Learn More
This paper presents a new approach towards automobile safety and security. In the field of an automotive research, a method to monitor and to detect a fatigue/drowsy or a drunken driver has been studied for many years. Previous research uses sensors such as an infrared camera for pupil detection or voice to detect fatigue, or image processing to detect(More)
Cloud computing is the set of distributed computing nodes. The distribution of virtual machine (VM) images to a set of distributed compute nodes in a Cross-Cloud computing environment is main issue considered in this paper. This paper will be dealing with the problem of scheduling virtual machine (VM) images to a set of distributed compute nodes in a(More)
In preeminence web organization communication plays a significant task. Clusterization of web documents is a smart way for current web stuff. Arranging all documents into collection of similar area make things easier and shorten seek period. Different individual of the humanity are in search for speckled pattern on a periodic intervals. At every stride of(More)
Mobile ad hoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile ad hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual(More)
— Wireless ad-hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. One of these attacks is the Black Hole Attack against network integrity(More)
In a knowledge driven economy information plays an important role. Different entities of society are seeking varied information on a day to day basis. In every walk of life decision makers are taking decisions after careful analysis of relevant information. Hence quality of decisions eventually depends upon quality of information. With the advent of(More)
Abstrac-: The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. Wireless networking is not as secure as other networking technologies. But IEEE 802.16 provides much higher security as(More)
—Sensors networks are capable of collecting an enormous amount of data over space and time .Often ,the ultimate objective is to " sample, store and forward " that is to sense the data , store it locally and ultimately forward it to accent almost and analyzed. Typical sensor nodes are wireless nodes with limited storage and computational power. Furthermore(More)
  • 1