21 results on '"Zeeshan Shafi Khan"'
Search Results
2. Advanced Ensemble Model for Solar Radiation Forecasting Using Sine Cosine Algorithm and Newton’s Laws
- Author
-
Mohammed El-Said, Seyedali Mirjalili, Sherif S. M. Ghoneim, Marwa M. Eid, Abdelhameed Ibrahim, El-Sayed M. El-kenawy, and Zeeshan Shafi Khan
- Subjects
General Computer Science ,Ensemble forecasting ,Computer science ,Search algorithm ,Law ,Differential evolution ,Genetic algorithm ,General Engineering ,General Materials Science ,Energy source ,Cuckoo search ,Metaheuristic ,k-nearest neighbors algorithm - Abstract
As research in alternate energy sources is growing, solar radiation is catching the eyes of the research community immensely. Since solar energy generation depends on uncontrollable natural variables, without proper forecasting, this energy source cannot be trusted. For this forecasting, the use of machine learning algorithms is one of the best choices. This paper proposed an optimized solar radiation forecasting ensemble model consisting of pre-processing and training ensemble phases. The training ensemble phase works on an advanced sine cosine algorithm (ASCA) using Newton’s laws of gravity and motion for objects (agents). ASCA uses sine and cosine functions to update the agent’s position/velocity components by considering its mass. The training ensemble model is then developed using the k-nearest neighbors (KNN) regression. The performance of the proposed ensemble model is measured using a dataset from Kaggle (Solar Radiation Prediction, Task from NASA Hackathon). The proposed ASCA algorithm is evaluated in comparison with the Particle Swarm Optimizer (PSO), Whale Optimization Algorithm (WOA), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), Squirrel Search Algorithm (SSA), Harris Hawks Optimization (HHO), Hybrid Greedy Sine Cosine Algorithm with Differential Evolution (HGSCADE), Hybrid Modified Sine Cosine Algorithm with Cuckoo Search Algorithm (HMSCACSA), Marine Predators Algorithm (MPA), Chimp Optimization Algorithm (ChOA), and Slime Mould Algorithm (SMA). Obtained results of the proposed ensemble model are compared with those of state-of-the-art models, and significant superiority of the proposed ensemble model is confirmed using statistical analysis such as ANOVA and Wilcoxon’s rank-sum tests.
- Published
- 2021
3. IMPACT OF PEEL COLORATION ON INTERNAL QUALITY OF KINNOW MANDARIN (Citrus nobilis Lour x Citrus deliciosa Tenora) AT EARLY RIPENING STAGE
- Author
-
Muhammad Riaz Khan, Azeem Khalid, Nadeem Akhtar Abbasi, Rab Nawaz, I. A. Hafiz, and Zeeshan Shafi Khan
- Subjects
chemistry.chemical_classification ,genetic structures ,food and beverages ,Ripening ,Titratable acid ,Sweetness ,Ascorbic acid ,food.food ,Horticulture ,Flavonols ,food ,Colored ,chemistry ,Carotenoid ,Citrus nobilis - Abstract
At earlier maturation, Kinnow mandarin color-break fruits were analyzed for internal quality. Ten fruits were harvested from dark green to fully red or yellow colored at field on visual observation and arranged in order of dark green to deep red or yellow through Chroma meter after being numbered as 1 to 10. Three aliquots were analyzed as per replicate. In red colored fruits juice, a decreasing trend of titratable acidity, ascorbic acid and total soluble salts were found with increasing pattern of sugars, total soluble solid and pH. Similarly in peel, low chlorophyll contents and highest carotenoids were recorded in red colored fruits. Total phenolic contents in juice were similar with declining trend in peel from green to red colored fruits. In juice both flavonoids and flavonols were constant but in peel flavonols increase were noted in red colored fruits. Total anthocyanins exhibited an increasing trend in red colored fruit for both, the peel and juice. Antioxidant activity was increased in juice and decreased in peel for red colored fruits. Nutritional values of green color peel fruits are alike those of red colored, but with reduced sugars, and sweetness were duly noted regarding their domestic consumers acceptance. Green color fruits have more ascorbic acid, polyphenols and reducing sugars are equally valuable like red colored Kinnow, thus both types are of Kinnow are best for the purpose of export
- Published
- 2019
4. Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains
- Author
-
Ibrahim Ahmed I. AlMallohi, Ahmed Saad M. Alotaibi, Zeeshan Shafi Khan, Farzana Azam, and Rahaf Alghafees
- Subjects
Proof-of-stake ,Work (electrical) ,Computer science ,Long period ,Range (aeronautics) ,Multivariable calculus ,Control (management) ,Computer security ,computer.software_genre ,computer ,Popularity ,Protocol (object-oriented programming) - Abstract
