Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book consist a technique where Mobile phone acts as a server. Here server and browser are connected threw IP address. A person who is connected to that mobile server and who want to watch live image then he can send a request and images clicked by that mobile server. This technique can be used in sting operation. In addition, for improving the competence of data gathering, its necessary that a new mobile phone search engine is needed when user done searching in grouping with live click.
In wireless sensor network Injecting invalid data attack is very crucial issue. If invalid data is stored in sink than due to error decision waste of energy and bandwidth will take place. This book proposes a new reliable scheme (EBCAS) to tackle this crucial issue (invalid data attack) in wireless sensor network which is help in power optimization and efficient bandwidth consumption base on message authentication code (MAC).This scheme results shows the ability to improve the performance and accuracy through draining the injected invalid data.
Wireless networks provide wide range of services which is never so easy by any other medium, its mode of working tends it to have many security breaches.In modern era of communication trillions of profitable vital informations are available on internet and they are accessible through this open medium. Such vital information can be achieved through intentional interference or jamming.In this book I am providing some efficient techniques which conceal such packets of high importance through dissembling. Dissembling refers to conceal under false appearance, there are various methods of concealing important packets and I have used highly efficient ones. Go through this book for more informations on jamming and its different avoidance techniques with their detailed descriptions.
The existing approach, that is Endpoint Based Call Admission Control for VoWLAN is used to carry the VoIP and other traditional data traffic over the WLAN. Even if lot of research work is conducted in this field, but still there are certain limitations, issues and flaws in the existing approach due to which it could not provide acceptable Quality of Service. This book emphasizes on these issues and flaws, along with the new methodology using retransmission timer, which reduced various limitations and issues, and according to the results obtained after implementation, it offered acceptable Quality of Service.
|
You may like...
The South African Guide To Gluten-Free…
Zorah Booley Samaai
Paperback
|