An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks
R.M.Sinthiya, J.Vijipriya
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Security is important for many sensor network applications. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. WSNs are often deployed in harsh environments, where an attacker node can physically capture some of the sensor nodes. Once a sensor node is captured then the attacker node can collect all the credentials like keys, identities etc. The attacker can modify the message and replicate in order to overhear the messages or interrupt the functionality of the sensor networks. IPD and PSD are proposed as an optimized localization algorithm for defending against the node replication attacks. Each node in the localized algorithm can communicate only with its one-hop neighbors. The node can meet again, it can be compared with the first node, previous node location, and attack replication node.
An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior
Elnaz B. Noeparast, Reza Ravanmehr, Ramin Nasiri
Most of the intrusion detection systems are unable to detect behavior-based intrusions such as Stuxnet, because of their absolute view of the intrusion. There are some legitimate behaviors which their subsequences cause intrusions. In this paper, a multi-agent model inspired by the human immune system has been proposed whose autonomous agents have a conditional view towards intrusion concept. The first level of the intrusion detection in this model has been implemented in clients' side on the anomaly detection. Furthermore, by agent migration to the server, the final detection about the intrusion is fulfilled by server’s agents in second level. In this level, an intrusion probability is measured in a Bayesian network based on the subsequence of functions and system calls which has been invoked in the client. This value shows the occurrence probability of this subsequence in an intrusion. Therefore, the false negative error probability will be decreased.
RECEIVER SYNCHRONIZATION FOR DAB WITH TRANSMISSION MODE III
Baliwan Preeti
Synchronization is the key part of OFDM receiver. A method to estimate Time Synchronization in DAB receiver is based on analysis of phase reference symbol is given. Synchronization analysis is performed under Rician channel with SNR 20dB and -8dB.
This paper presents basic about Virtual Private Network (VPN). In this paper, we can basically focus on its Types, Architecture, Functionality and Protocols. A ”VIRTUAL PRIVATE NETWORK” is an authenticated and encrypted communication channel across some form of public network, such as internet. The concept of “VIRTUAL PRIVATE NETWORK” is utilized by almost 60% of firms, companies and organizations to communicate each other.
An Adapted Group Method of Data Handling for Abrupt Data Analysis
Vikas Lamba, Sunita Lamba
This Research paper shows the experimental study for the Agricultural (Economical) yield prediction output those are based on the past data using Group Method of Data Handling (GMDH) technique. GMDH is very useful concept for solving the real life problem. Because in real life the data is vast, it is dynamic in behavior and complex in nature. The usability of Group Method of Data Handling is to select the useful input from all data set and discard the useless data using external criterion. Useless data not only reduce the performance of the system but also give the inaccurate result.
EFFICIENT DATA MINING FOR MINING CLASSIFICATION USING NEURAL NETWORK
Mrs.Maruthaveni.R, Mrs.Renuka Devi.S.V
One of the data mining problems receiving enormous attention in the database community is classification. Although Artificial Neural Networks (ANNs) have been successfully applied in a wide range of machine learning applications, they are often regarded as “black box”, that means predictions cannot be explained. To enhance the explanation of neural network, a novel algorithm is to extract symbolic rules from neural network has been proposed. With the proposed approach, concise symbolic rules with high accuracy can be extracted from the trained neural network. Extracted rules are comparable with other methods in terms of number of rules. The network is first trained to attain the desired accuracy rate. Redundant connection of the network are then removed by a network pruning rule. The effectiveness of the proposed approach is clearly demonstrated by the experimental results on a set of benchmark data mining classification problems.
In this paper we have discuss the Biometrics security .The biometrics term is becoming highly important in computer security world. The human physical Characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. Biometrics is the today’s high security application help for the minimized the error system rate and unauthorized access. In this term paper discuss about the future and present use of Biometrics security and various type of the Biometrics
Computer Viruses and Challenges for Anti-virus Industry
Deepak Kumar, Narender Kumar, Aditya K
In today’s world every organizations and individuals using computer and internet need to have a wide-ranging virus protection policy to combat the growing threats of computer viruses by means of anti-virus. The anti-virus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, and delivering and deploying the solution. In this situation, it is very difficult to prevent every machine from being compromised by virus. This paper highlights the most common virus types and their modus operandi. Further it is also discussed that in present scenario due to the evolution of new viruses every day why it is very difficult for Anti-virus industry to make themselves up-to-date each day as per the definition of new emerging viruses.
Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset
S. Revathi , Dr. A. Malathi
During the last decade the analysis of intrusion detection has become very significant, the researcher focuses on various dataset to improve system accuracy and to reduce false positive rate based on DAPRA 98 and later the updated version as KDD cup 99 dataset which shows some statistical issues, it degrades the evaluation of anomaly detection that affects the performance of the security analysis which leads to the replacement of KDD cup 99 to NSL-KDD dataset. This paper focus on detailed analysis on NSL- KDD dataset and proposed a new technique of combining swarm intelligence (Simplified Swarm Optimization) and data mining algorithm (Random Forest) for feature selection and reduction. SSO is used to find more appropriate set of attributes for classifying network intrusions, and Random Forest is used as a classifier. In the preprocessing step, we optimize the dimension of the dataset by the proposed SSO-RF approach and finds an optimal set of features. SSO is an optimization method that has a strong global search capability and is used here for dimension optimization. The experimental results shows that the proposed approach performs better than the other approaches for the detection of all kinds of attacks present in the dataset.
In today’s era of technology, evolution has occurred in every possible field. Mankind is witnessing a virtual world of internet more often since the last decade. If today’s demand is transmutation from physical to virtual, so has the concept of virtual blackboard come up. Following the domain of computer vision the system makes use of an object to interact with the digital world. An object with some specifications is detected by the system through webcam, movements of the object are tracked and depending upon the color of the object, predefined functionalities are provided by the system. Main objective of developing the system is to provide all the functionalities of a physical blackboard and change the traditional approach altogether.
VOIP and Internet multimedia system technologies are rapidly being used by consumers, government, enterprises and militaries for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as Internet. These technologies offer more features than traditional PSTN (Public Switched Telephone Network). VoIP provide more flexibility and cost is also reduced in VoIP than PSTN[2]. Also, VOIP systems are more complex in architecture, protocols and implementation terms with increase in the potential of misuse. This paper presents an overview of VoIP system and some of its security issues to provide a direction towards the future research in similar technologies. This paper also gives a brief overview of SIP, one of the most important technology of VoIP.
Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms
Pankaj Solanki, Deepak Shuhkla
MANET is a next generation communication network and can be defined by self.Due to its characteristics that is keptattracting for academic research and development.Due their ad hoc nature and dynamic topology, performance and security is a key problem in MANET. In search of secure, efficient and effective algorithm, a simulation is prepared in this paper. This paper describes the detailed analysis and implementation of the proposed work. After implementation, the performance of the designed system is evaluated. according to given results system isadoptable at the performance as well as security point of view
Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction
N. Sakthieswaran, K. Ganesan
Experiments have been conducted to study the effect of addition of fly ash, copper slag, silica fume together with/without steel fibres or/and polypropylene fibres on 28-day compressive strength of concrete. While fly ash and copper slag are used for partial replacement of cement and fine aggregate respectively, defined quantity of steel fibres or/and polypropylene fibres were simply added to the mix proportions considered for the study.It is found from the experimental study that, in general, irrespective of the presence or absence of fibres, (i) for a given copper slag-fine aggregate ratio, increase in fly ash-cement ratio decreases 28-day compressive strength of the concrete and, the rate of decrease in the 28-day strength decrease with increase in copper slag-sand ratio (ii) for a given fly ash-cement ratio, increase in copper slag-fine aggregate ratio increases 28-day compressive strength of the concrete. Approximate equation is proposed to determine the 28-day compressive strength of the concrete containing fly ash, copper slag, silica fume and fibres.
