Search
Now showing items 1-10 of 29
SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter
(Publishing India, 2014)
The massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy ...
Comparison of classification techniques for intrusion detection dataset using WEKA
(Institute of Electrical and Electronics Engineers Inc., 2014)
As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. ...
Behavior analysis of LEACH protocol
(Institute of Electrical and Electronics Engineers Inc., 2014)
A wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
A review of De-facto MAC standard: IEEE 802.11 DCF
(Institute of Electrical and Electronics Engineers Inc., 2014)
Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by ...
Mobility model based performance analysis of DSDV mobile ad hoc routing protocol
(Institute of Electrical and Electronics Engineers Inc., 2014)
Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the ...
Performance evaluation of manet routing protocols dsdv, tora enhanced tora
(Central University of Punjab, 2014)
Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the ...
Performance evaluation of AODV based congestion control protocols in manet
(Central University of Punjab, 2014)
The network in which the users communicate with each other by forming a temporary network without any centralized administration is known as ad hoc network. Every node in ad hoc network acts both as a host as well as a ...
Effect of improved IEEE 802.11 DCF on the performance of manets
(Central University of Punjab, 2014)
Wireless networks have become the most crucial aspect of the today's wireless communication and information exchange. The rapid advancements in the wireless networking technologies have drastically modified our communication ...
Improved 2ACK scheme for reducing routing overhead in manet's
(Central University of Punjab, 2014)
An autonomous collection of mobile nodes communicating with each other via wireless links either directly or indirectly or relying on other nodes forms the mobile adhoc network (MANET). The routing protocols in MANET are ...
A fault tolerable load balancing technique in cloud computing
(Central University of Punjab, 2014)
As the IT industry is growing day by day, the need of computing and data storage is increasing rapidly. The process of this increasing mass of data requires more computer equipment to meet the various needs of the ...