V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering

Size: px
Start display at page:

Download "V.S.B. ENGINEERING COLLEGE, KARUR. Department of Computer Science and Engineering"

Transcription

1 V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : International Journals : Sl. Name of the Title of the paper Impact No, Journal Name No Faculty Member published Factor Issue No, Year Manuscript No: AeroJ R1 Paper Entitled Large Scale Data Analysis Aeronautical Journal 1 Dr.V.Shunmughavel on Aviation Accident (Updated List 2016). No:121 - Database using (Accepted for Issue:1235 different Data Mining Publication) Jan 2017 Techniques The Aeronautical Journal2 2 Dr.V.Shunmughavel Information Retrieval based on Query Expansion and Latent Semantic Indexing Danish Medical journal in Annexure I Journal (Updated List 2016) Manuscript No: AeroJ R1 Paper Entitled Large Scale Data Analysis Aeronautical Journal 3 Dr.A.B.Arockia on Aviation Accident (Updated List 2016). No:121 - Christopher Database using (Accepted for Issue:1235 different Data Mining Techniques The Aeronautical Journal2 Publication) Jan 2017 Information 4 Retrieval based on Danish Medical journal Dr.A.B.Arockia Query Expansion and in Annexure I Journal Christopher Latent Semantic (Updated List 2016) Indexing EUTOME To 5 Dr.A.B.Arockia Solve Ties in Information Science in October - Christopher Decision Tree Annexure I Journal 2016 Induction Algorithm 6 S.Abirami Reduplication of SSRG International 2.15 May 2017

2 7 S.Abirami Cloud Storage with Encrypted Big Data Identify the Unusual Behaviors of Internet Users By STP Journal Computer Science and SSRG International Journal Computer Science and 2.15 ISSN: May 2017 ISSN:

3 V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : 2016 International Journals : Sl. No Name of the Faculty Member 1 Dr.P.Shanthakumar 2 A.P.V Raghavendra 3 A.Yuvarani 4 Dr.M.Shivakumar 5 Dr.M.Shivakumar 6 Mr.A.P.V.Raghavendra 7 Mr.A.P.V.Raghavendra 8 Mr.A.P.V.Raghavendra Title of the paper published Brain tumor Detection and diagnosis Using ANFIS Classifier Money Saving and Payment Alert Application Enhancing energy efficient sleep scheduling and aggregation approach in wireless LAN A Comparative Study of Various Protocols and their Enhancements in Wireless Sensor Networks Hiding Virtualization From Attacks Vibrant Rule Base Erection and Continuance plot for Ailment Profecy Proficient Pattern Selection for Supervised Tagging Real Time Algorithm for Resources Journal Name International journal of Imaging systems and Technology/Wiley Publication future Innovative Science and Technology/IST Publications Technology and Management Applied Advanced in and and Technology Impact Factor No, Issue No, Year 4,5 June /2 May /6 10/20 4/11

4 9 Mr.A.P.V.Raghavendra 10 Mr.S.Gunasekaran 11 Mr.I.Vasudevan 12 Mr.U.Gowrisankar 13 Mrs.C.Suguna 14 Mr.M.Senthilkumar 15 Ms.M.Mythili 16 Dr.V.Shunmughavel 17 Dr.V.Shunmughavel 18 Dr.V.Shunmughavel migration in cloud Query Based Level Enabling Comparisons for Apathetical Groups Robust Construction of Multiday Itinerary Planning Proficient Pattern Selection for Supervised Tagging Strict Privacy with enhanced Utility Preservation By N,T Closeness Through Microaggregation An Efficient Detection of Selfish nodes Based on Collaborative Contact Based Method Proficient Pattern Selection for Supervised Tagging Vibrant Rule Base Erection and Continuance plot for Ailment Profecy A concept based ontology mapping method for effective retrieval of bio medical documents A Neighbor Based Dynamic Estimate Rebroadcasting Approach for Efficient Routing In Mobile Adhoc Networks Privacy Protection in Personalized Web Search Using Exponential Ratio Technology and and and International Journal of Emerging Trends in Multidisciplinary and and Journal of Medical Imaging and Health Informatics Advanced and Innovative Advanced and Innovative /11 Dec 5/5 4/3 4/3

