Volume no :
|Issue no :
Article Type :
Author :
Mr. K. Sadanandam, A. Shiva Kumar, K. Yashwanth Krishna Reddy, V. Preetham ReddyPublished Date :
Publisher :
Page No: 1 - 10
Abstract : The surge in data traffic strains backbone networks, causing congestion, latency, and higher costs. This project proposes a data compression system tailored for backbone networks, utilizing Lempel-Ziv (LZ) and Huffman encoding to enhance processing time and network efficiency. Adaptive features allow the system to respond to network conditions, ensuring scalability and cost-effectiveness. The primary objective is to optimize network performance by reducing data packet size, increasing throughput, lowering latency, and reducing energy use.
Keyword Data Compression, Networking, Lempel-Ziv (LZ), Huffman encoding
Reference:
- Kumar, T. V. (2018). Project Risk Management System Development Based on Industry 4.0 Technology and its Practical Implications.
- Tambi, V. K., & Singh, N. (2015). Potential Evaluation of REST Web Service Descriptions for Graph-Based Service Discovery with a Hypermedia Focus.
- Kumar, T. V. (2024). A Comparison of SQL and NO-SQL Database Management Systems for Unstructured Data.
- Kumar, T. V. (2024). A Comprehensive Empirical Study Determining Practitioners’ Views on Docker Development Difficulties: Stack Overflow Analysis.
- Kumar, T. V. (2024). Developments and Uses of Generative Artificial Intelligence and Present Experimental Data on the Impact on Productivity Applying Artificial Intelligence that is Generative.
- Kumar, T. V. (2024). A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.
- Sharma, S., & Dutta, N. (2016). Analysing Anomaly Process Detection using Classification Methods and Negative Selection Algorithms.
- Sharma, S., & Dutta, N. (2024). Examining ChatGPT’s and Other Models’ Potential to Improve the Security Environment using Generative AI for Cybersecurity.
- Sakshi, S. (2023). Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.
- Arora, P., & Bhardwaj, S. Mitigating the Security Issues and Challenges in the Internet of Things (IOT) Framework for Enhanced Security.
- Sakshi, S. (2024). A Large-Scale Empirical Study Identifying Practitioners’ Perspectives on Challenges in Docker Development: Analysis using Stack Overflow.
- Sakshi, S. (2023). Advancements and Applications of Generative Artificial Intelligence and show the Experimental Evidence on the Productivity Effects using Generative Artificial Intelligence.
- Sakshi, S. (2023). Assessment of Web Services based on SOAP and REST Principles using Different Metrics for Mobile Environment and Multimedia Conference.
- Sakshi, S. (2022). Design and Implementation of a Pattern-based J2EE Application Development Environment.
- Sharma, S., & Dutta, N. (2018). Development of New Smart City Applications using Blockchain Technology and Cybersecurity Utilisation. Development, 7(11).
- Sharma, S., & Dutta, N. (2017). Development of Attractive Protection through Cyberattack Moderation and Traffic Impact Analysis for Connected Automated Vehicles. Development, 4(2).
- Sharma, S., & Dutta, N. (2015). Evaluation of REST Web Service Descriptions for Graph-based Service Discovery with a Hypermedia Focus. Evaluation, 2(5).
- Sharma, S., & Dutta, N. (2024). Examining ChatGPT’s and Other Models’ Potential to Improve the Security Environment using Generative AI for Cybersecurity.
- Sharma, S., & Dutta, N. (2015). Cybersecurity Vulnerability Management using Novel Artificial Intelligence and Machine Learning Techniques. Sakshi, S. (2023). Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.
- Sharma, S., & Dutta, N. (2017). Classification and Feature Extraction in Artificial Intelligence-based Threat Detection using Analysing Methods.
- Sharma, S., & Dutta, N. (2016). Analysing Anomaly Process Detection using Classification Methods and Negative Selection Algorithms.
