scispace - formally typeset
Search or ask a question
Author

Shaveta Rani

Bio: Shaveta Rani is an academic researcher from Punjab Technical University. The author has contributed to research in topics: Routing protocol & Mobile ad hoc network. The author has an hindex of 10, co-authored 53 publications receiving 295 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The proposed algorithm “Optimal Keyless Algorithm for Security” represents a new way of using data itself to create a protective shield and provides security at both character level as well as bit level.
Abstract: In Modern era, every business is dependent on the Internet. The Network is growing so quickly that now at this stage no one can ever imagine anything without use of internet. But at the same time security over network is very important because of the vulnerability of data to eavesdropping. To protect the data from eavesdropping, it must be appropriately encrypted before sending over the network. There are two types of algorithms, keyed and keyless, exist to protect data. The keyed algorithms are efficient but to avoid the overhead of key generation and key management, keyless algorithms are getting popularity now days. The proposed algorithm “Optimal Keyless Algorithm for Security” represents a new way of using data itself to create a protective shield. The algorithm provides security at both character level as well as bit level. The number of rounds and the number of shifts applied at bit level are made data dependent to increase the security level, is a major advantage of the algorithm. The system is proposed with the motive to provide highest security level with minimum execution time in terms of encryption and decryption. This paper presents simulation results of proposed algorithm and its comparison with the commonly used JS keyless algorithm. General Terms Security, Cryptography, Key, Keyless, Encryption, Decryption

59 citations

Journal ArticleDOI
TL;DR: This paper presents efficient RWA strategies, which minimizes the blocking probability in WDM optical networks, and results show that the performance of the proposed strategies is much better than the existing strategy.

29 citations

Proceedings ArticleDOI
28 Dec 2009
TL;DR: Enhanced Local Repair AODV (ELRAODV) makes mobile nodes more aware of the local connectivity by extending original HELLO to NHELLO message in A ODV as proposed in [3] to repair a route by sending a unicast request instead to broadcast in original AODVs.
Abstract: AODV is one of the most common reactive protocols used in MANET [1]. This paper proposes enhancement in popular on demand routing protocol AODV [2] by improving its local repair mechanism. Enhanced Local Repair AODV (ELRAODV) makes mobile nodes more aware of the local connectivity by extending original HELLO to NHELLO message in AODV as proposed in [3]. That extra information of the local neighbors allows ELRAODV to repair a route by sending a unicast request instead to broadcast in original AODV. The results show that ELRAODV performs better in terms of routing overhead, end to end delay than classic AODV. The simulation is done through network Simulator-2 (ns2).

23 citations

Journal ArticleDOI
TL;DR: The proposed one wavelength assignment strategy for optical networks which assigns the wavelength according to minimum connection count is much better than existing strategy in terms of number of searches required to find a wavelength for establishing the connection and hence connection establishment time reduces.

18 citations

Journal ArticleDOI
TL;DR: This paper has presented two resource allocation strategies for survivability, which reserve the resources for the primary lightpaths and backup light Paths and shows that the second strategy performs better than first strategy.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A large dataset compared to the state-of-the art is used and the proposed deep model performs dramatically shallow models, and they can be used as a practical tool for farmers to protect tomato against disease.
Abstract: Several studies have invested in machine learning classifiers to protect plants from diseases by processing leaf images. Most of the proposed classifiers are trained and evaluated with small datase...

480 citations

Journal ArticleDOI
TL;DR: The proposed hHHO-SCA optimization algorithm is much better than standard sine–cosine optimization algorithm, Harris Hawks Optimizer, Ant Lion Optimizer algorithm, Moth Flame Optimization algorithm, grey wolf optimizer algorithm and others recently described meta-heuristics, heuristics and hybrid type optimization search algorithm and endorses its effectiveness in multi-disciplinary design and engineering optimization problems.

154 citations

Journal ArticleDOI
TL;DR: Performance analysis and comparison with the relative methods show that the proposed kind of effective data aggregating method is effective and superior to other methods regardless of intra-clusters or inter-cluster on the total energy consumption of network.
Abstract: Wireless sensor network (WSN) in the Internet of Things consists of a large number of nodes. The proposal of compressive sensing technology provides a novel way for data aggregation in WSN. Based on the clustering structure of WSN, a kind of effective data aggregating method based on compressive sensing is proposed in this paper. The aggregating process is divided into two parts: in the cluster, the sink node sets the corresponding seed vector based on the distribution of network and then sends it to each cluster head. Cluster head can generate corresponding own random spacing sparse matrix based on its received seed vector and collect data through compressive sensing technology. Among clusters, clusters forward measurement values to the sink node along multi-hop routing tree. Performance analysis and comparison with the relative methods show that our method is effective and superior to other methods regardless of intra-cluster or inter-cluster on the total energy consumption of network.

143 citations

Journal ArticleDOI
TL;DR: It is concluded that in the present age, aspects of communications play an important factor in the quality of software.
Abstract: Actually, software products are increasing in a fast way and are used in almost all activities of human life. Consequently measuring and evaluating the quality of a software product has become a critical task for many companies. Several models have been proposed to help diverse types of users with quality issues. The development of techniques for building software has influenced the creation of models to assess the quality. Since 2000 the construction of software started to depend on generated or manufactured components and gave rise to new challenges for assessing quality. These components introduce new concepts such as configurability, reusability, availability, better quality and lower cost. Consequently the models are classified in basic models which were developed until 2000, and those based on components called tailored quality models. The purpose of this article is to describe the main models with their strengths and point out some deficiencies. In this work, we conclude that in the present age, aspects of communications play an important factor in the quality of software

123 citations