Notice Board :

Call for Paper
Vol. 10 Issue 8

Submission Start Date:
Aug 01, 2018

Acceptence Notification Start:
Aug 10, 2018

Submission End:
Aug 15, 2018

Final MenuScript Due:
Aug 25, 2018

Publication Date:
Aug 30, 2018
                         Notice Board: Call for PaperVol. 10 Issue 8      Submission Start Date: Aug 01, 2018      Acceptence Notification Start: Aug 10, 2018      Submission End: Aug 15, 2018      Final MenuScript Due: Aug 25, 2018      Publication Date: Aug 30, 2018




Volume IX Issue X

Author Name
S Joost
Year Of Publication
2017
Volume and Issue
Volume 9 Issue 10
Abstract
Link-state routing is always been one of the most intricate topics in Mobile Ad hoc Networks because of some unusual conditions and requirements which is tough to be handled by other protocols. Numerous attempts have been implemented to fix this. They either make an effort for designing new routing solutions that the ad hoc network will adapt, or existing solutions or protocols for wired network might be extended to work in wireless mobile scenario as well. This paper elaborates the second option by focusing on the different OSPF MANET extension. OSPF or Open Shortest Path First is a protocol that is mainly used for networks having wired nodes. Moreover further researches made it possible to work in wireless too. This pro quality helped organizations and network engineers to gear only one single protocol for the entire heterogeneous network. OSPF has its three extensions for MANETs which are OSPF-MDR, MPR-OSPF and SP/OR.
PaperID
2017/EUSRM/10/2017/44319

Author Name
S Chung
Year Of Publication
2017
Volume and Issue
Volume 9 Issue 10
Abstract
Nowadays, privacy is becoming more important in data storage and transmission. Images are widely used in several processes. Therefore, the protect ion of image data from unauthorized access is important. Image encryption plays a significant role in the field of i nformation hiding. Encryption is a means to achieve that privacy. It was invented for that very purpose. This paper is introduced to analysis and design a chaos based image encryption technique using the method of shuffled operation. In this new technique, a secret key of 128-bit and shuffled maps are employed. We compared the performance of new technique with the typical encryption technique in s ome literature. The proposed system has the advantage of larger key space; smaller iteration times, high security a nalysis, correlation analysis and entropy analysis will carry on.
PaperID
2017/EUSRM/10/2017/44366