Notice Board :

Call for Paper
Vol. 16 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 25, 2024

Final MenuScript Due:
April 30, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 16 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 25, 2024      Final MenuScript Due: April 30, 2024      Publication Date: April 30, 2024




Volume IX Issue X

Author Name
S Joost
Year Of Publication
2017
Volume and Issue
Volume 9 Issue 10
Abstract
Link-state routing is always been one of the most intricate topics in Mobile Ad hoc Networks because of some unusual conditions and requirements which is tough to be handled by other protocols. Numerous attempts have been implemented to fix this. They either make an effort for designing new routing solutions that the ad hoc network will adapt, or existing solutions or protocols for wired network might be extended to work in wireless mobile scenario as well. This paper elaborates the second option by focusing on the different OSPF MANET extension. OSPF or Open Shortest Path First is a protocol that is mainly used for networks having wired nodes. Moreover further researches made it possible to work in wireless too. This pro quality helped organizations and network engineers to gear only one single protocol for the entire heterogeneous network. OSPF has its three extensions for MANETs which are OSPF-MDR, MPR-OSPF and SP/OR.
PaperID
2017/EUSRM/10/2017/44319

Author Name
S Chung
Year Of Publication
2017
Volume and Issue
Volume 9 Issue 10
Abstract
Nowadays, privacy is becoming more important in data storage and transmission. Images are widely used in several processes. Therefore, the protect ion of image data from unauthorized access is important. Image encryption plays a significant role in the field of i nformation hiding. Encryption is a means to achieve that privacy. It was invented for that very purpose. This paper is introduced to analysis and design a chaos based image encryption technique using the method of shuffled operation. In this new technique, a secret key of 128-bit and shuffled maps are employed. We compared the performance of new technique with the typical encryption technique in s ome literature. The proposed system has the advantage of larger key space; smaller iteration times, high security a nalysis, correlation analysis and entropy analysis will carry on.
PaperID
2017/EUSRM/10/2017/44366