The International Arab Journal of Information Technology, Dec 31, 2023
Mobile Ad-hoc Networks (MANET) is a set of computing nodes with there is no fixed infrastructure ... more Mobile Ad-hoc Networks (MANET) is a set of computing nodes with there is no fixed infrastructure support. Every node in the network communicates with one another through wireless links. However, in MANET, the dynamic topology of the nodes is the vital demanding duty to produce security to the network and the black hole attacks get identified and prevented. In this paper, a novel fuzzy inference system is designed for black hole attack detection depending on the node authentication, trust value, Certificate Authority (CA), energy level, and message integrity. Before initiating the route discovery process in MANET, the proposed work mainly concentrates on node authentication. The simulation gets carried out using the Network Simulator (NS2), wherein the fuzzy inference system designed shows better performance by providing a certificate to only the trusted nodes. This helps the malicious nodes detection and prevents the black hole attack. The improvement in Packet Delivery Ratio (PDR) enhances throughput and the end to end delay gets reduced through better performance results. This proves that the system is more reliable and recovered to be used in military applications.
One of the challenges in multi hop wireless networks is to maximize throughput over a communicati... more One of the challenges in multi hop wireless networks is to maximize throughput over a communication channel. The greatest challenge is to attain optimal throughput, in a distributed manner. It has been shown that Queue length based Carrier Sense Multiple Access (Q-CSMA)-type random access algorithms can achieve the maximum possible throughput in ad hoc wireless networks. In general, single channel communication network is considered. In this kind of network, if more than one links are active in a certain neighborhood or more than one entity try to access a certain link, it’s have a collision. When a collision occurs, packets are not successfully transmitted over the medium. Its define a hybrid algorithm to use for improve the efficiency of collision avoided communication to improve throughput and reduce latency. This algorithm based on hybrid Q-CSMA and AODV and Preemptive scheduling. In finally combining CSMA with AODV leads to very good delay performance. Believe that it should be straightforward to extend this algorithms to be applicable to networks with multi-hop traffic and congestion-controlled sources.
International Journal of Advanced Research in Science, Communication and Technology, Feb 24, 2023
This paper presents the important inferences derived from the literature survey. A study of the l... more This paper presents the important inferences derived from the literature survey. A study of the literature available on the current problem reveals a large number of available techniques. Some of these techniques are mentioned. All these techniques suffer from various drawbacks like measuring image quality parameters and how much storage space occupy in the cloud environment. An extensive survey was made on the issues such as image compression and its features, image compression methods, existing compression algorithms, new proposed compression algorithm and their impact, the various levels of image compression in BTC were analyzed
International Journal of Advanced Research in Science, Communication and Technology
This paper provides the Generative Adversarial and Dual Layered Deep Classification techniques to... more This paper provides the Generative Adversarial and Dual Layered Deep Classification techniques to improve the drawbacks in the methods of Absolute Moment BTC (AMBTC) technique in reconstruction error rate of standard BTC model. The image blocks generation and compression are the main phases of BTC model. This can be applied for both colour images and grey scale images. However, the conventional BTC procedures lacks for edge reconstructions and noise reductions in the output images. The first technique GABTC is developed with multi-layered Deep Neural Network (DNN) structures with GA neural models. The integration of both GA models and BTC principles improve the quality of block constructions and reconstructions significantly. The second proposed work is adopted the Dual layered Deep Classification Technique. Handling the image database with minimal storage complexity, minimal computational complexity and optimal quality is a significant task. To obtain these solutions, many image pr...
International Journal of Advanced Research in Science, Communication and Technology
This Paper provides the Research gap in E-Learning resource environment deals with more space com... more This Paper provides the Research gap in E-Learning resource environment deals with more space complexity. In this paper is modified the existing block truncation coding algorithm. The proposed algorithm is a one that is efficient acquires the less space as well as the speed is increased on cloud by showing the experimental results and comparison of this image.
International Journal of Advanced Research in Science, Communication and Technology
This paper provides a comprehensive introduction to digital image, image compression and overview... more This paper provides a comprehensive introduction to digital image, image compression and overview of E-learning. It presents the basic concepts and features of image compression techniques with different measuring qualities of image in the cloud environment for better storage space.
