52 research outputs found
Security Policies and Mechanisms for Vehicular Delay Torlant Network
This article revision the literature related to Vehicular Delay Tolerant Network with focus on Cooperation. It starts by examining definitions of some of the fields of research in VDTN on security policies. An overview of VDTN on security policies cooperative networks is presented. A security policy is a high-level specification of the security properties that a given system should possess. It is a means for designers domain experts and implementers to communicate with each other, and a blueprint that drives a project from design through implementation and validation. We offer a survey of the most significant security policy models in the literature showing security may mean very different things in different contexts and we review some of the mechanisms used to implement a gievn security policy
Routing Protocols for WBAN
The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks stimulates many research activities. Our aim is to provide a tutorial to introduce WBAN routing proto-cols. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved
Solution for TCP/IP Flooding
TCP stands for transmission control protocol. It was defined by Internet Engineering Task Force (IETF). It is used in establishing and maintaining communication between applications on different computers and provide full duplex acknowledgement and flow control service to upper layer protocol and application. [2][3][4][5]
In this report proposes solution for TCP SYN flood
Intelligent predictor in Health care systems
transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours.
We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved
Cooperation for Vehicular Delay Tolerant Network
This article reviews the literature related to Vehicular Delay Tolerant Network with focus on Cooperation. It starts by examining definitions of some of the fields of research in VDTN. An overview of VDTN with cooperative networks is presented
Pipelining protocols in TCP
Transmission Control Protocol (TCP), the most popular transport layer communication protocol for the Internet.It was originally designed for wired networks, where Bit Error Rate (BER) is low and congestion is the primary cause of packet loss [1].This article analyzes handshaking issues and pipeline protocols, such as slow start, congestion control, collisions, low BER etc. Then it provides pipeline protocols to wireless network i.e., Head of Line Blocking. At the end it proposes solution for TCP enhancement specific to wireless network
Intelligent predictor in Health care systems
transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours.
We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved
- …