Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (3)
Mixed security
no vote
Application background we bring novelties to secure military MANET communication for three main points: Cryptographic methods used in MANETs, hybrid key management protocols and structural organization of the military MANETs. As a new approach, we use Hybrid Crypto Secure Signcryption Scheme  that provide security and performance advantages when compared to some traditional cryptographic methods. Furthermore, multi-leveled security approach of our protocol provides adaptive solutions according to the requirements of different military units in the MANET. Key Technology watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance
nalayathan
2016-08-23
3
1
Clusterwsn
1.0
Application background wireless sensor network (WSN) plays an important role in today's real world. The effectiveness of wireless sensor network purely depends on the data acquisition scheme. A large amount of data, such as multipath, chain, tree, cluster and hybrid topology collection plans, can be collected in the literature in wireless sensor networks. However, the existing data collection program fails to provide a reliable network in terms of mobility, traffic and end-to-end connectivity. The key technology is to design velct scheme to minimize & nbsp; energy development, reduce the end-to-end delay and the effective use of DCT of traffic cluster head in wireless sensor networks. &The strength of velct algorithm is to build a simple tree structure, so as to reduce the cluster energy consumption and avoid the formation of frequent industrial clusters.
nalayathan
2016-08-23
2
1
handover network
no vote
Comparison of Segmentation Methods for MelanomaDiagnosis in Dermoscopy Images.. digital image analysis and design. an important researched
nalayathan
2016-08-23
0
1
No more~