- Filter by:
-
Content Type
-
Topic
-
A Survey on Routing Protocol and Gateway Discovery in Vehicular Adhoc NETwork (VANET)
Vehicular Ad hoc NETwork (VANET) is the subcategory of MANET which has vehicle to vehicle and vehicle to infrastructure communication environment. VANET enable vehicle to communicate with each other but it require an efficient and robust routing protocol for their success. Several gateway selection schemes have been selected the gateway...
Download Now -
Energy Saving Using Token Bucket in Sensing Network
Wireless network in this modern era is more popular because of its efficiency, availability and convenience. As a consequence, congestion increases day-by-day. In this paper, the authors have proposed a method for lesser energy consumption and to set equilibrium in traffic with the help of BEEM and Token bucket procedure...
Download Now -
A Secure Authorized De-Duplication System in Hybrid Cloud
Most of the house now-a-days store carrying a lot of weight front page new that is individual as abundantly as corporate disclosure on laptops and mortal computers. But this name of tune of mortal and corporate story cannot remain win and are if theft because penniless connectivity. Such environment does...
Download Now -
A Procedural Based Encryption Technique for Accessing Data on Cloud
Access controls are security aspects that control how systems and user interact and communicate with other resources and systems. Whenever an access control is being considered on cloud, there exists a mechanism to reduce the common overhead of the internet and to provide a fine-grained access control. An attribute based...
Download Now -
Design of Frequency Reconfigurable Micro-Strip Patch Antenna for Wireless Applications
In this paper, the authors present innovative design of a compact reconfigurable microstrip patch antenna system using different rectangular rings. Switching between different frequency bands are achieved using six RF-MEMS switches. The antenna is capable to reconfigure up to three different frequency bands. Empirical relations relating to the design for...
Download Now -
Using Cluster Based Approach Wormhole Attack Detection in Wireless Sensor Network: A Survey
Wireless sensor network is one type of ad-hoc network; it has limited bandwidth, low energy with small battery. Use of this feature make sensor infeasible to used security solution. It has many applications like military battle field, habitat monitoring, target tracking, seismic monitoring, fire and flood detection. One of the...
Download Now -
TCP in MANET : Challenges and Solutions
TCP (Transmission Control Protocol) is a reliable transmission control protocol. One of primary elements of TCP is to transmit information in a secured way over a system. To this end, TCP utilizes a congestion control mechanism. In the TCP congestion control mechanism, congestion occurring during data transmission is detected from...
Download Now -
A Survey on Traffic Aware Congestion Control Techniques in Wireless Sensor Network
Wireless sensor network composed of one or more sink and ten or thousands of sensor nodes scattered in physical space. Congestion occurs in wireless sensor network when the numbers of packet being transmitted through the network approaches the packet handling capacity of network. Congestion in wireless sensor network affects the...
Download Now -
Secure Data Storage Framework Using Anti-XSS in Cloud
Cloud computing is an important model for delivering valuable business services to the cloud users. Cloud service consider as online storage where the data is remotely stored, managed and backed up based on pay per use. The user store their files in online and access them from anywhere via the...
Download Now -
A Survey on Privacy Preserving Neural Network with Cloud Computing
During the collaborative learning of neural network on cloud computing, multiple parties collaborate with their own private data sets. As the collaborative neural network learning process starts an individual datasets of all parties are collected and during this learning process no party needs to disclose the users' non-public information to...
Download Now