52 research outputs found

    Security Policies and Mechanisms for Vehicular Delay Torlant Network

    Get PDF
    This article revision the literature related to Vehicular Delay Tolerant Network with focus on Cooperation. It starts by examining definitions of some of the fields of research in VDTN on security policies. An overview of VDTN on security policies cooperative networks is presented. A security policy is a high-level specification of the security properties that a given system should possess. It is a means for designers domain experts and implementers to communicate with each other, and a blueprint that drives a project from design through implementation and validation. We offer a survey of the most significant security policy models in the literature showing security may mean very different things in different contexts and we review some of the mechanisms used to implement a gievn security policy

    Routing Protocols for WBAN

    Get PDF
    The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks stimulates many research activities. Our aim is to provide a tutorial to introduce WBAN routing proto-cols. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved

    Solution for TCP/IP Flooding

    Get PDF
    TCP stands for transmission control protocol. It was defined by Internet Engineering Task Force (IETF). It is used in establishing and maintaining communication between applications on different computers and provide full duplex acknowledgement and flow control service to upper layer protocol and application. [2][3][4][5] In this report proposes solution for TCP SYN flood

    Intelligent predictor in Health care systems

    Get PDF
    transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved

    Cooperation for Vehicular Delay Tolerant Network

    Get PDF
    This article reviews the literature related to Vehicular Delay Tolerant Network with focus on Cooperation. It starts by examining definitions of some of the fields of research in VDTN. An overview of VDTN with cooperative networks is presented

    Pipelining protocols in TCP

    Get PDF
    Transmission Control Protocol (TCP), the most popular transport layer communication protocol for the Internet.It was originally designed for wired networks, where Bit Error Rate (BER) is low and congestion is the primary cause of packet loss [1].This article analyzes handshaking issues and pipeline protocols, such as slow start, congestion control, collisions, low BER etc. Then it provides pipeline protocols to wireless network i.e., Head of Line Blocking. At the end it proposes solution for TCP enhancement specific to wireless network

    Intelligent predictor in Health care systems

    Get PDF
    transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved
    • …
    corecore