Found 3121 related files. Current in page 1
Wireless Ad hoc network is a set of wireless devices which move randomly and communicate with other node via radio signal. Ad-hoc networks may be logically represented as a set of clusters by grouping together nodes on the basis of different criteria such as 1-hop and k-hop that are in close boundary with one another. Clusters are formed by diffusing node identities along the wireless links. Different heuristics employ different policies to elect cluster heads. Several of these policies are biased in favour of some nodes. As a result, these nodes should greater responsibility and may deplete their energy faster, causing them to drop out of the network. Therefore, there is a need for load-balancing among cluster-heads to allow all nodes the opportunity to serve as a cluster-head. In this paper, different cluster head election mechanism are discussed in the one hop clustering approach.
This paper clearly explains about the safety and control systems in the car . Most of the accidents are occurred because of violation of rules . Result of this major accidents happened .In our day-to-day life we are careless in our safety while driving in vehicles for this we have to introduce some techniques to do these precautions compulsory . Such a new technique is explained in this paper.While driving car wearing seat belt is important that can safe our life during accident periods .But most of us are careless to wear seatbelt .
The factor ‘similarity’ is important in multiple ways in interpersonal relations and can be relevant to globalization, the study of similarities among Judaism Christianity and Islam, if exist, can help to facilitate globalization. To study such similarities a questionnaire based on the similarities mentioned in Torah (Jews) Gospel (Christians) and Quran (Muslims) was prepared and disseminated to the similar groups belonging to all the three faiths and after commuting the scores on similar choices the scores compiled.
Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack the node only by sending protocol-compliant messages.
Design of new fixture is a modified over the old fixture due to some drawback. The old fixture is not suitable for drum having slot on top face. This is because of the brake drum is seated on fixture ring instead of button so there is no gap maintained. Without sufficient gap it is difficult to machine the brake drum bore(pilot diameter), as well as brake drum surface in single set up to achieve the concentricity. Also current fixture is complicated in design and there is more work in fitting the button to fixture ring. So we designed new lathe fixture over the old fixture. In new modified lathe fixture, pads are provided instead of buttons and it could be suitable for brake drum having slot on the top face and other drum also. By trail run this lathe fixture is more comfortable than old fixture. So this fixture can be used in brake drum (cargo) manufacturing companies because of its simple design and less cost.
motoraty.com is a premium destination in the Middle East where we make car buying so easy. We at motoraty.com have engineered the way online car shopper can navigate, search, and find what they are looking for. Visit www.motoraty.com to learn more.
Network Security is always foremost and big issue in wired and wireless network. Wireless network, whether it is infrastructure mode or mobile adhoc mode, breaks the barriers of wired network and are easily accessible to everyone but everything is at a cost, the cost is in the form of increased susceptibilities and vulnerabilities of network. Packet delay is a result of poor utilization of network capacity when it is integrated with routing algorithms. Routing protocol contains very serious security issues in adhoc network. The code of AODV and DSDV are having such issues and new protocol are extended in the form of SEAD, SEAR and SAODV. This paper analyses the ways the security is breached by the hackers who emerge as malicious node in Infrastructure as well as in adhoc mode of network. The handiwork is prepared by way of Developing experimental Testbed and simulation in NS2 then proper measure are proposed in order to overcome all the problems.
Shadow Plastics is your premier source for the highest quality plastic film, VCI Bag, shrink bags, poly tubing, bags on rolls, large plastic bags and covers.
"We’re famous for carrying all types of equipment including martial arts weapons, accessories, training/exercise gear, uniforms, belts, MMA gear, knives, swords, pepper spray, apparels, books, CDs, DVDs, and anything else you can dream of! Need a trophy to praise the victor? We would be honored to create and hand them out for the big competition. We carry brands like Macho, Adidas, ProForce, Century, and our Warrior Emporium line of course… We are your resource for all the gear and equipment that is needed for protection and effectiveness while performing or practicing martial arts! We work hard to be an affordable, high quality martial arts supplier in everything from our cutlery to the uniforms. If you have a question, just ask and we’ll be happy to guide you in the right direction. Come see the team at Warrior Emporium, put on the armor, and be one of the many who have put their trust in our products and supplies!"