Badduri Divya

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—File Sharing in Peer-to-Peer Networks are a tedious process. For a particular peer to access the files owned by other peer it has to recognize the details of the desired file. Whenever a peer requires a file, it transmits a request to the other peer, which processes the request and demands a decision whether to send the file or not. There is no option for(More)
In Order to fulfill the energy consumption reduction in IEEE 802. 15. 4 sensor networks, it proposes an energy efficient implementation by managing the mobility in the networks using speculative algorithm in cluster tree topology. This system aims at anticipating the loss of the association between coordinators and mobile nodes. To adapt the mobility(More)
We considered the problem of ranking the popularity of items and suggesting popular items based on user feedback. User feedback is obtained by iteratively presenting a set of suggested items, and users selecting items based on their own preferences either the true popularity ranking of items, and suggest true popular items. We consider apriori algorithm(More)
In deregulated power systems, the issue of voltage stability causes major blackouts. This result in collapse of transmission system and is mostly affected due to frequent variations in load. In this paper, we will focus on the determination of most sensitive node in IEEE - 30 bus system. For this study, we are using PSAT, a MATLAB Based Simulink &(More)
The ―Multilevel converter‖ has drawn tremendous interest in the power industry. The general structure of the multilevel converter is to synthesize a sinusoidal voltage from several levels of voltages, Multilevel voltage source converters are emerging as a new breed of power converter options for high power applications, These converter topologies can(More)
In this paper, we propose a modification to the existing Data Encryption Standard (DES) to make it secure and prone to the bit errors caused by the wireless channel. We observe that using the modified algorithm in wireless channels, improves the bit error rate (BER) performance as well as security compared to DES. Wireless channels are an open medium to(More)
  • 1