- Sharma, S., & Dutta, N. (2015). Distributed DNN-based Middleware for Cyberattack Detection in the Smart IOT Ecosystem: A Novel Framework and Performance Evaluation Technique.
- Bhat, S. (2015). Technology for Chemical Industry Mixing and Processing. Technology, 2(2).
- Bhat, S. (2024). Building Thermal Comforts with Various HVAC Systems and Optimum Conditions.
- Bhat, S. (2020). Enhancing Data Centre Energy Efficiency with Modelling and Optimisation of End-To-End Cooling.
- Bhat, S. (2016). Improving Data Centre Energy Efficiency with End-To-End Cooling Modelling and Optimisation.
- Bhat, S. (2015). Deep Reinforcement Learning for Energy-Saving Thermal Comfort Management in Intelligent Structures.
- Bhat, S. (2015). Design and Function of a Gas Turbine Range Extender for Hybrid Vehicles.
- Bhat, S. (2023). Discovering the Attractiveness of Hydrogen-Fuelled Gas Turbines in Future Energy Systems.
- Bhat, S. (2019). Data Centre Cooling Technology’s Effect on Turbo-Mode Efficiency.
- Bhat, S. (2018). The Impact of Data Centre Cooling Technology on Turbo-Mode Efficiency.
- Archana, B., & Sreedaran, S. (2023). Synthesis, characterization, DNA binding and cleavage studies, in-vitro antimicrobial, cytotoxicity assay of new manganese (III) complexes of N-functionalized macrocyclic cyclam based Schiff base ligands. Polyhedron, 231, 116269.
- Archana, B., & Sreedaran, S. (2022). New cyclam based Zn (II) complexes: effect of flexibility and para substitution on DNA binding, in vitro cytotoxic studies and antimicrobial activities. Journal of Chemical Sciences, 134(4), 102.
- Archana, B., & Sreedaran, S. (2021). POTENTIALLY ACTIVE TRANSITION METAL COMPLEXES SYNTHESIZED AS SELECTIVE DNA BINDING AND ANTIMICROBIAL AGENTS. European Journal of Molecular and Clinical Medicine, 8(1), 1962-1971.
- Rasappan, A. S., Palanisamy, R., Thangamuthu, V., Dharmalingam, V. P., Natarajan, M., Archana, B., … & Kim, J. (2024). Battery-type WS2 decorated WO3 nanorods for high-performance supercapacitors. Materials Letters, 357, 135640.
- Arora, P., & Bhardwaj, S. (2017). Investigation and Evaluation of Strategic Approaches Critically before Approving Cloud Computing Service Frameworks.
- Arora, P., & Bhardwaj, S. (2017). Enhancing Security using Knowledge Discovery and Data Mining Methods in Cloud Computing.
- Arora, P., & Bhardwaj, S. (2017). Combining Internet of Things and Wireless Sensor Networks: A Security-based and Hierarchical Approach.
- Arora, P., & Bhardwaj, S. (2019). Safe and Dependable Intrusion Detection Method Designs Created with Artificial Intelligence Techniques. machine learning, 8(7).
- Arora, P., & Bhardwaj, S. (2017). A Very Safe and Effective Way to Protect Privacy in Cloud Data Storage Configurations.
- Arora, P., & Bhardwaj, S. (2019). The Suitability of Different Cybersecurity Services to Stop Smart Home Attacks.
- Arora, P., & Bhardwaj, S. (2020). Research on Cybersecurity Issues and Solutions for Intelligent Transportation Systems.
- Arora, P., & Bhardwaj, S. (2021). Methods for Threat and Risk Assessment and Mitigation to Improve Security in the Automotive Sector. Methods, 8(2).
- Onyema, E. M., Gude, V., Bhatt, A., Aggarwal, A., Kumar, S., Benson-Emenike, M. E., & Nwobodo, L. O. (2023). Smart Job Scheduling Model for Cloud Computing Network Application. SN Computer Science, 5(1), 39.
