Thursday 19 February 2015

FINEST MESSAGE DOWNLOAD IN VEHICULAR NETWORK



N.Muthazhaki 1, R.Akilandeswari 2
1PG Student STET Women’s college, mannargudi
2Professor of CS department, STET Women’s college, mannargudi
            A vehicular network uses cars as mobile nodes in a MANET to create a mobile network. It  turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 metres of each other to connect and, in turn, create a network  with a wide range.  A content downloading system leveraging both infrastructure-to-vehicle and vehicle-to-vehicle communication. This captures many of the infotainment services that vechicular communication is to enable, include news report, navigation maps, and multimedia file downloading. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. Its goal is to maximize the system throughput, So we formulate a max-flow problem for several practical aspects, including channel contention and the data transfer paradigm. The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users.  Our approach allows us to investigate the impact of different factors, such as the roadside infrastructure deployment, the vehicle-to-vehicle relaying, and the penetration rate of the communication technology, even in presence of large instances of the problem. The results highlight the existence of two operational regimes at different penetration rates and the importance of an efficient, vehicle-to-vehicle relaying.
Share:

Sunday 15 February 2015

BUYING THE CACHE IN CLOUD



B.Keerthana 1, N.Subhalakshmi 2

1PG Student STET Women’s college, mannargudi

2Professor of CS department, STET Women’s college, mannargudi


            Cloud computing is a general term for the delivery of hosted services over the Internet. Cloud computing enables companies to consume compute as a utility – similar to electricity or a telephone service – rather than building and maintaining computing infrastructures. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer the cloud. Cache as a service (CaaS) model is an additional service to Infrastructure as a service (IaaS). The cloud server process introduce, pricing model together with the elastic cache system. This will increase the disk I/O performance of the IaaS, and it will reduce the usage of the physical machines. The emerging cloud applications provide data management services allowing the user to query the cloud data, paying the price for the infrastructure they use. A virtual machine (VM) is a typical instance of IaaS. Although a VM as an isolated computing platform which is capable of running multiple applications, it is assumed in this study to be solely dedicated to a single application; and thus, we use the expressions VM and application interchangeably hereafter. Cloud services as virtualized entities are essentially elastic making an illusion of “unlimited” resource capacity. This elasticity with utility computing (i.e., pay-as-you-go pricing) inherently brings cost effectiveness that is the primary driving force behind the cloud. Caching technology improves the performance.

Share:

HIGHLY SCALABLE KEY PRE DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS



R.Saranya 1, S.Mekala 2
1PG Student STET Women’s college, mannargudi
2Professor of CS department, STET Women’s college, mannargudi

            A wireless networks of thousands of inexpensive miniature devices capable of computation, communication and sensing their use throughout society “could well dwarf previous milestones in the information revolution” .It Provide a bridge between the real physical and virtual worlds. A new scalable key management scheme forWSNs which provides good secure connectivity coverage. For this purpose, we make use of the unital design theory.  Allow the ability to observe the previously unobservable at a fine resolution over large spatio-temporal scales.  Have a wide range of potential applications to industry, science, transportation, civil infrastructure, and security. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that any node other than these compromised nodes is affected is close to zero. This desirable property lowers the initial payoff of smaller scale network breaches to an adversary, and makes it necessary for the adversary to attack a significant proportion of the network..Sensor networks are being deployed for a wide variety of applications, including military sensing and tracking, environment monitoring, patient monitoring and tracking, smart environments.Key pre distribution is an important topic that constitutes the basis of security in wireless sensor networks. Many security mechanisms such as encryption and authentication can be provided by accessing to shared keys. Several techniques are Key pre distribution is an important topic that constitutes the basis of security in wireless sensor networks. Many security mechanisms such as encryption and authentication can be provided by accessing to shared keys. Several techniques are previously proposed to address this issue. Previously proposed to address this issue.
Share:

SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER BASED WIRELESS SENSOR NETWORKS



S.A.Rukshana 1,ParveenJ.Revathi 2
1PG Student STET Women’s college, mannargudi.
2Professor of CS department, STET Women’s college, mannargudi.

            A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes). It is a group of specialized transducers with a communications infrastructure that uses radio to monitor and record physical or environmental conditions. Critical issues for transferring the data securely in cluster based wireless sensor networks. A convenient way to increase the work of wireless sensor networks is clustering. The clustering technique is used in both dynamic and peoridic.There are two protocols used in secure and efficient data transmission (SET) for cluster based wireless sensor networks. They are SET- IBS and SET-IBOOS, by means Identity Based Digital Signature and Identity Based Online/Offline Digital Signature. In SET- IBS security relies on the hardness of the Diffie-Hellman problem in the pairing area. In SET-IBOOS lessen the computational hanging for secure the protocol, which is critical for wireless sensor networks. It is depends on the stability of discrete logarithm problem. The two protocols SET-IBS and SET-IBOOS used for system requirements and analysis across various attacks. The two protocols give the improved performance than existing protocols used in cluster based wireless sensor networks
Share:

Saturday 14 February 2015

EXTRACTING SPREAD SPECTRUM TRANSFORM DOMAIN EMBEDDING DATA FROM DIGITAL MEDIA



S.Kalaivani 1, R.Anitha 2
1PG Student STET Women’s college, mannargudi
2Professor of CS department, STET Women’s college, mannargudi

            Data hiding and extraction schemes are increasing in todays communication world due to rapid increment of data tracking and tampering attacks. So we need an efficient and robust data hiding schemes to protect from these attacks. In this project the blindly extraction technique is considered. Blindly extraction means the original host and the embedding. Cognitive radio technologies are being developed which allow heterogeneous systems to share spectrum access while minimizing interference to improve the overall efficiency of spectrum usage. Interference minimization requires cognitive radio receivers to be able to detect the presence of all other systems competing for spectrum usage, a process often termed "spectrum sensing". This paper focuses on the kernel function of spectrum sensing: blind interference detection from a single, strictly time-limited, received data vector. Recent research has identified shortcomings in the operation of classical blind interference detection techniques such as energy detection and radiometry. Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like audio. Embedding secret messages in digital sound is usually a more difficult process.
Share: