Search
Now showing items 11-20 of 29
Analysis of leach protocol for lifetime optimization of wireless sensor networks
(Central University of Punjab, 2014)
A Wireless Sensor Network (WSN) is an emerging field comprised of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model
(IJRET, 2014)
Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified ...
AODV Based Congestion Control Protocols: Review
(IJCSIT, 2014)
Ad- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They ...
Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing
(IJCSIT, 2014)
Now-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users ...
Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing
(IASIR, 2014)
Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means ...
Impact of Denial of Service Attack on the Virtualization in Cloud Computing
(2014)
Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing ...
Security Enhancement in AODV protocol against Network Layer Attacks
(Excel India Publishers, 2014)
A mobile Ad hoc network (MANET) is a
wireless decentralized and self-configuring network in
which nodes communicate with each other either directly
or through intermediate nodes. Each node plays role of
both transmitter ...
Advance Stable Election Protocol in Wireless Sensor Network
(Excel India Publishers, 2014)
Wireless sensor network (WSN) is an
emerging research field. There are large numbers of
sensors that collect and send data to base station. Saving
energy by using various routing techniques is a challenge.
Clustering ...
A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack
(IJRET, 2014)
Wireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, ...
Service level agreement aware energy efficient approach for virtual machine placement in clous data center
(Central University of Punjab, 2014)
Generally, the growth of computing systems has been concentrate on performance improvement or fast processing of applications from the view point of customer, scientific and business perspective. However, this type of ...