Proof-of-Stake (PoS) is getting popularity among low power computing devices as compared to high power and energy demanded proof-of work (PoW). Among the security issues of PoS, Long range attack is declared as one of the major issue by many researchers. Long range attack allows the minority stakeholders to become majority stakeholders over a long time span and then they can control the whole blockchain protocol to produce the valid alternative history. Checkpointing is referred as solution to mitigate the impact of the long range attack but still for the newly joined users as well as the users those will stay offline for long period of time, checkpointing mechanism needs to be re-evaluated. In this paper we studied the checkpointing mechanism and proposed a new strategy to implement the checkpointing inside the blockchain technology. The proposed strategy is designed specifically to mitigate the long range attack or stake bleeding attack.
- Published
- 2019
5. Attack containment in mobile ad-hoc networks through fair distribution of processing resources
- Author
-
Farzana Azam, Khaled Alghathbar, Muhammad Sher, Zeeshan Shafi Khan, and Muhammad Khurram Khan
- Subjects
Fair share ,Computer science ,Fair distribution ,business.industry ,Wireless ad hoc network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network simulator 2 ,Mobile ad hoc network ,Computer security ,computer.software_genre ,Flooding (computer networking) ,Electrical and Electronic Engineering ,business ,Computer communication networks ,computer ,Computer network - Abstract
Due to frequent joining and leaving of nodes and better performance, use of flooding algorithms is always proffered in Mobile Ad-hoc Networks (MANETs). A single query transmitted by a node can be received by hundreds of nodes at 3rd or 4th hop. But it is also fact that flooding algorithms provide an opportunity to attackers for launching query flooding attacks. On one side these query flooding attacks results in wastage of valuable processing resources and on the other side they cause in starvation and delay at legitimate user's end. To solve this problem we proposed attack containment techniques by providing a fair share of processing resources to every node. Fair distribution is achieved by designing different query distribution techniques based on mathematical models. Results obtained through network simulator 2 prove that the proposed solution is resilient against various types of flooding attacks.
- Published
- 2013
6. Editorial 'Secure Multimedia Communication in Vehicular Adhoc Network'
- Author
-
Zeeshan Shafi Khan, Aneel Rahim, Fahad Bin Muhaya, and Muhammad Sher
- Subjects
Multimedia ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Wireless ad hoc network ,Media Technology ,Multimedia information systems ,computer.software_genre ,Computer communication networks ,computer ,Software - Published
- 2013
7. Performance Enhancement of Underlay Cognitive Radio Networks by Intelligent Multiple Relay Selection
- Author
-
Muhammad Zubair, Bassam Zafar, Zeeshan Shafi Khan, and Kiran Sultan
- Subjects
business.industry ,Computer science ,Distributed computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Transmitter power output ,Evolutionary computation ,law.invention ,Signal-to-noise ratio ,Cognitive radio ,0203 mechanical engineering ,Relay ,law ,Channel state information ,0202 electrical engineering, electronic engineering, information engineering ,Underlay ,Telecommunications ,business ,Relay channel ,Computer Science::Information Theory - Abstract
In an underlay spectrum sharing environment, relay selection stands as one of the fascinating techniques to address the challenge of performance enhancement of secondary communication via cognitive relays. In this paper, a similar constrained optimization problem is discussed in which a secondary source-destination pair is assisted by a potential Relay assisted Cognitive Radio (RCRN) in the worst-case scenario when line-of-sight (LOS) path is not available to enable the communication. In order to solve this sophisticated problem, we perform multiple relay selection under the assumption of availability of perfect channel state information (CSI) and propose two novel techniques, one based on Artificial Bee Colony (ABC) evolutionary computing and the second based on Fuzzy Rule Based System (FRBS). Both proposed techniques aim to maximize the signal-to-noise ratio (SNR) at the destination keeping in view the transmit power and interference constraints. The effectiveness of the schemes is highlighted through simulation results, along with their comparison.
