International Conference On Progressive Research In Applied Sciences, Engineering And Technology (ICPRASET 2K18)
(Volume-5)

ECE

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Vlsi Implementation Of Highly Secured Auto Key Generation Cryptography
Country
::
India
Authors
::
Mrs.M.Manju || Santhosh Kumar.L || Gautham.A || Muni || Rahul.K.V
Page
::
01-04

In recent days Field-Programmable Gate Arrays (FPGAs) are becomes a popular target for implementing cryptographic block ciphers. The recently selected Advanced Encryption Standard (AES) is slowly replacing older ciphers as the building block of choice for secure systems and is well suited to an FPGA implementation. We have also described some possible biometric schemes(RETINA) that can be used for authentication along with cryptography on networked embedded computers. Public-key infrastructures are secure, but only to the extent that private keys of individuals are maintained secret. Usually this involves securing the private key(s) using a password, a PIN or a token. Biometrics alone do not provide a great deal of safety, but a combination of biometrics will provide a higher degree of security for embedded computing devices. Finally we improve the performance of the proposed system using pipelining technique and its efficiency will be proved through hardware synthesis.

 

Keywords: -Field- Programmable Gate Array(FPGA), Cryptography, Advanced Encryption Standard, Public Key.

[1] B. Yang, K.Wu, and R. Karri, "Scan based side channel attack on dedicated hardware implementation of data encryption standard ," in Proc.Int. Test Conf., 2004, pp. 339–344.
[2] B. Yang, K.Wu, and R. Karri, "Secure scan: A design-for-test architecture for crypto chips," IEEE Trans. Comput.-AidedDes.
Integr. Circuits Syst., vol. 25, no. 10, pp. 2287–2293, Oct. 2006.
[3] R. Nara, N. Togawa, M. Yanagisawa, and T. Ohtsuki, "Scan-based attack against elliptic curve cryptosystems," in Proc. IEEE ASPDAC, 2010, pp. 407–412.
[4] G. Sengar, D.Mukhopadhyay, and D. R. Chowdhury, "Secured flipped scan-chainmodel for crypto-architecture," IEEE Trans.
Comput.-Aided Des. Integr. Circuits Syst., vol. 26, no. 11, pp. 2080–2084, Nov. 2007.
[5] M. Agrawal, S. Karmakar, D. Saha, and D. Mukhopadhyay, "Scan based side channel attacks on stream ciphers and their countermeasures," in Proc. Int. Conf. Cryptology India (INDOCRYPT), 2008, pp. 226–238

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Fpga Implementation of Anti-Wear Levelling Design of Ssd with Hybrid Ecc Capability Using Codes
Country
::
india
Authors
::
S.Suganthi || S.Bharath
Page
::
05-15

The Joint Analysis Of Performance And Reliability, In Solid State Drive Design The Hybrid Error Correction Code Is The Alternative Choice. In Ssds Wear Leveling Leads In Early Performance Of Degradation. In That P/E Cycle Are Limited In Number Because Of Delay In Bit Error Rate Growth. The Proposed Anti-Wear Level Design Is To Avoid Performance Problem. Then The Performance Of Ssd With Hybrid Ecc Can Be Upgraded Without Offering Their Reliability. The Ability Of Proposed System Was Analysis By The Series Of Experiment. In Which The Proposed System Of Ldpc, Bch And Hamming Codes Enhanced To 55% Of Read And Write Performance In Ssds Without Disturbing The Investigated Ssd While Compared With Conventional Approaches.


Keywords: - Anti-Wear Levelling ,Bose - Chaudhuri-Hocquenghem (Bch), Low Density Parity Check (Ldpc), Bit Error Rate, Error Correction Code (Ecc), Solid State Drives (Ssd).

