- Filter by:
-
Content Type
-
Topic
-
Enhanced Security Strategy over Secure Multicast Ranked Search in Secure Cloud Data
Cloud computing is the emerging technology in the data services platform. The networked systems that connected through the systematic nature for the cloud interpretation from the client level to the cloud level usage defines with the ranked search methodology called as Multi-keyword Ranked SEarch (MRSE), the security level in the...
Download Now -
Proxy Based on Multi Technology Network Management
The most important protocol that is presently used for supervision of computer networks is known as Simple Network Management Protocol (SNMP). The main advantages of applying this protocol in computer equipment and networks are its unfussiness and prevalent usage. However, despite these advantages, using this protocol will be faced with...
Download Now -
Review of Security in Routing Protocols on Ad-Hoc Networks
The ad-hoc networks comprise wireless hosts which can be mobile. Automatically, it doesn't be used any prefabricate structure in these networks. It resources that there are no sub-structure such as central station, router, switch and/or any supplementary things are used in network structure. At present are only numerous wireless nodes...
Download Now -
Development the Mobility of Mobile IPv6 Based Mobile Networks
Mobile IPv6 based mobile networks are attractive ever more imperative with the widespread attractiveness of wireless internet connectivity. For large networks, an addition, namely, the hierarchical mobile IPv6 is used, which suffers from overfilling of the Home Agent as every packet sent has to pass throughout it and this produces...
Download Now -
Analysis on Enhancements in LEACH Protocol for WSN
Owing to recent technological advancements in wireless sensor and communication technologies, WSN has become a prominent research topic tapping the potential use of it to a wide range of applications. A large quantity of miniscule sensor nodes collaborating and communicating through a wireless medium, collect and propagate data finally to...
Download Now -
An Evolutionary Location Update Model in Mobile Cellular Communication Network Sample
In this paper, the authors will propose a model, where they will use fixed time based scheme and an adaptive scheme using increasing velocity of the mobile node. Here, the mobile station will continuously monitor the velocity and threshold level of the velocity will be maintained here. And at the...
Download Now -
Appraisal of WIMAX for VoIP Using OPNET Modular
The improvement of the performance of any wireless network has become a topic of keen interest of the researchers. The path of propagation being wireless, the performance of the network is affected consequently by the topology and the environmental conditions of the area where the network is deployed. Hence, a...
Download Now -
Utilizing a Resistance Compression Network for High Efficiency Reasonant DC/DC Converter
In this paper, the authors present a new topology for a high efficiency DC/DC resonant power converter that utilizes a resistance compression network to provide simultaneous zero voltage switching and near zero current switching across a wide range of input voltage, output voltage and power levels. The Resistance Compression Network...
Download Now -
Sheltered and Dexterous Data Communication for Team-Based Wireless Antenna Networks
Sheltered information communication is a basic issue for Wireless Sensor Networks (WSNs). Grouping is a powerful and viable approach to upgrade the framework execution of WSNs. In this paper, the authors concentrate on a protected information transmission for bunch Cluster-based WSNs (CWSNs), where the bunch is framed progressively and occasionally....
Download Now -
IEEE 802.15.4 standard was especially designed to provide specifications for simple, low data rate, ultra-low power and economical Wireless Personal Area Networks (WPANs). By exploiting the 16 non-interfering channels supported by IEEE 802.15.4, they can improve the channel capacity of wireless sensor networks. This paper analyses the performance of a...
Download Now