5 Sl. No V.S.B. ENGINEERING COLLEGE, KARUR. Department of and Details of Faculty Paper Publications in National and International Journals Academic Year : - International Journals : Name of the Faculty Member 1 Mr.A.P.V.Raghavendra 2 Mr.A.P.V.Raghavendra 3 Mr.A.P.V.Raghavendra 4 Mr.A.P.V.Raghavendra 5 Mr.A.P.V.Raghavendra Mr.A.P.V.Raghavendra Mr.A.P.V.Raghavendra Mr.A.P.V.Raghavendra Title of the paper published Dynamic Resource privilege with security based Distributed Database Authentication Over Large-scale scrabble in Social Network Authentic Data Provision in Decentralized Disruption-tolerant Military Networks Private Access Control With Random Authentication of Data stored in clouds Novel Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Reputation Based Data Validation Enhanced Utility in Search Log publishing of Infrequent Items Protecting Global Records Sharing with Identity Based Access Control List Proficient Hash Sensitivity Growth for optimized Image Forgery Detection Journal Name Technology Technology Technology Technology Innovative in Information Technology and Web Impact Factor No, Issue No, Year 10/9 September 9/2 June 9 Mr.A.P.V.Raghavendra Tagging based /10

6 10 Mr.A.P.V.Raghavendra 11 Mr.A.P.V.Raghavendra 12 Mr.A.P.V.Raghavendra 13 Mr.A.P.V.Raghavendra 14 Mr.A.P.V.Raghavendra 15 Mr.S.Gunasekaran 16 Mr.I.Vasudevan 17 Ms.C.Anoor Selvi 18 Mr.P.Leveenbose 19 Mr.P.Leveenbose Efficient Web Video Event Categorization Advanced Data Access Scheme in Disruption tolerant Network Self lenient anamoly detection by using give to get in WSN Ensure Security and Scalable Performance in Multiple Relay Networks Authenticating Location Based Skyline Queries in Mobile environment Efficient and secure Router Discover by Stability Link Selection of Neighbors in MANET Feature Selection Algorithm for Supervised and Semisupervised Clustering Feature Selection Algorithm for Supervised and Semisupervised Clustering Hot Topics Perception in Social Network Discovering Probabilistic Frequent Sequential Patterns in Uncertain Databases under Systolic Tree Proficient Hash Sensitivity Growth for Optimized Image forgery Innovative in and Innovative in Innovative in /10 October /10 October 2/11

7 20 Mr.U.Gowrisankar 21 Mr.U.Gowrisankar 22 Mrs.C.Suguna 23 Mrs.R.Kohila 24 Mr.G.S.Pugalendhi Dynamics Chunks Distribution Scheme for Multiservice Load Balancing Using Fibonacci Bases Approach Hop-By-Hop Message Authentication and Wormhole Detection Mechanism in WSN Enhanced detection system for Trust aware P2P communication networks Efficient Resource Management with fault tolerance model for computational grids Detection of Spyware by data mining executable files International Journal Applied and Studies /

ACADEMIC YEAR

ACADEMIC YEAR INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha

More information

International journals of emerging trends & technology in computer science. Volume no 4, issue 1, pp Vol. 4 Issue 6 pp.

International journals of emerging trends & technology in computer science. Volume no 4, issue 1, pp Vol. 4 Issue 6 pp. Name of the Faculty Title of Paper Name of /Conference Vol.No.,Issu e No.,Page No. ISBN/ISSN No. H- Index/Impac t Factor Year of publication A survey on clustering based feature selection technique algorithm

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

PUBLICATIONS BY THE STAFF Springer Vol 32, Issue 2, Dec Ms.S.Sujatha

PUBLICATIONS BY THE STAFF Springer Vol 32, Issue 2, Dec Ms.S.Sujatha PUBLICATIONS BY THE 2009-2010 JOURNAL NAME AND Springer Vol 32, Issue 2, Dec 2009 - Intelligent Agent Based Artificial Immune System for computer security review 2010-2011 Ms.R.Mala JOURNAL NAME AND CIIT