International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
In recent years, mobile technology is popular among the human society which makes the humans conn... more In recent years, mobile technology is popular among the human society which makes the humans connected virtually to both living things [Social Media] and non living things [IOT]. MANET plays a vital role in wireless network infrastructure. Ad-hoc Wireless network consist of a two or more mobile nodes connected wirelessly in a self configured, self-healing network without having a constant framework. Each and every device in MANET was able to move freely in any directions to share the information between each devices or nodes of network. Many routing protocols for such networks have been proposed so far to find optimized routes from source to the destination and prominent among them are Dynamic Source Routing (DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV) routing protocols. The charateristics comparison of these protocols should be considered as the primary step to understand the routing protocol in a perfect manner.
The article was submitted to be part of a guestedited issue. An investigation by the publisher fo... more The article was submitted to be part of a guestedited issue. An investigation by the publisher found a number of articles, including this one, with a number of concerns, including but not limited to compromised editorial handling and peer review process, inappropriate or irrelevant references or not being in scope of the journal or guest-edited issue. Based on the investigation's findings the
In sentiment analysis, the most accepted technique in statistical learning approaches is Bag-of-w... more In sentiment analysis, the most accepted technique in statistical learning approaches is Bag-of-words (BOW). Though BOW is widely accepted technique, the elementary deficiencies in treating the polarity shift problem restrict the performance of BOW. In order to address this problem a model called Multiple sentiment analysis (MSA) for sentiment classification is proposed in this paper. For each training and test review a novel data expansion method by creating a sentiment reversed review is first introduced. To study a sentiment classifier, original as well as reversed training reviews are used in pairs. For this purpose, a multi-mood training algorithm is proposed. A multiple prediction algorithm is also proposed in order to classify test reviews with the consideration of two sides of one review.
International Journal of Advanced Research in Science, Communication and Technology
Internet Learning Image compression is a useful approach this is inevitable to save any snapshots... more Internet Learning Image compression is a useful approach this is inevitable to save any snapshots in compressed sample. The compressed image is reconstructed the usage of image retrieval system for any applications. This method guarantees garage performance in various content management packages. Mainly, Internet Learning resource environment deals with greater area complexity. The e-learning storage area complexity may be reduced with the assist of image compression strategies. There are extraordinary forms of image compression techniques invented for constructing compressed assets. Block Truncation Coding (BTC) is a kind of lossy compression technique for reducing grey scale quantities the usage of blocking and quantizing stages. This is powerful technique for compressing the photos. In the scope, the want for extra active and Generative image compression methods is important to enhance BTC principles. This work proposes notably complex and novel Generative Adversarial BTC (GA-BTC...
International Journal of Advanced Research in Science, Communication and Technology
Dealing with the picture database with minimal garage complexity, minimum computational complexit... more Dealing with the picture database with minimal garage complexity, minimum computational complexity and ultimate nice is an important work. To obtain these solutions, many image-processing techniques are advanced. Now days, E-learning assets are widely used across the internet based totally expertise sharing environments. Within the cyber learning surroundings, multiple sorts of records sources are controlled. Particularly, organizing the photos is challenge that is more vital where pictures appeared in the cyber learning network databases. This trouble expects solutions from powerful image compression techniques. Block truncation coding technique is offer beneficial and easy implementations of cyber learning to know primarily based picture compression platform. On this regard, this proposed system develops a Dual Layered Deep Classification and Truncation (DLDCT) approach. This proposed system has applied the DLDCT and as compared with existing works with admire to considerable over...
2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019
Video surveillance applications need to segregate human from a variety of objects present in the ... more Video surveillance applications need to segregate human from a variety of objects present in the environment to avoid the performance degradation in their classification. We propose a method to classify human and non-human objects present in the scene using Genetic Algorithm (GA). The initial population (chromosomes) for the genetic algorithm is formed by the coefficients of the Stationary wavelet transform applied for the image and evaluated using the proposed fitness function. Based on the best fitness values, the parents are selected for reproduction followed by mutation to repopulate the generations. The process of producing a new generation and selecting the best member is repeated until the best fitness valued chromosome is met. The Stationary wavelet transform (SWT) has multi resolution property that improves the reconstruction of the image when compared with the conventional Discrete Wavelet Transform (DWT). GA is a global stochastic search and optimization technique that can explore a large solution space and concentrate the search in the regions which lead to fitter structures and hence better solutions are obtained. The proposed method is evaluated by various performance metrics and found better than other state-of-art-methods.
