The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Named Data Networking is a new data centric kind of communication network. This paper shows the study about NDN network and applies this architecture over Vehicular ad-hoc networks so that performance of network improves and communication becomes faster. At the end of simulation results are discussed in the form of packet delivery ratio, throughput, good put, routing overhead and various network parameters...
Wireless Sensor network (WSN) is one of the most attractive fields for researchers. This paper studies about optimization techniques such as Weighted Compressive Data Aggregation (WCDA), Cluster-based Weighted Compressive Data Aggregation (CWCDA) & Ant Colony Optimization (ACO). WCDA & CWCDA are analyzed and discussed. WCDA & CWCDA algorithm is used for reducing energy consumption in WSN...
Cloud computing came into the full existence in every field of computing. As the usage of internet increases the cloud user also increases and the volume of data in the cloud also increases. Cloud computing has various characteristics like resource pooling, ubiquity, virtualization, utility computing, pay per uses etc. With all these characteristics there are various important issues which is to be...
DSR protocol is less considered for practical application due to its more limitations against other routing protocols. Modification in DSR protocol can make it considerable and it can improve energy efficiency to enhance lifetime of battery operated mobile adhoc networks. This paper proposes the modification for route discovery mechanism in normal DSR protocol for energy efficient route establishment...
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms F5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption and decryption time and improve the embedding capacity. In this paper we present a better F5 algorithm with less encryption and decryption time and higher embedding capacity with the help...
Cloud Computing is the technique of dynamic virtual provisioning of computing resources like processing power, storage, networking and Information Technology infrastructure through the Internet on pay per use basis from service providers. Customers can request for resources on the cloud from anywhere on the planet, by sending request through Internet to cloud service provider. Cloud Computing uses...
In opportunistic networks, rather than accepting an end-to-end communication in the conventional Internet model. Opportunistic networking stems from the research area of mobile ad-hoc networks (MANET). Opportunistic networks are wireless networks in which a completely connected path from source to destination is not likely to exist. Mobile ad hoc routing protocol allows nodes with wireless adaptors...
In recent years, the immense and ubiquitous coverage area of vehicular network is growing very frequently as the computational power and deployment of modern vehicle's wireless connectivity and their service facilities are raised. VANET (Vehicular Ad hoc Network) have become an orientation to the researchers and users both for inventive utilization of wide range of safety and non-safety applications...
The infrastructure of MANET is such that it does not have a fixed route path for routing and each nodes can individually acts as a base station. There is no centralized network. There are various attacks for which defend mechanism have been proposed by many researchers. Out of all such attacks wormhole attack poses a great threat as it has ability to grab the route more easily and is difficult to...
CBIR (Content-Based Image Retrieval) uses the visual contents of a picture like global features-color feature, shape feature, texture feature, and local features-spatial domain present to signify and index the image. CBIR method combines global and local features. In this paper worked on Haar Discrete Wavelet Transform (HDWT) for decaying an image into horizontal, vertical and diagonal region and...
A sensor network consisting of hundreds to thousands of small and limited powered nodes with a processing unit called sink or base station connected wirelessly is called a wireless sensor network. It is considerably reasonable to design and develop these small, limited powered sensing nodes with low cost. As these nodes are limited battery powered therefore energy conservation is a key issue. Various...
The theme of the paper is to focus upon an edge based hybrid approach for face detection using neural network classifier and canny method. The algorithm classifies between faces and non-faces using multilayer feed forward networks followed by extraction of facial features using canny method. Viola-Jones method for face detection proved to be a great support in detection of human faces. The execution...
Wireless sensor networks represent an innovative prototype for extracting data from the environment for various applications. It consist of various sensors which send their sensed data to base station. So energy preservation is a key issue for sensor nodes as they have restricted power. This has led to a number of routing scheme for maximizing the network lifetime. In this paper we have enhanced the...
In today's era of drastically improved technology and increasing scalability for large number of users, need for a secure system has grown immensely. To protect networks from unauthorized entries and hackers, intrusion detection systems provides improved monitoring of malicious entries and provides integrity to the system. This growing problem has motivated widespread research in particular field...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.