[1] Byte-Reconfigurable Ldpc Codec Design With Application To High-Performance Ecc Of Nand Flash Memory Systems, Yu-Min Lin, Huai-Ting Li, Ming-Han Chung, And An-Yeu (Andy) Wu, Fellow, Ieee.
[2] Fault Tolerant Parallel Filters Based On Error Correction Codes, Zhen Gao, Pedro Reviriego, Wen Pan, Zhan Xu, Ming Zhao, Jing Wang, And Juan Antonio Maestro.
[3] Development Of The Parallel Bch And Ldpc Encoders Architecture For The Second Generation Digital Video Broadcasting
Standards With Adjustable Encoding Parameters On Fpga, Tran Van Nghia, Moscow Institute Of Physics And Technology, State University Moscow, Russia.
[4] Hamming Coding For Multi-Relay Cooperative Quantize And Forward Networks, Nasaruddin, Rony Kurnia, 2016 Ieee Region 10 Symposium (Tensymp), Bali, Indonesia.
[5] "Increasing Flash Solid State Disk Reliability," Siliconsystems, Tech. Rep.,Apr. 2005. [Online]. Available:
Http://Www.Storagesearch.Com/ Siliconsys-Art1.Html

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Highly reliable RC5 System Using Biometric Based key generation
Country
::
India
Authors
::
Poonkothai.R || Priyanka.P || BalaVigneshwari.M
Page
::
16-20

In Recent Days Field-Programmable Gate Arrays (Fpgas) Are Becomes A Popular Target For Implementing Cryptographic Block Ciphers, As A Well-Designed Fpga Solution Can Combine Some Of The Algorithmic Flexibility And Cost Efficiency Of An Equivalent Software Implementation With Throughputs That Are Comparable To Custom Asic Designs. The Recently Selected Rc5 Standard Is Slowly Replacing Older Ciphers As The Building Block Of Choice For Secure Systems And Is Well Suited To An Fpga Implementation. We Have Also Described Some Possible Biometric Schemes That Can Be Used For Authentication Along With Cryptography On Networked Embedded Computers. Public-Key Infrastructures Are Secure, But Only To The Extent That Private Keys Of Individuals................

 

Keywords: - Mimo, Spatial Modulation, Index Modulation, Bit Error Rate, Ml Detector Etc.

[1]. B. Yang, K.Wu, and R. Karri, "Scan based side channel attack on dedicated hardware implementation of data encryption standard ," in Proc.Int. Test Conf., 2004, pp. 339–344.
[2]. B. Yang, K.Wu, and R. Karri, "Secure scan: A design-for-test architecture for crypto chips," IEEE Trans. Comput.-AidedDes.
Integr. Circuits Syst., vol. 25, no. 10, pp. 2287–2293, Oct. 2006.
[3]. R. Nara, N. Togawa, M. Yanagisawa, and T. Ohtsuki, "Scan-based attack against elliptic curve cryptosystems," in Proc. IEEE ASPDAC2010, pp. 407–412.
[4]. G. Sengar, D.Mukhopadhyay, and D. R. Chowdhury, "Secured flipped scan-chainmodel for crypto-architecture," IEEE Trans.
Comput.-Aided Des. Integr. Circuits Syst., vol. 26, no. 11, pp. 2080–2084, Nov. 2007.
[5]. M. Agrawal, S. Karmakar, D. Saha, and D. Mukhopadhyay, "Scan based side channel attacks on stream ciphers and their countermeasures," in Proc. Int. Conf. Cryptology India (INDOCRYPT), 2008, pp. 226–238.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Hybrid Scale Invariant Texture Model For Accurate Mammography Clinical Measurements
Country
::
India
Authors
::
Mr. Sethuram Rao || Santhosh.S || Venkatesa Viswanath.G || Rajaram.K
Page
::
21-24

