Papers by Dr.Deepak Dembla
Network topology can change quickly and unpredictably in mobile adhoc networks (MANETs), since th... more Network topology can change quickly and unpredictably in mobile adhoc networks (MANETs), since there may exist a large number of independent ad hoc connections. All the routing protocols use a basic technique of route request transmission i.e. blind flooding which causes a lot of overheads in terms of end to end delay, packet delivery ratio, no. of routing packets generated etc. Because this is a bottleneck in performance of AODV protocol, an improved AODV protocol is proposed here. The proposed protocol is modeled, analyzed and implemented on base AODV routing protocol, based on improved method of route discovery and the proposed protocol adjusts itself dynamically based on the network density of MANET. The proposed protocol implementation is done in GloMoSim. The simulation results show that improved-AODV (I-AODV) protocol significantly reduces the no. of rebroadcasts and hence reduces the routing overheads caused due to broadcast storm in the network. Keywords- MANET, AODV, broad...
Bookmarks Related papers MentionsView impact
Abstract- Mobile ad hoc network is a self-directed structure of mobile nodes connected by wireles... more Abstract- Mobile ad hoc network is a self-directed structure of mobile nodes connected by wireless links. All nodes operate not only as an end system, but also as work as a router to forward the packets. Ad hoc wireless networks are characterized by multi-hop wireless connectivity, infrastructure less and habitually changing topology. It may be necessary for one mobile node to schedule other hosts for forwarding a packet from source to destination node due to the constrained transmission range of wireless network interfaces. Therefore a self-motivated routing protocol is required for these networks to work properly. A number of Routing protocols have been created to achieve this task. In this paper, the performance of Mobile Ad-Hoc network routing protocols DSDV, AODV and DSR are evaluated using network simulator NS2. The performance metrics includes PDF (Packet Delivery Fraction),
Bookmarks Related papers MentionsView impact
A mobile adhoc network is a collection of autonomous mobile nodes that that communicate with each... more A mobile adhoc network is a collection of autonomous mobile nodes that that communicate with each other over wireless links. Hosts need to specify the requirements of the neighbors for efficient routing outside their transmission range. However, since there is no stationary infrastructure such as base stations, each host has to act as a router in itself and hence, a routing protocol runs on every host and is therefore subject to the limit of the resources at each mobile host. This paper proposes a new Efficient and dynamic probabilistic broadcasting (EDPB) approach, which solves the broadcast storm problem of AODV. Global Mobile Simulator is used to run simulations. The main performance metrics considered in simulations are routing overhead and end-to-end delays. The results show that, the normalized routing load is reduced to around 35 % to 40 % compared with AODV-blind flooding and AODV-fixed probability model, at a very heavy traffic load, when used with AODV-EDPB. The results sh...
Bookmarks Related papers MentionsView impact
Abstract-A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely an... more Abstract-A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely and dynamically self-organize and co-operative in to arbitrary and temporary network topologies. Security of AODV protocol is compromised by a particular type of attack called 'Black Hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. If there are multiple malicious nodes in a network and are co-operating with each other then it is known as "cooperative black hole attack". In this work a hybrid approach is proposed for implementing H-AODV, by preventing malicious nodes from network and improving efficiency. The proposed H-AODV protocol is simulated on ns-3 simulator and results are compared and analysed with base AODV protocol, based on important performance metrics like packet delivery fraction, end-to-end delay and throughput. It is concluded from the result that H-AODV with propo...
