HOP-BY-HOP CROSS-LAYER CROWING CONTROL SCHEME FOR DISIMINATION AND INTRUSION CONSTRAIN TO REDUCE POWER IN MANET
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 9
Abstract
A mobile ad-hoc network (MANET) is a self-structure network of mobile routers connected by wireless link. The node are free to move randomly and independently. ad-hoc networks suitable for emergency situations like natural or human made disasters, military conflicts, emergency medical situations etc . Major problem in a mobile ad-hoc network is constrains. In this paper focused on a intrusion constrain and delay constrain. objective of the topology control algorithm satisfactory the both interference constrain and delay constrain. Topology control mainly focused on diminish the interference between the nodes then increasing the network capacity. We are going to discussed about the constrain in a mobile ad-hoc networks.
Authors and Affiliations
P. Punitha*
The Effect of the Handover in WiMax Wireless Communication
Worldwide Interoperability for Microwave Access(WiMAX) dep Wireless communications is the transfer of information between two or more of the items that are not physically connected.Considered WiMAX an extension o...
BIOMETRIC OBSERVANCE OF EYE PATTERN USING ALGORITHMS AND DIGITAL IMAGE PROCESSING
In this paper, we describe a non-intrusive vision-based system for the detection of eye pattern of driver fatigue. The system uses a color video camera that points directly towards the driver's face and monitors the dri...
[b]AN INSPECTION ON OFFLINE SIGNATURE AUTHENTICATION [/b][b][/b]
In the era of emergent technology, security is that the foremost anxiety to avoid replicas and counterfeits. There are diverse Biometric systems that enable in personal identification, amongst those verification s...
Authenticate the Centralized Network Using NIS(Network Information System)
Security is the degree of resistance to, or protection from, harm and illegal accessing the services networks. NIS server used for high security in LINUX or another environment. NIS, or Network Information Systems, is...
COMPARISION BETWEEN THE CONTENT BASED FILTERING AND COLLABORATIVE FILTERING TECHNIQUES
On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filterin...