An Security Aware Routing Protocol for Mobile Ad Hoc Networks
Mobile Ad-Hoc Networks (MANETs) uses security routing scheme for establishing secure route and securely data transmission. The security issues in MANET are mostly concentrated in two parts. The main security threat in MANET is integrity, non-repudiation and privacy. To combat with these security threats, many secure routing protocols has been designed to reduce the security threats in MANET. In this paper we have proposed Privacy Aware Routing Protocol (ESARP) to enhance the security levels in the routing protocol to prevent the network attacks. The proposed work consists of three parts. In the first part each node perform a key exchange operation with its one and two hop distance neighbours, in the second step, secure route establishment and in the third step, secure data communication is performed. Key exchange operation is done in two steps; in the first step, source node (S) exchanges public key (e) with its one hop distance nodes and establish a secret key (SK), and in the second step, source node exchanges public key with its two hop distance nodes and establish a secret key. On establishing the key exchange process node can participate in routing process. In route establishment process, secure route will be established between the sender and receiver. In the third step, sender and receiver will exchange their public key securely and establish a secret key for communication and then data communication is performed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analytical solution of Unsteady MHD free Convection and mass transfer past a Vertical Porous Plate with Slip Flow Region
The unsteady free convection flow of a laminar viscous, incompressible, electrically conducting with chemical reactive species and heat generation fluid past a semi-infinite vertical plate embedded in uniform porous medium with slip flow region has been studied. The governing equations are solved analytically using perturbation techniques. The influences of the various parameters on the flow field, Temperature field, Mass concentration field, Skin friction, Rate of heat transfer and Rate of mass transfer are extensively discussed through Graphs and Tables.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analyzing blood cell images to differentiate WBC and counting of linear & non-linear overlapping RBC based on morphological features
In this paper we propose a new set of features based on morphology for total RBC count in given blood sample is explained along with classification of WBC. For the diagnosis of any disease first requirement is complete blood count i.e total number of RBC, WBC and platelets in given blood sample. And if there are excess of any of these types or any of these is few in number then this gives the doctor a basic idea that the person is not healthy for sure. To do this manually is very tedious. Here RBC and WBC are first differentiated and then counted through some algorithm. Implementation here is done through MATLAB.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Antimicrobial, DNA cleavage and antitumoral properties of some transition metal complexes of 1, 10 –phenanthroline and 2, 2? – bipyridine: a review
Transition metal ions coordinated to nitrogen containing ligands, such as 1, 10 – phenanthroline and/or 2, 2? – bipyridine have found wide applications in chemotherapy. The ligands form very stable chelates with many first row transition metals and the ligands, as well as some of their derived complexes, do exhibit antimicrobial properties. The mechanism of action of these novel set of drugs was reviewed and compared to that of the conventional antifungal drugs (polyene and azoles). Transition metal complexes of 1, 10 – phenanthroline and/or 2, 2? – bipyridine demonstrated a significantly different mode of action and thus could be used either in combination with existing antimicrobial drugs or in a situation where resistance to conventional antimicrobial drugs have emerged. However, the antimicrobial properties of the various transition metal complexes of phen and bpy are not uniform indicating a degree of metal – ion dependency on their mode of action. The DNA binding, DNA cleavage and antitumoral properties of the transition metal complexes of the chelating ligands were also reviewed. DNA cleavage by these metallonucleases is reported to be dependent on the presence of a biological reductant (e.g. L-ascorbic acid, gluthathione) and an oxidant ( H2O2). The metal complexes were reported to control cancer cell division by significantly reducing DNA synthesis. However there is a significant difference in the mode of action of these novel sets of antitumoral drugs compared to the conventional antifungal drug cisplatin.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Bio-efficacy and dissipation of Beta-cyfluthrin against white fly in okra
Beta-cyfluthrin at 18 g a.i. ha-1 applied twice as foliar spray was found to be most effective in controlling the whitefly and dissipation pattern was studied by collecting okra fruits at 0, 1, 3, 5, 7, 10 and 15 days after last spray and analyzed at AINP on Pesticide Residues, Hyderabad. The initial deposits of beta-cyfluthrin (18.75 g a.i. ha-1) in okra fruits was 0.11 mg kg-1 dissipated to below detectable level (BDL) on 5th day.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Celebrate Esfandgan (Sepandarmazgan)
This research paper is about "celebrating Esfandgan", which aims at understanding the customs of ancient Persia, and transmit it to future generations is performed. In this study, which is an effort in order to preserve the legacies of the past, the definition of "Sepandar Mazgan", are very different in culture and resources, and how the ritual celebrations in different parts of the country, and also because the difference in time to hold it in different periods, have been studied. According to the March party providers, as the celebration of "Women of the earth", is held in this study, the relationship between these two cases have been investigated. Well as parts of the Avesta, the two poems in praise , and the common denominator is that enhance are referenced. Given that, Valentine, among the Romans, called the day of love is named, as well as Sepandar Mazgan celebrate the Day of the Woman, the epitome of love, has been named in the investigation of how the appearance of Valentine's Day , Rome and Persia, is also noted.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Comparative Study of Page Replacement Algorithms
A page fault is a kind of delay, put forward by the system hardware on accessing of a page by a process in execution, which is plotted in the virtual memory, but not really stacked to the main memory. The set up which observes the interrupt is known as the CPU's memory management unit (MMU), whereas the exception handling program which tackles these interrupts is mainly a section of systems program kernel. During managing an interrupt, the systems program normally take attempts in making the needed page obtainable at the locale in physical memory, or aborts the process in a scenario of unauthorized memory retrieval. In this paper we have done a survey on different techniques to handling a page fault or an interrupt.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Competition Law and Intellectual Property Rights Conflicts
Developed countries apply some controls directly to protect national security, concerning persons` or certain countries` access to specified technologiesSimilarly, they apply indirect supervision on the types, amount and channels of technology transfer to certain countries through currency exchange regulations, taxation and foreign investment. Developing countries also keep technology turn under their own control in order to ensure that technology transfer contracts and the economic objectives and policies of the government are consistent. In technology-transfer contracts (license contract), one type of various intellectual property rights is transferred The exclusivity of intellectual property rights is one of the most striking examples of exclusivity which is granted to special people and for certain period; so that in the certain period, they themselves, or their own selected people or their representatives benefit from the issue of intellectual property . The reason why these exclusive rights are granted is that the issues of the rights are used by the common people without special protection (patents). The variety of intellectual products and their utilizations in diverse fields of industry, commerce, science, literature and art have made such issues important. Hence, demand for these products either from the government or private sectors always exists. The owners of intellectual property market their products due to such requests and also to observe their own investment, therefore, obtain incentives for more activities and innovation in today`s knowledge-based economy (in which just those societies are successful that own high creativity and technical ability for their consumers` welfare). Accordingly, either they themselves use them or totally transfer them to another person or sometimes (with preserving their property on such rights) they give others solely a license to use them. The recent form of using intellectual property rights (namely to conclude license contracts) allows license-givers (with preserving their property on technology) to develop their own technology and enter the global market.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Consorcioara case analysis to the problem of housing sector in Mexico
The article talks about the strategies that led Consorcio Ara to maintain growth, although the outlook for housing in Mexico is going through a difficult situation. The strategies are evaluated through the landscape of the industry, where they take into social implications of the problem as well as economic aspects that affected most of the companies in the industry. Strategies for success in this business versus strategies that took most of the companies engaged in housing construction are analyzed through quantitative method with reference data from public institutions, for give to the situation solid arguments for the final conclusion.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]