0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,570 Discovery Miles 75 700 Ships in 10 - 15 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Resource Management and Efficiency in Cloud Computing Environments (Hardcover): Ashok Kumar Turuk, Bibhudatta Sahoo, Sourav... Resource Management and Efficiency in Cloud Computing Environments (Hardcover)
Ashok Kumar Turuk, Bibhudatta Sahoo, Sourav Kanti Addya
R5,478 Discovery Miles 54 780 Ships in 10 - 15 working days

Today's advancements in technology have brought about a new era of speed and simplicity for consumers and businesses. Due to these new benefits, the possibilities of universal connectivity, storage and computation are made tangible, thus leading the way to new Internet-of Things solutions. Resource Management and Efficiency in Cloud Computing Environments is an authoritative reference source for the latest scholarly research on the emerging trends of cloud computing and reveals the benefits cloud paths provide to consumers. Featuring coverage across a range of relevant perspectives and topics, such as big data, cloud security, and utility computing, this publication is an essential source for researchers, students and professionals seeking current research on the organization and productivity of cloud computing environments. Topics Covered: Big Data Cloud Application Services (SaaS) Cloud Security Hybrid Cloud Internet of Things (IoT) Private Cloud Public Cloud Service Oriented Architecture (SOA) Utility Computing Virtualization Technology

A Multi-Objective ILP Formulation for RWA Problem in WDM Networks (Paperback): Ravi Sankar Barpanda, Ashok Kumar Turuk,... A Multi-Objective ILP Formulation for RWA Problem in WDM Networks (Paperback)
Ravi Sankar Barpanda, Ashok Kumar Turuk, Bibhudatta Sahoo
R1,213 Discovery Miles 12 130 Ships in 10 - 15 working days

Routing and Wavelength Assignment (RWA) is a well known problem in Wavelength Division Multiplexing (WDM) networks. RWA problem is reported in the literature as a single objective ILP problem. In this article, we formulated the RWA problem as a multi objective ILP problem. An attempt is made to obtain a feasible solution using genetic algorithm (GA). The parameters considered for optimization are congestion among the individual lightpath requests, connection set up time, the number of intermediate hops traversed and the number of fibers used to honor the established connection requests. We considered ARPANET and NSFNET for our simulation.

Key Pre-distribution in Wireless Sensor Networks (Paperback): Sourav Kanti Addya, Ashok Kumar Turuk Key Pre-distribution in Wireless Sensor Networks (Paperback)
Sourav Kanti Addya, Ashok Kumar Turuk
R1,211 Discovery Miles 12 110 Ships in 10 - 15 working days

Sensor nodes are tiny devices, with less computational power and memory capacity. For secure communication, the secret keys must be built into the nodes before deployment. Distribution of keys among the sensor nodes is a challenging task. Number of sensor nodes are usually much higher than the number of keys available. In this paper we use Steiner Triple system (STS) which is a combinatorial design to distribute the keys among the sensor nodes. As the keys are built into the nodes, no path key establishment phase is required for secure communication. Hence nodes can communicate using the built in secret keys. Thus, a faster communication is achieved. However, STS is not an appropriate candidate for large networks, where sensors are not within the communication range of each other. To overcome this we propose a cluster based key predistribution using Steiner Triple System. We evaluated the resiliency of our proposed system and found to have a better resiliency.Using dummy node concept the scalability of network can be increase.

A Hybrid Zone-Based Routing Protocol for Secure Communication in Manet (Paperback): Niroj Kumar Pani, Ashok Kumar Turuk A Hybrid Zone-Based Routing Protocol for Secure Communication in Manet (Paperback)
Niroj Kumar Pani, Ashok Kumar Turuk
R1,217 Discovery Miles 12 170 Ships in 10 - 15 working days

In this new era of mobile communication, with the technological advancements, we have found out new alternatives to the traditional infrastructure-based networks, a MANET. A Mobile Ad hoc Network (MANET) is the cooperative engagement of mobile nodes without the required intervention of any centralized access point or existing infrastructure. However, this infrastructure-less nature of MANET makes it difficult in designing a foolproof security protocol. A number of protocols have been proposed in the literature for secure routing, but, most of these are either proactive or reactive in approch with their own limitations. In this book, we proposed a secure hybrid ad hoc routing protocol, called Secure Zone Routing Protocol (SZRP), which aims at addressing the above limitations by combining the best properties of both proactive and reactive approaches. The book details the design of the protocol and analyses its robustness in the presence of multiple possible security attacks that involves impersonation, modification, fabrication and replay of packets caused either by an external advisory or an internal compromised node within the network.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Hoover H84-7WD-ZA Wet & Dry Hand Vacuum…
 (1)
R799 R725 Discovery Miles 7 250
Andro Vita Pheromone Women Scented…
R999 R799 Discovery Miles 7 990
Joggers Belt
 (1)
R59 R48 Discovery Miles 480
Mellerware Swiss - Plastic Floor Fan…
 (1)
R348 Discovery Miles 3 480
Pure Pleasure Non-Fitted Electric…
 (16)
R289 Discovery Miles 2 890
Faber-Castell A2 Stretch Canvas…
R165 Discovery Miles 1 650
Maped Smiling Planet Pulse Sharpener - 1…
R14 Discovery Miles 140
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Cellphone Ring & Stand [Black]
R22 Discovery Miles 220

 

Partners