RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기
      • 무료
      • 기관 내 무료
      • 유료
      • A Critical Analysis of Congestion Adaptive Routing Protocols for Mobile Ad-Hoc Networks

        Laxmi Shrivastava,G. S. Tomar 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.6

        Congestion in mobile ad hoc networks leads to transmission delays and packet losses and causes wastage of time and energy on recovery. In the current designs, routing is not congestion adaptive. Routing may let a congestion happen which is detected by congestion control, but dealing with congestion in this reactive manner results in longer delay and unnecessary packet loss and requires significant overhead if a new route is needed. This problem becomes more visible especially in large-scale transmission of heavy traffic such as multimedia data, where congestion is more probable and the negative impact of packet loss on the service quality is of more significance. Routing should not only be aware of, but also be adaptive to, network congestion. Routing protocols which are adaptive to the congestion status of a mobile ad hoc network can greatly improve the network performance. Many protocols which are congestion aware and congestion adaptive have been proposed. In this paper, we present a survey of congestion adaptive routing protocols for mobile ad hoc networks.

      • Optimized Genetic Algorithm (OGA) for Homogeneous WSNs

        Tripti Sharma,G. S Tomar,Radhika Gandhi,Srishti Taneja,Kiran Agrawal 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.4

        A wireless sensor network (WSN) is a network consisting of wireless computing devices called sensors that sense environmental conditions like motion, sound, etc in an area. These networks collect the information from the environment and send it to the sink node. The main constraint in these networks is the energy of the nodes. As these sensors have limited battery life, routing protocol should be designed appropriately so that minimal energy is used. Long communication distances between the sensors and the sink in the WSN drain the energy of the sensors and reduce the lifetime of the network. Clustering reduces energy consumption. By clustering a sensor network we can help minimize the total communication distance, thus increasing the network lifetime. In this paper, we an algorithm based on LEACH (Low Energy Adaptive Clustering Hierarchy protocol) using genetic algorithm has been proposed in order to achieve increased lifetime of the network and energy efficiency in WSN. The genetic algorithm is used to select the cluster heads for the WSN and hence create the energy efficient clusters for transmission of data in the wireless sensor network. The fitness function proposed in this algorithm considers both the distance of the nodes from the sink and their energies. The simulation results show that the proposed protocol results in prolonged network lifetime and optimal energy consumption of the wireless sensor network.

      • Cluster Head Election with Hexagonal Node Deployment Technique in Wireless Sensor Networks

        Tripti Sharma,G.S.Tomar,Ishaan Berry,Aarti Kapoor,Suhani Jasuja 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.1

        Wireless Sensor Networks (WSNs) are a network of large number of wireless sensor nodes deployed over a wide geographical area. The sensor nodes have a limited amount of memory as well as power. Excess extent of energy is dissipated during data transmission to the base station (sink) from normal sensor nodes. The efficient way of prolonging the lifetime of sensor nodes is clustering which optimizes the energy dissipation of WSNs. In this paper, a homogenous clustering algorithm based on fuzzy logic has been proposed in which cluster head election is done with the help of two fuzzy descriptors namely residual energy and proximity distance. The sensor nodes have been hexagonally deployed in the homogenous environment. This covers the sensing area efficiently along with reducing the redundancy in data being transmitted by the sensor nodes. This algorithm has been compared with the low energy adaptive clustering hierarchy (LEACH) protocol. The simulation results show that the proposed approach outperforms the LEACH protocol in terms of number of data packets transmitted to base station, energy consumption and prolonged network lifetime.

      • Metamaterial Loaded Shorted Post Circular Patch Antenna

        Praful Ranjan,G. S. Tomar,R. Gowri 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.10

        This Paper serve as investigation for the different behaviors of resonant modes of the metamaterial loaded shorted Microstrip circular Patch antenna where the inner core is loaded with MNG(μ negative) metamaterial. The material DPS is outside of the MNG Core material. DPS is a double positive regular dielectric. MNG metamaterial loaded with circular patch is used for frequency tuning and dual band operation. Simulation has been performed by way of CST software program.