The Local Binary Pattern (Lbp) And Its Variants Have Been Widely Investigated In Many Image Processing And Computer Vision Applications Due To Their Robust Ability To Capture Local Image Structures And Their Computational Simplicity. The Existing Lbps Extract Local Structure Information By Establishing A Relationship Between The Central Pixel And Its Adjacent Pixels. However, Most Lbps Miss The Relationship Among All Of The Pixels In The Local Region. Therefore, This Paper Proposes A Novel Model To Establish This Relationship By Introducing A Support Lbp. The Proposed Model Improves The Performance Of The Existing Lbp Methods And Results In Lower Sensitivity To Illumination Changes And Radiometric Variations. Moreover, The Proposed Model Has Been Successfully Investigated In Breast Cancer Classification Applications: With The Standard Lbp Under Radiometric Variation Conditions. Moreover, The Proposed Model Produced Satisfactory Results As Compared With The Standard Lbp Under The Mias Dataset. For Texture Classification Applications, The Proposed Model Improves The Classification Results From 81% To 90% As Compared With The Completed Lbp.

 

Keywords - Completed Local Binary Pattern (Clbp), Local Binary Pattern (Lbp), Local Derivative Pattern (Ldp), Support Local Pattern.

[1] T. Ojala, M. Pietikainen, And T. Maenpaa, "Multiresolution Gray-Scale And Rotation Invariant Texture Classification With Local Binary Patterns," Ieee Trans. Pattern Anal. Mach. Intell., Vol. 24, No. 7, Pp. 971–987, Jul. 2002.

[2] D. Huang, C. Shan, M. Ardabilian, Y. Wang, And L. Chen, "Local Binary Pattern And Its Application To Facial Image Analysis: A Survey," Ieee Trans. Syst., Man, Cybern. C, Appl. Rev., Vol. 41, No. 6, Pp. 765–781, Nov. 2011.

[3] M. Pietikainen, G. Zhao, A. Hadid, And T. Ahonen, Computer Vision Using Local Binary Patterns, Vol. 40. Berlin, Germany: Springer, 2011.

[4] M. Varma And A. Zisserman, "A Statistical Approach To Texture Classification From Single Images," Int. J. Comput. Vis., Vol. 62, No. 2, Pp. 61–81, 2005.

[5] M. Varma And A. Zisserman, "A Statistical Approach To Material Classifi- Cation Using Image Patch Exemplars," Ieee Trans. Pattern Anal. Mach. Intell., Vol. 31, No. 11, Pp. 2032–2047, Nov. 2009.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Study of Third-Order Nonlinear Optical Properties of Undoped and Dye Doped 1, 7, 7-Trimethylbicyclo [2.2.1] Heptan-2-One Using Z–Scan Technique
Country
::
India
Authors
::
S. Jeyaram || T. Geethakrishnan
Page
::
25-29

Third-Ordernonlinear Optical (NLO) Properties Of Undoped And Dye Doped 1, 7, 7- Trimethylbicyclo [2.2.1] Heptan-2-One Was Studied By A Single Beam Z–Scan Technique. The Experiments Were Performedusing A Continuous Wave (CW) Diode Laser Operating At 635 Nm Wavelength Witha 5 Mw Of Total Power. Both Undoped And Dye Doped Samples Exhibited A Negative Value Of Nonlinear Refraction And Nonlinear Absorption Coefficient Respectively Due To Self-Defocusing And Reverse Saturable Absorption (RSA)Behaviors.The Real And Imaginary Parts Of The Third-Order Nonlinear Susceptibility Were Found To Be The Order Of 10–5esu. The Self-Diffraction Ring Pattern Of The Transmitted Beam Profile Was Also Observed At Far Field. Based On The Experimental Results The Authors Suggest That The Sample Studied Here May Be A Potential Material For Applications In Photonics And Optoelectronics.

 

Keywords -Z–Scan; 1, 7, 7-Trimethylbicyclo [2.2.1] Heptan-2-One; NLO.

[1]. K. McEwan, K. Lewis, G.Y. Yang, L.L. Chng, Y.W. Lee, W.P. Lau, Adv.Funct.Mater.13, 863–867 (2003).

