首页 > 最新文献

International Journal of communication and computer Technologies最新文献

英文 中文
VEBEK-Working & Functionalities  vebek -工作和功能
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.13
{"title":"VEBEK-Working & Functionalities ","authors":"","doi":"10.31838/ijccts/01.02.13","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.13","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125008573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SENSOR NODE FAILURE DETECTION USING ROUND TRIP DELAY IN WIRELESS SENSOR NETWORK  无线传感器网络中基于往返时延的传感器节点故障检测
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/05.01.03
E.Sowmiya Dr.V.Chandrasekaran, Thindal, Erode
In these days, the application of Wireless Sensor Networks (WSNs) have been increased .Advance in microelectronic fabrication technology also reduces the manufacturing cost. Detecting node failures in Wireless Sensor Networks is very challenging because the network topology can be highly dynamic, the network may not always connected and the resources are limited . It becomes trend to deploy the large number of portable wireless sensors in Wireless Sensor Networks, in order to increase the Quality of Service (QoS). The QoS is mainly affected by the failure of sensor node .The sensor node failure increases with the increase in number of sensors in Wireless Sensor Networks. In order to maintain better QoS in such failure condition, Identifying and Detaching such faults are essential. In the proposed method the faulty sensor node is detected by measuring the Round Trip Delay (RTD) time of Discrete Round Trip paths and comparing them with threshold value. In proposed method, Scalability is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementation are almost equal, justifying the real time applicability of the investigated method.
近年来,无线传感器网络(WSNs)的应用越来越广泛,微电子制造技术的进步也降低了制造成本。在无线传感器网络中,由于网络拓扑结构是高度动态的,网络可能不总是连接,并且资源有限,因此节点故障检测是一个非常具有挑战性的问题。在无线传感器网络中部署大量便携式无线传感器以提高服务质量已成为趋势。在无线传感器网络中,随着传感器数量的增加,传感器节点的故障也随之增加。为了在这种故障状态下保持更好的QoS,必须对这种故障进行识别和分离。该方法通过测量离散往返路径的RTD (Round Trip Delay)时间并与阈值进行比较来检测故障传感器节点。通过在NS2中模拟具有大量传感器节点的wsn,验证了该方法的可扩展性。硬件和软件实现的RTD时间结果几乎相等,证明了所研究方法的实时适用性。
{"title":"SENSOR NODE FAILURE DETECTION USING ROUND TRIP DELAY IN WIRELESS SENSOR NETWORK ","authors":"E.Sowmiya Dr.V.Chandrasekaran, Thindal, Erode","doi":"10.31838/ijccts/05.01.03","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.03","url":null,"abstract":"In these days, the application of Wireless Sensor Networks (WSNs) have been increased .Advance in microelectronic fabrication technology also reduces the manufacturing cost. Detecting node failures in Wireless Sensor Networks is very challenging because the network topology can be highly dynamic, the network may not always connected and the resources are limited . It becomes trend to deploy the large number of portable wireless sensors in Wireless Sensor Networks, in order to increase the Quality of Service (QoS). The QoS is mainly affected by the failure of sensor node .The sensor node failure increases with the increase in number of sensors in Wireless Sensor Networks. In order to maintain better QoS in such failure condition, Identifying and Detaching such faults are essential. In the proposed method the faulty sensor node is detected by measuring the Round Trip Delay (RTD) time of Discrete Round Trip paths and comparing them with threshold value. In proposed method, Scalability is verified by simulating the WSNs with large numbers of sensor nodes in NS2. The RTD time results derived in hardware and software implementation are almost equal, justifying the real time applicability of the investigated method.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EMBEDDED ASSISTIVE STICK FOR VISUALLY IMPAIRED PEOPLE 为视障人士设计的嵌入式辅助手杖
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.02.03
R. Denicashelus, B.Deebikaa, S.Hariram
Today's technology is improved to a greater extent for the betterment of people, but there are some people with disabilities like blindness. In order to overcome their problem a smart stick is designed with GPS-GSM module, ultrasonic sensor that would help them in their way to identify obstacle. Ultrasonic sensors calculate the distance of the obstacles around the visually impaired person to guide the user towards the necessary path. This paper describes about how each components would help them. This also helps to find the stick if it is lost. The tool says that, the smart walking stick that alerts visually-impaired persons over obstacles, fire, and water and could help them in walking with less accident.
