Abstract-Mobile ad hoc networks (MANETs) are a collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security point of view. This paper presents a proficient and secure routing, based on asymmetric authentication using key exchange approach (KEA). The proposed mechanism ensures secure routing and quality of service in MANETs and minimizes the network overhead. The KEA mechanism can be effectively used to develop a new routing protocol for Mobile Adhoc Networks which will provide maximum security against all kinds of attacks. In this paper, KEA is compared with other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency of KEA in Ad Hoc Networks. The empirical results show that there is an increase of 20% packet delivery ratio and a reduction of 10% routing overhead.
A multilingual document may contain text words in more than one language. In a multilingual country like India it is necessary that a document should be composed of text contents in different languages in order to reach a larger cross section of people, But on the other hand, this causes practical difficulty in OCRing such a document, because the language type of the text should be pre-determined, before employing a particular OCR(Optical Character Recognition). It is perhaps impossible to design a single recognizer which can identify a large number of scripts/languages. So, it is necessary to identify the language region of the document before feeding the document to the corresponding OCR system. Script identification aims to extract information presented in digital documents namely articles, newspapers, magazines and ebooks. This has given rise to many language identification systems. The objective of this paper is to propose a model to identify script type of different text portions using visual clues. In this work seven feature namely bottom max row, top horizontal lines, vertical lines, bottom components, tick components, top holes and bottom holes have been used to identify the script type. In this work, multilingual documents with Telugu, English and Hindi scripts have been used. From the experimentation it is understood that the identification accuracy of above 93% is achieved.
Traditional data mining classifiers are used for mining the static data, in which incremental learning assumed data streams come under stationary distribution where data concepts remain unchanged. The concept of data can be changed at any time in real world application this refers to change in the class definitions over time. Classifier ensembles are rapidly gaining popularity in data mining Community, because they are comparatively more accurate, easy and react better to concept drift than single classifiers. They are general way of boosting classification accuracy. Their modularity provides natural path of absorbing changes by modifying ensemble member.The proposed approach uses ensemble classifiers to improve the accuracy of the classification in data streams .The performance of the classifiers tested with benchmark datasets from UCI machine learning repository.the experimental results prove that this approach great accuracy when comparing to the single classifier.
<p align="justify"> Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in MANETs. This paper proposes a security improvisation based on a Node Trust Prediction Approach (NTPA). NTPA aims to prevent the interference of an anomalous node in a MANET. There by improving the <strong><em>security and data delivery output</em></strong>. The NTPA calculates the node trust prediction by evaluating the four most frequent actions that are performed by a node in the communication process. <em>Node authorization </em>is a key aspect in the evaluation of an ad hoc network’s security. In the proposed method, we monitor the <em>valid</em> and <em>Invalid Authorization </em>of a node. Data delivery reliability is measured with S<em>uccess of Packet delivery </em>and <em>Loss or Drop of packets. </em>In this paper, NTPA is compared with SAR(Security-Aware Routing) and AODV (Adhoc on-Demand Distance Vector), to evaluate the efficiency in an adhoc networks. The empirical results shows that there is an increase of 25% packet delivery and a 40% reduction in routing overhead. <strong></strong></p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.