Leveenbose Efficient Web Video Event Categorization Advanced Data Access Scheme in Disruption tolerant Network Self lenient anamoly detection by using give to get in WSN Ensure Security and Scalable Performance in Multiple Relay Networks Authenticating Location Based Skyline Queries in Mobile environment Efficient and secure Router Discover by Stability Link Selection of Neighbors in MANET Feature Selection Algorithm for Supervised and Semisupervised Clustering Feature Selection Algorithm for Supervised and Semisupervised Clustering Hot Topics Perception in Social Network Discovering Probabilistic Frequent Sequential Patterns in Uncertain Databases under Systolic Tree Proficient Hash Sensitivity Growth for Optimized Image forgery Innovative in and Innovative in Innovative in /10 October /10 October 2/11
7 20 Mr.U.Gowrisankar 21 Mr.U.Gowrisankar 22 Mrs.C.Suguna 23 Mrs.R.Kohila 24 Mr.G.S.Pugalendhi Dynamics Chunks Distribution Scheme for Multiservice Load Balancing Using Fibonacci Bases Approach Hop-By-Hop Message Authentication and Wormhole Detection Mechanism in WSN Enhanced detection system for Trust aware P2P communication networks Efficient Resource Management with fault tolerance model for computational grids Detection of Spyware by data mining executable files International Journal Applied and Studies /
ACADEMIC YEAR
INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha
More informationInternational journals of emerging trends & technology in computer science. Volume no 4, issue 1, pp Vol. 4 Issue 6 pp.
Name of the Faculty Title of Paper Name of /Conference Vol.No.,Issu e No.,Page No. ISBN/ISSN No. H- Index/Impac t Factor Year of publication A survey on clustering based feature selection technique algorithm
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationDynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET
Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced
More informationPUBLICATIONS BY THE STAFF Springer Vol 32, Issue 2, Dec Ms.S.Sujatha
PUBLICATIONS BY THE 2009-2010 JOURNAL NAME AND Springer Vol 32, Issue 2, Dec 2009 - Intelligent Agent Based Artificial Immune System for computer security review 2010-2011 Ms.R.Mala JOURNAL NAME AND CIIT
More informationEfficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.
Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J
More informationPrinciples of Ad Hoc Networking
Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationEngineering Project Proposals
Engineering Project Proposals (Wireless sensor networks) Group members Hamdi Roumani Douglas Stamp Patrick Tayao Tyson J Hamilton (cs233017) (cs233199) (cs232039) (cs231144) Contact Information Email:
More informationLocali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall
Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationBiologically-inspired Autonomic Wireless Sensor Networks. Haoliang Wang 12/07/2015
Biologically-inspired Autonomic Wireless Sensor Networks Haoliang Wang 12/07/2015 Wireless Sensor Networks A collection of tiny and relatively cheap sensor nodes Low cost for large scale deployment Limited
More informationPart I: Introduction to Wireless Sensor Networks. Alessio Di
Part I: Introduction to Wireless Sensor Networks Alessio Di Mauro Sensors 2 DTU Informatics, Technical University of Denmark Work in Progress: Test-bed at DTU 3 DTU Informatics, Technical
More informationEfficient rekeying algorithms for WiMAX networks
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:392 400 Published online 30 July 2009 in Wiley InterScience (www.interscience.wiley.com).124 Efficient rekeying algorithms for WiMAX
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationSurvey of MANET based on Routing Protocols
Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing
More informationWSN Based Fire Detection And Extinguisher For Fireworks Warehouse
WSN Based Fire Detection And Extinguisher For Fireworks Warehouse 1 S.Subalakshmi, 2 D.Balamurugan, Abstract-Security is primary concern for everyone. There are many ways to provide security at industries.