[2]. K. Jamshidi-Ghaleh,S. Salmani, M.H. MajlesAra,Opt. Commun. 271, 551–554 (2007).

[3]. L.W. Tutt, A. Kost, Nature 356, 225–226 (1992).

[4]. M.A.Kramer, W.R. Tompkin, R.W. Boyd,Phys. Rev.A.34,2026–2031 (1986).

[5]. F.E. Hernandez, A.O. Marcano, Y. Alvarado, A. Biondi, H. Maillotte,Opt.Commun.152, 77–82 (1998).

[6]. S. Jeyaram, T. Geethakrishnan,Opt. Laser Technol. 89, 179–185 (2017).

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Token Based Virus Signature with Early Detection Using Fpga
Country
::
India
Authors
::
M.Vijayakumar || K.Rajesh
Page
::
30-37

In This Paper Present The Hardware Architecture Size Of Virus Signature Databases Been Growing Rapidly, Leading To A Corresponding Reduction In The Performance Of Anti-Virus (Av) Software. Hardware Architecture For High Speed Regex Pattern Matching With Virus Database. In General, Virus Signature Databases Comprise String-Based And Hash-Based (E.G., Md5) Signatures. The Proposed Method Is Incorporated With A New Technique Namely Early Detection In Matching The Regex Patterns The Input Byte Stream Is Transformed Into A Token Stream...............Non -Deterministic Finite Automaton, Parallel Processing, Network Intrusion Detection, Gatedlatch, Memory-Based.

 


Key words: - PLC, SCADA, RTU

[1] Clamav Anti-Virus System, Http://Www.Clamav.Net
[2] Snort: Http://Www.Snort.Org
[3] F. Yu, Z. Chen, Y. Diao, T. V. Lakshman And R. H. Katz, "Fast And Memory-Efficient Regular Expression Matching For Deep
Packet Inspection". In Proc. Of ANCS, 2006.
[4] T. H. Lee, "Generalized Aho-Corasick Algorithm For Signature Based Anti-Virus Applications", IEEE Int.Conf. Computer,
Communications And Networks, Pp. 792-797, 2007.
[5] Nga Or, Xing Wang And Derek Pao, "Memory-Based Hardware Architectures To Detect Clamav Virus Signatures With Restricted Regular Expression Features", IEEE Transactions On Computers, No. 1, Pp. 1, 2015.2439274

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Detection Of Diabetics Mellitus And Tongue Cancer Using Tongue Features By Hybrid Classifier
Country
::
India
Authors
::
B.Dhanalakshmi || D.Revathi || S.Kalpana
Page
::
38-40

Diabetics Mellitus (Dm) And Its Problems Leading To Diabetic Retinopathy (Dr) And Tongue Cancer Are Soon To Become One Of The 21st Century's Major Health Problems. This Represents A Huge Financial Burden To Healthcare Officials And Governments. To Overcome This Burden, We Develop This Model To Detect Both Diabetics Mellitus And Tongue Cancer On A Single Model. It Is Based On Person Tongue Images Using The Feature Of Color, Texture And Geometry. Features Extraction Are By Different Color Spaces I.E Rgb To Hsv. First Image Is Enrolled And It Is Undergone With Enhancement And Background Removal. Then All 3features (Color, Texture, Geometry) Are Extracted................

 

Keywords -...............