Bookmarks Related papers MentionsView impact
The key confront in Mobile Ad hoc Network (MANET) is its dynamic nature, which itself carries sec... more The key confront in Mobile Ad hoc Network (MANET) is its dynamic nature, which itself carries security measures. The Mobile Ad hoc Network is multi-hop in nature where nodes are required to perform communication activity for end to end connectivity which is being used for transferring data packets and thereby spending its resources. A selfish node is one that tries to consume the network resources for its own benefit but is unwilling to spend its own resource for others. If such selfish behavior continues among nodes in network, it may be harmful for network by creating disorder. In this paper, Proposed ES-DSR (Enhanced Selfish DSR) is implemented on NS-2 and results shown significant improvement over original DSR in terms of performance evaluation of network. In proposed protocol, as mobility increases, there is significant decrease in communication overhead that is almost about 50 % than DSR protocol which is one of the main beneficial point of our proposed protocol and also as sp...
Bookmarks Related papers MentionsView impact
Recent concerns regarding privacy breach issues have motivated the development of data mining met... more Recent concerns regarding privacy breach issues have motivated the development of data mining methods, which preserve the privacy of individual data item. A cluster is gathering of information in such a way that the objects with similar properties are grouped into similar clusters and objects with dissimilar properties are placed into different clusters. The K-Means clustering algorithm is a broadly utilized plan to solve the clustering problem. In this paper, a comparative study of three clustering algorithms—K-means, Hierarchical and Cobweb across two different datasets is being performed. To form Clusters WEKA API has been used. The comparison is made with the variant of standard K-means technique that is Modified K-means technique. The Modified K-means technique has been developed to give better results as compared to existing K-means, Hierarchical and Cobweb techniques. This work also includes encryption and decryption of the formed clusters using AES algorithm to provide priva...
Bookmarks Related papers MentionsView impact
In MANET, there is no pre defined infrastructure to monitor the resources used by the mobile node... more In MANET, there is no pre defined infrastructure to monitor the resources used by the mobile nodes. The Ad Hoc On Demand Distance Vector (AODV) and most of the on demand ad hoc routing protocols uses the idea of particular route reply beside the reverse path. Due to immediate changes of network structure the route reply may not arrive to the source node resulting in sending many route request messages and decreasing the concert of the routing protocol. To overcome these all the problems, an efficient AODV (E-AODV) routing protocol is projected. In E-AODV the destination a node recognizes first route request message (RREQ), it produces Turn-Around route request (TA-RREQ) message and deluges it to neighbor nodes within transmission range. When the source node receives first TA-RREQ memo, then it starts packet broadcast, and late entered TA-Route Requests are saved for further use. It decreases route fail variation messages and gets very good performance as compared to existing AODV. T...
Bookmarks Related papers MentionsView impact
International Journal of Computer Applications, 2013
The key confront in Mobile Ad hoc Network (MANET) is its dynamic nature, which itself carries sec... more The key confront in Mobile Ad hoc Network (MANET) is its dynamic nature, which itself carries security measures. The Mobile Ad hoc Network is multi-hop in nature where nodes are required to perform communication activity for end to end connectivity which is being used for transferring data packets and thereby spending its resources. A selfish node is one that tries to consume the network resources for its own benefit but is unwilling to spend its own resource for others. If such selfish behavior continues among nodes in network, it may be harmful for network by creating disorder. In this paper, Proposed ES-DSR (Enhanced Selfish DSR) is implemented on NS-2 and results shown significant improvement over original DSR in terms of performance evaluation of network. In proposed protocol, as mobility increases, there is significant decrease in communication overhead that is almost about 50% than DSR protocol which is one of the main beneficial point of our proposed protocol and also as spe...
Bookmarks Related papers MentionsView impact
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in ... more In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. The motes in these networks are coordinate to produce high quality information and each of these scattered motes has the capabilities to collect and route at aback to the bases stations, which are fixed or mobile. The main objective of this research work is to optimize the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. There are two reasons behind the hierarchical routing be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. In this research work implementation of LEACH routing protocol using NS2 simulator and finally in I-LEACH routing protocol ensure tha...
