Bandwidth Estimation in Network Probing Techniques Utilizing Min-Plus Algebraic Methods
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
The Effectiveness of Jaya Optimization for Energy Aware Cluster Based Routing in Wireless Sensor Networks
Stress Analysis and Detection from Wearable Devices
Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks
Channel Estimation and It’s Techniques: A Survey
Impact of Mobility on Power Consumption in RPL
Implementation of Traffic Engineering Technique in MPLS Network using RSVP
FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique
Performance Evaluation of Advanced Congestion Control Mechanisms for COAP
DGS Based MIMO Microstrip Antenna for Wireless Applications
A Review on Optimized FFT/IFFT Architectures for OFDM Systems
Balanced Unequal Clustering AlgorithmFor Wireless Sensor Network
HHT and DWT Based MIMO-OFDM for Various ModulationSchemes: A Comparative Approach
Study and Comparison of Distributed Energy Efficient Clustering Protocols in Wireless Sensor Network: A Review
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
The nodes are connected by wireless channels and form a random topology. This paper focuses on a new Intrusion Detection System (IDS), Secure-Enhanced Adaptive 3 Acknowledgment (S-EA3ACK), using Enhanced Adaptive ACKnowledgment (EAACK) with hybrid cryptography specifically designed for Mobile Ad Hoc Networks (MANET). In addition, all the aforementioned protocols are compared based on several important performance metrics such as Packet Delivery Ratio (PDR), end-to-end latency, and average power consumption across Network Simulator 2 (NS2), which are used to implement and test the proposed system. Different topology sizes and node sets were used, and the results were compared to those of some closely related IDS mechanisms.
The self-configuring ability of nodes in Mobile Adhoc Network (MANETs) made it popular among critical applications like military use or natural emergency recovery. Most of the proposed protocols assume that all nodes in the network are cooperative, and do not address any security issue. To adjust such trend, it is vital to address its potential security issues. The main objective of this paper is to define the path for security and to further improve delay, energy, throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security. In this paper, performance analysis of hybrid cryptography with reactive protocol Elliptic Curve Cryptography - Ad hoc On- Demand Distance Vector Routing (ECC-AODV) designed for MANET. In this design there is a two key encryption technique based on elliptic curve based theory that can be used to create faster, smaller, and more energetic and efficient cryptography. Network Simulator (NS2) is used to implement and test the proposed system.
In this paper, An soft High-Frequency Structure Simulator (HFSS) software is used to create microstrip patch antennas in three different shapes, including round, triangular, and hexagonal. The antennas are constructed using FR4 epoxy material with a dielectric constant of 4.4 and a thickness of 1.6 mm. Various performance measures of these antennas, including return loss, gain, and bandwidth, are compared. All of these antennas are tuned to operate at 2.45 GHz. The circular microstrip patch antenna was found to perform better at this frequency than any other form.
Quality of Service (QoS) requirements are possible with actual transmission of updates for wireless applications typically included in mission critical applications such as military use or disaster recovery. This research paper proposes an efficient Secure Quality Oriented Distributed (S-QOD) Secure Enhanced Adaptive 3 Acknowledgment (S-EA3ACK) and implements a new on-demand wireless intrusion detection system. S-QOD can improve a best performance of output quality (QoS) to reduce transmission delay, transmission time and also increase network communication throughput for S-EA3ACK using Enhanced Adaptive Acknowledgement (EAACK) DSA (Digital Signature Algorithm) with MAJE4 symmetric cryptography specially designed for MANET through Network Simulator-2.34 (NS2) to implement it.
In this paper, an economical method for replacing each cluster is additionally designed. It uses this method as an associate's Central Management Server (CMS), and its main goal is to improve performance by reducing the everchanging CH topology. The CH method is used in the 2-head rule network to avoid any kind of offensive model and also to avoid latency and energy. This will make the node even faster. The Network Simulator 2 (NS 2) is used to simulate the predictive rule and compare it with the Weight-based Cluster (WBC), Primary and Secondary Weight-based Cluster (PSWBC). The designed cluster methodology implemented in the test system ensures secure transmission and further reduces routing, delay, and power overhead, improving topology efficiency.