International Journal of Advances in Engineering Sciences
Not a member yet
    138 research outputs found

    VANET’S SECURITY REQUIREMENTS AND ATTACKS - A REVIEW

    No full text
    Vehicular Ad hoc Networks (VANETs) have emerged as one of the most promising topics for researchers and automotive industries due to their remarkable potential to improve traffic safety, efficiency and other added services. Communication using VANETs is commonly seen as the next milestone for improving traffic safety.  Vehicles will be enabled to exchange any kind of information that helps to detect and mitigate dangerous situations. However, VANETs are themselves exposed against attacks that can directly lead to the corruption of networks and then possibly exacerbate big losses of time, money, and even lives.Subject of this work is to recognize the attackers that target active safety applications in VANETs. Through a risk analysis, this work identifies assets, threats and possible attacks in inter-vehicle communication. The risk analysis shows that the most serious threat arises from a road- side attacker that distributed fake warning messages. This paper presents a review of various VANETs security requirements attacks

    A SYSTEM WITH GUARANTEE PERIOD AND TWO TYPES OF REPAIR

    No full text
    A two-unit cold standby system with guarantee period and two types of repair is analysed and profit is evaluated. If a unit fails before completion of guarantee period (after completion of guarantee period) then it is repaired by manufacturer (management) at his own cost. The system is analysed using semi-Markov processes and regenerative processes. Various measures of system effectiveness are determined

    Evaluation of Mechanical Properties of Medium Carbon Low Alloy Forged Steels Quenched in Water, Oil and Polymer

    No full text
    Samples of medium carbon low alloy forged steels are investigated after heating to a maximum hardening temperature at 8550c in electric furnace and the soaking period of 60 minute. Step tempering is done on the hardened samples and quenched in water, oil and polymer, polyethylene glycol (PEG) H− (O−CH2−CH2)n−OH separately. The evaluation of mechanical properties was investigated using Hounsfield tensometer for tensile test, Brinell hardness tester for hardness test, Charpy test to determine the amount of energy absorbed by a material during fracture and finally the microstructure of the all quenched samples were studied using Scanning Electron Microscope. The tensile strength, hardness and impact energy values of the quenched samples were relatively higher than those as-received samples, suggesting improved mechanical properties. However, samples quenched in PEG displayed better properties compared with that of water, oil quenched and as- received samples. The microstructure consists of fine tempered martensite are in hardened and tempered condition. Heat treated specimens have fine tempered martensite structure with small amount of bainite. The formation of martensite structures gives the samples higher hardness

    PROFIT ANALYSIS OF A TWO – UNIT COLD STANDBY SYSTEM WITH INSTRUCTION AND PREPRATION TIME FOR REPAIR

    No full text
    The cost benefit analysis of a two unit cold standby system with instruction and preparation time for repair is carried out. The repair man (who is an expert) does not come alone but he comes with his assistant. If the expert repair man is busy in repairing a failed unit and second unit fails then the assistant repairman repairs the latter unit after getting instructions from expert repairman. Various measures of system effectiveness are found using regenerative point technique. Graphs are plotted for a special case

    Modified AIS-PEGASIS: A protocol to secure WSN

    No full text
    Wireless sensor networks are the resource constrained networks that are prone to various attacks. In this work, we have mapped human body to the WSN. The peripheral nervous system is mapped with the network layer. Various attacks on network layer can lead to energy loss to dead network. Similarly, an attack on nervous system can lead to paralysis, etc. A timely sensing of attack can save the person from paralysis. This work applied this timely sensing to save network from network layer attacks. This work designed an algorithm AIS-PEGASIS that saves the WSN from network layer attack and performs routing of data in the network. This work also represents the AIS implementation using MATLAB. The simulation of the proposed algorithm over WSN shows better performance as compared to conventional techniques. Â

    Evaluation of packet forwarding of GPSR in VANET

    No full text
    Vanet is vehicular adhoc network for communication between moving vehicles and roadside infrastructure. One of the most efficient routing protocol, GPSR is evaluated for packet forwarding approach. As it send data to the node which is closest to the destination node. In this paper we change the transmission range of node and check the performance using metrics parameter packet delivery ratio, loss ratio, end to end delay, routing overhead. And it is found that with increase in transmission range total received Packets, PDR increase which is good. With increase in transmission range Loss ratio decrease and end to end delay remain almost constant

    A Survey of Design of RBS for Low Power VLSI

    No full text
    With the rapid growth of the portable electronic equipment, wearable computers, laptops, cell phones etc. the demand of the low power very large scale integration (VLSI) is dynamically increasing. The power consumption is one of the top most crucial limiting factors of the concern for the designing of the low power electronic circuits for the today’s even before this era. The numbers of scientists/ researchers are struggling for overcoming such a limiting factor/ obstacle and proposing different ideas and designing methods from the logical level (Gate Level) to circuitry level (Physical level) and above for the very large scale integration Even after of such a struggle, there is no any universal method to design to avoid tradeoff between delay, power consumption and complexity of the circuit. Still, the designer is required to opt appropriate technology for satisfying product need and applicationsÂ

    ENERGY CONSERVATION AND EFFICIENT TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY

    No full text
    From the last few years, wireless sensor networks (WSNs) gained an increasing attention from both research community and actual users. In WSN, as sensor nodes are battery-powered constraints, so to increase network lifetime how to reduce energy consumption of nodes is a critical aspect. In this paper I will study energy conservation schemes and energy efficient techniques in wireless sensor networks

    Structural analysis of crystal structure in Bi0.9Nd0.1FeO3 multiferroic ceramic

    No full text
    Bi0.9Nd0.1FeO3 multiferroic ceramics has been prepared via solid state reaction method. To investigate the crystal structure X-ray diffraction was carried out at room temperature followed by Rietveld refinement through FullProf suit. Beside a smaller impurity peak of BiO2, the XRD pattern can be fitted well with the rhombohedral (R3c) phase setting. The goodness of fit is well ascribed by the lower values of Rp, Rwp, and χ2. The present study brings to a close verification that doping of Nd suppresses the growth of secondary phases and helps in formulation of single phase BiFeO3

    ADAPTIVE MODULATION ANDRATE cryptography FOR WIMAX

    No full text
    Future mobile communication needs a hundred Mbps rate, video and audio streaming, asymmetric, multiple access, adaptational modulation and code rate, dynamic packet arrangement, adaptational antenna and IPv6 utilization facility to inforce lossless communication. we have a tendency to propose AN adaptational Modulation and Rate cryptography Wimax (AMRC-WIMAX) technique may be a promising thanks to increase the info rate with reliable transmission over wireless channels. During this paper, we have a tendency to gift numerous digital modulation techniques admire BPSK, QPSK ANd M-ary PSK systems applied to a coded WIMAX system in an AWGN channel atmosphere. This methodology compares the Bit Error Rate Performance of varied code rates mistreat- ment WIMAX technique and at last select the most effective code rate to realize higher BERperformance. it's found that the planned methodology offers the optimumperformance compared to the standard WIMAX system utilized in fourth generation

    6

    full texts

    138

    metadata records
    Updated in last 30 days.
    International Journal of Advances in Engineering Sciences
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