- Published
- 2016
8. Sensor Based Framework for Secure Multimedia Communication in VANET
- Author
-
Aneel Rahim, Tai-Hoon Kim, Muhammad Sher, Fahad T. Bin Muhaya, and Zeeshan Shafi Khan
- Subjects
Scheme (programming language) ,Computer science ,security ,lcsh:Chemical technology ,computer.software_genre ,Biochemistry ,Article ,Analytical Chemistry ,Network simulation ,Computer Communication Networks ,malicious node ,lcsh:TP1-1185 ,VANETs ,Electrical and Electronic Engineering ,Instrumentation ,Computer Security ,computer.programming_language ,multimedia ,malicious data ,Vehicular ad hoc network ,Multimedia ,business.industry ,Node (networking) ,Atomic and Molecular Physics, and Optics ,business ,computer ,Algorithms ,Computer network - Abstract
Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool.
- Published
- 2010
9. Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication
- Author
-
Qutbuddin, Aneel Rahim, Khalid Rashid, Fahad Bin Muhaya, and Zeeshan Shafi Khan
- Subjects
Short Message Service ,business.industry ,Gateway (telecommunications) ,Pull data traffic control ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer security ,computer.software_genre ,Token server ,Computational Mathematics ,Computational Theory and Mathematics ,Secure communication ,SMS ,Concatenated SMS ,Modelling and Simulation ,Modeling and Simulation ,SMS banking ,The Internet ,Mobile telephony ,GSM services ,business ,computer ,Call-Back Authentication ,Mathematics ,Computer network - Abstract
In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global system for mobile communication (GSM) services, this interface has given birth to new security challenges. Especially recent research has divulged that an adversary equipped with little more than a cable modem can block all voice communication in a metropolitan area or even in entire country of the size of USA by sending enormous short message service (SMS) traffic via Internet. To overcome this threat in particular and other client–server communication problems in general, a new secure protocol, Call-Back Authentication (CBA), for web to phone SMS communication is proposed. The protocol introduces two-tier server architecture and pulls data traffic control (PDTC) mechanism for secure communication. The protocol is aimed to throat-knot malicious traffic at GSM–Internet interface gateway. The results show that the CBA protocol secures all GSM services from Internet originated SMS floods. Moreover the authentication mechanism of the CBA protocol identifies and blocks the spoofed as well as the zombie requests. The CBA server requires lesser resources to deliver SMS as compared to existing mechanism.
- Published
- 2010
10. A group based key sharing and management algorithm for vehicular ad hoc networks
- Author
-
Mohammed Morsi Moharram, Zeeshan Shafi Khan, Farzana Azam, and Abdullah Alaraj
- Subjects
Article Subject ,Computer science ,Wireless ad hoc network ,Radio Waves ,Distributed computing ,lcsh:Medicine ,Broadcasting ,lcsh:Technology ,General Biochemistry, Genetics and Molecular Biology ,lcsh:Science ,Dissemination ,General Environmental Science ,Vehicular ad hoc network ,business.industry ,lcsh:T ,Node (networking) ,lcsh:R ,General Medicine ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Radio ,Motor Vehicles ,Optimized Link State Routing Protocol ,lcsh:Q ,business ,Algorithms ,Computer network ,Research Article - Abstract
Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.
