The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flying ad-hoc network is now growing area of research. There are few work done in this area. This whole paper going to stdy about flying network and its protocols. In our propose work we give decentalize cloud based approach in which cloud have data form sensor and base station and then all the base station and device or sensor connected to the each other through many to many connectivity.
The paper describes an Energy — Efficient Resource Allocation protocol for Wavelength-Routed All-Optical WDM Networks. Protocol selects efficient and low power consumption optimal primary and backup paths. The path selection will be done by Central Management System (CMS). The selection will be by two methods, i.e., the path with less number of free wavelengths will not be considered for selection...
Currently there are many tools available to generate HTTP loads to test and benchmark the performance of hosted web services such as Amazon Web Service. However, none of these tools currently supports SPDY protocol with a number of concurrent client requests. SPDY over HTTP is recently becoming more popular for web service providers, hence it is desirable to develop tools to benchmark the performance...
Ever increasing use of web application creates the number of threats and vulnerability in e-community. 81% of hacking attacks are directed towards web applications, which impose a great security threat to online banking, e-commerce and other organizations. Most of traditional Intrusion Detection Systems are useful for network layer attacks detection and fails to detect web application attacks with...
The World Wide Web contributes greatly to the creation of an ever-increasing global information database. One of the important experience factors while accessing it lies with the time taken to load the webpages. The latency of the network and server's response affect the page-load performance. Caching and prefetching are well-known strategies for reducing the access latency and have become essential...
Wireless sensor networks are associated with risk due to the threats of security vulnerabilities. In this context, we propose a scheme, which uses random key distribution based Artificial Immune System (AIS) for detecting spoofing attacks. The prospective method is for clustered sensor networks and as an example, the algorithm is executed on LEACH protocol. The simulation results prove that the design...
In this paper we present the design of an Advanced Centralized RWA Protocol (ACRP) in which the cost of a lightpath is computed based on its number of available free wavelengths and number of wavelength conversions. Centralized Management System (CMS I) assigns optimal primary and backup lightpaths. CMS II updates the optimal primary and backup lightpaths as and when the number of free wavelengths...
Distributed systems contain several interacting components that perform complex computational tasks. Formal specification of the interaction protocols are crucial to the understanding of these systems. Dynamic specification mining from traces containing information about actual interactions during execution of distributed systems can play a useful role in verification and comprehension when formal...
A semantic web service composition system can be considered as a multi-agent system, in which each of the agent act as a component service provider. In the service composition process, selecting most appropriate service for performing a task is considered to be one of the important aspects. This paper proposes a multi-agent based semantic web service composition process. The process presented deals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.