Enhanced shortest Path and Query Response Time for Users in Location Based Service
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 7
Abstract
The most important brave on answering live shortest paths is scalability, in terms of the number of clients and the amount of live traffic updates. An innovative and talented solution to the shortest path computation is to televise an air index over the wireless network called index transmission model. The most important advantages of this model are that the network overhead is self-determining of the number of clients and each client only downloads a portion of the entire roadmap according to the index information. For occurrence the proposed index comprises a set of pair wise smallest amount and maximum travelling costs between every two sub partitions of the road map. Though, these methods only resolve the scalability issue for the number of clients but not for the amount of live traffic updates. There-computation time of the index takes 2 hours for the San Francisco (CA) road map. It is prohibitively costly to update the index for OSP, in order to keep up with live traffic situation.
Authors and Affiliations
G. Naresh Kumar, Y. Jayababu, G. Vijay Kumar
Pilot-Symbol Assisted Power Delay Profile Estimation for MIMO-OFDM Systems
In this paper a power delay profile (PDP) estimation technique is proposed for the linear minimum mean square error (LMMSE) channel estimator of multipleinput multiple-output orthogonal frequency division multiplexing...
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...
A Stochastic Representation to Probe Data Center Implementation and QoS in Iaas Cloud Organizations
Cloud computing is a general term for framework architectures that includes conveying facilitated administrations over the Internet, made conceivable by huge advancements in virtualization and circulated figuring, an...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...
Survey on Different Data Hiding Techniques
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...