今天的技术在很大程度上是为了造福人类,但仍有一些人有残疾,比如失明。为了克服他们的问题,设计了一种带有GPS-GSM模块的智能棒,超声波传感器可以帮助他们识别障碍物。超声波传感器计算视障人士周围障碍物的距离,引导使用者走向必要的路径。本文描述了每个组件将如何帮助他们。如果棍子丢了,这也有助于找到它。该工具称,这款智能手杖可以提醒视障人士注意障碍物、火和水,帮助他们减少行走事故。
{"title":"EMBEDDED ASSISTIVE STICK FOR VISUALLY IMPAIRED PEOPLE","authors":"R. Denicashelus, B.Deebikaa, S.Hariram","doi":"10.31838/ijccts/07.02.03","DOIUrl":"https://doi.org/10.31838/ijccts/07.02.03","url":null,"abstract":"Today's technology is improved to a greater extent for the betterment of people, but there are some people with \u0000disabilities like blindness. In order to overcome their problem a smart stick is designed with GPS-GSM module, \u0000ultrasonic sensor that would help them in their way to identify obstacle. Ultrasonic sensors calculate the distance \u0000of the obstacles around the visually impaired person to guide the user towards the necessary path. This paper \u0000describes about how each components would help them. This also helps to find the stick if it is lost. The tool says \u0000that, the smart walking stick that alerts visually-impaired persons over obstacles, fire, and water and could help \u0000them in walking with less accident.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116042033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Smart Alert Service for Women Safety System  女性安全系统动态智能警报服务
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/05.02.05
{"title":"Dynamic Smart Alert Service for Women Safety System ","authors":"","doi":"10.31838/ijccts/05.02.05","DOIUrl":"https://doi.org/10.31838/ijccts/05.02.05","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols  一种可靠的ATM协议及其各参数与其他ATM协议的比较分析
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.01.04
{"title":"A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols ","authors":"","doi":"10.31838/ijccts/01.01.04","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HOME AUTOMATION USING SMART MIRROR WITH RASPBERRY PI 家庭自动化使用智能镜子与树莓派
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.sp01.08
R. Gokila, P. Arunkumar, S. Deepakkumar, Athul Ravi, S. Sakthivel
Intelligent mirrors, which continue the works today and will take its place in the future technology, provide both mirror and computer aided information services to its users.. The user command is recognized by Raspberry PI through the micro phone in the mirror, in-built microphone and speaker is used for communicate with the mirror. That mirror shows time, calendar, reminders and headlines.
智能镜子,延续了今天的工作,并将在未来的技术中占据一席之地,为用户提供镜子和计算机辅助信息服务。用户命令通过镜子中的麦克风被树莓派识别,内置的麦克风和扬声器用于与镜子通信。这面镜子可以显示时间、日历、提醒和标题。
{"title":"HOME AUTOMATION USING SMART MIRROR WITH RASPBERRY PI","authors":"R. Gokila, P. Arunkumar, S. Deepakkumar, Athul Ravi, S. Sakthivel","doi":"10.31838/ijccts/07.sp01.08","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.08","url":null,"abstract":"Intelligent mirrors, which continue the works today and will take its place in the future technology, provide both \u0000mirror and computer aided information services to its users.. The user command is recognized by Raspberry PI \u0000through the micro phone in the mirror, in-built microphone and speaker is used for communicate with the mirror. \u0000That mirror shows time, calendar, reminders and headlines.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Data Routing with Security Keys  无线数据路由与安全密钥
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.02.11
{"title":"Wireless Data Routing with Security Keys ","authors":"","doi":"10.31838/ijccts/02.02.11","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.11","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved RSA image encryption algorithm using 1-D logistic map 一种基于一维逻辑映射的改进RSA图像加密算法
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.01.01
H. J. Yakubu, T. Aboiyar, P. B. Zirra
The need to have a more secured ways of protecting sensitive images in this modern age of technology has become necessary for ensuring that such images sent via the insecure public network called the Internet are protected from attacks. To this end, various image encryption algorithms have been proposed by many researchers and RSA image encryption algorithm is one of them. Studies on RSA image encryption algorithm reveal that some images when encrypted using the algorithm, gives encrypted images that do expose some features of the plain images on visual inspection no matter the size of primes used. This is due to the fact that digital images have high redundancy and high correlation of image data that make RSA algorithm image dependent. Cryptanalysis has been a major source of concern (in particular the brute-force attack) when designing a cryptosystem since it is assumed that the cryptanalyst knows exactly the design and working of the cryptosystem under study except the secret key. Thus, making the secret key access much more difficult to the cryptanalyst makes the encryption algorithm a more reliable one. In view of these, an improved RSA image encryption algorithm using 1-D logistic map was proposed. The proposed scheme has two stages. In the first stage, the plain-image is shuffled using the chaotic properties of the map and in the second stage; the shuffled image is encryption using the RSA algorithm. The proposed algorithm and the RSA algorithm were tested on two standard test gray scale images: cameraman.tif and clock.tif using four different set of keys. Security analysis such as histogram analysis and correlation coefficient analysis were also carried out on the results obtained from the two methods. The results of the analysis show that the proposed scheme is more secured and stronger against the brute-force attack ( encrypted image which does not reveals any hint about the plain image to the attacker and also its key space has double: the two primes, initial condition and control parameter) than the RSA image encryption scheme.
