Comparative Analysis of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks IJTSRD
Mobile Ad hoc Networks (MANETs) are collection of wireless mobile nodes. MANETs are infrastructure less temporary networks. They do not have fixed static infrastructure. As no fixed infrastructure is available all nodes itself, work as receiver, transmitter as well as router. These nodes are also mobile so providing stable route is a big challenge. We […]
Secure Data Transmission in VANETs IJTSRD
A number of technical problems are arising with the widespread distribution of vehicular ad-hoc networks. Privacy and authentication mechanisms are of major concern. If security is not integrated with the system, it leads to anti-social and criminal behavior and endanger the benefits of the deployment of VANETs. A suitable authentication procedure is to implement the […]
Life-Care Online Blood Donor Finder Application using Android IJTSRD
This paper introduce new technique to help people when they need blood. ‘Life-care’ is the android based mobile application, which uses the Java language. This Android app will help patients who are in need of Blood it will give the patient address of nearest Blood Bank along with information regarding Blood Banks. This app not […]
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector Machine IJTSRD
The most common mode for consumers to express their level of satisfaction with their purchases is through online ratings, which we can refer as Online Review System. Network analysis has recently gained a lot of attention because of the arrival and increasing attractiveness of social sites, such as blogs, social networks, micro blogging, or customer […]
Review on Vulnerabilities of IoT Security IJTSRD
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as […]