MITS

Displaying 1-5 of 5 results

  • White Papers // Jul 2012

    Self Configurable Re-Link Establishment Using Continuous Neighbour Discovery in Asynchronous Wireless Sensor Networks

    In many sensor networks the nodes are static and node connectivity is matter to changes because of disturbance in wireless communication, transmission power varies, or loss of synchronization between neighbouring nodes. Hence, the immediate neighbour is aware of its next sensor, it must continuously maintain its view and the authors...

    Provided By MITS

  • White Papers // Apr 2012

    Application of Fuzzy Logic in Delay Analysis in Construction

    In this paper, the authors describe an application of fuzzy logic in analysis of delays in construction projects using Fuzzy toolbox of MATLAB Program Software. Delays in construction projects are inevitable and may result in claims and disputes among different construction parties. Delays in construction projects can be due to...

    Provided By MITS

  • White Papers // Aug 2011

    Agent Based Congestion Control Performance in Mobile Ad-Hoc Network:A Survey Paper

    A Congestion control is a key problem in mobile adhoc networks. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. Many approaches have been proposed to overcome these difficulties. ideas and show their interrelations. Mobile agent based congestion control Technique...

    Provided By MITS

  • White Papers // Apr 2011

    Limitations of Practical Quantum Cryptography

    As the people all know that the quantum cryptography is having lots of consideration in present time for security but it's important to note that implementation of algorithms using QC is not viable if one wants to have the security intact. It can only be used to share keys using...

    Provided By MITS

  • White Papers // Aug 2010

    Implementation of Cryptography for Privacy Preserving Data Mining

    Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the protection of sensible information has a relevant role. Thus privacy is becoming an increasingly important issue in many data mining applications. For...

    Provided By MITS

  • White Papers // Jul 2012

    Self Configurable Re-Link Establishment Using Continuous Neighbour Discovery in Asynchronous Wireless Sensor Networks

    In many sensor networks the nodes are static and node connectivity is matter to changes because of disturbance in wireless communication, transmission power varies, or loss of synchronization between neighbouring nodes. Hence, the immediate neighbour is aware of its next sensor, it must continuously maintain its view and the authors...

    Provided By MITS

  • White Papers // Apr 2012

    Application of Fuzzy Logic in Delay Analysis in Construction

    In this paper, the authors describe an application of fuzzy logic in analysis of delays in construction projects using Fuzzy toolbox of MATLAB Program Software. Delays in construction projects are inevitable and may result in claims and disputes among different construction parties. Delays in construction projects can be due to...

    Provided By MITS

  • White Papers // Aug 2010

    Implementation of Cryptography for Privacy Preserving Data Mining

    Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the protection of sensible information has a relevant role. Thus privacy is becoming an increasingly important issue in many data mining applications. For...

    Provided By MITS

  • White Papers // Aug 2011

    Agent Based Congestion Control Performance in Mobile Ad-Hoc Network:A Survey Paper

    A Congestion control is a key problem in mobile adhoc networks. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. Many approaches have been proposed to overcome these difficulties. ideas and show their interrelations. Mobile agent based congestion control Technique...

    Provided By MITS

  • White Papers // Apr 2011

    Limitations of Practical Quantum Cryptography

    As the people all know that the quantum cryptography is having lots of consideration in present time for security but it's important to note that implementation of algorithms using QC is not viable if one wants to have the security intact. It can only be used to share keys using...

    Provided By MITS