More information

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J

More information

Principles of Ad Hoc Networking

Principles of Ad Hoc Networking Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Engineering Project Proposals

Engineering Project Proposals Engineering Project Proposals (Wireless sensor networks) Group members Hamdi Roumani Douglas Stamp Patrick Tayao Tyson J Hamilton (cs233017) (cs233199) (cs232039) (cs231144) Contact Information Email:

More information

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

Biologically-inspired Autonomic Wireless Sensor Networks. Haoliang Wang 12/07/2015

Biologically-inspired Autonomic Wireless Sensor Networks. Haoliang Wang 12/07/2015 Biologically-inspired Autonomic Wireless Sensor Networks Haoliang Wang 12/07/2015 Wireless Sensor Networks A collection of tiny and relatively cheap sensor nodes Low cost for large scale deployment Limited

More information

Part I: Introduction to Wireless Sensor Networks. Alessio Di

Part I: Introduction to Wireless Sensor Networks. Alessio Di Part I: Introduction to Wireless Sensor Networks Alessio Di Mauro Sensors 2 DTU Informatics, Technical University of Denmark Work in Progress: Test-bed at DTU 3 DTU Informatics, Technical

More information

Efficient rekeying algorithms for WiMAX networks

Efficient rekeying algorithms for WiMAX networks SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:392 400 Published online 30 July 2009 in Wiley InterScience (www.interscience.wiley.com).124 Efficient rekeying algorithms for WiMAX

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

WSN Based Fire Detection And Extinguisher For Fireworks Warehouse

WSN Based Fire Detection And Extinguisher For Fireworks Warehouse WSN Based Fire Detection And Extinguisher For Fireworks Warehouse 1 S.Subalakshmi, 2 D.Balamurugan, Abstract-Security is primary concern for everyone. There are many ways to provide security at industries.

More information

Veracity Managing Uncertain Data. Skript zur Vorlesung Datenbanksystem II Dr. Andreas Züfle

Veracity Managing Uncertain Data. Skript zur Vorlesung Datenbanksystem II Dr. Andreas Züfle Veracity Managing Uncertain Data Skript zur Vorlesung Datenbanksystem II Dr. Andreas Züfle Geo-Spatial Data Huge flood of geo-spatial data Modern technology New user mentality Great research potential

More information

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

Two Improvements of Random Key Predistribution for Wireless Sensor Networks

Two Improvements of Random Key Predistribution for Wireless Sensor Networks Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key

More information

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering List of conference papers presented by faculties during the year - S.No. Date Level Name of the Journal/Conference

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A

More information

Wireless Device Location Sensing In a Museum Project

Wireless Device Location Sensing In a Museum Project Wireless Device Location Sensing In a Museum Project Tanvir Anwar Sydney, Australia Email: tanvir.anwar.australia@gmail.com Abstract Dr. Priyadarsi Nanda School of Computing and Communications Faculty

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Analog radio broadcast has played important roles in modern society during the past decades. The last decade saw great expansions and interconnections of digital information, the

More information

A Wireless Smart Sensor Network for Flood Management Optimization

A Wireless Smart Sensor Network for Flood Management Optimization A Wireless Smart Sensor Network for Flood Management Optimization 1 Hossam Adden Alfarra, 2 Mohammed Hayyan Alsibai Faculty of Engineering Technology, University Malaysia Pahang, 26300, Kuantan, Pahang,

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

A Survey of Autonomic Computing Systems

A Survey of Autonomic Computing Systems A Survey of Autonomic Computing Systems Mohammad Reza Nami, Koen Bertels Computer Engineering Laboratory, Delft University of Technology Abstract The evolution of networks and Internet has introduced highly

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Mesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve

Mesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve MOTOROLA TECHNOLOGY POSITION PAPER Mesh Networks Decentralized, self-forming, self-healing networks that achieve unprecedented coverage, throughput, flexibility and cost efficiency. Mesh networks technology

More information

A REVIEW OF AD-HOC NETWORK

A REVIEW OF AD-HOC NETWORK A REVIEW OF AD-HOC NETWORK Dr. N. Elamathi Asst. Professor, Dept.of Computer Science Trinity college for Women, Namakkal Dt., Tamilnadu, India ABSTRACT ---- This paper focus on the study of Ad hoc network

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

LIST OF PUBLICATIONS FOR Dr. N. MUTHUKUMARAN

LIST OF PUBLICATIONS FOR Dr. N. MUTHUKUMARAN LIST OF PUBLICATIONS FOR Dr. N. MUTHUKUMARAN Dr. N. Muthukumaran, B.E., M.E., Ph.D 10/61-3, Azhagan Vilai, Ganapathipuram (Post), Kaniyakumari Distric- 629502, Tamilnadu, INDIA. Phone Number- +91 9952203887.

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Dr.V.Jayaraj Professor

Dr.V.Jayaraj Professor Dr.V.Jayaraj Professor Contact Address : Department of Computer Science and Engineering Bharathidasan University, Khajamalai Campus Tiruchirappalli 620 023 Tamil Nadu, INDIA Employee Number : BDU1621026

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks. V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala

SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks. V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala 07.01.2009 Contents Introduction Related works Design

More information

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic

More information

Sinhgad Technical Education Society's Sinhgad College of Engineering. Vadgaon (Budruk) Off. Sinhgad Road,S.No. 44/1, Year of Passing

Sinhgad Technical Education Society's Sinhgad College of Engineering. Vadgaon (Budruk) Off. Sinhgad Road,S.No. 44/1, Year of Passing Technical Education Society's Vadgaon (Budruk) Off. Road,S.No. 44/1, Prof. Rajaram BE IT pathakgr.scoe@sinhgad.edu 9822400791 Academic Qualification Degree BE Master of PhD Institute Name Name Walch Institue

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Internet of Things Application Practice and Information and Communication Technology

Internet of Things Application Practice and Information and Communication Technology 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) Internet of Things Application Practice and Information and Communication Technology Chen Ning Guangzhou City Polytechnic,

More information

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Bit Reversal Broadcast Scheduling for Ad Hoc Systems Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems

More information

Secure Localization in Wireless Sensor Networks: A Survey

Secure Localization in Wireless Sensor Networks: A Survey Secure Localization in Wireless Sensor Networks: A Survey arxiv:1004.3164v1 [cs.cr] 19 Apr 2010 Waleed Ammar, Ahmed ElDawy, and Moustafa Youssef {ammar.w, aseldawy, moustafa}@alex.edu.eg Computer and Systems

More information

AN OVERVIEW TO COGNITIVE RADIO SPECTRUM SHARING

AN OVERVIEW TO COGNITIVE RADIO SPECTRUM SHARING International Journal of Latest Research in Engineering and Technology (IJLRET) ISSN: 2454-5031 ǁ Volume 2 Issue 2ǁ February 2016 ǁ PP 20-25 AN OVERVIEW TO COGNITIVE RADIO SPECTRUM SHARING Shahu Chikhale

More information

Safeguarding Wireless Service Access

Safeguarding Wireless Service Access Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech Wireless Service Access Service Access Points Users Wireless Service Access (cont d) Ad Hoc Networking

More information

Profile of Dr.M.SELVI

Profile of Dr.M.SELVI Name : Dr.M.Selvi Designation : Assistant Professor Department : Electronics and Communication Bapatla College, Bapatla, Andhra Pradesh 522102 e-mail : drselvimunuswamy@gmail.com Scopus ID : 56046397600

More information

FACULTY PROFILE. Period Name of the Organization Designation From To 01 K.S.R.College of Engineering Professor

FACULTY PROFILE. Period Name of the Organization Designation From To 01 K.S.R.College of Engineering Professor FACULTY PROFILE 0 Name : Dr.S.Karthikeyan 02. Designation : Professor 03. Date of Joining in this Institution : 108.2004 04. Specialization : Image Processing 05. Experience & Promotion Details (Chronological):

More information

Distance-Vector Routing

Distance-Vector Routing Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation

More information

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories.

