Notice Board :





Volume V Issue III

Author Name
A F Valdés
Year Of Publication
2013
Volume and Issue
Volume 5 Issue 3
Abstract
- It is well known fact that A Mobile Ad-hoc Network (MANET) is a set of wireless mobile nodes which forms a transitory network without using any centralized access point, infrastructure, or centralized administration. Data transmission between different nodes in MANET’s may be either by single hope or multiple hops as the obvious reason is limited nodes transmission range. Mobility of the different nodes makes the situation even more complicated and situation becomes worst if some bad nodes are present in the network. Multiple routing protocols for different situations have been developed during the last few years, to find optimized routes as well as good nodes from a source to some destination. As we know that Ad-hoc network suffer from the lots of issues i.e. Congestion, Throughput, packet delivery ratio, delay, security and which may be achieved some sort of by compromising with some cost and network overhead. This survey gives a comprehensive overview of AODV (Ad-hoc on demand Distance Vector Routing). Issues related with AODV has been discussed to serve as a starting point to future protocol design and evaluation.
PaperID
2013/EUSRM/05/03/1034

Author Name
Schwarz R, O Kniemeyer
Year Of Publication
2013
Volume and Issue
Volume 5 Issue 3
Abstract
Advent of latest wireless technologies and portab le devices like mobile phones laptop encourages constituting Mobile Ad-hoc Networks (MANETs) on regular basis for various applications as MANET is a decentralized and quickly deployable network. This paper address various energy management schemes used for MANETs. Battery management deals with the issue related with scheduling of batteries that increases the battery capacity, finding the optimal capacity of the battery, selection of battery technologies etc. Transmission power management tries to find optimum power level for all the nodes to reduce the energy consumption. System power management minimizes the power required by the hardware or peripherals of the nodes, overview of these techniques are provided at different layer of protocol stack. Though these schemes reside in more than one layer, the classification provided is based on highest layer in protocol stack. However, we are focused on the network layer solution that aims at increasing the network lifetime. Also, we have proposed our scheme in this paper where energy conservation is done on the basis of threshold value.
PaperID
2013/EUSRM/05/03/1023

Author Name
L Liu
Year Of Publication
2013
Volume and Issue
Volume 5 Issue 3
Abstract
In our research, our paper reviews are concerned with the software effort estimation using NN approaches to increase the performance and accuracy over the years. Various error measurement models such as MMRE (mean magnitude relative error), MRE (mean relative error) and PRED (m) is used by various research scholar for their project metrics. The various neural network approaches such as RBFN(Radial basis function network), MLP (Multi layer perception), SVM (Support Vector Machine) etc, provide the efficient performance and accuracy for software model which will be concluded in this paper over the study of various year respectively. Therefore this study is designed to analyze the development of a new framework model by studying various software development cases. This paper review gives you the theoretical concept of new proposed framework model with the various experimental results with their conclusion over the years.
PaperID
2013/EUSRM/05/03/1042

Author Name
R JR
Year Of Publication
2013
Volume and Issue
Volume 5 Issue 3
Abstract
In current scenario, phishing attacks are very much problematic. These attacks try to steal the confidential information, such as Username, Password etc., of the users. Phishing is done either by e-mails or instant messaging or by a spoofed website which is an exact replica of original one. It’s very difficult to distinguish fake websites and legitimate sites. Homograph attacks also help in phishing and make it more difficult for users to identify them. Some malware like Key-loggers also helped to steal the crucial information. A different type of malware called Transaction Generator also helped attackers. Instead of passing the confidential information to attackers, it waits till the user login into their accounts and then does the transaction in background illegally. To secure user and their personal and confidential information, this paper describes several traditional methods with their pros and cons with an additional method Password-Transaction Secure Window (PTSW). We discuss a different type of method which is more reliable technique to deal with these attacks. This will result as a better and a common solution against different attacks such as Phishing attacks, Homograph attacks etc. as well as against malwares such as Key-loggers, Transaction Generators etc.
PaperID
2013/EUSRM/05/03/1046