- Hasnain, M., Gude, V., Edeh, M. O., Masood, F., Khan, W. U., Imad, M., & Fidelia, N. O. (2024). Cloud-Enhanced Machine Learning for Handwritten Character Recognition in Dementia Patients. In Driving Transformative Technology Trends With Cloud Computing(pp. 328-341). IGI Global.
- Kumar, M. A., Onyema, E. M., Sundaravadivazhagan, B., Gupta, M., Shankar, A., Gude, V., & Yamsani, N. (2024). Detection and mitigation of few control plane attacks in software defined network environments using deep learning algorithm. Concurrency and Computation: Practice and Experience, 36(26), e8256.
- Gude, V., Lavanya, D., Hameeda, S., Rao, G. S., & Nidhya, M. S. (2023, December). Activation of Sleep and Active Node in Wireless Sensor Networks using Fuzzy Logic Routing Table. In 2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)(pp. 1358-1360). IEEE.
- Gorantla, V. A. K., Sriramulugari, S. K., Gorantla, B., Yuvaraj, N., & Singh, K. (2024, March). Optimizing performance of cloud computing management algorithm for high-traffic networks. In 2024 2nd International Conference on Disruptive Technologies (ICDT)(pp. 482-487). IEEE.
- Sriramulugari, S. K., & Gorantla, V. A. K. (2023). Deep learning based convolutional geometric group network for alzheimer disease prediction. International Journal of Biotech Trends and Technology, 13(3).
- Sriramulugari, S. K., & Gorantla, V. A. K. Cyber Security using Cryptographic Algorithms.
- Gorantla, V. A. K., Sriramulugari, S. K., Mewada, A. H., Jiwani, N., & Kiruthiga, T. (2023, December). The slicing based spreading analysis for melanoma prediction using reinforcement learning model. In 2023 IEEE Technology & Engineering Management Conference-Asia Pacific (TEMSCON-ASPAC)(pp. 1-7). IEEE.
- Sriramulugari, S. K., Gorantla, V. A. K., Mewada, A. H., Gupta, K., & Kiruthiga, T. (2023, December). The opinion based analysis for stressed adults using sentimental mining model. In 2023 IEEE Technology & Engineering Management Conference-Asia Pacific (TEMSCON-ASPAC)(pp. 1-6). IEEE.
- Gorantla, V. A. K., Sriramulugari, S. K., Mewada, A. H., Gupta, K., & Kiruthiga, T. (2023, December). The smart computation of multi-organ spreading analysis of COVID-19 using fuzzy based logical controller. In 2023 IEEE Technology & Engineering Management Conference-Asia Pacific (TEMSCON-ASPAC)(pp. 1-7). IEEE.
- Gude, Venkataramaiah (2023). Machine Learning for Characterization and Analysis of Microstructure and Spectral Data of Materials. International Journal of Intelligent Systems and Applications in Engineering12 (21):820 – 826.
- Prabhu Kavin, B., Karki, S., Hemalatha, S., Singh, D., Vijayalakshmi, R., Thangamani, M., … & Adigo, A. G. (2022). Machine Learning‐Based Secure Data Acquisition for Fake Accounts Detection in Future Mobile Communication Networks. Wireless Communications and Mobile Computing, 2022(1), 6356152.
- Kalaiselvi, B., & Thangamani, M. (2020). An efficient Pearson correlation based improved random forest classification for protein structure prediction techniques. Measurement, 162, 107885.
- Thangamani, M., Satheesh, S., Lingisetty, R., Rajendran, S., & Shivahare, B. D. (2025). Mathematical Model for Swarm Optimization in Multimodal Biomedical Images. In Swarm Optimization for Biomedical Applications(pp. 86-107). CRC Press.
- Chithrakumar, T., Mathivanan, S. K., Thangamani, M., Balusamy, B., Gite, S., & Deshpande, N. (2024, August). Revolutionizing Agriculture through Cyber Physical Systems: The Role of Robotics in Smart Farming. In 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT)(Vol. 1, pp. 1-6). IEEE.