在这个现代技术时代,需要有一种更安全的方式来保护敏感图像,以确保通过称为Internet的不安全公共网络发送的此类图像免受攻击。为此,许多研究者提出了各种各样的图像加密算法,RSA图像加密算法就是其中之一。对RSA图像加密算法的研究表明,某些图像在使用该算法加密时,无论使用的素数大小如何,加密后的图像在视觉上都暴露了普通图像的一些特征。这是由于数字图像具有高冗余性和图像数据的高相关性,使得RSA算法依赖于图像。在设计密码系统时,密码分析一直是一个主要的关注点(特别是暴力攻击),因为它假设密码分析师确切地知道所研究的密码系统的设计和工作原理,除了密钥。因此,使密码学家更难访问密钥使加密算法更加可靠。鉴于此,提出了一种改进的基于一维逻辑映射的RSA图像加密算法。拟议的计划分为两个阶段。在第一阶段,利用地图的混沌特性对图像进行洗牌,在第二阶段;打乱后的图像使用RSA算法进行加密。在cameraman.tif和clock.tif两个标准测试灰度图像上使用四组不同的密钥对所提出的算法和RSA算法进行了测试。并对两种方法得到的结果进行了直方图分析、相关系数分析等安全性分析。分析结果表明,与RSA图像加密方案相比,该方案具有更高的安全性和更强的抗暴力攻击能力(加密图像不会向攻击者透露任何关于明文图像的线索,并且其密钥空间具有两倍:两个素数、初始条件和控制参数)。
{"title":"An improved RSA image encryption algorithm using 1-D logistic map","authors":"H. J. Yakubu, T. Aboiyar, P. B. Zirra","doi":"10.31838/ijccts/04.01.01","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.01","url":null,"abstract":"The need to have a more secured ways of protecting sensitive images in this modern age of technology has become necessary \u0000for ensuring that such images sent via the insecure public network called the Internet are protected from attacks. To this end, various \u0000image encryption algorithms have been proposed by many researchers and RSA image encryption algorithm is one of them. Studies on \u0000RSA image encryption algorithm reveal that some images when encrypted using the algorithm, gives encrypted images that do expose \u0000some features of the plain images on visual inspection no matter the size of primes used. This is due to the fact that digital images have \u0000high redundancy and high correlation of image data that make RSA algorithm image dependent. Cryptanalysis has been a major source \u0000of concern (in particular the brute-force attack) when designing a cryptosystem since it is assumed that the cryptanalyst knows exactly \u0000the design and working of the cryptosystem under study except the secret key. Thus, making the secret key access much more difficult to \u0000the cryptanalyst makes the encryption algorithm a more reliable one. In view of these, an improved RSA image encryption algorithm \u0000using 1-D logistic map was proposed. The proposed scheme has two stages. In the first stage, the plain-image is shuffled using the chaotic \u0000properties of the map and in the second stage; the shuffled image is encryption using the RSA algorithm. The proposed algorithm and \u0000the RSA algorithm were tested on two standard test gray scale images: cameraman.tif and clock.tif using four different set of keys. Security \u0000analysis such as histogram analysis and correlation coefficient analysis were also carried out on the results obtained from the two \u0000methods. The results of the analysis show that the proposed scheme is more secured and stronger against the brute-force attack ( encrypted \u0000image which does not reveals any hint about the plain image to the attacker and also its key space has double: the two primes, \u0000initial condition and control parameter) than the RSA image encryption scheme.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey of suboptimal polygonal approximation methods  次优多边形近似方法综述
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.01.07
M. MangayarkarasiRVanitha, K. SakthivelRDr.Bharanitharan
Polygonal approximation detects a set of feature points on the boundary of a shape that constitute the vertices of the shape. In particular, shape representation by polygonal approximation has become a popular technique due to its easiness, locality and compression. This paper presents a survey of methods that detects a set of dominant points that constitute the boundary of a 2D digital planar curve with an iterative procedure and a comparison of the polygonal approximation algorithms on various shapes with varying number of dominant points is made along with the demerits of each of the techniques
多边形近似检测形状边界上的一组特征点,这些特征点构成形状的顶点。特别是多边形近似的形状表示由于其简单、局域性和压缩性而成为一种流行的技术。本文介绍了用迭代方法检测构成二维数字平面曲线边界的一组优势点的方法,并比较了具有不同数量优势点的各种形状的多边形近似算法以及每种技术的缺点
