Articles

  1. DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDownload Article

    *1Mr. C. Bhuvaneshwaran , 2Mr.D.Jeyakumar,M.E.,

    Abstract

    close

    Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and robust Internet access. Improving user throughput is a primary objective in a WMN. The system focus on wireless networks with stationary nodes, such as community wireless networks. The goal of the metric is to choose a high-throughput path between a source and a destination. Metric assigns weights to individual links based on the Expected Transmission Time (ETT) of a packet over the link using many to many communications. In such networks, most of the nodes are either stationary or minimally mobile and do not rely on batteries. Hence, the focus of routing algorithms is on improving the network capacity or the performance of individual transfers for this, the system use Ad-hoc On-Demand MultiPath Distance Vector (AOMDV) for selecting and Demanding Shortest Path for transmission with Bandwidth Guarantees . One of the main problems facing such networks is the reduction in total capacity due to interference between multiple simultaneous transmissions. This result taken by network simulator tool (NS-2) for better performance in Networks. Index terms: Wireless mesh Networks, Expected Transmission Time(ETT),routing algorithm, AOMDV.

  2. ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSDownload Article

    *1Mr. S.Aravinth, 2Mr. N.M.K.Ramalingam Sakthivelan,M.E.,

    Abstract

    close

    Wireless sensor networks (WSNs) are used in many areas for critical infrastructure monitoring and information collection. For WSNs, SLP service is further complicated by the nature that the sensor nodes generally consist of low-cost and low-power radio devices. Computationally intensive cryptographic algorithms (such as public-key cryptosystems), and large scale broadcasting-based protocols may not be suitable. Propose criteria to quantitatively measure source-location information leakage in routing-based SLP protection schemes for WSNs. Through this model, identify the vulnerabilities of SLP protection schemes. Propose a scheme to provide SLP through routing to a randomly selected intermediate node (RSIN) and a network mixing ring (NMR). The security analysis, based on the proposed criteria, shows that the proposed scheme can provide excellent SLP. The message will send securely. The adversaries cannot able to identify the source location. The adversaries cannot make any interruption to the message because of the secure algorithms. The comprehensive simulation results demonstrate that the proposed scheme is very efficient and can achieve a high message delivery ratio. It can be used in many practical applications. Index terms: Light key cryptosystems,randomly selected intermediate node, Network mixing ring, Source location privacy.

  3. A DISCUSSION ON IMAGE ENHANCEMENT USING HISTOGRAM EQUALIZATION BY VARIOUS METHODSDownload Article

    *1Mr. S.T.Premkumar, *2Mr. S.Senthilnathan, *3Mr.B.Jagdishkumar

    Abstract

    close

    Image enhancing is a needed process for improving the quality of the image so that it can be used in various applications and appliances. Today, many things are based on the visual representation, the image and a good image has a good use. Histogram equalization is a technique used for obtaining an image that has enhanced contrast. This method is used for images which has over contrast and under contrast regions as it increases the total contrast of the image by equalizing the histogram of the image. It does so by spreading out most frequent intensity values. It can be used to increase the X-ray contrast containing the bone structure and for enhancing under or over exposed photographs. The drawback of this method is that it changes the brightness of the resulting image creating problems while used in an electrical appliance such as television. To overcome this problem and several other problems during the contrast enhancing process, many have come up with their idea of approach which gives good results as well as some variations in some situations. In this paper, we have discussed the proposals of various authors for enhancing the image that is not proper without altering the other important characteristics of it. The proposed methods are proven to be successful under most conditions. Index terms: Histogram, X-ray, Photographs.

  4. USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSDownload Article

    *1Mr. A.Ganesan, 2Mrs.D.Bhuwaneshwari,M.E.,

    Abstract

    close

    Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem, Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost of inconvenience to users. In this paper, the inadequacy of existing and proposed login protocols designed to address large scale online dictionary attacks (e.g., from a botnet of hundreds of thousands of nodes). A new Password Guessing Resistant Protocol (PGRP), derived upon revisiting prior proposals designed to restrict such attacks. While PGRP limits the total number of login attempts from unknown remote hosts to as low as a single attempt per username, legitimate users in most cases (e.g., when attempts are made from known, frequently-used machines) can make several failed login attempts before being challenged with an ATT. Finally, the performance of PGRP with two real-world datasets and find it more promising than existing proposals. Index terms: Sensitive-attributes, Quasive-identifiers, Generalization, Bucketization, Multiset generalization .

  5. A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENTDownload Article

    *1Mr. S.T.Premkumar, *2Mr. S.Senthilnathan, *3Mr.B.Jagdishkumar

    Abstract

    close

    In statistics, a histogram is a graphical representation of the distribution of data. It is an estimate of the probability distribution of a continuous variable. The histogram of an image represents the relative frequency of occurrence of the various gray levels in the image. Image enhancement algorithms based on Histogram equalization (HE) often fall short to maintain the image quality after enhancement due to quantum jump in the cumulative distribution function (CDF) in the histogram. Moreover, some detail parts appear to be washed out after enhancement. To solve this problem, various histogram equalization methods were introduced which enhanced the image details parts separately and combine it with the enhanced image using a weighted function. This gives a way to control the enhancement of the details improving the quality of the image. Experiments show that the proposed method performs well as compared to the existing enhancement algorithms. Histogram equalization methods preserve the image brightness, local contrast of the image and reduce the noise in speech. Index terms: Histogram, Histogram equalization, Cumulative distribution function.

  6. AN EVALUATION OF THE PERFORMANCE OF LIBRARY USERS IN COLLEGES AFFILIATED TO ANNA UNIVERSITY, TIRUNELVELI, TAMILNADUDownload Article

    S.Saravanan, Dr.P.Balasubramanian

    Abstract

    close

    This paper details with the study about the librarian uses in colleges affiliated to Anna University of Technology, Tirunelveli. The study covers methods adopted by library users to access the adequacy, availability and accessibility of the college library collection. Key words-Evaluation of library usage, library users in Engineering Colleges

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"