More informationVeracity Managing Uncertain Data. Skript zur Vorlesung Datenbanksystem II Dr. Andreas Züfle
Veracity Managing Uncertain Data Skript zur Vorlesung Datenbanksystem II Dr. Andreas Züfle Geo-Spatial Data Huge flood of geo-spatial data Modern technology New user mentality Great research potential
More informationLSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR
More informationBadri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004
Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization
More informationA Secure Transmission of Cognitive Radio Networks through Markov Chain Model
A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,
More informationTwo Improvements of Random Key Predistribution for Wireless Sensor Networks
Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key
More informationMEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering
MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering List of conference papers presented by faculties during the year - S.No. Date Level Name of the Journal/Conference
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationAgenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime
CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A
More informationWireless Device Location Sensing In a Museum Project
Wireless Device Location Sensing In a Museum Project Tanvir Anwar Sydney, Australia Email: tanvir.anwar.australia@gmail.com Abstract Dr. Priyadarsi Nanda School of Computing and Communications Faculty
More informationChapter 1. Introduction
Chapter 1 Introduction Analog radio broadcast has played important roles in modern society during the past decades. The last decade saw great expansions and interconnections of digital information, the
More informationA Wireless Smart Sensor Network for Flood Management Optimization
A Wireless Smart Sensor Network for Flood Management Optimization 1 Hossam Adden Alfarra, 2 Mohammed Hayyan Alsibai Faculty of Engineering Technology, University Malaysia Pahang, 26300, Kuantan, Pahang,
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationA Survey of Autonomic Computing Systems
A Survey of Autonomic Computing Systems Mohammad Reza Nami, Koen Bertels Computer Engineering Laboratory, Delft University of Technology Abstract The evolution of networks and Internet has introduced highly
More informationPerformance Evaluation of a Video Broadcasting System over Wireless Mesh Network
Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless
More informationMesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve
MOTOROLA TECHNOLOGY POSITION PAPER Mesh Networks Decentralized, self-forming, self-healing networks that achieve unprecedented coverage, throughput, flexibility and cost efficiency. Mesh networks technology
More informationA REVIEW OF AD-HOC NETWORK
A REVIEW OF AD-HOC NETWORK Dr. N. Elamathi Asst. Professor, Dept.of Computer Science Trinity college for Women, Namakkal Dt., Tamilnadu, India ABSTRACT ---- This paper focus on the study of Ad hoc network
More informationFrom Shared Memory to Message Passing
From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich
More informationLIST OF PUBLICATIONS FOR Dr. N. MUTHUKUMARAN
LIST OF PUBLICATIONS FOR Dr. N. MUTHUKUMARAN Dr. N. Muthukumaran, B.E., M.E., Ph.D 10/61-3, Azhagan Vilai, Ganapathipuram (Post), Kaniyakumari Distric- 629502, Tamilnadu, INDIA. Phone Number- +91 9952203887.
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationDr.V.Jayaraj Professor
Dr.V.Jayaraj Professor Contact Address : Department of Computer Science and Engineering Bharathidasan University, Khajamalai Campus Tiruchirappalli 620 023 Tamil Nadu, INDIA Employee Number : BDU1621026
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationSCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks. V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala
SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala 07.01.2009 Contents Introduction Related works Design
More informationTopical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities
Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic
More informationSinhgad Technical Education Society's Sinhgad College of Engineering. Vadgaon (Budruk) Off. Sinhgad Road,S.No. 44/1, Year of Passing
Technical Education Society's Vadgaon (Budruk) Off. Road,S.No. 44/1, Prof. Rajaram BE IT pathakgr.scoe@sinhgad.edu 9822400791 Academic Qualification Degree BE Master of PhD Institute Name Name Walch Institue
More informationThis list supersedes the one published in the November 2002 issue of CR.
PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.
