The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile ad hoc network is an effective networking system which facilitates exchanging data between wireless devices, without the support of wireless access points and base stations. Providing secure communication is a major research avenue in MANETs because of the dynamic topology due to mobility and energy constraint. To ensure security ID - based key management was introduced. Most of the existing...
Emerging internet technologies rely on Mobile IPv6 services. Home Agent is a key component for such services as it holds the binding association information. Whenever the mobile node changes its point of attachment, it updates the binding information to a Home Agent. In Mobile IPv6, Home Agent addresses are discovered by mobile node via Dynamic Home Agent Address Discovery mechanism. It is the responsibility...
Secure Distributed Wireless Sensor Network (DWSN) is empowered by using an efficient key management technique. Battery powered sensor nodes faces precarious aspects during key distribution in order to reduce the energy consumption for the components of sensor nodes. Thus, implementing a key distribution algorithm should possess minimum power consumption. The proposed work steps towards greater heights...
Software Development Life Cycle (SDLC) starts with eliciting requirement of user as a document called Software Requirement Specification (SRS). SRS document is mostly written in the form of any natural language (NL) that is convenient for the client. In order to develop a right software based on user's requirements, the objects, methods and attributes needs to be identified from SRS document. In this...
Cloud Computing is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources between the service provider and consumers. In cloud computing, many tasks are to be executed by the available services to achieve better performance, minimum total time for completion,...
The current works on the data centers have revealed that most of the network resources are underutilized when adding the resources to the data centers. This under utilization results in congestion while routing the data across the data centers. This can be improved by the load balancing over the bottlenecked links. The traditional method handles the load balancing by implementing the protocols at...
The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this...
Biometrics is the ID of humans utilizing intrinsic physical, biological, otherwise activity features, traits, or habits. Biometrics has the potential to provide this desired ability to clearly and discretely determine a person's identity with additional accuracy and security. Biometric systems primarily based on individual antecedent of advice which is referred as unimodal frameworks. Even though...
Mobile Ad-hoc networks (MANET) are formed with dynamism and upheld by individual hosts in a network. In these type of networks all communication occurs through a wireless medium and the nature of the network is decentralized and dynamic. Hence it probes for a number of security problems and in order provide security against malicious attacks, Intrusion Detection System (IDS) is commonly used as a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.