http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Reliable Multicast using Opportunistic Feeding and Inter-batch Coding
Meenakshi Sharma,Nitika Chowdhary,Jyoteesh Malhotra 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.4
In modern wireless networks, multicast is a very important technique to improve network performance, including throughput, delay, energy efficiency, loss monitoring, etc. The quality of wireless links in wireless networks is affected by many factors like collisions, fading, packet loss problem and noise. Multicast techniques and reliable multicast protocol are used to resolve these negative factors and improve throughput and reduce delay in lossy wireless networks. Point-to-multipoint data transmission over wireless IP networks occurs in multicast technology. Bandwidth of network saved and load on the network is reduced with the use of multicast technique. In this paper, the four key techniques named as LP-based opportunistic routing structure, opportunistic feeding, fast batch moving and inter-batch coding, are reviewed.
Performance Measure Modeling Of Routing Protocols In MANET
Anmol Preet Kaur,Nitika Chowdhary,Jyoteesh Malhotra 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.6
Mobile ad-hoc networks (MANETs) are recently attracting a lot of interest due to their widely available wireless devices and low communication cost. MANET comprises a set of wireless communicating devices able to connect instantaneously without any pre-existing base station. Due to a limited transmission range of mobile devices, they need multi-hop routing for communication. In MANET nodes can change topology in an unpredictable manner so they need an efficient routing protocol which can handle the changing topology. However, MANET suffers from many challenges, including decentralization, low memory device, infrastructure less, bandwidth and limited battery reservoir. Different modes of the nodes like active-communication mode and non-active-communication mode consume available energy of a node. This paper presents an energy measurement model which shows the remaining energy level in each mobile node after some activity. The parameters required for designing energy measurement model consist of initialEnergy, txPower, rxPower, and idlePower. This paper also evaluates the performance measure metrics of two routing protocols such as Ad hoc On Demand Distance Vector (AODV) and Destination Sequenced Distance Vector (DSDV). This paper analyzes these routing protocols by simulation tested in network simulator (NS2). The performance will be studied based on Throughput, Packet loss, Routing delay, Cumulative sum of dropped packets, Calculate energy consumption and remaining energy at each node.
To Evaluate the Effect of Burst Length on the Performance of Optical Burst Switched Networks
Upkar Kaur,Nitika Chowdhary,Jyoteesh Malhotra 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.4
Optical burst switching (OBS) has attracted interest of many from researchers to industries as a transport network architecture for the future optical Internet. OBS acts as a backbone to the Internet by providing long distance and large bandwidth links. In this work, we study the OBS networks in a very well-known network simulator tool “NCTUns” along-with the study of its performance evaluation. NCTUns is a high fidelity network simulator which can be used for simulating both wired and wireless networks. The simulation setup and evaluation results have been generated in NCTUns 6.0 running on Fedora 12 with kernel version 2.6.31.6.
Sethi Benu,Jain Monika,Chowdhary Manish,Soni Yogesh,Bhatia Yukti,Sahai Vikram,Mishra Saroj The Korean Society for Biotechnology and Bioengine 2002 Biotechnology and Bioprocess Engineering Vol.7 No.1
The cloning and expression of $\beta-glucosidase$ II, encoded by the gene ${\beta}glu2$, from thermotolerant yeast Pichia etchellsii into Escherichia coli is described. Cloning of the 7.3 kb BamHI/SalI yeast insert containing ${\beta}glu2$ in pUC18, which allowed for reverse orientation of the insert, resulted in better enzyme expression. Transformation of this plasmid into E. coli JM109 resulted in accumulation of the enzyme in periplasmic space. At $50^{\circ}C$, the highest hydrolytic activity of 1686 IU/g protein was obtained on sophorose. Batch and fed-batch techniques were employed for enzyme production in a 14 L bioreactor. Exponential feeding rates were determined from mass balance equations and these were employed to control specific growth rate and in turn maximize cell growth and enzyme production. Media optimization coupled with this strategy resulted in increased enzyme units of 1.2 kU/L at a stabilized growth rate of $0.14\;h^{-l}$. Increased enzyme production in bioreactor was accompanied by formation of inclusion bodies.