      • Scrutinize Study on Face Recognition by Pose Invariant Methodology

        Deepika Dubey,G.S Tomar,Hye-jin Kim 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.9

        Three-dimensional (3D) face models can handle large pose face recognition problem. In this paper, we propose survey on pose-invariant face recognition method. By scrutinizing study depth, here we only analysis on pose invariant technique in face recognition method is able to handle self-occlusion and deformation, both of which are challenging problems in two-dimensional (2D) face recognition. Texture images of the face in the database can be the same view as the probe during surveillance. In this survey of face detection technology has been presented in this work feature based approach with low level analysis has been done. Information, color, shape, model etc. has been considered for investigation. The technique considered here also explained in other papers. Depth information has improved the performance of face recognition with large pose variations up to the mark able angle and under even more challenging conditions.

      • KCI등재후보

        Echelon Based Pose Generalization of Facial Images Approaches

        Deepika Dubey,G. S. Tomar 사단법인 미래융합기술연구학회 2017 아시아태평양융합연구교류논문지 Vol.3 No.1

        Face recognition having many applications applied different in security, using in access control, applied on gaming, also effect by aging effect, health issues, and internet communication and so on. It has been perform on different images either they are stored in database or a new image is captured and take it as input image. Face recognition algorithms having different fields of application. The intelligent image (face) recognition system consists of various components through which human identification and recognition has been done. In real world practical applications unconstrained conditions like illumination and create variations, occlusion and expressions are to be faced by the users. in this paper discuss about the pose invariant technology also study the challenges during face recognition under unconstrained conditions like illumination and cause variations, basically it proposes several possible pose invariant technologies future directions which is excluded from the challenges used.

      • Deep Perusal of Human Face Recognition Algorithms from Facial Snapshots

        Deepika Dubey,Dr. G.S. Tomar 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.9

        Face recognition having so many application in security, access control, gaming, aging effect, health issues, and internet communication and so on. It has been perform by using different face recognition algorithms on different field of application. When we use face recognition in real-world scenarios with unfavorable conditions such as occlusion and pose variations, illumination and expressions. Here also study the challenges during face recognition under immoral conditions such as facial expression recognition with poses variations, occlusion and lightning condition. Basically it proposes several possible future direction which is excluded from the challenges used in it. Thus, it is a beneficial developing ping point for research project on face recognitions able to be used for a practical purpose or in several ways.

      • KCI등재

        Performance Comparison of Microstrip High-Pass Filters for Different Dielectric Substrates

        Vivek Singh Kushwah,G. S. Tomar,Sarita Singh Bhadauria,김혜진 사단법인 인문사회과학기술융합학회 2016 예술인문사회융합멀티미디어논문지 Vol.6 No.12

        In this paper performance and design comparison of Microstrip high-pass filters are presented for different dielectric materials for L, S and C-band applications. IE3D 14.1 simulation tool is used for obtaining the Insertion loss and return loss performance of microstrip high pass filter.

      • Gaussian Profile based Vehicular Mobility Modeling

        Brijesh Kumar Chaurasia,Shekhar Verma,G. S. Tomar 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.2

        The driving behavior of a person is influenced by a multitude of local and global factors. These include nature of the driver, distance between the source and destination, condition of the road selected by the driver, traffic conditions, time constraints, lane changing, overtaking actions, safe distance, reaction time etc. are vital for modeling the mobility of a vehicle and are largely determined by the driving behavior. In this paper, a profile based model has been proposed to define the mobility behavior of the vehicles. Different types of influence on the mobility have been lumped and the profile of the motion of vehicles has been modeled as a Gaussian profile. In this model, a driver, first, selects the source, destination and his path and then, selects the parameters of the profile according to his/her presumption. Simulation and results show that profile based model is able to generate realistic and smooth mobility patterns.

      • VANET Optimized IP Address Allocation

        Brijesh Kumar Chaurasia,Shekhar Verma,Henna Parveen,G. S. Tomar 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.3

        Vehicular Ad hoc network is usually deployed for minimizing hand off latency and reducing packet loss. VANET consist of vehicle to vehicle and vehicle to infrastructure communication. Vehicles form infrastructure network with the access point and infrastructure less within themselves which is called ad-hoc network. The handoff latency and packet loss is reduced with the help of front and rear vehicles. In case of no front or rear vehicles this scenario comes to halt with both handoff latency and packet loss coming into picture. So in order to remove this flaw we create a pool of IP addresses where two access points share a particular group of IP address. This paper deals with this method described in detail.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