scispace - formally typeset
Search or ask a question

Showing papers by "Mayank Dave published in 2007"


Journal ArticleDOI
TL;DR: This study focuses on introducing a new metric, Aggregate Interface Queue Length (AIQL), in AODV in order to deal with load balancing issues and performance evaluation through simulation shows that the modified code can perform better than the conventional A ODV.
Abstract: AODV is a prominent routing protocol for MANET that uses hop count as a path selection metric However, AODV has no means to convey traffic load on current route This study focuses on introducing a new metric, Aggregate Interface Queue Length (AIQL), in AODV in order to deal with load balancing issues Performance evaluation through simulation shows that the modified code can perform better than the conventional AODV We also evaluate the effect of interface queue length on normalized routing load, average throughput and average end-to-end delay

33 citations


Journal ArticleDOI
TL;DR: This study presents a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher in Adhoc networks and compares and analyzed the performance of these algorithms in automated attacks on Mono-alphabetic Substitutes Cipher.
Abstract: With exponential growth of networked system and application such as e-Commerce, the demand for effective Internet security is increasing. Cryptology is the science and study of systems for secret communication. In consists of two complementary fields of study: cryptography and cryptanalysis. This study presents a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher in Adhoc networks. We have also compared and analyzed the performance of these algorithms in automated attacks on Mono-alphabetic Substitution Cipher. The use of Tabu search is largely an unexplored area in the field of Cryptanalysis. A generalized version of these algorithms can be used for attacking other ciphers as well.

32 citations


Journal ArticleDOI
TL;DR: It is observed that throughput of the system decreases as the securitylevel of the transaction increases, i.e., there is tradeoff between the security level and the throughput ofThe system.
Abstract: In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper we presented a secure concurrency control protocol (SCCP) based on the timestamp ordering, which provides concurrency control and maintains security. We also implemented SCCP and a comparison of SCCP is presented in three cases (High, Medium and Low security levels). In this experiment, It is observed that throughput of the system decreases as the security level of the transaction increases, i.e., there is tradeoff between the security level and the throughput of the system.

4 citations


Journal ArticleDOI
TL;DR: A hybrid model based on natural language and formal specifications using K-nn technique has been discussed, and benefits of both formal methods and natural language have been exploited for the retrieval of reusable software components.
Abstract: Reusing a previously developed and tested software component is the key to improve the quality and productivity of the software. Searching a software from a software library with an intent to reuse it is similar to searching a book from a library. Locating a book or document in library may not be that difficult as searching a reusable component in a software library. The main challenge in reusing software component lies in the retrieval and selection of the appropriate component that would need no or least adaptation from a software component library. Book can be searched on title, authors or some keywords, but these features are not sufficient for searching the required functionality in a component library. Using formal specifications to represent software components facilitates the determination of reusability of the software component. The functionality of the software, and the welldefined syntax of formal language makes processing amenable to automation. In this paper, a hybrid model based on natural language and formal specifications using K-nn technique has been discussed. Benefits of both formal methods and natural language have been exploited for the retrieval of reusable software components. Existing components have been weighted according to their degree of similarity on the basis of certain attributes to the required component. http://dx.doi.org/10.14429/djlit.27.5.137

3 citations


Journal ArticleDOI
TL;DR: In this paper, a novel method for power system voltage instability estimation and improvement using ANN is presented, which is based on the fact that reactive power injections at critical buses of the power system help to steer the system away from a developing voltage collapse.
Abstract: Today an average transmission line is loaded more heavily than ever before, and this has given rise to a serious problem of voltage instability. The authors present a novel method for power system voltage instability estimation and improvement using ANN. The method is based on the fact that reactive power injections at critical buses of the power system help to steer the system away from a developing voltage collapse. The location and quantum of reactive power support has been computed based on sensitivity. The sensitivity matrix is formulated by cascading the output/input sensitivity of multiplayer perceptron model with that of input features versus reactive power injections. The effectiveness of the proposed method is demonstrated on Ward-Hale 6-bus, IEEE 14-bus, and IEEE 30-bus test systems. The method can be effectively used to make the system secure against voltage collapse condition in system planning and online operation.