- Published
- 2013
11. An Evaluation of Health Education Intervention on Hygienic Status of Food Handlers in Aligarh - A Three Year Experience
- Author
-
M. Athar Ansari and Zeeshan Shafi Khan
- Subjects
medicine.medical_specialty ,Interview ,business.industry ,media_common.quotation_subject ,Personal hygiene ,Hygiene ,Environmental health ,Intervention (counseling) ,Epidemiology ,Medicine ,Health education ,Girl ,business ,Associate professor ,media_common - Abstract
Background: Eating establishments provide food on a large scale and are important from the point of view of epidemiology of food borne diseases in the community. They have been identified as an important source for contamination of food and food borne disease outbreaks. Eating at these places significantly increases the risk of diarrhea among consumers. Objectives: The present study was carried out with the following objectives: (1) To find out the socio-demographic characteristics of food handlers working in eating establishments. (2) To assess the impact of health education intervention on hygienic status of food handlers. Methods: The present longitudinal study was carried out by interview method during academic session from 20082009 to 2010-11 (3 Years) among 701 food handlers including cooks, helpers and waiters/ bearers employed by 18 kitchens establishments. IEC material and power point presentation was used for imparting health education. Data was collected, tabulated and analyzed statistically using appropriate tests of significance. Results: Majority of food handlers (36.8%) belonged to age group of 18-30 years followed by 31 to 40 years (30.8%). There were 95.6% male workers and only 4.4% female worker, employed mainly in girl’s hostel. Majority of workers were illiterate (41.1%). Apron and caps were not used by most of them (84.5%) but the dresses were clean. Hands and nails were clean in large number of participants (69.9%). 59.8% workers were not addicted to any type of tobacco. On an arbitrary scale of hygiene, general conditions were satisfactory in 63.7% food handlers. Overall hygiene status of the food handlers improved during the three years (2009 to 2011). Conclusion: There was marked improvement among food handler’s knowledge, attitude and practice towards personal hygiene. Certain steps should be taken to improve the status of food hygiene in food service establishments like banning smoking and the use of all tobacco products during food handling. Strict periodical examination for early identification of morbid conditions should be carried out. *Corresponding author: Dr. M. Athar Ansari, Associate Professor, Department of Community Medicine, J.N. Medical College, Aligarh Muslim University, Aligarh, India-202002, Tel: +91-9897267621, E-mail: atharansari777@rediffmail.com Received March 07, 2012; Accepted April 21, 2012; Published April 23, 2012 Citation: Ansari MA, Khan Z (2012) An Evaluation of Health Education Intervention on Hygienic Status of Food Handlers in Aligarh A Three Year Experience. J Community Med Health Educ 2:142. doi:10.4172/2161-0711.1000142 Copyright: © 2012 Ansari MA, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- Published
- 2012
12. Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms
- Author
-
Muhammad Khurram Khan, Khaled Alghatbar, M. Zubair Rafique, and Zeeshan Shafi Khan
- Subjects
Voice over IP ,IMS security ,Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Byte ,IP Multimedia Subsystem ,Machine learning ,computer.software_genre ,Server ,Redundancy (engineering) ,Operating system ,Artificial intelligence ,business ,INVITE of Death ,Algorithm ,computer ,Computer network - Abstract
Modern communication infrastructure (IP Multimedia Subsystem (IMS) and Voice over IP (VoIP)) are vulnerable to zero day attacks and unknown threats. Anomalous SIP requests can be used to remotely launch malicious activity. Furthermore, anomalous messages are capable of crashing - sometimes with one message only - servers and end points. Recently, it is shown that a malicious SIP message "INVITE of Death" crash a server or gain unfettered access to it. In contrast, little research is done to protect IMS against such anomalous messages. In this paper, we propose an anomalous message detection framework that extracts novel syntactical features from SIP messages at the P-CSCF of an IMS. Our framework operates in four steps: (1) analyzes the byte-level distribution of SIP message, (2) extracts spatial features from IMS messages in form of byte transition probabilities, (3) uses well-known feature selection scheme to remove redundancy in the features set, and (4) uses standard machine learning algorithms to raise the final alarm. The benefit of our framework is that it is lightweight requiring less processing and memory resources and provides high detection accuracy. We have evaluated our system on a real-world IMS dataset consisting of more than 10, 000 benign and malicious SIP messages. The results of our experiments demonstrate that using machine learning algorithms, our framework achieves detection accuracy of more than 99%. Last but not least, its testing time is 152μ seconds per packet, as a result, it can be easily deployed on IMS core.
