Learn More
We consider the routing and wavelength assignment (RWA) problem on wavelength division multiplexing (WDM) networks without wavelength conversion. When the physical network and required connections are given, RWA is the problem to select a suitable path and wavelength among the many possible choices for each connection such that no two paths using the same(More)
WDM optical networks are high speed networks and provide enormous capacity. Survivability is very important issue in these networks. Survivability requires resources for handling the failures. So, efficient resource allocation strategy is required for survivability. In this paper, we have presented two resource allocation strategies for survivability. These(More)
MANET network is a type of decentralized network and is high vulnerable network which requires secure communication.A significant security issue in manet is to protect the network layer from malicious nodes that misbhaves often to obtain the data that is not broadcasted for them i.e gray hole attacks aka selective forwarding attack that leads to denial of(More)
To stay ahead in competition, software organizations have to deliver required functionality consistently guaranteed with high quality. The quality expectations of customers at purchase time from the software is the major reason of emergent attention of software organizations to implement quality management in software development. Nowadays, use of Component(More)
Conceptual Segmentation is a critical technique in medical imaging. The Processes of identification and division of optic circle and veins are the fundamental strides for the analysis of a few infections that causes visual deficiency like diabetic retinopathy, hypertension, glaucoma and different visual deficiency ailment. These diseases lead to loss of(More)
In Modern era, every business is dependent on the Internet. The Network is growing so quickly that now at this stage no one can ever imagine anything without use of internet. But at the same time security over network is very important because of the vulnerability of data to eavesdropping. To protect the data from eavesdropping, it must be appropriately(More)
Mobile Ad-hoc Networks (MANETs) are widely used in various applications due to its ability to communicate without any fixed infrastructure like in military and civilian applications. MANETs are wireless infrastructure-less (Ad-hoc) network comprising of mobile nodes. Mobile nodes can enter and leave the network at any time. Due to its inherent(More)
Content Based Image Retrieval (CBIR) is a set of methods for retrieving related images from an image dataset based on the image features. In the retrieval system, features recognition is the main phase of the system. One of the most important features visually recognized by humans in images is color. A company's trademark plays an important in expansion of(More)
Wireless Mesh Networks are looming as a key technology for next generation of existing wireless networks. The network falls into the category of infrastructure less wireless networks that rely on high mobility and dynamic topology. Though mesh topology provides good reliability, market coverage and scalability, there are number of issues and challenges in(More)