Zone Based Ant Colony Routing In MANET

ABSTRACT

Ant colony optimization (ACO) is a stochastic approach for solving combinatorial optimization problems like routing in computer networks. The idea of this optimization is based on the food accumulation methodology of the ant community. Position based routing algorithms (POSANT) had some significant loopholes to find route like it never guarantees the route would be the shortest one, in cases while it is able to find it. The routing algorithms which are based on ant colony optimization find routing paths that are close in length to the shortest paths. The drawback of these algorithms is the large number of control messages that needs to be sent or the long delay before the routes are established from a source to a destination.This paper presents a new routing algorithm for mobile ad hoc network by combining the concept of Ant Colony approach and Zone based routing approach using clustering to get shortest path with small number of control messages to minimize the overhead. Also this shows that zone based ant colony routing algorithm using cluster is more efficient than POSANT routing algorithm by comparative Overhead study of POSANT and Zone based Ant using clustering concept with respect to varying Node Number, Zone Size and Mobility.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

DNSSEC: A Protocol towards securing the Internet Infrastructure

ABSTRACT

Unlike spam, worms, viruses, and phishing—all of which confront end users directly—infrastructure attacks occur outside their normal frame of reference and control. But attacks on the Domain Name System (DNS), an engine of the Internet infrastructure, appear to be increasing in length and severity, affecting DNS information associated with financial services institutions, Internet service providers, and major corporations in the travel, health, technology, and media/ entertainment sectors. Such attacks can result in, say, dropped or intercepted email messages or users unknowingly redirected to fraudulent sites where they inadvertently hand over personal information.
The ultimate casualty in a serious infrastructure attack is public trust. The Internet technical community has responded to threats to the DNS infrastructure by developing the DNS Security Extensions (DNSSEC) protocol standard. DNSSEC-enabled systems run primarily in only a few early adoption and experimental zones.
DNSSEC introduces security at the infrastructure level through a hierarchy of cryptographic signatures attached to DNS records. In the context of DNSSEC, users are assured that the source of the data is verifiable as the stated source, and the mapping of a name to an IP address is accurate. DNSSEC – capable name servers also provide denial of- existence; that is, they tell a user that a name does not exist.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

An Energy Aware Framework for Dynamic Software Management in Mobile Computing Systems

ABSTRACT

Energy efficiency is a very important and challenging issue for resource-constrained mobile computers. Here, a novel dynamic software management (DSOM) framework to improve battery utilization is introduced. DSOM module is designed and implemented in user space, independent of the operating system. DSOM explores quality-of-service adaptation to reduce system energy and employs a priority based pre-emption policy for multiple applications to avoid competition for limited energy resources. Software energy macromodels for mobile applications are employed to predict energy demand at each QoS level, so that DSOM module is able to select the best possible trade-off between energy conservation and application QoS; it also honors the priority desired by the user. Experimental results on some mobile applications like video player, speech recognizer and voice-over-IP show that this approach can meet user specified task oriented goals and significantly improve battery utilization.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

SMART CAMERA FOR TRAFFIC SURVIELLANCE

ABSTRACT


The integration of advanced CMOS image sensors with high-performance processors into an embedded system facilitates new application classes such as smart cameras. A smart camera combines video sensing, video processing and communication within a single device . These devices could support a wide variety of applications including human and animal detection, surveillance, motion analysis, and facial identification. This paper reports on the prototype implementation of a smart camera for traffic surveillance. The smart camera captures a video stream, computes traffic information and transfers the compressed video stream and the traffic information to a network node. The achieved experimental results of the implemented stationary vehicle detection demonstrate the feasibility of this approach.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



NavBelt and GuideCane

ABSTRACT


Recent evolutionary achievements in robotics and bioengineering have given scientists and engineers’ great opportunities and challenges to serve humanity. With the development of radar and ultrasonic technologies over the past four decades, when combined with the robotic technology and bioengineering, gave rise to new series of devices, known as “electronic travel aids (ETAs). It operates similar to a radar system, sends a laser or an ultrasonic beam, which after striking the object reflects back and is detected by the sensors, and so the corresponding distance from the object is calculated. In particular, these devices are used to help people organ failure and people with disabilities, such as visual impairment, deafness etc. This seminar is about an instrument, which is the outcome of robotics and bioengineering, and it is called “NavBelt and the GuideCane”. It is a robotics-based obstacle-avoidance system for the blind and visually impaired.
NavBelt is worn by the user like a belt and is equipped with an array of ultrasonic sensors. It provides acoustic signals via a set of stereo earphones that guide the user around obstacles or “displays” a virtual acoustic panoramic image of the traveller’s surroundings. One limitation of the NavBelt is that it is exceedingly difficult for the user to comprehend the guidance signals in time to allow fast walking.
A newer device, called GuideCane, effectively overcomes the above problem faced by the use of NavBelt. The GuideCane uses the same mobile robotics technology as the NavBelt but is a wheeled device pushed ahead of the user via an attached cane. When the GuideCane detects an obstacle, it steers around it. The user immediately feels this steering action and can follow the GuideCane’s new path easily without any conscious effort.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,313 other followers