- Published
- 2011
13. Presence Based Secure Instant Messaging Mechanism for IP Multimedia Subsystem
- Author
-
Khalid Rashid, Zeeshan Shafi Khan, and Muhammad Sher
- Subjects
Session Initiation Protocol ,business.industry ,Computer science ,computer.internet_protocol ,IP Multimedia Subsystem ,Instant messaging ,business ,Computer security ,computer.software_genre ,computer ,Unified communications ,Computer network ,Flooding (computer networking) - Abstract
Presence and instant messaging are the two important services offered on top of IP Multimedia subsystem. Instant messages can be session based or immediate. In both cases there are some security threats like session modification, session termination, invite flooding and message flooding, etc. In this paper, a presence based solution to mitigate the effect of these attacks is proposed. Results show that the proposed solution performs well to secure the instant messaging.
- Published
- 2011
14. Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network
- Author
-
Syed Sherjeel A. Gilani, Zeeshan Shafi Khan, and Muhammad Zubair
- Subjects
Key distribution in wireless sensor networks ,Wireless mesh network ,Wireless network ,Computer science ,Service set ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mesh networking ,Order One Network Protocol ,Wireless WAN ,Shared mesh ,business ,Computer network - Abstract
Infrastructure-based Wireless Mesh Networks are emerging as an affordable, robust, flexible and scalable technology. With the advent of Wireless Mesh Networks (WMNs) the dream of connecting multiple technology based networks seems to come true. A fully secure WMN is still a challenge for the researchers. In infrastructure-based WMNs almost all types of existing Wireless Networks like Wi-Fi, Cellular, WiMAX, and Sensor etc can be connected through Wireless Mesh Routers (WMRs). This situation can lead to a security problem. Some nodes can be part of the network with high processing power, large memory and least energy issues while others may belong to a network having low processing power, small memory and serious energy limitations. The later type of the nodes is very much vulnerable to targeted attacks. In our research we have suggested to set some rules on the WMR to mitigate these kinds of targeted flooding attacks. The WMR will then share those set of rules with other WMRs for Effective Utilization of Resources.
- Published
- 2010
15. An Energy efficient, Modified Hybrid Adaptive Intra Cluster Routing for wireless sensor networks
- Author
-
Bashir Ahmad, Zeeshan Shafi Khan, and Adeel Akhtar
- Subjects
Dynamic Source Routing ,Zone Routing Protocol ,Static routing ,Adaptive quality of service multi-hop routing ,business.industry ,Computer science ,Distributed computing ,Policy-based routing ,Link-state routing protocol ,Multipath routing ,Computer Science::Networking and Internet Architecture ,business ,Hierarchical routing ,Computer network - Abstract
As devices in sensor network are energy limited so energy efficiency is the most critical parts of this network. To have energy efficient network, efficient routing plays very important role. In this paper, an Energy efficient modified Hybrid Adaptive Intra Cluster Routing is proposed which provides best solution for the problem offered by traditional and simple adaptive routing algorithms. Quantitative analysis reveals its energy efficiency over the previously published work
- Published
- 2010
16. Best suitable transport protocol under various scenarios of Multi-Protocol Label Switching
- Author
-
Rashid Mehmood, Zeeshan Shafi Khan, and Zulfiqar Hussain
- Subjects
TCP Vegas ,Computer science ,computer.internet_protocol ,Network packet ,Virtual circuit ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Multiprotocol Label Switching ,Label switching ,Transport layer ,Zeta-TCP ,Stream Control Transmission Protocol ,business ,computer ,Computer network - Abstract
Multi-Protocol Label Switching is a best technique for efficient utilization of network resources, a small overhead labels. The Internet Protocol is the dominant protocol in computer networks today. MPLS adds the flavor of virtual circuits in computer networks. Which transport layer protocol (TCP Vegas, TCP New Reno, SCTP) performs the best when it is used along with MPLS is still an open question. We evaluated the efficiency of the three transport protocols under MPLS technology by considering average delay, throughput, channel wastage and average packet delivery performance as the decision variables. The results showed that in scenario of delay TCP Vegas perform better with minimum average delay while in case of throughput, channel wastage and packet delivery SCTP perform better than other protocols used in this research. Results are obtained through simulations over Network simulator 2.
