R. K. Rathy

Learn More
Ad hoc networks are characterized by wireless connectivity, continuous changing topology, distributed operations and ease of deployment. Routing in Ad hoc networks is a challenge due to mobility and thus is a current area of research. We compare two reactive routing protocols by considering multiple performance metrics to bring out their relative merits.(More)
Ad-hoc networks are infrastructure less networks and can be established in any environment without pre-existing infrastructure with ease of deployment. The nodes in the network can communicate freely while being in motion. Several routing protocols such as DSR, AODV, and DSDV etc. have been developed for communication in these networks. Ad-hoc networks are(More)
Mobile ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Mobile Ad-hoc networks are self-organizing and self-configuring multihop wireless networks where, the structure of the network changes dynamically. This is mainly due to the mobility of(More)
The long-term success of the World Wide Web depends on fast response time. People use the Web to access information from remote sites, but do not like to wait long for their results. The rapid growth in the amount of information and the number of users has lead to difficulty in providing effective response time for the web users and this increased web(More)
English Character Recognition techniques have been studied extensively in the last few years and its progress and success rate is quite high. But for regional languages these are still emerging and their success rate is moderate. There are millions of people who speak Hindi and use Devnagari script for writing. As digital documentation in Devnagari script(More)
A mobile ad hoc network consists of wireless nodes that move frequently. Movement of nodes results in a change in routes, requiring some mechanism for determining new routes. In this paper we propose an approach to utilize location information to improve performance of routing protocols for ad hoc networks. We propose a node-disjoint location based(More)
Multilevel secure database systems are the systems, which each data item is assigned a security level or sensitivity level. The security classifications are assigned from complete relation to the individual data elements. To assign sensitivity levels, the capability of security constraints or classification rules is utilized. Security constraints assign the(More)
In this paper, we consider multilevel relational database system in which security classifications are assigned at the granularity of individual data elements. Usually these multilevel relations exist only at the logical level. In reality, a multilevel relation is decomposed into a collection of single-level relations which are then physically stored in a(More)