8 research outputs found
An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol
Mobile ad hoc network (MANET) is now days become very famous due to their
fixed infrastructure-less quality and dynamic nature. They contain a large
number of nodes which are connected and communicated to each other in wireless
nature. Mobile ad hoc network is a wireless technology that contains high
mobility of nodes and does not depend on the background administrator for
central authority, because they do not contain any infrastructure. Nodes of the
MANET use radio wave for communication and having limited resources and limited
computational power. The Topology of this network is changing very frequently
because they are distributed in nature and self-configurable. Due to its
wireless nature and lack of any central authority in the background, Mobile ad
hoc networks are always vulnerable to some security issues and performance
issues. The security imposes a huge impact on the performance of any network.
Some of the security issues are black hole attack, flooding, wormhole attack
etc. In this paper, we will discuss issues regarding low performance of
Watchdog protocol used in the MANET and proposed an improved Watchdog
mechanism, which is called by I-Watchdog protocol that overcomes the
limitations of Watchdog protocol and gives high performance in terms of
throughput, delay
An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol
Mobile ad hoc network (MANET) is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay
The Digital Economy: Social Interaction Technologies – an Overview
Social interaction technologies (SIT) is a very broad field that encompasses a large list of topics: interactive and networked computing, mobile social services and the Social Web, social software and social media, marketing and advertising, various aspects and uses of blogs and podcasting, corporate value and web-based collaboration, e-government and online democracy, virtual volunteering, different aspects and uses of folksonomies, tagging and the social semantic cloud of tags, blog-based knowledge management systems, systems of online learning, with their ePortfolios, blogs and wikis in education and journalism, legal issues and social interaction technology, dataveillance and online fraud, neogeography, social software usability, social software in libraries and nonprofit organizations, and broadband visual communication technology for enhancing social interaction. The fact is that the daily activities of many businesses are being socialized, as is the case with Yammer (https://www.yammer.com/), the social enterprise social network. The leitmotivs of social software are: create, connect, contribute, and collaborate
IJIMAI Editor's Note - Vol. 3 Issue 4
This special issue, Teaching Mathematics using new and classic tools, concentrates on the practical and experimental teaching in advanced Mathematics in Engineering. The selected papers deal with the most relevant issues in the field, such as Mathematical learning and other different subjects in which Mathematics are needed, Advanced Mathematics, the development of different studied using Masive Open Online courser (MOOCs) or even the history of E-Learning and Mathematics. The result is a collection of experimental validations, mathematical papers and MOOCs studies which constitutes a clear contribution to the state of the art
IJIMAI Editor's Note - Vol. 4 Issue 3
The Internet of Things is the networks of physical devices, embedded with electronics, software, sensors, actuators and security and connectivity mechanisms that enables them to collect and exchange data. It is a very important research topic nowadays in which many scientific papers are focusing on its bases.
This Special Issue tries to show some of the latest researches related to IoT with special emphasis on the basic components of IoT, some of the major applications in which researchers and practitioners are working and especially in aspects related to security, one of the main areas of research related to IoT, with a special emphasis on cloud-based systems. Next, I present a summary of the works that are included in this special issue
IJIMAI Editor's Note - Vol. 3 Issue 4
This special issue, Teaching Mathematics using new and classic tools, concentrates on the practical and experimental teaching in advanced Mathematics in Engineering. The selected papers deal with the most relevant issues in the field, such as Mathematical learning and other different subjects in which Mathematics are needed, Advanced Mathematics, the development of different studied using Masive Open Online courser (MOOCs) or even the history of E-Learning and Mathematics. The result is a collection of experimental validations, mathematical papers and MOOCs studies which constitutes a clear contribution to the state of the art