The International Arab Journal of Information Technology, Dec 31, 2023
Mobile Ad-hoc Networks (MANET) is a set of computing nodes with there is no fixed infrastructure ... more Mobile Ad-hoc Networks (MANET) is a set of computing nodes with there is no fixed infrastructure support. Every node in the network communicates with one another through wireless links. However, in MANET, the dynamic topology of the nodes is the vital demanding duty to produce security to the network and the black hole attacks get identified and prevented. In this paper, a novel fuzzy inference system is designed for black hole attack detection depending on the node authentication, trust value, Certificate Authority (CA), energy level, and message integrity. Before initiating the route discovery process in MANET, the proposed work mainly concentrates on node authentication. The simulation gets carried out using the Network Simulator (NS2), wherein the fuzzy inference system designed shows better performance by providing a certificate to only the trusted nodes. This helps the malicious nodes detection and prevents the black hole attack. The improvement in Packet Delivery Ratio (PDR) enhances throughput and the end to end delay gets reduced through better performance results. This proves that the system is more reliable and recovered to be used in military applications.
One of the challenges in multi hop wireless networks is to maximize throughput over a communicati... more One of the challenges in multi hop wireless networks is to maximize throughput over a communication channel. The greatest challenge is to attain optimal throughput, in a distributed manner. It has been shown that Queue length based Carrier Sense Multiple Access (Q-CSMA)-type random access algorithms can achieve the maximum possible throughput in ad hoc wireless networks. In general, single channel communication network is considered. In this kind of network, if more than one links are active in a certain neighborhood or more than one entity try to access a certain link, it’s have a collision. When a collision occurs, packets are not successfully transmitted over the medium. Its define a hybrid algorithm to use for improve the efficiency of collision avoided communication to improve throughput and reduce latency. This algorithm based on hybrid Q-CSMA and AODV and Preemptive scheduling. In finally combining CSMA with AODV leads to very good delay performance. Believe that it should be straightforward to extend this algorithms to be applicable to networks with multi-hop traffic and congestion-controlled sources.
International Journal of Advanced Research in Science, Communication and Technology, Feb 24, 2023
This paper presents the important inferences derived from the literature survey. A study of the l... more This paper presents the important inferences derived from the literature survey. A study of the literature available on the current problem reveals a large number of available techniques. Some of these techniques are mentioned. All these techniques suffer from various drawbacks like measuring image quality parameters and how much storage space occupy in the cloud environment. An extensive survey was made on the issues such as image compression and its features, image compression methods, existing compression algorithms, new proposed compression algorithm and their impact, the various levels of image compression in BTC were analyzed
International Journal of Advanced Research in Science, Communication and Technology
This paper provides the Generative Adversarial and Dual Layered Deep Classification techniques to... more This paper provides the Generative Adversarial and Dual Layered Deep Classification techniques to improve the drawbacks in the methods of Absolute Moment BTC (AMBTC) technique in reconstruction error rate of standard BTC model. The image blocks generation and compression are the main phases of BTC model. This can be applied for both colour images and grey scale images. However, the conventional BTC procedures lacks for edge reconstructions and noise reductions in the output images. The first technique GABTC is developed with multi-layered Deep Neural Network (DNN) structures with GA neural models. The integration of both GA models and BTC principles improve the quality of block constructions and reconstructions significantly. The second proposed work is adopted the Dual layered Deep Classification Technique. Handling the image database with minimal storage complexity, minimal computational complexity and optimal quality is a significant task. To obtain these solutions, many image pr...
International Journal of Advanced Research in Science, Communication and Technology
This Paper provides the Research gap in E-Learning resource environment deals with more space com... more This Paper provides the Research gap in E-Learning resource environment deals with more space complexity. In this paper is modified the existing block truncation coding algorithm. The proposed algorithm is a one that is efficient acquires the less space as well as the speed is increased on cloud by showing the experimental results and comparison of this image.
International Journal of Advanced Research in Science, Communication and Technology
This paper provides a comprehensive introduction to digital image, image compression and overview... more This paper provides a comprehensive introduction to digital image, image compression and overview of E-learning. It presents the basic concepts and features of image compression techniques with different measuring qualities of image in the cloud environment for better storage space.