CACHING DATA THROUGH PULL BASED APPROCHES IN WIRELESS NETWORKS
S. Mahalakshmi, Dr. M. Kamarajan
In MANET environments, data caching are essential because it increases the ability of mobile to access desired data, and improve overall system performance. This paper proposes distributed cache invalidation mechanism (DCIM), a client based cache consistency scheme that’s implemented on prime of an antecedently planned design for caching information things in mobile impromptu networks (MANET),namely COACS, where special nodes cache the queries and therefore the addresses of the nodes that store the responses to those queries. DCIM may be a pull-based algorithmic program that implements adaptive time to measure (TTL),piggybacking, per-fetching and provides near study consistency capabilities. Cached knowledge things as appointed adjective TTL values that correspond to their update rates at the data supply, where ever things with terminated TTL values as stored in validation requests to the information adjective to refresh them, where a sun expired ones however with high request rates as perfected from the server. DCIM is analyzed to assess the delay and bandwidth gains in comparison to polling whenever and push based schemes.
This paper introduces the concept of visible light communication (VLC). Visible-light communications (VLC) is a technology for wireless communication using light that can be perceived by the naked eye. VLC uses frequencies other than radio, and they are unrestricted and licence free. The urgent need of VLC is to overcome the problems faced in RF communication. Unlike existing methods of wireless communication, the visible light portion of the electromagnetic frequency spectrum is used in VLC to transmit information. Visible light communication (VLC) refers to the communication technology which utilizes the visible light source as a signal transmitter, the air as a transmission medium, and the appropriate photodiode as a signal receiving component. This paper provides an overview of applications and design challenges for VLC, compare it with other existing communication technologies and presents the modulation techniques used
Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks
D.Ramya, Mr.P.Basith
Conventional trust management techniques developed for wired and wireless sensor networks are not well suited for applications due to their higher memory and power consumption. To overcome this an efficient Weighted Trust Evaluation System for Wireless Sensor Networks (WTES-WSN), is proposed in this paper. A trust detection system is proposed based on node identities and an enhanced trust evaluating approach is defined in cooperation between cluster heads. This approach significantly increases the system efficiency and reduces the cost of trust evaluation. Moreover a novel scheme based on weighted-trust evaluation to detect malicious nodes is proposed in this paper. Also, theoretical and simulation results show that this scheme provides less memory, energy, and communication overheads as compared to the current trust management schemes. Furthermore, this approach enables us to detect and prevent malicious, selfish, and faulty nodes.
A New BBBC based LEACH Algorithm for Energy Efficient Routing in WSN
Archana, Sukhjinder kaur
The competing objectives of wireless sensor network for optimizing the scarce battery utilization with sending large amount of data to base station, constantly suggest for identifying energy efficient routing algorithm. To achieve this objective, in this paper a Big Bang Big Crunch (BBBC) based metaheuristic algorithm is proposed for the selection of Cluster Head in such a way so that its energy is used uniformly with delayed disintegration of network. For this purpose, the LEACH algorithm random clustering approach has been replaced by BBBC clustering. To evaluate the performance of our proposed BBBC based LEACH protocol we have compared it with random LEACH, Max Energy LEACH and k-means LEACH. Results showed improvement in energy conservation.
Cyber-attacks has increased at a tremendous rate in the last decade. Due to this sensitive data like Bank Account details, login details of the accounts are not safe. Thus to counter this we need a robust authentication method. In recent years different types of fast authentication systems are already being developed such as token based, biometrics system, captcha etc. Each of the existing methods have their own merits and demerits. So in this paper we proposed a new model for the authentication using traditional text based password system with an integration of sound and image based password system. The Integrated system is difficult to spoof and the security principles cannot be breached easily.
Mr. Anup R. Nimje, Prof. V.T.Gaikwad, Prof. H.N.Datir
A Review of Various Trust Management Models for Cloud Computing Storage Systems
Mr. Anup R. Nimje, Prof. V.T.Gaikwad, Prof. H.N.Datir
Computing has been widely used for data storage and computational purposes. When we discuss about the cloud storage services, the data must be outsourced, so, there may be serious concerns about the authorization and trust management for the cloud service provider (CSP). These concerns are about confidentiality, integrity and access control. In this paper we are going to discuss various models in brief such as Provable data possession (PDP), Proof of retrievability (POR), HAIL, Attribute Based Encryption Scheme, Plutus, SiRiUS, Third party auditor (TPA) etc that are introduced for addressing such issues about cloud storage systems. Also the mutual trust model given by Ayad Barsoum et al. This scheme supports dynamic data and trust in the cloud computing storage systems.
