Performance analysis of TCP and TCP- Fin Ad-Hoc network
Many applications use TCP as the transport layer for reliable data transfer for wireless connections to integrate seamlessly into the Internet. Some of the assumptions made during the design of traditional TCP may not be suitable for an infrastructure-less network environment, because TCP invokes the congestion control mechanism even if the packet loss is due to the link failure. On the other hand TCP-F that is able to distinguish link failure from congestion through feedback from the intermediate nodes and takes appropriate action. This paper compares the performance of TCP-F with traditional TCP through simulation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Survey of flooding attack in mobile adhoc network
Mobile ad hoc networks will appear in environments where the nodes of the networks are absent and have little or no physical protection against tampering. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented using random waypoint mobility model. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement? all increases, thus degrading the performance of MANET significantly.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An empirical assessment of the effects of globalisation on the perceived performance of operators in the banking sector in Nigeria
Globalization has caused dramatic changes to business practices around the world. Globalization is an interesting phenomenon since it is obvious that the world has been going through this process of change towards increasing economic, financial, social, cultural, political, market, and environmental interdependence among nations. Virtually, everyone is affected by this process because globalization brings about a borderless world. This study investigated how sustainable global market uncertainty, global market opportunities and global competitive threat affect the performance of bankers in Nigeria which can lead to a competitive advantage and an enhancement of industrial development that can bring about global partnership for development which is one of the pivotal goals of the Millennium Development Goals (MDGs). Subjects for this study were three hundred and one bankers in Lagos, Nigeria. Two hypotheses were tested and the findings of the study revealed that that there was a significant relationship between performance of operators and global market opportunities. The result also revealed that global market uncertainty, global market opportunities and global competitive threat significantly jointly predicted performance of operators. Conclusively, the findings from this study support the argument that globalization not only benefits firms in terms of increasing opportunities, but also hurts business performance due to higher competitive threats. This study also confirms that globalization is a universal phenomenon and that firms are inevitably affected either positively or negatively. While global market opportunities are likely to enhance firm performance, global competitive threats tend to worsen it. Therefore, managers must be aware of such double-edged effects, and try to capitalize on opportunities while converting threats into opportunities. Appropriate strategies, such as developing networking relationships with other firms, must be carefully designed and implemented in order to take advantage of global market opportunities and minimize the threats from increasing competitive intensity.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Philosophy and theology: a twin brotherhood
This paper examine the important part philosophy play in theology. Theology depends to a large extent on the philosophy of the people. It looks at the concept of philosophy, the concept of theology and the implication of philosophy in the development of theology. It therefore proposes that philosophy and theology are twin brotherhood – one cannot exist in isolation; each enables the other, taken together it makes a whole word of sense.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
New algorithm for solving mixed intuitionistic fuzzy assignment problem
In conventional assignment problem, cost is always certain. In this paper, Assignment problem with crisp, fuzzy and intuitionistic fuzzy numbers as cost coefficients is investigated. There is no systematic approach for finding an optimal solution for mixed intuitionistic fuzzy assignment problem. This paper develops an approach to solve a mixed intuitionistic fuzzy assignment problem where cost is not in deterministic numbers but imprecise ones. The solution procedure of mixed intuitionistic fuzzy assignment problem is proposed to find the optimal assignment and also obtain an optimal value in terms of triangular intuitionistic fuzzy numbers. Numerical examples show that an intuitionistic fuzzy ranking method offers an effective tool for handling an intuitionistic fuzzy assignment problem.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Experimental study on effect of sugar powder on strength of cement
The present work deals with the results of experimental investigations on effect of sugar powder on setting time and compressive strength of cement and concrete. Effect of sugar on compressive strength of cement and concrete by using different brands of cement are studied. Sugar powder content is 0, 0.05, 0.075, 0.1, 0.15, and 0.2 % by weight of cement. Cube of size 70 mm X 70 mm X 70 mm for compressive strength test of cement. And cube of size 150 mm X 150 mm X 150 mm for compressive strength test of concrete were cast. All the specimens were water cured and testing is done for 3 days, 7 days and 28 days. Results were observe and comparison of results of compressive strength of cement and concrete with sugar powder with that of normal cement and concrete showed the significant improvements in the results of compressive strength.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Effect of groundnut paste fineness modulus on the quantity of oil extractable
This work focused on the effect of groundnut paste fineness modulus on the quantity of oil extractable. Three samples of peeled roasted groundnut seeds A, B, and C weighing 14kg each were ground at different machine speeds of 310rpm, 250rpm, and 230rpm respectively. The energy expended in the extraction process using the IAR kneader was found to be 923J, 1043J, and 203J for samples A, B,and C respectively. Results revealed that the extraction efficiency increases as the value of fineness modulus decreases. The results also revealed that the energy requirement decreases as the fineness modulus value decreases.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Intrusion Prevention System (IPS) countering DDOS attack in internetworks
Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infrastructure resources. Here, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of Intrusion Prevention Systems (IPSs) located at the Internet Service Providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of FireCol using extensive simulations and a real dataset is presented, showing FireCol effectiveness and low overhead, as well as its support for incremental deployment in real network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure grouping data transmission scheme for multiple applications in wireless sensor network
Data aggregation system is the majority sensible technique for wireless sensor networks. It reduce a large amount of communication. To screen announcement during aggregation homomorphism encryptions have been practical in previous be taught. So the enciphered data can be aggregated algebraically without decryption. Although data aggregation could considerably reduce broadcast, it is defenseless to some attacks. However, these schemes failed to satisfy multi-application surroundings. The main drawback of these scheme is that, it become insecure in case a number of sensor nodes are compromised. Also, these scheme do not provide secure counting. Thus, it is suffer due to unauthorized aggregation attacks. An alternative move toward for this problem is to collective encrypted messages in a straight line from SN, thereby avoid the forgery of aggregate result. To end these drawbacks, we propose a new hidden data aggregation system called CDAMA, provide CDA connecting multiple groups. It is extensive from homomorphism community encryption system. There are three contributions in the proposed system. First, it is intended a multi-application surroundings. Next, it mitigates the crash of compromising attack in single request environments. Compared with conservative schemes, CDAMA mitigates the collision of compromise SN from beginning to end the construction of manifold groups. It reduces the damage from illegal aggregations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Mentoring and coaching for employee development
Mentoring is a relationship between an experienced person and a less experienced person for the purpose of helping the one with less experience. The mentee seeks the advice and support of the more experienced person. Coaching is the way in which people with vast experience help those in the same job or field of endeavor who have less experience. Coaching usually deals with specific skills and tactics, while mentoring often is a long-term process and a more personal relationship is formed. In both coaching and mentoring the goal is to help people to reach their full potential. In a basic sense it is a method of training, directing or instructing a person or group of people to do a specific task, achieve a goal or develop certain skills. Coaches are usually paid for their work, and their relationship with those being coached is a professional one. In this paper I would like to discuss various aspects of Mentoring and Coaching for the development of employees in the organization.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]