Performance Evaluation of Various Routing Protocols Used in Manet
A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may be...
View ArticleOn Demand Routing Protocols in Manet
A Mobile Ad Hoc NETwork (MANET) is a network consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The dynamic topology of a mobile ad...
View ArticleAn Efficient and Cost-Effective Approach to Manage Network Elements in a...
With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to...
View ArticleDiscovering Algorithms With Matrix Code
In first-year programming courses it is often difficult to show students how an algorithm can be discovered. In this paper, the authors present a program format that supports the development from...
View ArticleModel for Evaluating the Security of Wireless Sensor Network With Hesitant...
The problem of evaluating security of Wireless Sensor Network (WSN) with hesitant fuzzy information is the Multiple Attribute Decision Making (MADM). In this paper, the authors investigate the Multiple...
View ArticleAn Extended and Granular Classification of Cloud's Taxonomy and Services
In the recent time cloud computing has come forwarded as one of the most admired computing model in knowledge domain that concerns about the distributed information systems to support the whole world...
View ArticleP2P and Grid Computing: Opportunity for Building Next Generation Wireless...
Nowadays, digital libraries have become the source of information, sharing across the globe in the fields of education, research and knowledge. The full usage of digital libraries will be realized only...
View ArticlepluralisMAC: A Generic Multi-MAC Framework for Heterogeneous, Multiservice...
Developing energy-efficient MAC protocols for lightweight wireless systems has been a challenging task for decades because of the specific requirements of various applications and the varying...
View ArticleNon-Commutative Large Entries for Cognitive Radio Applications
Cognitive radio has been proposed as a solution for the problem of underutilization of the radio spectrum. Indeed, measurements have shown that large portions of frequency bands are not efficiently...
View ArticleDirectPath: High Performance and Energy Efficient Platform I/O Architecture...
With the widespread development of cloud computing and high speed communications, end users store or retrieve video, music, photo and other contents over the cloud or the local network for...
View ArticleResearch on Evaluation Method of Software Reliability Based on Agile...
The problem of evaluating the software reliability based on agile development with intuitionistic trapezoidal fuzzy information is the Multiple Attribute Decision Making (MADM) problems. In this paper,...
View ArticleInference and Checking of Object Ownership
Ownership type systems describe a heap topology and enforce an encapsulation discipline; they aid in various program correctness and understanding tasks. However, the annotation overhead of ownership...
View ArticleAn Efficient Cluster-Based Power Saving Scheme for Wireless Sensor Networks
In this paper, efficient power saving scheme and corresponding algorithm must be developed and designed in order to provide reasonable energy consumption and to improve the network lifetime for...
View ArticleIcebergs in the Clouds: The Other Risks of Cloud Computing
Cloud computing is appealing from management and efficiency perspectives, but brings risks both known and unknown. Well-known and hotly-debated information security risks, due to software...
View ArticleResidue Code Based Low Cost SEU-Tolerant FIR Filter Design for OBP Satellite...
With the development of satellite communications, On-Board Processing (OBP) obtains more and more attentions due to the increased efficiency and performance. However, the large amounts of digital...
View ArticleA Type System for Regular Expressions
Regular expressions are used to match and extract text. It is easy for developers to make syntactic mistakes when writing regular expressions, because regular expressions are often complex and...
View ArticleStudy on EEG Password Based on AR Power Spectrum and BP Network
In recent information day, how to identify person and protect security of information is a key to the social. A problem of personal verification and identification is an actively growing area of...
View ArticleHow code signing works
For developers creating software to be distributed via the internet, tampering is a common concern. Software can be modified to include malware, and the software's original, non-malicious author will...
View ArticleA Reputation-Based Ant Secure Routing Protocol of Wireless Sensor Networks
Benefit from the rapidly developing in hardware manufacturing technology and efficient software algorithms, wireless sensor networks have been widely used in many fields. Secure routing protocol in...
View ArticleFive Myths of Agile Development
Agile development is an umbrella term for a number of iterative and incremental software development methodologies such as Extreme Programming (XP), Scrum, Crystal, Dynamic Systems Development Method...
View Article
More Pages to Explore .....