Abstract-In this paper we propose Adaptive Fast Convergecast MAC protocol (AFC-MAC) to improve communication performance in wireless sensor networks. AFC-MAC is a hybrid protocol that combines scheduled and multi-frequency approaches. We propose a channel assignment algorithm which aims to: 1) Allow concurrent multiple transmissions 2) Helps the nodes to adapt their schedules according to the network load by increasing the number of active slots in one time cycle. Instead of assigning...
This process is a computer user consisting of a user logon name, password and authentication methods described. It can be thought user security features which permit administrations to manage who has access to the network. Whatever, users' password can over and over again be stolen, accidentally revealed, or forgotten. Hence organizations need a more requirements and techniques for the authentication process. Cards, smart card- like device smart phones, web authentication, finger-scan...
The prefix nano in the term nanotechnology refers to the one billionth part of anything. So by this term nanotechnology cn be said that the technology which works with the matter to this precison. Nanotechnology deals with the various structures of matter having dimensions of the order of the one billionth part of the matter. While the word nanotechnology is relatively new, the existence of functional devices and structures of nanometer dimensions is not new, and in fact such structures have...
Abstract In this report, an overview of GPUs, CUDA, and Brook+ programming will be explore represents in parallel computing. GPU Computing provides a fully programmable, massively multithreaded chip with up to 128 scalar processor cores and capable of delivering hundreds of billions of operations per second. Researchers across many scientific and engineering disciplines are using this platform to accelerate important computations by up to 2 orders of magnitude. CUDA is a scalable parallel...
Abstract: GSM network consists of two parts one is mobile switching and other one is radio. The radio part is a critical factor which effects quality of services in GSM network. Radio network optimization refers to modification according to some rules in order to get best quality of services and best utilization of resources. Optimization can be divided into three parts, initial optimization, primary optimization and maintenance optimization. The main focus throughout the research will be on...
MANET is vulnerable to different kind of attacks because there are no clear secure boundaries. Node can join a network automatically when it is in the radio range of a network, and communicate with other nodes in the network. Due to this, MANETs are susceptible to attacks. The attacks may be passive or active. False message reply, Leakage of information, Denial-of-Service, and changing the data integrity are few examples of attacks. Spoofing, confidential information leakage, data tampering and...
Distributed coordination function is the fundamental MAC technique of the IEEE 802.11 based WLAN standard. DCF employs a CSMA/CA with Binary exponential backoff algorithm. DCF requires a station wishing to transmit to listen for the channel status for a DIFS interval. If the channel is found busy during the DIFS interval, the station defers its transmission. In a network where a number of stations contend for the wireless medium. If multiple stations sense the channel busy and defer their...
In this chapter is to provide the study and review about Intrusion Detection System and Intrusion Prevention System which have done by expert and professor. According to (Tony Bradley, 2004), intrusion detection system (IDS) is to monitor traffic and monitor for suspicious activity. And it will give alerts to network administrator and the system. And IDS also will respond to malicious traffic by taking action to block the user or the IP address from accessing to the network. According to (Ameya...
The term voice recognition refers to the ability where a machine can respond to spoken commands by the user. It will enable the user to use the computer without using his hands to give it commands. This helps a lot with disabled persons, because it will let them use computers or any type of electronic device in the near future even if they can't move their hands. The research for ASR (Automatic Speech Recognition) started in the late 1930's. It was funded and tested by the Defence Advanced...
Nowadays, the demand for graphic design in low-band application, like web pages, also in heavy duty applications such as medic photos is increasing sharply. Image compression has gained great attention over last 20 years. There are many standard generic compression technologies which have effectively been employed for image compression. Normally, there are two kinds compression algorithm-lossy and lossless. Lossy compression has gained increasing popularity since the release of JPEG standard...