Dravidian University

Displaying 1-4 of 4 results

  • White Papers // Jun 2012

    Security Attacks in Manet - A Review

    Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in mobile adhoc...

    Provided By Dravidian University

  • White Papers // May 2011

    Energy Conservation Techniques in Ad Hoc Networks

    Energy is a limiting factor in the successful deployment of ad hoc networks since nodes are expected to have little potential for recharging their batteries. In this paper, the authors investigate the energy costs of wireless communication and discuss the mechanisms used to reduce these costs for communication in ad...

    Provided By Dravidian University

  • White Papers // Dec 2010

    Restoring the Connectivity in K-Connected MANET When All Edge Disjoint Minimum Spanning Trees Fail

    Due to random mobility of nodes in MANETs, the connectivity of the nodes in very sensitive environments becomes a serious issue and is subject to increased risk of damage. Sometimes a MANET suffers from the simultaneous failure of multiple multicast paths and gets partitioned into disjoint segments. In order to...

    Provided By Dravidian University

  • White Papers // Nov 2010

    A Novel Business Intelligence System Framework

    Business Intelligence (BI) systems plays a vital role in effective decision making in order to improve the business performance and opportunities by understanding the organization's environments through the systematic process of information. The development of BI systems is limited due to its huge development costs. Developing the complex systems with...

    Provided By Dravidian University

  • White Papers // Jun 2012

    Security Attacks in Manet - A Review

    Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in mobile adhoc...

    Provided By Dravidian University

  • White Papers // Dec 2010

    Restoring the Connectivity in K-Connected MANET When All Edge Disjoint Minimum Spanning Trees Fail

    Due to random mobility of nodes in MANETs, the connectivity of the nodes in very sensitive environments becomes a serious issue and is subject to increased risk of damage. Sometimes a MANET suffers from the simultaneous failure of multiple multicast paths and gets partitioned into disjoint segments. In order to...

    Provided By Dravidian University

  • White Papers // May 2011

    Energy Conservation Techniques in Ad Hoc Networks

    Energy is a limiting factor in the successful deployment of ad hoc networks since nodes are expected to have little potential for recharging their batteries. In this paper, the authors investigate the energy costs of wireless communication and discuss the mechanisms used to reduce these costs for communication in ad...

    Provided By Dravidian University

  • White Papers // Nov 2010

    A Novel Business Intelligence System Framework

    Business Intelligence (BI) systems plays a vital role in effective decision making in order to improve the business performance and opportunities by understanding the organization's environments through the systematic process of information. The development of BI systems is limited due to its huge development costs. Developing the complex systems with...

    Provided By Dravidian University