Search
Now showing items 1-10 of 11
Segregated receive and relay scheme for communication in wireless sensor networks
(Institute of Electrical and Electronics Engineers Inc., 2015)
A Wireless Sensor Network (WSN) is a set of self-powered sensor nodes. These nodes are deployed in infrastructure less mode to collect the useful information from the environment and transmit it to the sink node. The ...
Combinational feature selection approach for network intrusion detection system
(Institute of Electrical and Electronics Engineers Inc., 2015)
In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from ...
Effect of nickel oxide nanoparticles on dielectric and optical properties of nematic liquid crystal
(American Institute of Physics Inc., 2015)
In the present paper, we have studied the improvement in dielectric and optical properties of nematic liquid crystal (NLC) by doping of nickel oxide (NiO) nanoparticles. We have observed the dielectric and optical properties ...
Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models
(Institute of Electrical and Electronics Engineers Inc., 2015)
The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET ...
Performance analysis of AODV based congestion control protocols in MANET
(Institute of Electrical and Electronics Engineers Inc., 2015)
MANETs are highly deployable, dynamic and self-configurable because of which routing is an extremely challenging task in them. AODV routing protocol used for routing purposes in MANETs is an on-demand routing protocol which ...
Performance evaluation of various symmetric encryption algorithms
(Institute of Electrical and Electronics Engineers Inc., 2015)
With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions ...
Wireless sensor network: Routing protocols and attacks - A survey
(Institute of Electrical and Electronics Engineers Inc., 2015)
Based on end user application a network of hundreds or even thousands of sensor nodes, also known as wireless sensor network, can collect valuable data from an unassisted environment and transmit the information to the ...
Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System
(IJCTT, 2015)
Distributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically ...
Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol.
(IJRET, 2015)
Vehicular Ad Hoc Network (VANET) is a kind of Wireless Ad hoc Network in which node has high mobility, and thus the topology of the network is highly dynamic. VANET has thepotential to increase road safety, improve traffic ...
Code clone detection and analysis using software metrics and neural network: A Literature Review
(Eighth Sense Research Group, 2015)
Code clones are the duplicated code which degrade the software quality and hence increase the maintenance cost. Detection of clones in a large software system is very tedious tasks but it is necessary to improve the design, ...