Enforcer 32WE-APP. The control panel Enforcer 32WE-APP is certified to EN50131 Grade 2 and offers a wide range of certified wireless accessories. Enforcer 32WE-APP Enforcer 32WE-APP Enforcer 32WE is the first wireless system on the market that is capable to guarantee high performance maximum security wireless protection via the advanced two way

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

ISSN Vol.06,Issue.09, October-2014, Pages:

ISSN Vol.06,Issue.09, October-2014, Pages: ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute

More information

Faculty Name Title Level Name of Journal ISSN Volume Issue Pages Month Year Academic Year

Faculty Name Title Level Name of Journal ISSN Volume Issue Pages Month Year Academic Year Faculty Name Title Level Name of Journal ISSN Volume Issue Pages Month Year Academic Year Parminder Kaur Predicting Protein Function using Decisipn Wadhwa Tree Steganography using the Technique of Orderly

More information

ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS)

ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS) ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS) DEPARTMENT CHAIR: B. Ross Barmish 407 Olin, 368-2802 E-mail: brb8@po.cwru.edu ASSOCIATE CHAIR FOR UNDERGRADUATE STUDIES Frank Merat 518 Glennan, 368-4572

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

Performance Analysis of DV-Hop Localization Using Voronoi Approach

Performance Analysis of DV-Hop Localization Using Voronoi Approach Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and

More information

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks P.Ramesh Kumar 1, G.Nageswara Rao 2, P.Rambabu 3 1 Sasi Institute of Technology and Engineering, Tadepalligudem,W.G(dt) 2 Assoc

More information

Study of 3D Barcode with Steganography for Data Hiding

Study of 3D Barcode with Steganography for Data Hiding Study of 3D Barcode with Steganography for Data Hiding Megha S M 1, Chethana C 2 1Student of Master of Technology, Dept. of Computer Science and Engineering& BMSIT&M Yelahanka Banglore-64, 2 Assistant

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and Computer Science, University

More information

Knights, Spies, Games and Social Networks

Knights, Spies, Games and Social Networks Knights, Spies, Games and Social Networks Mark Wildon 16 February 2010 The Knights and Spies Problem In a room there are 100 people. Each person is either a knight or a spy. Knights always tell the truth,

More information

An Adaptive Indoor Positioning Algorithm for ZigBee WSN

An Adaptive Indoor Positioning Algorithm for ZigBee WSN An Adaptive Indoor Positioning Algorithm for ZigBee WSN Tareq Alhmiedat Department of Information Technology Tabuk University Tabuk, Saudi Arabia t.alhmiedat@ut.edu.sa ABSTRACT: The areas of positioning

More information

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction , pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

Improving Lifetime of WSNs Using Energy-Efficient Information Gathering Algorithms and Magnetic Resonance

Improving Lifetime of WSNs Using Energy-Efficient Information Gathering Algorithms and Magnetic Resonance Advances in Wireless Communications and Networks 2015; 1(2): 11-16 Published online October 30, 2015 (http://www.sciencepublishinggroup.com/j/awcn) doi: 10.11648/j.awcn.20150102.11 Improving Lifetime of

More information

Distributed Control-as-a-Service with Wireless Swarm Systems"

Distributed Control-as-a-Service with Wireless Swarm Systems Distributed Control-as-a-Service with Wireless Swarm Systems" Prof. Rahul Mangharam Director, Real-Time & Embedded Systems Lab Dept. Electrical & Systems Engineering Dept. Computer & Information Science

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

An Embedding Model for Mining Human Trajectory Data with Image Sharing

An Embedding Model for Mining Human Trajectory Data with Image Sharing An Embedding Model for Mining Human Trajectory Data with Image Sharing C.GANGAMAHESWARI 1, A.SURESHBABU 2 1 M. Tech Scholar, CSE Department, JNTUACEA, Ananthapuramu, A.P, India. 2 Associate Professor,

More information

Isolation Mechanism for Jamming Attack in MANET

Isolation Mechanism for Jamming Attack in MANET Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute

More information

Developing an Embedded Digital Twin for HVAC Device Diagnostics

Developing an Embedded Digital Twin for HVAC Device Diagnostics Developing an Embedded Digital Twin for HVAC Device Diagnostics Gianluca Bacchiega R&D manager at I.R.S. ni.com Digital twins are becoming a business imperative, covering the entire lifecycle of an asset

