Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 7
Abstract
"We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of "
A Study on Perception and Usefulness of Seed Village Program for Soya Bean Crop among the Beneficiary Farmers of Indore Block of Indore District Madhya Pradesh, India
The word seed or seeds are used for all propagating materials. The seed is considered as most important input in agriculture. It is cheaper than other inputs like irrigation, fertilizer & plant protection measures. Quali...
Applications of Soft Sets in BH-algebra
In this paper, the concept of soft set BH-algebra is introduced and in the meantime, some of their properties and structural characteristics are discussed and studied. The bi-intersection, extended intersection, restrict...
Bilateral Exophthalmos - A Case Report and Review of Literature
Grave’s Ophthalmopathy ( Dysthyroid Eye Disease)is the most common cause of unilateral or bilateral proptosis in adults between ages of 25-50 years,mostly females.Diagnostic clinical features include Proptosis,Eyelid re...
A Novel Security Model For Password Stealing And Password Reuse Attacks
The aim of the project is to design a user authentication protocol named Opass which leverages a user cell phone and short message service to password stealing and password reuse attacks. Opass only requires a unique pho...
Integrative Performance of the House and the Low-Cost for the Respondent to the Hot Humid Climate
The study deals with the achievement of climate efficiency and makes the housing more suitable for the climate in the humid areas, including the city of Basra, because most exposed to solar radiation ceiling. The study p...