-
Simulation of Obstruction Avoidance Generously Mobility (OAGM) Model using Graph-theory Technique
Authors:
V. Vasanthi,
M. Hemalatha
Abstract:
An Obstruction Avoidance Generously Mobility (OAGM) model has been introduced for controlling ad-hoc sensor networks and thereby operating emerging fields like military and healthcare services. According to this model, the ability to send a message to a group of users simultaneously, based solely on their geographic location, is desirable by using Mission Critical Mobility model that assumes the o…
▽ More
An Obstruction Avoidance Generously Mobility (OAGM) model has been introduced for controlling ad-hoc sensor networks and thereby operating emerging fields like military and healthcare services. According to this model, the ability to send a message to a group of users simultaneously, based solely on their geographic location, is desirable by using Mission Critical Mobility model that assumes the obstacle shapes like rectangle or square in the simulation terrain. The OAGM model is developed by grasping the critical situations of military and healthcare services by incorporating the node movement model, hierarchical node organization, placement of obstacle that affect the movement of nodes and also signal propagation. Graph theory technique is used to find the shortest path of the node movement process. The varying number of parameter sets with DSR protocol is analyzed for MCM and OAGM mobility model. The results show OAGM performance is better than MCM.
△ Less
Submitted 12 April, 2013;
originally announced April 2013.
-
High performance computing network for cloud environment using simulators
Authors:
N. Ajith Singh,
M. Hemalatha
Abstract:
Cloud computing is the next generation computing. Adopting the cloud computing is like signing up new form of a website. The GUI which controls the cloud computing make is directly control the hardware resource and your application. The difficulty part in cloud computing is to deploy in real environment. Its' difficult to know the exact cost and it's requirement until and unless we buy the service…
▽ More
Cloud computing is the next generation computing. Adopting the cloud computing is like signing up new form of a website. The GUI which controls the cloud computing make is directly control the hardware resource and your application. The difficulty part in cloud computing is to deploy in real environment. Its' difficult to know the exact cost and it's requirement until and unless we buy the service not only that whether it will support the existing application which is available on traditional data center or had to design a new application for the cloud computing environment. The security issue, latency, fault tolerance are some parameter which we need to keen care before deploying, all this we only know after deploying but by using simulation we can do the experiment before deploying it to real environment. By simulation we can understand the real environment of cloud computing and then after it successful result we can start deploying your application in cloud computing environment. By using the simulator it will save us lots of time and money.
△ Less
Submitted 8 March, 2012;
originally announced March 2012.
-
Program slicing techniques and its applications
Authors:
N. Sasirekha,
A. Edwin Robert,
Dr. M. Hemalatha
Abstract:
Program understanding is an important aspect in Software Maintenance and Reengineering. Understanding the program is related to execution behaviour and relationship of variable involved in the program. The task of finding all statements in a program that directly or indirectly influence the value for an occurrence of a variable gives the set of statements that can affect the value of a variable at…
▽ More
Program understanding is an important aspect in Software Maintenance and Reengineering. Understanding the program is related to execution behaviour and relationship of variable involved in the program. The task of finding all statements in a program that directly or indirectly influence the value for an occurrence of a variable gives the set of statements that can affect the value of a variable at some point in a program is called a program slice. Program slicing is a technique for extracting parts of computer programs by tracing the programs' control and data flow related to some data item. This technique is applicable in various areas such as debugging, program comprehension and understanding, program integration, cohesion measurement, re-engineering, maintenance, testing where it is useful to be able to focus on relevant parts of large programs. This paper focuses on the various slicing techniques (not limited to) like static slicing, quasi static slicing, dynamic slicing and conditional slicing. This paper also includes various methods in performing the slicing like forward slicing, backward slicing, syntactic slicing and semantic slicing. The slicing of a program is carried out using Java which is a object oriented programming language.
△ Less
Submitted 5 August, 2011;
originally announced August 2011.