Notice Board :

Call for Paper
Vol. 11 Issue 6

Submission Start Date:
June 01, 2019

Acceptence Notification Start:
June 10, 2019

Submission End:
June 20, 2019

Final MenuScript Due:
June 22, 2019

Publication Date:
June 25, 2019
                         Notice Board: Call for PaperVol. 11 Issue 6      Submission Start Date: June 01, 2019      Acceptence Notification Start: June 10, 2019      Submission End: June 20, 2019      Final MenuScript Due: June 22, 2019      Publication Date: June 25, 2019




Volume IX Issue X

Author Name
S Joost
Year Of Publication
2017
Volume and Issue
Volume 9 Issue 10
Abstract
Link-state routing is always been one of the most intricate topics in Mobile Ad hoc Networks because of some unusual conditions and requirements which is tough to be handled by other protocols. Numerous attempts have been implemented to fix this. They either make an effort for designing new routing solutions that the ad hoc network will adapt, or existing solutions or protocols for wired network might be extended to work in wireless mobile scenario as well. This paper elaborates the second option by focusing on the different OSPF MANET extension. OSPF or Open Shortest Path First is a protocol that is mainly used for networks having wired nodes. Moreover further researches made it possible to work in wireless too. This pro quality helped organizations and network engineers to gear only one single protocol for the entire heterogeneous network. OSPF has its three extensions for MANETs which are OSPF-MDR, MPR-OSPF and SP/OR.
PaperID
2017/EUSRM/10/2017/44319

Author Name
S Chung
Year Of Publication
2017
Volume and Issue
Volume 9 Issue 10
Abstract
Nowadays, privacy is becoming more important in data storage and transmission. Images are widely used in several processes. Therefore, the protect ion of image data from unauthorized access is important. Image encryption plays a significant role in the field of i nformation hiding. Encryption is a means to achieve that privacy. It was invented for that very purpose. This paper is introduced to analysis and design a chaos based image encryption technique using the method of shuffled operation. In this new technique, a secret key of 128-bit and shuffled maps are employed. We compared the performance of new technique with the typical encryption technique in s ome literature. The proposed system has the advantage of larger key space; smaller iteration times, high security a nalysis, correlation analysis and entropy analysis will carry on.
PaperID
2017/EUSRM/10/2017/44366