International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
In recent years, mobile technology is popular among the human society which makes the humans conn... more In recent years, mobile technology is popular among the human society which makes the humans connected virtually to both living things [Social Media] and non living things [IOT]. MANET plays a vital role in wireless network infrastructure. Ad-hoc Wireless network consist of a two or more mobile nodes connected wirelessly in a self configured, self-healing network without having a constant framework. Each and every device in MANET was able to move freely in any directions to share the information between each devices or nodes of network. Many routing protocols for such networks have been proposed so far to find optimized routes from source to the destination and prominent among them are Dynamic Source Routing (DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV) routing protocols. The charateristics comparison of these protocols should be considered as the primary step to understand the routing protocol in a perfect manner.
The article was submitted to be part of a guestedited issue. An investigation by the publisher fo... more The article was submitted to be part of a guestedited issue. An investigation by the publisher found a number of articles, including this one, with a number of concerns, including but not limited to compromised editorial handling and peer review process, inappropriate or irrelevant references or not being in scope of the journal or guest-edited issue. Based on the investigation's findings the
In sentiment analysis, the most accepted technique in statistical learning approaches is Bag-of-w... more In sentiment analysis, the most accepted technique in statistical learning approaches is Bag-of-words (BOW). Though BOW is widely accepted technique, the elementary deficiencies in treating the polarity shift problem restrict the performance of BOW. In order to address this problem a model called Multiple sentiment analysis (MSA) for sentiment classification is proposed in this paper. For each training and test review a novel data expansion method by creating a sentiment reversed review is first introduced. To study a sentiment classifier, original as well as reversed training reviews are used in pairs. For this purpose, a multi-mood training algorithm is proposed. A multiple prediction algorithm is also proposed in order to classify test reviews with the consideration of two sides of one review.
International Journal of Advanced Research in Science, Communication and Technology
Internet Learning Image compression is a useful approach this is inevitable to save any snapshots... more Internet Learning Image compression is a useful approach this is inevitable to save any snapshots in compressed sample. The compressed image is reconstructed the usage of image retrieval system for any applications. This method guarantees garage performance in various content management packages. Mainly, Internet Learning resource environment deals with greater area complexity. The e-learning storage area complexity may be reduced with the assist of image compression strategies. There are extraordinary forms of image compression techniques invented for constructing compressed assets. Block Truncation Coding (BTC) is a kind of lossy compression technique for reducing grey scale quantities the usage of blocking and quantizing stages. This is powerful technique for compressing the photos. In the scope, the want for extra active and Generative image compression methods is important to enhance BTC principles. This work proposes notably complex and novel Generative Adversarial BTC (GA-BTC...
International Journal of Advanced Research in Science, Communication and Technology
Dealing with the picture database with minimal garage complexity, minimum computational complexit... more Dealing with the picture database with minimal garage complexity, minimum computational complexity and ultimate nice is an important work. To obtain these solutions, many image-processing techniques are advanced. Now days, E-learning assets are widely used across the internet based totally expertise sharing environments. Within the cyber learning surroundings, multiple sorts of records sources are controlled. Particularly, organizing the photos is challenge that is more vital where pictures appeared in the cyber learning network databases. This trouble expects solutions from powerful image compression techniques. Block truncation coding technique is offer beneficial and easy implementations of cyber learning to know primarily based picture compression platform. On this regard, this proposed system develops a Dual Layered Deep Classification and Truncation (DLDCT) approach. This proposed system has applied the DLDCT and as compared with existing works with admire to considerable over...
2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019
Video surveillance applications need to segregate human from a variety of objects present in the ... more Video surveillance applications need to segregate human from a variety of objects present in the environment to avoid the performance degradation in their classification. We propose a method to classify human and non-human objects present in the scene using Genetic Algorithm (GA). The initial population (chromosomes) for the genetic algorithm is formed by the coefficients of the Stationary wavelet transform applied for the image and evaluated using the proposed fitness function. Based on the best fitness values, the parents are selected for reproduction followed by mutation to repopulate the generations. The process of producing a new generation and selecting the best member is repeated until the best fitness valued chromosome is met. The Stationary wavelet transform (SWT) has multi resolution property that improves the reconstruction of the image when compared with the conventional Discrete Wavelet Transform (DWT). GA is a global stochastic search and optimization technique that can explore a large solution space and concentrate the search in the regions which lead to fitter structures and hence better solutions are obtained. The proposed method is evaluated by various performance metrics and found better than other state-of-art-methods.
Uploads
Papers by Ruba Soundar K