Cloud Computing in Academic Libraries A Review IJTSRD
Now in the age of information and communication technology Cloud Computing is the most popular technology used to deliver the library services in the effective manner. Various types of technologies like Web 2.0, utility computing, grid computing etc are included in the Cloud Computing. Libraries are able to give their services promptly with the help […]
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks IJTSRD
The design of Wireless sensor networks has currently significant attention due to their limitless potential and has great value of applications such as not closely connected environmental monitoring and target tracking. This has been motivated by the development and availability of small, low cost and intelligent sensors. A wireless sensor network is a collection of […]
Optimal Energy and Network Lifetime Maximization using a Modified Bat Optimization Algorithm (MBAT) under Coverage Constrained Problems over Heterogeneous Wireless Sensor Networks IJTSRD
Recent years have witnessed an increasing interest in Wireless Sensor Networks (WSNs) for various applications such as environmental monitoring and military field surveillance. WSN have a number of sensor nodes that communicate wirelessly and it deployed to gather data for various environments. But it has issue with the energy efficiency of sensor nodes and network […]
Reliable and Efficient Routing in WLAN IJTSRD
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces […]
Enhancing the Techniques to Secure Grid Computing IJTSRD
Security is important issue in every aspect in today’s world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user can’t breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for […]