Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 7
Abstract
"We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of "
Performance Evaluation of Urban Water Treatment Plant
"Sustained supply of safe and potable water is of paramount significance in promotion of health and well being of the people. It is commonly observed in most of the conventional WTP in urban area are unable to perform th...
Online Virtual Subjective Examination System Based Under Ubiquitous Cloud
"With the advancement in the field of information and communication technology, must change in the traditional examination system. Today, the online examination conducted is for an objective phase, but no provision is th...
Electronic Waste - A Literature Review
Electronic waste is informally known as e-waste for the electronic products nearing the end of their useful life. The e- waste products contain materials that are hazardous to the human beings,depending on their conditi...
Review Effective use of CORDIC in JPEG
As in modern of portable Devices where the power consumption should be limited CORDIC algorithm is a promising technology. The CORDIC algorithm has two modes vectoring mode and rotation mode . The rotation mode can be...
Effect Steel Plate of Shear Reinforced Wide Beam Concrete
"Wide reinforced concrete beams have been used in buildings to reduce reinforcement congestion and floor heights for required headroom. The beaming most of these cases is wider than that of the supporting columns. Conseq...