- Published
- 2010
17. A Mechanism for Handling Internal Threats of IMS Based Push to Talk and Push to Multimedia Service
- Author
-
Aneel Rahim, Fahad Bin Muhaya, and Zeeshan Shafi Khan
- Subjects
Authentication ,Service (systems architecture) ,Push-to-talk ,Multimedia ,Computer science ,business.industry ,Teleconference ,computer.software_genre ,Computer security ,Server ,Next-generation network ,File transfer ,Session (computer science) ,business ,computer ,Computer network - Abstract
Capabilities like Instant Messaging (IM), real-time video transfer and file transfer converts the Push to Talk (PTT) Service into a new one, known as Push to Multimedia (PTM). In PTT and PTM an authenticated user can be deleted from the session by the session administrator (initiator). Deletion of an authenticated user by a single authority may results in dispute among the remaining authenticated members. So in this paper we present a distributed mechanism to delete an authenticated user (who starts to act maliciously after authentication) from an ongoing session. Moreover a user may use the floor for the long period of time. No mechanism is defined to preset the maximum time for the floor use in a single turn. In this paper we also give a mechanism to define the maximum time for floor use at the start of the session. This time can vary from user to user. These features on one side secure the PTT and PTM service and on the other side enrich these services.
- Published
- 2010
18. Performance Evaluation of Video Streaming in Vehicular Adhoc Network
- Author
-
Aneel Rahim, Fahad Bin Muhaya, and Zeeshan Shafi Khan
- Subjects
Vehicular ad hoc network ,Computer science ,Wireless ad hoc network ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Video streaming ,business ,Computer network - Abstract
In Vehicular Ad-Hoc Networks (VANETs) wireless-equipped vehicles form a temporary network for sharing information among vehicles. Secure Multimedia communication enhances the safety of passenger by providing visual picture of accidents and danger situations. In this paper we will evaluate the performance of multimedia data in VANETS scenario and consider the impact of malicious node using NS-2 and Evalvid video evaluation tool.
- Published
- 2010
19. Editorial
- Author
-
Aneel Rahim and Zeeshan Shafi Khan
- Subjects
Electrical and Electronic Engineering - Published
- 2011
20. Information Sharing in Vehicular AdHoc Network
- Author
-
Aneel Rahim, Muhammad Khurram Khan, Fahad Bin Muhaya, Zeeshan Shafi Khan, and Muhammad Sher
- Subjects
SIMPLE (military communications protocol) ,Queue management system ,Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,Wireless ad hoc network ,Distributed computing ,Node (networking) ,Computer Science Applications ,Computational Theory and Mathematics ,Virtual queue ,business ,Queue ,Protocol (object-oriented programming) ,Computer network - Abstract
Relevance Technique broadcast the useful information and removes the redundant data. 802.11e protocol implementation has certain flaws and is not suitable for VANETs scenarios. Main issue in 802.11e protocol is internal sorting of packets, no priority mechanism within the queues and often lower priority traffic get more medium than high priority traffic. In this paper, the mathematical model of relevance scheme is enhanced so that it can consider the network control in real scenario by considering the impact of malicious node in network. Problems of 802.11e protocol can be resolved by making virtual queue at application level. We analyze the comparison of simple virtual queue with the over all impact of virtual queue and mathematical model. Similarly we compare the mathematical model with over all impact of virtual queue and modified mathematical model using NS-2 simulator.
- Published
- 2010
21. Weighted Priority Based Signatures' Batch Verification Scheme in Vehicular Ad-Hoc Networks
- Author
-
Zeeshan Shafi Khan, Alaraj, A., Rekha, S. N., Azam, F., and Zubair, M.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.