Abstract- Mobile Ad-hoc Networks (MANETs) have attracted a lot of interest in the research community. The Ad Hoc On-demand Distance Vector (AODV) and Dynamic Manet On- Demand(DYMO) are the two most popular reactive routing protocols for MANETs. In this paper AODV and DYMO Routing Protocols are compared using performance metrics Average End to End delay, Throughput, Routing Overhead, Packet Delivery Ratio and packet Loss. Comparison results shows DYMO performs is higher than AODV. Keywords- MA...
In the present world the security vulnerabilities are highly challenging in MANET. To get the maximum security and minimum threat there is lots of work going on. To effectively isolate the malicious node this paper proposes a Neuro fuzzy algorithm. By using fuzzy logic we can further improve the security level by identifying the malicious node more accurately. The concept behind the paper is as in real life scenario, trust and sharing. Here in this paper we use the concept of trusting support...
Facial animation is primarily an area of computer graphics that encapsulates models and techniques for generating and animating images of the human head and face (Wiki, 2010). Facial animation has been a research topic for more than 25 years, aiming at building models of human faces which can be animated and used to produce facial expressions reflecting emotions and mouth movements for spoken text (F. Parke 1974). The first effort to animate a face by using a computer was more than 25 years a...
Digitally Controlled Delay Lines play a key role in many applications like all-digital PLL, all-digital DLL, all-digital spread-spectrum clock generators etc. A NAND-based DCDL, free from glitches is proposed in this paper. The proposed NAND based DCDL circuit is composed of equal delay elements each composed of NAND gates. Here there are two sets of control bits in order to control the DCDL. The glitch free operation of DCDL can be obtained with a three step switching mechanism. Depending up...
1. ABSTRACT: This paper describes about mobile ad-hoc networks. In mobile ad-hoc networks the simulation tools plays a vital part. The main simulation tools used in MANETS are described in this paper elaborately. Various aspects of MANET routing protocols, quality of service and security issues of the simulated tools have been explained. Advantages and disadvantages of simulation tool software and test bed is explained. 2. INTRODUCTION: Mobile Ad-hoc network in simulation tool have been expla...
SQL injection attack was possible on RockYou because all of the user passwords were stored in plain text rather than using a non reversible hashing system. This site has been hacked and around 32.6m passwords were known to the attackers."- Using this specific case of SQL injection I would like to discuss how attackers exploit the vulnerabilities in the code written by programmers who focus more on implementing desired functionalities and less on security aspects, how these attacks can be avoi...
Firstsoft Technologies private Limited is a Chennai based software Development Company specialized in customized client/server software solutions, Internet centric application development, Business process outsourcing and project consulting. Firstsoft has successfully executed projects in varied business domains based on client/server-based platforms. The company is committed to provide software services and products of assured quality to ensure customer satisfaction. The focus has been consi...
Describe some possible technologies to build a mobile agent which should capable to search for a specific given task over internet and develop an algorithm for that mobile agent. And also classify and discuss about any inference mechanism that might be suitable for the agent. Task 1: Suitable software technologies to build a Mobile Agent In the distributed System architecture and implementation, Mobile Agent (MA) is a new advanced technology. Mobile Agent is nothing but a program that can tra...
In recent years, research has been performed in the area of multihop cellular networks due to their potential for higher capacity, lower energy consumption, and wider coverage. The architecture of a multihop cellular network is similar to that of a traditional cellular network but differs in one significant way. In a multihop cellular network, the physical layer of mobile terminals is modified so that they can transmit not only to base stations but also directly to other mobile terminals. A m...
AS the windows 7 has many interesting and very useful features so that this windows is getting popularity. But now we will see some of its features. 64-bit support The windows has 64-bit support as well . In 64bit you can use more RAM—4 GB and up—a 64-bit computer can be more responsive when you're running lots of programs at once. Accessibility Windows7 gives you more ways to interact with your PC by taking advantage of new strides in speech recognition and touch technology. Action Center Ac...