Learn More
  • S. Madhavi
  • 2008
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed(More)
Problem statement: A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility(More)
The capacity of ad hoc networks can be severely limited due to interference constraints. One way of using improving the overall capacity of ad hoc networks is by the use of smart antennas. Smart antennas allow the energy to be transmitted or received in a particular direction as opposed to disseminating energy in all directions. This helps in achieving(More)
Cross-Layer Design (CLD) is a new paradigm that allows the optimization of communication network architectures across the traditional layer boundaries, but does not imply a change of the present layered architecture. Cross-Layer optimization is used in multi media application this is also used in run this type of applications parallel so that network(More)
Mobile ad hoc networks (MANETs) are characterized by dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting to the source nodes with destinations may very unstable and go down at any time, making communication over ad hoc networks difficult. Multicasting is intended for group-oriented(More)
Data mining is a process of analyzing data in order to bring about patterns or trends from the data. Many techniques are part of data mining techniques. Other mining techniques such as text mining and web mining also exists. Clustering is one of the most important data mining or text mining algorithm that is used to group similar objects together. In other(More)
Technology and its Significance have great impact in the Society; we enable to significantly describe the best of technology makes us to nest level of research. Hence of, we considered the Clustering based high dimensional data where Information retinal is key and typical feature in the field of Data Mining , Mean while the other parameters which(More)
Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. There are various challenges that are faced in the Ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks.(More)
Mobile ad hoc networks (MANETs) are characterized by dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting to the source nodes with destinations may very unstable and go down at any time, making communication over ad hoc networks difficult. Energy efficiency is a limiting factor in the(More)