The implementation of ATM (Asynchronous Transfer Mode) is needed for quick access to web-based applications and real-time delivery of multimedia transmissions on an integrated network infrastructure. ATM is a high-performance technology that provides bandwidth on-demand for broadband transmissions and hence supports seamless transport of full-motion video, audio, data, animations and still images in local and wider area environments on different data rates. Asynchronous transfer mode (ATM) also known as Cell Relay is a cell-oriented switching and multiplexing technology. It uses fixed-length packets to carry different types of traffic and employs the asynchronous time division multiplexing. This feature will likely to have broad positive impacts on revenue opportunities since multiple types of services like- high speed local-area network (LAN) interconnection, voice, video, and future multimedia applications in business and residential markets will then depend on ATM technology in both short as well as long term of time. ATM will not only reduce the infrastructure costs through efficient bandwidth management, operational simplicity and usage of existing networks but also it will diminish the unacceptable time delay between packets.
Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique
R. K. Sharma, Neeraj Kishore, Parijat Das
Data security is an important issue in military devices. This paper presents a secured and efficient way of sending data and image in encrypted form using Identity Based Cryptography and Visual Cryptography. This has direct application in MANETs specifically for military surveillance [16]. This paper also presents an advantage of using public - private key pairs in Visual Cryptography wherein generally only the private key generators are used. In this paper, the simplicity of RSA algorithm is adopted to set up the public - private key pairs of all the mobile nodes and hence for encryption and decryption [22]. Regeneration of public-private keys is adopted to make the system more secure from various attacks [6].
EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD
Kanya Devi J, Kanimozhi S
Mona, secure data sharing in a multi-owner manner for dynamic groups preserves data, identity privacy from an untrusted cloud and allows frequent change of the membership. In RLS while the number of invoked users grows larger, the length of RL increases. To send all user revocation details to the group members for sharing purpose, leads to communication overhead .To address this issue, in this paper, By leveraging group signature and dynamic broadcast encryption techniques and for overall security Elliptic curve cryptography(ECC) algorithm is used, so that any cloud user can anonymously share data with others. The storage overhead and encryption computation cost of the scheme are independent with the number of revoked users.
Shape Analysis of the Quintic Trigonometric Bèzier curve with two shape parameter
Mridula Dube, Bharti Yadav
A quintic trigonometric Bèzier curve with two shape parameters, is presented in this work. The shape of the curve can be adjusted as desired, by simply altering the value of shape parameter, without changing the control polygon. The quintic trigonometric Bèzier curve can be made close to the quintic Bèzier curve or closer to the given control polygon than the quintic Bèzier curve.
In the modern era the popularity of the Universal Serial Bus storage device is very vast. But disadvantage of USB is that being a peripheral device, it needs a host usually a PC to initiate and mediate communications between two USB storage devices. With help of this project two USB can communicate directly without PC. USB devices directly connected to embedded system. There is a controller that hosts the flash devices. Insert pen drive into USB port, then an signal will sent to the processor indicating that source pen drive is inserted so now processor will wait for the signal from other USB device. When the controller gets the signal from other USB drive then controller is ready to transfer the data between two. Controller gets the input only from external hard key from the user. Once the user presses the hard key, controller gets the information to transfer the data between two drives. The user interface consists of keypad 20x2 LCD display. User can see the data of both the flash drive and can send in either direction from first flash drive to other or from second to first
Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews
M. Govindarajan
The area of sentiment mining (also called sentiment extraction, opinion mining, opinion extraction, sentiment analysis, etc.) has seen a large increase in academic interest in the last few years. Researchers in the areas of natural language processing, data mining, machine learning, and others have tested a variety of methods of automating the sentiment analysis process. The feasibility and the benefits of the proposed approaches are demonstrated by means of movie review that is widely used in the field of sentiment classification. In the proposed work, a comparative study of the effectiveness of ensemble technique is made for sentiment classification. Bagging and boosting are two relatively new but popular methods for producing ensembles. In this work, bagging is evaluated on movie review data set in conjunction with Naive Bayes (NB), Support Vector Machine (SVM), Genetic Algorithm (GA) as the base learners. The proposed bagged NB, SVM, GA is superior to individual approaches for movie review in terms of classification accuracy.