{"title":"A Survey of suboptimal polygonal approximation methods ","authors":"M. MangayarkarasiRVanitha, K. SakthivelRDr.Bharanitharan","doi":"10.31838/ijccts/04.01.07","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.07","url":null,"abstract":"Polygonal approximation detects a set of feature points on the boundary of a shape that constitute the vertices of the shape. In particular, shape representation by polygonal approximation has become a popular technique due to its easiness, locality and compression. This paper presents a survey of methods that detects a set of dominant points that constitute the boundary of a 2D digital planar curve with an iterative procedure and a comparison of the polygonal approximation algorithms on various shapes with varying number of dominant points is made along with the demerits of each of the techniques","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Cluster Based Congestion Control in Wireless Mesh Network  基于集群的无线Mesh网络拥塞控制
Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.02.07
R. Suba, R. Satheeskumar
A Wireless Mesh Network (WMN) is a communication network made up of radio nodes, organized in a mesh topology. In this mesh network, load balancing can be used to extend the lifetime of a mesh network and thus reducing the traffic congestion and improves the network performance. The clustering techniques are used to solve routing and congestion control problems, because it offers scalability and enhance the availability of network and reduce overhead. Here a Weighted Clustering Algorithm (WCA) method is selected to divide the network into k –cluster to manage the load in small scale and hence to reduce the overhead. The node with maximum weight is more desirable to select as Cluster Head (CH).By using the AODV protocol a node in the cluster sends many small packets compared to other reactive protocols to increase the speed of the transmission packet. When the network size increases, the degree of node also increases causing network congestion. The use of this WCA reduces this overhead by allowing route discovery and maintenance.
无线网状网络(WMN)是一种由无线节点组成的通信网络,以网状拓扑结构组织。在这种网状网络中,负载均衡可以延长网状网络的生存期,从而减少网络的流量拥塞,提高网络的性能。集群技术用于解决路由和拥塞控制问题,因为它提供了可伸缩性,增强了网络的可用性并减少了开销。本文采用加权聚类算法(Weighted Clustering Algorithm, WCA)将网络划分为k个簇,以实现对负载的小规模管理,从而降低网络开销。权重最大的节点更适合作为簇头(CH)。与其他响应性协议相比,使用AODV协议可以使集群中的节点发送许多小数据包,从而提高传输数据包的速度。当网络规模增加时,节点的数量也会增加,导致网络拥塞。使用WCA允许路由发现和维护,从而减少了这种开销。
{"title":"Efficient Cluster Based Congestion Control in Wireless Mesh Network ","authors":"R. Suba, R. Satheeskumar","doi":"10.31838/ijccts/04.02.07","DOIUrl":"https://doi.org/10.31838/ijccts/04.02.07","url":null,"abstract":"A Wireless Mesh Network (WMN) is a communication network made up of radio nodes, organized in a mesh topology. In this mesh network, load balancing can be used to extend the lifetime of a mesh network and thus reducing the traffic congestion and improves the network performance. The clustering techniques are used to solve routing and congestion control problems, because it offers scalability and enhance the availability of network and reduce overhead. Here a Weighted Clustering Algorithm (WCA) method is selected to divide the network into k –cluster to manage the load in small scale and hence to reduce the overhead. The node with maximum weight is more desirable to select as Cluster Head (CH).By using the AODV protocol a node in the cluster sends many small packets compared to other reactive protocols to increase the speed of the transmission packet. When the network size increases, the degree of node also increases causing network congestion. The use of this WCA reduces this overhead by allowing route discovery and maintenance.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of communication and computer Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1