More informationInternet of Things Application Practice and Information and Communication Technology
2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) Internet of Things Application Practice and Information and Communication Technology Chen Ning Guangzhou City Polytechnic,
More informationBit Reversal Broadcast Scheduling for Ad Hoc Systems
Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems
More informationSecure Localization in Wireless Sensor Networks: A Survey
Secure Localization in Wireless Sensor Networks: A Survey arxiv:1004.3164v1 [cs.cr] 19 Apr 2010 Waleed Ammar, Ahmed ElDawy, and Moustafa Youssef {ammar.w, aseldawy, moustafa}@alex.edu.eg Computer and Systems
More informationAN OVERVIEW TO COGNITIVE RADIO SPECTRUM SHARING
International Journal of Latest Research in Engineering and Technology (IJLRET) ISSN: 2454-5031 ǁ Volume 2 Issue 2ǁ February 2016 ǁ PP 20-25 AN OVERVIEW TO COGNITIVE RADIO SPECTRUM SHARING Shahu Chikhale
More informationSafeguarding Wireless Service Access
Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech Wireless Service Access Service Access Points Users Wireless Service Access (cont d) Ad Hoc Networking
More informationProfile of Dr.M.SELVI
Name : Dr.M.Selvi Designation : Assistant Professor Department : Electronics and Communication Bapatla College, Bapatla, Andhra Pradesh 522102 e-mail : drselvimunuswamy@gmail.com Scopus ID : 56046397600
More informationFACULTY PROFILE. Period Name of the Organization Designation From To 01 K.S.R.College of Engineering Professor
FACULTY PROFILE 0 Name : Dr.S.Karthikeyan 02. Designation : Professor 03. Date of Joining in this Institution : 108.2004 04. Specialization : Image Processing 05. Experience & Promotion Details (Chronological):
More informationDistance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationEnforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories.
Enforcer 32WE-APP Enforcer 32WE-APP Enforcer 32WE is the first wireless system on the market that is capable to guarantee high performance maximum security wireless protection via the advanced two way
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationISSN Vol.06,Issue.09, October-2014, Pages:
ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute
More informationFaculty Name Title Level Name of Journal ISSN Volume Issue Pages Month Year Academic Year
Faculty Name Title Level Name of Journal ISSN Volume Issue Pages Month Year Academic Year Parminder Kaur Predicting Protein Function using Decisipn Wadhwa Tree Steganography using the Technique of Orderly
More informationELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS)
ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS) DEPARTMENT CHAIR: B. Ross Barmish 407 Olin, 368-2802 E-mail: brb8@po.cwru.edu ASSOCIATE CHAIR FOR UNDERGRADUATE STUDIES Frank Merat 518 Glennan, 368-4572
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and
More informationPacket Classification Methods to Counter Jamming Attacks in Adhoc Networks
Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks P.Ramesh Kumar 1, G.Nageswara Rao 2, P.Rambabu 3 1 Sasi Institute of Technology and Engineering, Tadepalligudem,W.G(dt) 2 Assoc
More informationStudy of 3D Barcode with Steganography for Data Hiding
Study of 3D Barcode with Steganography for Data Hiding Megha S M 1, Chethana C 2 1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64, 2 Assistant
More informationSimulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool
Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab
More informationReputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and Computer Science, University
More informationKnights, Spies, Games and Social Networks
Knights, Spies, Games and Social Networks Mark Wildon 16 February 2010 The Knights and Spies Problem In a room there are 100 people. Each person is either a knight or a spy. Knights always tell the truth,
More informationAn Adaptive Indoor Positioning Algorithm for ZigBee WSN
An Adaptive Indoor Positioning Algorithm for ZigBee WSN Tareq Alhmiedat Department of Information Technology Tabuk University Tabuk, Saudi Arabia t.alhmiedat@ut.edu.sa ABSTRACT: The areas of positioning
More informationAn Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction
, pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,
More informationOptimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer
Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-
More informationImproving Lifetime of WSNs Using Energy-Efficient Information Gathering Algorithms and Magnetic Resonance
Advances in Wireless Communications and Networks 2015; 1(2): 11-16 Published online October 30, 2015 (http://www.sciencepublishinggroup.com/j/awcn) doi: 10.11648/j.awcn.20150102.11 Improving Lifetime of
More informationDistributed Control-as-a-Service with Wireless Swarm Systems"
Distributed Control-as-a-Service with Wireless Swarm Systems" Prof. Rahul Mangharam Director, Real-Time & Embedded Systems Lab Dept. Electrical & Systems Engineering Dept. Computer & Information Science
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationAn Embedding Model for Mining Human Trajectory Data with Image Sharing
An Embedding Model for Mining Human Trajectory Data with Image Sharing C.GANGAMAHESWARI 1, A.SURESHBABU 2 1 M. Tech Scholar, CSE Department, JNTUACEA, Ananthapuramu, A.P, India. 2 Associate Professor,
More informationIsolation Mechanism for Jamming Attack in MANET
Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute
More informationDeveloping an Embedded Digital Twin for HVAC Device Diagnostics
Developing an Embedded Digital Twin for HVAC Device Diagnostics Gianluca Bacchiega R&D manager at I.R.S. ni.com Digital twins are becoming a business imperative, covering the entire lifecycle of an asset
More informationRFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode
International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay
More informationDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING SECAB INSTITUTE OF ENGINEERING & TECHNOLOGY, VIJAYAPUR- 586109. KARNATAKA. INDIA. ----------------------------------------------------------------------------------------------------------------------------------
More informationConstructing K-Connected M-Dominating Sets
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction
More informationEnergy Efficiency for Mica Mode to Improve Network Life Time using Greedy Scheduling Algorithm
IJIRST National Conference on Latest Trends in Networking and Cyber Security March 2017 Energy Efficiency for Mica Mode to Improve Network Life Time using Greedy Scheduling Algorithm S. Kannadhasan 1 M.