[1] M. Niemeijer, B. Van Ginneken, J. Staal, M. S. A. Suttorp-Schulten, And M. D. Abramoff, ―Automatic Detection Of Red Lesions In Digital Color Fundus Photographs,‖ Ieee Trans. Med. Imag., Vol. 24, No. 5, Pp. 584–592, May 2005.
[2] J. J. Staal, M. D. Abramoff, M. Niemeijer, M. A. Viergever, And B. Van Ginneken, ―Ridge Based Vessel
[3] Segmentation In Color Images Of The Retina,‖ Ieee Trans. Med. Imag., Vol. 23, No. 4, Pp. 501–509, Apr. 2004.
[4] X. Wang And D. Zhang, ―An Optimized Tongue Image Color Correction Scheme,‖ Ieee Trans. Inf. Technol. Biomed., Vol. 14, No. 6, Pp. 1355–1364, Nov. 2010.
[5] B. Pang, D. Zhang, And K. Q. Wang, ―The Bi-Elliptical Deformable Contour And Its Application To Automated Tongue
Segmentation In Chinese Medicine,‖ Ieee Trans. Med. Imag., Vol. 24, No. 8, Pp. 946–956, Aug.2005.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Expressive and Deployable Hand Gesture Recognition for Sign Way of Communication for Visually Impaired Peoples
Country
::
India
Authors
::
J.Sanmathi Sri || S.Priyadharshini
Page
::
41-44

To Improve Our Communication Between The Normal And Visually Impaire8d Peoples .We Go For The Sign Way Of Communication Is One Of The Most Effective Communication Tool For The People Who Are Not Able To Speak Or Hear Anything. Sign Language Is Boon For The Deaf And Dumb People. Sign Language Is The Combination Of Different Gesture, Shape And Movement Of Hand, Body And Facial Expression. With The Help Of Sign Language, These Physical Impaired People Express Their Emotions And Thoughts To Other Person. Hence Sign Language Recognition Has Become Empirical Task. Since Sign Language Consist Of Various Movement And Gesture Of Hand Therefore The Accuracy Of Sign Language Depends On The Accurate Recognition Of Hand Gesture. This Project Present Various Method Of Hand Gesture And Sign Language Recognition Proposed In The Past By Various Researchers.

 

Keywords-Dump, Deaf, Sign Language, Gesture, Recognition

[1] Prof. R R.Itkarkar And Dr.Anil, V Nandi," HandGesture To Speech Conversion Using Matlab," ICCCNT 2013 July 4-6, 2013,
Tiruchengode,India.
[2] Aarthi.M And Vijayalakshmi.P,"Sign Language To Speech Conversion,"2016 Fifth International Conference On Recent Trends In Information Technology.
[3] Arthi M And Vijayalakshmi P,"Sign Language Recognition System To Aid Deaf-Dumb People Using PCA,"2016 International
Journal Of Computer Science & Engineering Technology (IJCSET).
[4] Shraddha R Ghorpade And Surendra K Waghamare," Full Duplex Communication System For Deaf & Dumb People," International Journal Of Emerging Technology And Advanced Engineering. [5] Ms.Shubhangi, G.Shinde, Prof.Rajashri, R.Itkarkar,
[5] Dr.Anilkumar, V.Nandi," Gesture To Speech Conversion For Sign Language Recognition,"International Journal Of Innovations& Advancement In Computer Science (IJIACS)ISSN 2347 – 8616 Volume 6, Issue 9 September 2017.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
High Performance Fbmc/Oqam System for Next Generation Multicarrier Wireless Communication
Country
::
India
Authors
::
R.Priyadharshini || A.Savitha || Ms.T.Rathi
Page
::
45-49

In This Paper We Propose Cyclic Prefix Less Filter-Bank Multi-Carrier With Offset Quadrature Amplitude Modulation (FBMC/OQAM) System Over OFDM For Next Generation Wireless Standards. We Proved That Overall Throughput Metrics Of OFDM System In Fact Largely Limits By Delay Insertion And Also Depends On Many Parameters And Even With Multistage Pipelining Data Rate Can't Be Extended Up To 5G Requirements. Therefore, The Availability Of Efficient Hardware Implementations With Maximum Operating Frequency Becomes Of High Interest. In This Work, Pipelined Hardware With Maximized Parallel Processing Architecture Is Used At The Transmitter Which Capable Of Supporting Several Filter Lengths With Low Complexity And Its Efficiency Is Compared With OFDM Implementations.............

