scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Advanced Networking and Applications in 2011"


Journal Article
TL;DR: In this article, the impact of heterogeneity of nodes to the performance of WSNs is studied and different clustering algorithms are surveyed by classifying algorithms depending upon various clustering attributes.
Abstract: Potential use of wireless sensor networks (WSNs) can be seen in various fields like disaster management, battle field surveillance and border security surveillance since last few years. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Sensor nodes are considered to be homogeneous since the researches in the field of WSNs have been evolved, but some nodes may be of different energy to prolong the lifetime of a WSN and its reliability. In this paper, we study the impact of heterogeneity of nodes to the performance of WSNs. This paper surveys different clustering algorithms for heterogeneous WSNs by classifying algorithms depending upon various clustering attributes.

76 citations


Journal Article
TL;DR: Wavelet based Non LSB Steganography (WNLS) is proposed, which can’t be detected by existing steganalysis techniques such as chi-square and pair of values techniques, and observes that the PSNR values are better in the case of IWT compare to DWT for all image formats.
Abstract: Steganography is the methods of communicating secrete information hidden in the cover object. The messages hidden in a host data are digital image, video or audio files, etc, and then transmitted secretly to the destination. In this paper we propose Wavelet based Non LSB Steganography (WNLS). The cover image is segmented into 4*4 cells and DWT/IWT is applied on each cell. The 2*2 cell of HH band of DWT/IWT are considered and manipulated with payload bit pairs using identity matrix to generate stego image. The key is used to extract payload bit pairs at the destination. It is observed that the PSNR values are better in the case of IWT compare to DWT for all image formats. The algorithm can’t be detected by existing steganalysis techniques such as chi-square and pair of values techniques. The PSNR values are high in the case of raw images compared to formatted images.

22 citations


Journal Article
TL;DR: In this paper attempt has been made to explain an authentic transmission without digital signature on an algebraic coding theory based public key cryptosystem which relay on the difficulty of decoding and proposed by McEliece.
Abstract: -------------------------------------------------------------- In this paper attempt has been made to explain an authentic transmission without digital signature on an algebraic coding theory based public key cryptosystem which relay on the difficulty of decoding and proposed by McEliece, and also provide us an error less integrated secure transmission of medical information like Image, Audio, Video etc. We also use lossless compression technique like Sequitur for efficient utilization of communication channel. Keywords- McEliece Cryptosystem, SEQUITUR Algorithm, Encryption, Decryption, Error Correction Code,Quantization. ------------------------------------------------------------------------------------------------------------------------------- --------------------------- Date of Submission: 20 November 2010 Date of Acceptance: 12 January 2011 ------------------------------------------------------------------------------------------------------------------------------- ---------------------------

8 citations


Journal Article
TL;DR: In this article, a discussion of image de-noised by wavelet and contourlet transform is presented, where the wavelet transform performs well for images where singularities are located both in space and directions.
Abstract: Although the wavelet transform is powerful in representing images containing smooth areas separated with edges, it cannot perform well when the edges are smooth curves. Wavelets are less effective for images where singularities are located both in space and directions. The contourlet transform is one of the new geometrical image transforms, which represents images containing contours and textures. New developments in directional transforms, known as contourlets in two dimensions, which have the property of capturing contours. The present paper is a discussion of image de-noised by wavelet and contourlet transform.

3 citations


Journal Article
TL;DR: In this article, a symmetry key block cipher algorithm has been proposed to encrypt plain text into cipher text or vice versa using a frame set and a comparison has been made for time complexity for encryption of plain text and decryption from cipher text with the well-known existing algorithms.
Abstract: There are huge numbers of algorithms available in symmetry key block cipher. All these algorithms have been used either complicated keys to produce cipher text from plain text or a complicated algorithms for it. The level of security of all algorithms is dependent on either number of iterations or length of keys. In this paper, a symmetry key block cipher algorithm has been proposed to encrypt plain text into cipher text or vice versa using a frame set. A comparative study have been made with RSA, DES, IDEA, BAM and other algorithms with Chi-square value, frequency distribution, bit ratio to check the security level of proposed algorithm. Finally, a comparison has been made for time complexity for encryption of plain text and decryption from cipher text with the well-known existing algorithms.

2 citations


Journal Article
TL;DR: It is proved that the proposed protocol meets several security attributes under the assumption that the Root Problem in braid group is a hard problem.
Abstract: This paper presents a key agreement protocol based on a non abelian group. It is proved that the proposed protocol meets several security attributes under the assumption that the Root Problem (RP) in braid group is a hard problem.

1 citations


Journal Article
TL;DR: An asymmetrical pulse-width-modulated (APWM) resonant inverter topology is presented for high frequency ac power distribution systems and shows very low total harmonic distortion, near-zero switching losses, and fast transient response.
Abstract: In this paper, an asymmetrical pulse-width-modulated (APWM) resonant inverter topology is presented for high frequency ac power distribution systems. The inverter system is comprised of simple power and control circuitry. The detailed analysis shows that the proposed inverter has very low total harmonic distortion, near-zero switching losses, and fast transient response. Open loop and Closed loop Simulation results are presented to prove the performance of the proposed inverter.

1 citations