Efficient Algorithms for Distributed Mutual Exclusion in Mobile Ad-Hoc Network
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 6
Abstract
For distributed mutual exclusion problem in mobile environment we presented two algorithms.Both the algorithms are token based. The first algorithm is providing tokens to the nodes which are in critical section and the second one is hierarchical clustering based. A mobile ad-hoc networks (MANET) is hierarchically (two level) clustered to get logical tree network through which the token is passed from one node to another. However, we simulate the second algorithm only. The evaluation of the proposed algorithms show that its message requirement is optimal, and thus the second algorithm is an energy efficient algorithm.
Authors and Affiliations
R. Karthick , B. Gopinathan
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
The major threat to wireless network is Denial of Service attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Here, we address the...
OPTIMIZED FLAME DETECTION USING IMAGE PROCESSING BASED TECHNIQUES
Present work is an in depth study to detect flames in video by processing the data captured by an ordinary camera. Previous vision based methods were based on color difference, motion detection of flame pixel and flame e...
Parallel Implementation of Similarity Measures on GPU Architecture using CUDA
Image processing and pattern recognition algorithms take more time for execution on a single core processor. Graphics Processing Unit (GPU) is more popular now-a-days due to their speed, programmability, low cost and mor...
“Noise Detection and Noise Removal Techniques in Medical Images”
In this experimental work we have taken different medical images like MRI, Cancer, X-ray, and Brain and we have calculated standard derivations and mean of all these medical images after finding Gaussian noise and then w...
ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER
In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goa...