 

Keywords - OFDM, Quadrature Amplitude Modulation, Filter Bank, Bit Error Rate , Signal Detector Etc.

[1] B. Le Floch, M. Alard, And C. Berrou, "Coded Orthogonal Frequency Division Multiplex," Proc. IEEE, Vol. 83, No. 6, Pp. 982–
996, June 1995.
[2] P. Siohan, C. Siclet, And N. Lacaille, "Analysis And Design Of OFDM/OQAM Systems Based On Filterbank Theory," IEEE
Trans. Signal Process., Vol. 50, No. 5, Pp. 1170–1183, May 2002.
[3] M. G. Bellanger, "Specification And Design Of A Prototype Filter For Filter Bank Based Multicarrier Transmission," In Proc. 2001 IEEE Int. Conf. Acoustics, Speech, And Signal Process., Pp. 2417-2420.
[4] B. Farhang-Boroujeny And C. H. Yuen, "Cosine Modulated And Offset QAM Filter Bank Multicarrier Techniques: A Continuous- Time Prospect," EURASIP J. Advances In Signal Process., Vol. 2010, Jan. 2010.
[5] M. Alard, "Construction Of A Multicarrier Signal," Patent WO96/35 278, 1996.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
White and Red Lesions Detection for Diabetic Retinopathy
Country
::
India
Authors
::
C.Gunaselvi || K .Gomathi || A.Poomani || N.Pavithira
Page
::
50-55

Exudates That Appears As Bright Yellow Or White Lesions In Color Fundus Images, Is An Important Symptom Of Diabetic Retinopathy. In This Paper, An Efficient Image Based Method For The Automatic Detection Of Exudates, Is Presented And Validated. To Identify The Exudates, The Proposed Approach Performs A Hierarchical Correlation Clustering On The Input Retinal Images. Ten Different Features, Based On Dynamic Shape, Colour, Contrast And Brightness, Are Extracted For Each Patient Segment. Based On The Values Of The Feature Vectors, Each Patient Segment Is Categorized As Mild, Moderate And Severe Using Random Forest (Rf) Classifier. The Proposed Matlab App........... 

 

Keywords - Color Fundus Images, Diabetic Retinopathy, Exudates, Lesions, Random Forest Classifier.

[1]. Luca Giancardo, "Quality Analysis Of Retina Images For The Automatic Diagnosis Of Diabetic Retinopathy",
Http://Gradvibot.Ubourgogne.Fr/Thesis1/Giancardo_Luca.Pd
[2]. R. Klein, B. Klein, S. Moss, M. Davis, And D. Demets, "The Wisconsin Epidemiologic Study Of Diabetic Retinopathy", Arch.
Ophthalmology, Vol. 102, No. 4, 1984 Pp. 520–526.
[3]. Kempen Jh, O'colmain Bj, Leske Mc, Et Al., Arch Ophthalmol (2004), Pp. 552–563.
[4]. D. Klein, B. E. Klein, S. E. Moss Et Al, "The Wisconsin Epidemiologic Study Of Diabetic Retinopathy", Ophthalmol., Vol. 94,
1986, Pp. 1389–1400.
[5]. S.R. Salomao. R.K.H. Mitsuhiro, And R. B.Jr., "Visual Impairment And Blindness: An Overview Of Prevalence And Cause In
Brazil," Anals Of The Brazilian Academy Of Sciences, Vol. 81. Pp. 539-549, 2009.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Detection and Disposal of Defects in Sewage Pipe Using Robots
Country
::
India
Authors
::
Harichandana Voora || S.Jayashree Annal || E.Kalpana || Mrs.G.Anuvidhya
Page
::
56-58

In All Part Of The World, People Die While Cleaning The Sewage Pipe. Our Main Objective Is To Overcome The Problem By Replacing The Human Life Through The Robot. It Detects The Toxic And Non-Toxic Gases By The Use Of The Gas Sensor. We Can Analyze The Blocks Using The Wireless Camera. The Robot Is Designed With Two Robotic Arms. Finally, It Detects The Blockage And Removes The Block By Using Robot Arms By The User Control And Dispose It At Nearby Sewage Pipeline.