Ekta Parwani, Apeksha Pawar, Chirag Ajwani, Prof.Govind Pole
Virtual Touch Screen Using Microsoft Kinect
Ekta Parwani, Apeksha Pawar, Chirag Ajwani, Prof.Govind Pole
Virtual Touch Screen using Microsoft Kinect is a depth-sensing and projection system that enables interactive touch applications on everyday planar surfaces. It provides capabilities similar to that of a mouse or touchscreen. Touch screen surfaces are becoming prevalent, since they are capable of detecting the user’s actual touch points that is the points of contact on the surface. Our project presents a practical solution to achieve touch on any planar surface based on mounting a single commodity depth camera that is a Microsoft Kinect above a horizontal surface and using a projector for projection purpose. This will enable us to detect when the surface is being touched. Using Microsoft Kinect to detect touch has significant advantages: firstly, the interactive surface should not be instrumented. Secondly it is more accurate and cost effective.
Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm
Prakash Kuppuswamy, Sikandhar Shah
WiMAXtechnology is a new trend in wireless communication. The IEEE Standard 802.16 WiMAX protocol provides wireless broadband access to homes, businesses and core telecommunication networks worldwide. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This paper provides a mechanism for increasing the efficiency and hence improves the existing model of 802.16 protocols using new public key algorithm. We are attempting here new algorithm based on block cipher (Nlbc) for the replacement of RSA algorithm which is using in the IEEE Standard 802.16 WiMAX Technology.
Mobile Ad Hoc networks (MANET) allow a set of wireless hosts to exchange information without any special infrastructure. Limited battery power is one of the most important issues in mobile ad-hoc network by that efficient utilization of battery power or energy is must in routing process. Among the various factors which cause disorder in such a network and routing process the problem of broken links is occur due to the lack of energy is the most important ones. Due to the unawareness of energy of mobile nodes that problem will occur. The numbers of mobile nodes that are take part in communication are aware about the energy statue of rest of the mobile nodes then energy efficient routing approaches will maintain the network condition so that the packet can be delivered reliably without any link failure. There are lot of work has been done in this field and some of them are proposed a good approaches. Now in this paper we presents the some latest approaches that are reduces the energy consumption of mobile nodes and increases the life time of battery by that also enhance the life of network.
Patil Ketan C , Patil Rohan A , Musale Shrikant K , Prof. D.B. Rane
An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor
Patil Ketan C , Patil Rohan A , Musale Shrikant K , Prof. D.B. Rane
The aim of home automation is to control home devices from a central control point. In this paper, we present the design and implementation of a low cost but yet flexible and secure internet based home automation system. The communication between the devices is wireless. The protocol between the units in the design is enhanced to be suitable for most of the appliances. The system is designed to be low cost and flexible with the increasing variety of devices to be controlled. Networking is a major component of the processes and control instrumentation systems as the network’s architecture solves many of the Industrial automation problems. There is a great deal of benefits in the process of industrial parameters to adopt the Ethernet control system. Hence an attempt has been made to develop an Ethernet based remote monitoring and control of home appliances. In the present work the experimental result shows that remote monitoring and control system (RMACS) over the Ethernet.
Cloud Computing Security using Federated Key Management
Dr. Atulbhai Patel, Kalpit Soni
Cloud Computing is solution in which resources such as hardware, software, network and storage requirement are provided to the user as per the demand. Basically Cloud Computing is the combination of private cloud and public cloud. This paper focus the overview of security issued which may arise during file sharing while adopting the hybrid clouds. It also focuses to use Federated Key Management in the cloud such that each user and each server will have its own unique identity, and the identity is allocated by the system hierarchy.
ENHANCING UNSUPERVISED APPROACH FOR PERSON NAME BIPOLARIZATION
Sathya D, Kaladevi P
A topic is usually associated with a specific time, place, and person(s). Generally, topics that involve bipolar or competing viewpoints are attention getting and are thus reported in a large number of documents. Identifying the association between important persons mentioned in numerous topic documents would help readers comprehend topics more easily. In existing paper propose an unsupervised approach for identifying bipolar person names in a set of topic documents. Specifically, Principal component analysis (PCA) to discover bipolar word usage patterns of person names in the documents, and show that the signs of the entries in the principal eigenvector of PCA partition the person names into bipolar groups spontaneously. To reduce the effect of data sparseness, we introduce two techniques, called the weighted correlation coefficient and off-topic block elimination
A Efficient Approach Used for Identifying Distraction of statue Image
C.Kanimozhi, Dr.A.Gnanabaskaran
In this study, we mainly concentrate on measuring the different features of statues inorder to maintain it’svolubility.There is a need to maintain valuable status in our world from the possible disasters. For this purpose, a different part of the image is captured and its parametric values were validated with the pre available dataset of those statues.The main objective of this paper is to rebuilt the originality of the statues in case of any damages. The technique to be used here is Artificial neural network inorder to estimate its different parameters incase of any damage.
Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Prof. Archana Lomte
Virtual Network Computing- A Technique to Control Android Phones Remotely
Priyadarshani Raskar, Sejal Patel, Pragati Badhe, Prof. Archana Lomte
Virtual Network Computing (VNC) is popular tool for graphical desktop sharing system which is used to control another computer remotely. Multiple clients may connect to a VNC server at the same time. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa. It makes use of Remote Frame Buffer protocol (RFB). RFB is a simple protocol for remote access to Graphical User Interface. VNC is an ultra-thin client system which is based on a simple display protocol. It is platform-independent. With the help of VNC one can achieve mobile computing without requiring the user to carry any hardware. This paper proposes a new architecture for remote control and access of android mobile devices .Which allows sharing of displays between android mobile phone and computers. This should be done within Wi-Fi range irrespective of various platforms. The image of the desktop is compressed before transmission. A modified region algorithm is used to reduce the encoding time of screen image and increase the screen update rate. A number of video encoders are integrated into a prototype system
DATA REPORTING OF TRACING EVENTS BY EVENT DRIVEN INCIDENCE MATRIX
S.Keerthana, Mr.P.Sathishkumar M.E
A platform for online Sensitivity Analysis (SA) that is applicable in large scale real-time data acquisition (DAQ) systems. Supervisory Control and Data Acquisition (SCADA) sensors and actuators connected to monitor the processes of manufacturing and its transmittable operations as a case study for resistant of concept. It deploys the Rank Order Clustering (ROC) method to automatically group all existing data sensors and actuators of the system to the Key Performance Indicators of the system. The sensors and actuators data collected shapes the input data for measuring the performance. The Event Cluster algorithm is located in inside the control centre of the SCADA system to assess the influence of each input to the overall key performance indicators of the process. This method progresses the quality of data analysis and reduces computation overhead on the control system.The flexibility to adapt can only be assured if data is succinctly interpreted and translated into corrective actions in a timely manner. Every single or combination of events could subsequently results in a change to the system state. The Proposed Event-Driven Incidence Matrix is designed based on sorting the rows for inputs and columns for key performance indicators (outputs). Incidence matrix elements can take a value of 0 and 1.
Mobile Network Area Selection and Analysis of 3G GSM Network Site
Ms.Neetu Sharma, Ms. Neelkamal Chaudhary
Paper includes the proper selection process of area for mobile computing parameter analysis. So there can be a process so that the site around and area is selected and then the features of mobile network are analyzed on the basis of recent applications. The features or parameters on the basis of Performance of GSM network can be as follows: Blocked Call Analysis, Drop Call Analysis, Speech Quality Parameters, and Speech Quality Analysis, Handover Analysis, Coverage Analysis, Quality of SFH & Non-SFH network, Drop Call Rate, Call setup success rate, Blocked Call Rate, Hopping C/I.
ZONE BASED ANALYSIS OF ZRP UNDER VARYING MOBILITY AND TRANSMISSION RANGE IN MANETs
Anil Manohar Dogra, Rajvir singh
Mobile adhoc network (MANETs) is emerging wireless technology for research field that work with reactive,proactive and hybrid routing protocols. In MANETs , mobility is major issues on mobile adhoc networks, there are several problems in routing with Mobile Ad hoc Networks like asymmetric links ,routing overhead , dynamic topology and interference.This paperfocused on ZRP to designing scenario for parameters that give its best and how much effective this protocol is.NS-2.34 simulator environment has been used to analysis the performance of ZRP for different zone radius by varying mobility rate and communication distance along with zone radius on QoS based performance metrics.