Malicious Node Detection in WSN Using WTE IJTSRD
Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional […]
Accessing the Internet Through Light Using LiFi IJTSRD
LiFi is a short form for Light Fidelity. This concept came in the picture during 2011 in a TED talk by Harald Hass, who is a German physicist. Because of him we came to know the concept of accessing the internet through light. Wi-Fi uses radio frequency and LIFI uses visible light communication (VLC). [1] […]
Agricultural Drone using IoT IJTSRD
The use of drones in agriculture is in trend now. The use of pesticides and composts in farming zones is of prime significance for yields. The utilization of agricultural drones is winding up progressively basic in doing this undertaking fundamentally in light of its speed and adequacy in the showering task. Be that as it […]
A Study and Designing of Custom Network Configuration using Integrated Protocols in SDN Architecture IJTSRD
Today’s world emphasizes a lot on speed, performance and ease of use. Taking these demands into consideration it has become mandatory to change all existing systems and transform them into ones that can deliver these characteristics. One such system has been network architecture. Since many years’ vendors have been creating and developing their own Network […]
Centralized Tool for Software and USB IJTSRD
We propose a standalone application which facilitates a user to send request for USB access to the server, and after an approval from the administrator the user can use the USB. Along with that, the application also generates report for the administrator regarding hardware configuration and list of software in a computer, in a given […]