 

Keywords - Pic Controller (16f877a), Power Supply, Gas Sensor, Camera Module, Robotic Mechanism, Control Unit, Proteus, Embedded C.

[1] B. Nemec And A. Ude, "Action Sequencing Using Dynamic Movement Primitives," Robotica, Vol. 30, Pp. 837–846, Sep. 2012.
[2] D. Martínez, G. Alenyá, And C. Torras, "Planning Robot Manipulation To Clean Planar Surfaces," Eng. Appl. Artif. Intell., Vol.
39, Pp. 23–32,Mar. 2015.
[3] A. M. Kabir, J. D. Langsfeld, C. Zhuang, K. N. Kaipa, And S. K. Gupta, "Automated Learning Of Operation Parameters For
Robotic Cleaning By Mechanical Scrubbing," In Proc. ASME 11th Int. Manuf. Sci. Eng. Conf., Jun. 2016, P. V002T04A001.
[4] J. D. Langsfeld, A. M. Kabir, K. N. Kaipa, And S. K. Gupta, "Robotic Bimanual Cleaning Of Deformable Objects With Online
Learning Of Part And Tool Models," In Proc. IEEE Int. Conf. Autom. Sci. Eng. (CASE),Aug. 2016, Pp. 626–632.
[5] J. D. Langsfeld, A. M. Kabir, K. N. Kaipa, And S. K. Gupta, "Online Learning Of Part Deformation Models In Robotic Cleaning
Of Compliant Objects," In Proc. ASME 11th Int. Manuf. Sci. Eng. Conf., Jun. 2016, P. V002T04A003.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Energy Efficient Multipath Routing Protocol for Manet Using Fitness Function
Country
::
India
Authors
::
Ramya.V || Sangeetha.M || Ms. A. Rajeswari M.E
Page
::
59-63

Consumption Is Considered As One Of The Major Limitations In Manet, As The Mobile Nodes Do Not Possess Permanent Power Supply And Have To Rely On Batteries, Thus Reducing Network Lifetime As Batteries Get Exhausted Very Quickly As Nodes Move And Change Their Positions Rapidly Across Manet. The Research Proposed In This Paper Highlights This Very Specific Problem Of Energy Consumption In Manet By Applying The Fitness Function Technique To Optimize The Energy Consumption In Ad Hoc On Demand Multipath Distance Vector (Aomdv) Routing Protocol...............

 

Keywords - Aomdv , Encryption, Energy Efficiency, Multipath Routing, Manets ,Network Lifetime.

[1] M. K. Marina And S. R. Das, "Ad Hoc On-Demand Multipath Distance Vector Routing", Wireless Communications And Mobile
Computing, Vol. 6(7), Pp. 969–988, 2006.
[2] A. Nasipuri And S. R. Das, "On-Demand Multipath Routing For Mobile Ad Hoc Networks", Eight International Conference On
Computer Communications And Networks, Ieee, Pp. 64-70, 1999.
[3] M. Tarique, K. E. Tepe, S. Adibi, And S. Erfani, "Survey Of Multipath Routing Protocols For Mobile Ad Hoc Networks", Journal
Of Network And Computer Applications, Vol. 32(6), Pp. 1125–1143, 2009.
[4] N. K. Ray, "Techniques To Enhance The Lifetime Of Mobile Ad Hoc Networks", Phd Thesis, Ethesis.Nitrkl.Ac.In/6546, 2013.
[5] S. Adibi And S. Erfani, "A Multipath Routing Survey For Mobile Adhoc Networks", Proceedings Of The Ieee Consumer
Communications And Networking Conference (Ccnc), Pp. 984–988, 2006.