More information

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay

More information

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING SECAB INSTITUTE OF ENGINEERING & TECHNOLOGY, VIJAYAPUR- 586109. KARNATAKA. INDIA. ----------------------------------------------------------------------------------------------------------------------------------

More information

Constructing K-Connected M-Dominating Sets

Constructing K-Connected M-Dominating Sets Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction

More information

Energy Efficiency for Mica Mode to Improve Network Life Time using Greedy Scheduling Algorithm

Energy Efficiency for Mica Mode to Improve Network Life Time using Greedy Scheduling Algorithm IJIRST National Conference on Latest Trends in Networking and Cyber Security March 2017 Energy Efficiency for Mica Mode to Improve Network Life Time using Greedy Scheduling Algorithm S. Kannadhasan 1 M.

More information

Dr. Sohail Abbas. Assistant Professor. Department of Computer Science University of Sharjah

Dr. Sohail Abbas. Assistant Professor. Department of Computer Science University of Sharjah Assistant Professor Department of Computer Science University of Sharjah E-Mail: sabbas@sharjah.ac.ae Phone office:+971 (0)65052520 OFFICE Department of Computer Science University of Sharjah, P.O. Box

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

DYNAMIC ROBOT NETWORKS: A COORDINATION PLATFORM FOR MULTI-ROBOT SYSTEMS

DYNAMIC ROBOT NETWORKS: A COORDINATION PLATFORM FOR MULTI-ROBOT SYSTEMS DYNAMIC ROBOT NETWORKS: A COORDINATION PLATFORM FOR MULTI-ROBOT SYSTEMS a dissertation submitted to the department of aeronautics and astronautics and the committee on graduate studies of stanford university

More information

ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu

ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks Chenyang Lu Home Area Network for Smart Energy Connecting power meters, thermostats, HVAC, appliances. Source: AT&T Labs 2 Wireless

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses Announcements Homework #3 is due March 24 Exam in class March 31 Agenda Cross-layer attacks

More information

Curriculum-Vitae. K.Kavitha No. 63, Alangudiar Street, Karaikudi. Mobile: Objective:

Curriculum-Vitae. K.Kavitha No. 63, Alangudiar Street, Karaikudi. Mobile: Objective: K.Kavitha No. 63, Alangudiar Street, Karaikudi. Email:kavitha.urc@gmail.com Mobile: 9443133000 Curriculum-Vitae Objective: To work in a creative, challenging environment where I can constantly learn and

More information

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization

More information

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte

More information

Entropy/IP: Uncovering Structure in IPv6 Addresses

Entropy/IP: Uncovering Structure in IPv6 Addresses Entropy/IP: Uncovering Structure in IPv6 Addresses RIPE 74 - Budapest, 8-12 May 2017 Paweł Foremski, David Plonka, Arthur Berger 1 What s Entropy/IP? A system that automatically learns the syntax of Internet

More information

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

An Introduction to SIMDAT a Proposal for an Integrated Project on EU FP6 Topic. Grids for Integrated Problem Solving Environments

An Introduction to SIMDAT a Proposal for an Integrated Project on EU FP6 Topic. Grids for Integrated Problem Solving Environments An Introduction to SIMDAT a Proposal for an Integrated Project on EU FP6 Topic Grids for Integrated Problem Solving Environments Martin Hofmann Department of Bioinformatics Fraunhofer Institute for Algorithms

More information

Efficient Peer-to-Peer Belief Propagation

Efficient Peer-to-Peer Belief Propagation Efficient Peer-to-Peer Belief Propagation Roman Schmidt, Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) 14 th International Conference on Cooperative

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) ABSTRACT A

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

A New Trend of Knowledge Management: A Study of Mobile Knowledge Management

A New Trend of Knowledge Management: A Study of Mobile Knowledge Management Management Science and Engineering Vol. 8, No. 4, 2014, pp. 1-5 DOI: 10.3968/5786 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org A New Trend of Knowledge Management: A

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING

A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING Gaurang Mokashi, Hong Huang, Bharath Kuppireddy, and Subin Varghese Klipsch School of Electrical and

More information