Bookmarks Related papers MentionsView impact
Quick response time and accuracy are important factors in the success of any database. In large d... more Quick response time and accuracy are important factors in the success of any database. In large databases particularly in distributed database, query response time plays an important role as timely access to information and it is the basic requirement of successful business application. A data warehouse uses multiple materialized views to efficiently process a given set of queries. The materialization of all views is not possible because of the space constraint and maintenance cost constraint. Materialized views selection is one of the crucial decisions in designing a data warehouse for optimal efficiency. Selecting a suitable set of views that minimizes the total cost associated with the materialized views is the key component in data warehousing. Materialized views are found useful for fast query processing. This paper gives the results of proposed tree based materialized view selection algorithm for query processing. In distributed environment where database is distributed the no...
Bookmarks Related papers MentionsView impact
Mobile ad hoc network is a self-directed structure of mobile nodes connected by wireless links. A... more Mobile ad hoc network is a self-directed structure of mobile nodes connected by wireless links. All nodes operate not only as an end system, but also as work as a router to forward the packets. Ad hoc wireless networks are characterized by multi-hop wireless connectivity, infrastructure less and habitually changing topology. It may be necessary for one mobile node to schedule other hosts for forwarding a packet from source to destination node due to the constrained transmission range of wireless network interfaces. Therefore a self-motivated routing protocol is required for these networks to work properly. A number of Routing protocols have been created to achieve this task. In this paper, the performance of Mobile Ad-Hoc network routing protocols DSDV, AODV and DSR are evaluated using network simulator NS2. The performance metrics includes PDF (Packet Delivery Fraction), Throughput, End to End Delay, NRL (Normalized Routing Load), routing overhead and Packet Lost. The performances ...
Bookmarks Related papers MentionsView impact
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
Authentication means preserving the systems and information from unwanted unauthorized access, us... more Authentication means preserving the systems and information from unwanted unauthorized access, usage, disclosure, disruption, integration, inspection, modification or destruction of the information. The studies have shown that the text passwords are more vulnerable to shoulder surfing, brute force, and dictionary attacks. The password with images are hard to guess and will provide a more secure way to access the recourse, with much more security but they are still vulnerable to shoulder surfing attacks. In proposed system the video is used as a password. OpenCv (open source computer vision) is used, which is an open source to capture video and will extract the frames out of the videos and these frames are stored in an encrypted form using AES(advanced encryption standard) and in turn to authenticate the user JAMA(numerical linear algebra library) is used. Java is used for implementation which is platform independent. The proposed method can be used where the password protection is r...
Bookmarks Related papers MentionsView impact
A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely and dynamic... more A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes which can freely and dynamically self-organize and co-operative in to arbitrary and temporary network topologies. Security of AODV protocol is compromised by a particular type of attack called 'Black Hole' attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. If there are multiple malicious nodes in a network and are co-operating with each other then it is known as "co- operative black hole attack". In this work a hybrid approach is proposed for implementing H-AODV, by preventing malicious nodes from network and improving efficiency. The proposed H-AODV protocol is simulated on ns-3 simulator and results are compared and analysed with base AODV protocol, based on important performance metrics like packet delivery fraction, end-to-end delay and throughput. It is concluded from the result that H-AODV with proposed enhan...
Bookmarks Related papers MentionsView impact
In the field of text classification and information retrieval, the process of text summarization ... more In the field of text classification and information retrieval, the process of text summarization has always been an important aspect. It decreases the size of text and preserves its information content by providing a shorter illustration. This illustration has the major portion of data, i.e., the most vital information and it is no longer than the half of source data. In addition, it is the best solution for information overloading problem as we do not have to scan through each line of long length documents and still receive the foremost important information. For the betterment of this process, we have proposed an algorithm utilizing lexical chain calculation and it is implemented using Eclipse Java Development Tool, enterprise edition for web developers. Along with WordNet API, this method also included the nouns and proper nouns in the computation of lexical chains. MAX tagger is used for part-of-speech tagging and statistical calculations. By the execution of proposed methodolog...