More informationDr. Sohail Abbas. Assistant Professor. Department of Computer Science University of Sharjah
Assistant Professor Department of Computer Science University of Sharjah E-Mail: sabbas@sharjah.ac.ae Phone office:+971 (0)65052520 OFFICE Department of Computer Science University of Sharjah, P.O. Box
More informationEvaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models
Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationDYNAMIC ROBOT NETWORKS: A COORDINATION PLATFORM FOR MULTI-ROBOT SYSTEMS
DYNAMIC ROBOT NETWORKS: A COORDINATION PLATFORM FOR MULTI-ROBOT SYSTEMS a dissertation submitted to the department of aeronautics and astronautics and the committee on graduate studies of stanford university
More informationARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu
ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks Chenyang Lu Home Area Network for Smart Energy Connecting power meters, thermostats, HVAC, appliances. Source: AT&T Labs 2 Wireless
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses Announcements Homework #3 is due March 24 Exam in class March 31 Agenda Cross-layer attacks
More informationCurriculum-Vitae. K.Kavitha No. 63, Alangudiar Street, Karaikudi. Mobile: Objective:
K.Kavitha No. 63, Alangudiar Street, Karaikudi. Email:kavitha.urc@gmail.com Mobile: 9443133000 Curriculum-Vitae Objective: To work in a creative, challenging environment where I can constantly learn and
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationSelfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte
More informationEntropy/IP: Uncovering Structure in IPv6 Addresses
Entropy/IP: Uncovering Structure in IPv6 Addresses RIPE 74 - Budapest, 8-12 May 2017 Paweł Foremski, David Plonka, Arthur Berger 1 What s Entropy/IP? A system that automatically learns the syntax of Internet
More informationGAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu
GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationHiRLoc: High-resolution Robust Localization for Wireless Sensor Networks
HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,
More informationAn Introduction to SIMDAT a Proposal for an Integrated Project on EU FP6 Topic. Grids for Integrated Problem Solving Environments
An Introduction to SIMDAT a Proposal for an Integrated Project on EU FP6 Topic Grids for Integrated Problem Solving Environments Martin Hofmann Department of Bioinformatics Fraunhofer Institute for Algorithms
More informationEfficient Peer-to-Peer Belief Propagation
Efficient Peer-to-Peer Belief Propagation Roman Schmidt, Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) 14 th International Conference on Cooperative
More informationWireless in the Real World. Principles
Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse
More informationCalculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node
Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) ABSTRACT A
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationA New Trend of Knowledge Management: A Study of Mobile Knowledge Management
Management Science and Engineering Vol. 8, No. 4, 2014, pp. 1-5 DOI: 10.3968/5786 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org A New Trend of Knowledge Management: A
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationA ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING
A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING Gaurang Mokashi, Hong Huang, Bharath Kuppireddy, and Subin Varghese Klipsch School of Electrical and
More information