Trust Worthy Architecture Implementation for Mobile Ad hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
A mobile ad hoc network is a wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. The wireless and distributed nature of mobile ad hoc networks poses greater challenges like security, mobility, scalability, reliability and other attributes of trust worthy communication. In this paper we implemented a framework for mobile ad hoc networks by checking the simulation for various service metrics of mobile ad hoc networks. This framework implementation also provides optimum quality of service metrics, while being readily adaptable to widely differing applications, different hardware and software providers and changing technologies..
Authors and Affiliations
D. Saravanan , R. M. Chandrasekaran , B. Vishnu Prabha , V. R. Sarma Dhulipala
A Classification Technique for Microarray Gene Expression Data using PSO-FLANN
Despite of an increased global effort to end breast cancer, it continues to be most common cancer deaths in women. This problem reminds that new therapeutic approaches are desperately needed to improve patient survival r...
Analyzing Theoretical Basis and Inconsistencies of Object Oriented Metrics
Metrics help in identifying potential problem areas and finding these problems in the phase they are developed decreases the cost and avoids major ripple effects from these in later development stages. These days, Object...
Web-enabled Decision Support System on Most Probable Producing Ability and a Searchable Database on Herd Strength for Livestock Farm Management
An estimate of the producing ability of cattle, known as Most Probable Producing Ability (MPPA) is an important measure, which provides an estimate of future productivity of a dairy animal as the basis of the past produc...
INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE
This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of...
Performance Evaluation of Requirements Engineering Methodology for Automated Detection of Non Functional Requirements
Requirement Engineering (RE) deals with the requirements of a proposed solution and handles conflicting requirements of the various stakeholders and is critical to the success of a project. Good requirement engineering m...