Bookmarks Related papers MentionsView impact
A data warehouse (DW) contains multiple views accussed by queries. One of the most important deci... more A data warehouse (DW) contains multiple views accussed by queries. One of the most important decisions in designing a DW is selecting views to materialize for the purpose of efficiently supporting decision making. The search space for possible materialalized views is exponentially large. Therefore heuristics have been used to search for a near optimal solution. In this paper, we explore the use of an evolutionary algorithm for materialized view selection based on multiple global processing plans for queries. We apply a hybrid evolutionary algorithm to solve three related problems. The first is to optimize queries. The second is to choose the best global processing plan from multiple global processing plans. The third is to select materialized views from a given global processing plan. Our experiment shows that the hybrid evolutionary algorithm de- livers better performance than either the evolutionary algorithm or heuristics used alone in terms of the minimal query and maintenance c...
Bookmarks Related papers MentionsView impact
Over the past decades, digital video compression technologies have become an integral part of the... more Over the past decades, digital video compression technologies have become an integral part of the way we create, communicate and consume visual information. Digital video communication can be found today in many application sceneries such as broadcast services over satellite and terrestrial channels, digital video storage, wires and wireless conversational services and etc. The data quantity is very large for the digital video and the memory of the storage devices and the bandwidth of the transmission channel are not infinite, so it is not practical for us to store the full digital video without processing. For instance, we have 720 x 480 pixels per frame, 30 frames per second, total 90 minutes full color video, and then the full data quantity of this video is about 167.96 Gigabytes. Thus, several video compression algorithms had been developed to reduce the data quantity and provide the acceptable quality as possible as can. This paper starts with an explanation of the basic concep...
Bookmarks Related papers MentionsView impact
In today’s era advanced digital technologies have made multimedia data widely available. Recently... more In today’s era advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a detailed analysis on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. Generally chaotic based cryptography is not suitable for practical application. It does not secure algorithm due to dependency of initial condition [1][3], which can be easily broken. This Algorithm is optimizing by B.B equation. Modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build a...
Bookmarks Related papers MentionsView impact
A MANET is referred as an infrastructure less network because the mobile nodes in the network dyn... more A MANET is referred as an infrastructure less network because the mobile nodes in the network dynamically locate paths among themselves to transfer packets provisionally. Security is core concern in routing protocol of MANET and affects the performance. Here, a innovative request forwarding mechanism is proposed in which source node generates route request packet and broadcast packet to other neighbor nodes to locate destination by implementing black hole attack. Enhanced DSR Routing is proposed & implemented by using selfish nodes in network, and it is found from results that enhanced DSR routing protocol is better than existing DSR protocol on performance measures such as throughput, routing overhead, end to end delay and packet delivery ratio. As mobility increases, there is significant decrease in communication overhead that is almost about 60% than DSR protocol which is one of the main beneficial point of our proposed protocol and also as speed increases end to end delay is als...
Bookmarks Related papers MentionsView impact
Knowledge discovery in databases is a rapidly growing field, whose development is driven by stron... more Knowledge discovery in databases is a rapidly growing field, whose development is driven by strong research interests as well as urgent practical, social, and economical needs. In this paper we look at the use of link analysis in data mining to help detecting the crime patterns and speed up the process of solving crimes. In our study, we have seen that how this data mining tool in knowledge discovery process learns the typical behavior (’profile’) of serial killers by applying link analysis, and helps in detecting the offender’s movements. We looked at the use of data mining for identifying crime patterns using semantic link association algorithm. Our contribution here was to formulate crime pattern detection as machine learning task and to thereby use data mining to support police detectives in solving crimes. We identified the significant attributes and developed the scheme for weighting the significant attributes. Our modeling technique was able to identify the crime patterns fro...
Bookmarks Related papers MentionsView impact
Advances in Mathematics: Scientific Journal
Bookmarks Related papers MentionsView impact
Uploads
Papers by Dr.Deepak Dembla