Impact Evaluation of Distributed Denial of Service Attacks using NS2
Raghav Vadehra,Nitika Chowdhary,Jyoteesh Malhotra 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.8
Distributed Denial of Service (DDoS) attacks has been a prominent threat to the Internet community. The attack effect is recognized by large number of client base due to the dependency of majority users on World Wide Web. In such an attack, the attacker targets a machine or a server to thwart its services to the intended users. These attacks are majorly motivated by the presence of multiple groups of hackers present on the Internet. As the research has progressed in this field, researchers have encountered a lot many ways through which attacks have been successful launched. In early years of its birth, the Internet was not designed keeping in mind various possible security aspects thus it lacked this immunity in present day. This paper covers the advent of the DDoS attacks along-with their types. We have also designed certain simulation scenarios based on flooding based DDoS attacks to measure its impact on legitimate users. A discussion on the present solutions to combat such attack situations concludes our work.
Saroj Mishra,Benu Sethi,Monika Jain,Manish Chowdhary,Yogesh Soni,Yukti Bhatia,Vikram Sahai 한국생물공학회 2002 Biotechnology and Bioprocess Engineering Vol.7 No.1
The cloning and expression of β-glucosidase II, encoded by the gene bglu2, from thermo- tolerant yeast Pichia etchellsii into Escherichia coli is described. Cloning of the 7.3 kb BamHI/SalI yeast insert containing bglu2 in pUC18, which allowed for reverse orientation of the insert, resulted in better enzyme expression. Transformation of this plasmid into E. coli JM109 resulted in accumulation of the enzyme in periplasmic space. At 50oC, the highest hydrolytic activity of 1686 IU/g protein was obtained on sophorose. Batch and fed-batch techniques were employed for enzyme production in a 14 L bioreactor. Exponential feeding rates were determined from mass balance equations and these were employed to control specific growth rate and in turn maximize cell growth and enzyme production. Media optimization coupled with this strategy resulted in increased enzyme units of 1.2 kU/L at a stabilized growth rate of 0.14 h-1. Increased enzyme production in bioreactor was accompanied by formation of inclusion bodies.
Evaluation of Flow and Average Entropy Based Detection Mecha-nism for DDoS Attacks using NS-2
Raghav Vadehra,Manjit Singh,Butta Singh,Nitika Chowdhary 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.5
Distributed Denial of Service (DDoS) attacks has started posing a serious threat to all sorts of businesses, which have used the power of internet to their credit. DDoS attacks have put a big question mark on the capabilities and reliability of the World Wide Web. The use of supreme techniques to combat the DDoS attacks has not been substantial enough to fight the distributed nature of attacks. Hackers have been successful in blocking the services and flooding traffic to servers, in spite of a tight check on the network. Thus, in the view of personal data being present on the web and the threat to global economy worth million dollars, it becomes really important to devise some new techniques that are self-capable enough to capture, trace and nullify the dangers posed by such attacks. This term paper talks about such solutions to combat DDoS attacks. Here, the flow entropy in combination with average entropy technique is used to detect an attack. It highlights how the loop holes of one technique are covered by the other, resulting in a considerable improvisation in the methods of how we deal with these attacks.
Efficient IP Traffic over Optical Network Based on Wavelength Translation Switching
Vikas Jha,Kartik Kalia,Bhawani Shankar Chowdhary,D M Akbar Hussain,Deepa Singh 보안공학연구지원센터 2016 International Journal of Multimedia and Ubiquitous Vol.11 No.7
With the advent of TCP/IP protocol suite the overall era of communication technologies had been redefined. Now, we can’t ignore the presence of huge amount of IP traffic; data, voice or video increasing day by day creating more pressure on existing communicating media and supporting back bone. With the humongous popularity of Internet the overall traffic on Internet has the same story. Focusing on transmission of IP traffic in an optical network with signals remaining in their optical nature generated at particular wavelength, proposed is the switching of optically generated IP packets through optical cross connects based on translation of wavelength when an IP packet is crossing the optical cross connect. Adding the concepts of layer 3 routing protocols along with the wavelength translation scheme, will help in spanning the overall optical network for a larger area.