An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited battery source. Also, due to node mobility, link failures in such networks are very frequent and render certain standard protocols inefficient resulting in wastage of power and loss in throughput. The power consumption is an important issue with the goal to maintain the network lives for long by consuming less power. The power consumption can be achieved by modifying algorithms such as cryptographic algorithms,Routing algorithms, Multicast Algorithms, Energy Efficient Algorithms and Power Consumption Techniques in High Performance Computing, Compression and decompression algorithms, minimizing link failure algorithms, and by power control algorithms. In this work, we have proposed a new algorithm for minimization of power consumption in Ad hoc networks. The performance of the proposed model is analyzed and it is observed that, information could be sent with security consuminglesscomputational power, thereby increasing the battery life.
Mobile Ad hoc Networks (MANETs) are wireless infrastructure less networks can be easily formed or deployed due to its simple infrastructure. Since each node acts as a router, the nodes must assist in discovery and maintain the network routes for long standing which is not possible due to limited battery source. This reflects on link failures which increase the overhead. Since the MANETs has tremendous applications in commercial, military, mobile conferencing outside the office, battlefield communications, embedded sensor devices that automate household functions, etc., the goal is to maintain the network sustain for long by reducing power consumption. The power consumption plays a vital role in MANETS, and there are lots of low power consumption techniques were designed. Among many, data compression technique is a simple technique, with the benefit of reducing the transmission rate that consumes less bandwidth and low power. Hence in this work, Lempel-Ziv-Welch (LZW) compression algorithm is implemented and the simulation results proved that the data can be transmit with low power consumption without any loss of data. This, in turn helps in reducing the battery consumption, thereby increasing the battery life.
In this paper, Non-subsampled medical image fusion is a unique tool, which develops many imaging techniques in medical field. The main work is to capture the information from different image sources and convert them into single output. Two different fusion rules like phase congruency and directive contrast are introduced. The work was discussed based on the images in medical field which gives accurate results with less distortion is based upon transformation and parameters. The main drawback of previous methods are they cannot produce a color image for better clarity and accurate analysis of medical image. In this paper, the parameters such as Mutual Information(MI), Edge Based Similarity Measure(QAB/F), Structural Information Metric(Qe), Degree Of Distortion(Qo) and Normalization Of Image(Qw) are introduced to increase the visual perception of an image. The parameters and lab-transform is used for better quality of the image. KeywordsNSCT domain, MRI image, CT image, phase congruency and directive contrast.
Abstract-Mobile Ad hoc Networks are wireless infrastructure less networks can be easily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance of the network by securing the data and to minimize the malicious nodes which disturb the stream of the network. Securing data is a critical task which can be achieved by cryptographic algorithms and disturbance detection plays as a crucial ingredient in any comprehensive security solution to address the threats. Hence a Novel Cryptographic Algorithm with a new Disturbance Detection System (DDS) has been proposed for Mobile Adhoc Networks. This method prevents the outside attacks to obtain any information from any data exchange in network and also use promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. The proposed algorithm was implemented and simulated in the Glomosim and the result analysis proved that the performance of the network is increased.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.