- Tiwari, V., Ananthakumaran, S., Shree, M. R., Thangamani, M., Pushpavalli, M., & Patil, S. B. (2024). RETRACTED ARTICLE: Data analysis algorithm for internet of things based on federated learning with optical technology. Optical and Quantum Electronics, 56(4), 572.
- Sakthivel, M., SivaSubramanian, S., Prasad, G. N. R., & Thangamani, M. (2023). Automated detection of cardiac arrest in human beings using auto encoders. Measurement: Sensors, 27, 100792.
- CHITHRAKUMAR, T., THANGAMANI, M., KSHIRSAGAR, R. P., & JAGANNADHAM, D. (2023). MICROCLIMATE PREDICTION USING INTERNET OF THINGS (IOT) BASED ENSEMBLE MODEL. Journal of Environmental Protection and Ecology, 24(2), 622-631.
- Vasista, T. G. K. (2017). Towards innovative methods of construction cost management and control. Civ Eng Urban Plan: Int J, 4, 15-24.
- Hsu, H. Y., Hwang, M. H., & Chiu, Y. S. P. (2021). Development of a strategic framework for sustainable supply chain management. AIMS Environmental Science, (6).
- Venkateswarlu, M., & Vasista, T. G. (2023). Extraction, Transformation and Loading Process in the Cloud computing scenario. International Journal of Engineering Applied Sciences and Technology, 8, 232-236.
- Sagar, M., & Vanmathi, C. (2022, August). Network Cluster Reliability with Enhanced Security and Privacy of IoT Data for Anomaly Detection Using a Deep Learning Model. In 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)(pp. 1670-1677). IEEE.
- Sagar, M., & Vanmathi, C. (2024). A Comprehensive Review on Deep Learning Techniques on Cyber Attacks on Cyber Physical Systems. SN Computer Science, 5(7), 891.
- Sagar, M., & Vanmathi, C. (2024). Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature set. Journal of Intelligent & Fuzzy Systems, (Preprint), 1-17.
- Vanmathi, C., Mangayarkarasi, R., Prabhavathy, P., Hemalatha, S., & Sagar, M. (2023). A Study of Human Interaction Emotional Intelligence in Healthcare Applications. In Multidisciplinary Applications of Deep Learning-Based Artificial Emotional Intelligence(pp. 151-165). IGI Global.
- Kumar, N. A., & Kumar, J. (2009). A Study on Measurement and Classification of TwitterAccounts.
- Senthilkumar, S., Haidari, M., Devi, G., Britto, A. S. F., Gorthi, R., & Sivaramkrishnan, M. (2022, October). Wireless bidirectional power transfer for E-vehicle charging system. In 2022 International Conference on Edge Computing and Applications (ICECAA)(pp. 705-710). IEEE.
- Firos, A., Prakash, N., Gorthi, R., Soni, M., Kumar, S., & Balaraju, V. (2023, February). Fault detection in power transmission lines using AI model. In 2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)(pp. 1-6). IEEE.
- Gorthi, R. S., Babu, K. G., & Prasad, D. S. S. (2014). Simulink model for cost-effective analysis of hybrid system. International Journal of Modern Engineering Research (IJMER), 4(2).
- Rao, P. R., & Sucharita, D. V. (2019). A framework to automate cloud based service attacks detection and prevention. International Journal of Advanced Computer Science and Applications, 10(2), 241-250.
- Rao, P. R., Sridhar, S. V., & RamaKrishna, V. (2013). An Optimistic Approach for Query Construction and Execution in Cloud Computing Environment. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5).
- Rao, P. R., & Sucharita, V. (2020). A secure cloud service deployment framework for DevOps. Indonesian Journal of Electrical Engineering and Computer Science, 21(2), 874-885.
Selvan, M. A., & Amali, S. M. J. (2024). RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.
