Entity

Time filter

Source Type


Patel K.N.,Shri Sad Vidya Mandal Institute of Technology | Jhaveri R.H.,Shri Sad Vidya Mandal Institute of Technology
Procedia Computer Science | Year: 2015

Mobile Ad hoc Network (MANET) can be said as a collection of mobile nodes, which builds a dynamic topology and a A resource constrained network. In this paper, we present a survey of various testbeds for Mobile Ad hoc Networks. Emulator provides environment without modifications to the software and validates software solutions for ad hoc network. A field test will show rather the simulation work is going on right track or not and going from the simulator to the real thing directly to analyze the performance and compare the results of routing protocols and mobility models. Analyzing and choosing an appropriate emulator according to the given environment is a time-consuming process. We contribute a survey of emulation testbeds for the choice of appropriate research tools in the mobile ad hoc networks. © 2015 Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license. Source


Patel N.J.,Shri Sad Vidya Mandal Institute of Technology | Jhaveri R.H.,Shri Sad Vidya Mandal Institute of Technology
Procedia Computer Science | Year: 2015

Vehicular Ad-hoc networks (VANETs) require trusted vehicles to vehicles communication. VANET is multidimensional network in which the vehicles continuously change their locations. Secure routing is imperative during the routing process to incorporate mutual trust between these nodes. Sometimes, the malicious node broadcast the bogus information among other nodes. Establishing trust is a challenge while one or more malicious nodes attempt to disrupt route discovery or data transmission in the network. A lot of research has been carried out for secure routing process with trust-based approaches. In this paper, we present survey of various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs. © 2015 Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license. Source


Mistry H.P.,Shri Sad Vidya Mandal Institute of Technology | Mistry N.H.,Shri Sad Vidya Mandal Institute of Technology
ICIIECS 2015 - 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems | Year: 2015

In this growing world, widespread and easily available use of mobile and portable devices such as, laptops, PDAs etc., the mobile ad hoc networks are receiving more attention for connectivity between these devices in real time. Ant Colony optimization routing is an adaptive and efficient for MANETs. Now a days, routing in mobile ad hoc networks (MANETs) is a very challenging and growing issue because of its dynamic nature and decentralization infrastructure. Various routing protocols have been proposed for MANETs but results in limited bandwidth, high throughput, end-to-end delay, packet delivery ratio and more energy consumptions etc. An ant colony optimization algorithms have good techniques for developing different routing algorithms for MANETs. The reactive routing protocols like, AODV and DSR using Ant Colony optimization are review in this paper. © 2015 IEEE. Source


Kantharia K.J.,Shri Sad Vidya Mandal Institute of Technology | Prajapati G.I.,Shri Sad Vidya Mandal Institute of Technology
International Conference on Advanced Computing and Communication Technologies, ACCT | Year: 2015

Human facial behaviour recognition can be defined as the process of identifying human internal feelings or mood from the classification of facial expression and gesture. Human facial expression and gesture recognition have a many real world applications such as Human Machine Intelligent Interaction (HMII), Smart rooms, Advance Driver Assistance Systems (ADAS), Intelligent Robotics, Monitoring and Surveillance, Gaming, Research on pain and depression, Health support appliances. Facial Expression Recognition is challenging problem up till now because of many reasons, moreover, it consists of three sub challenging tasks face detection, facial feature extraction and expression classification. Soft computing is a computer science field that applies to the problem whose solution is unpredictable or inexact. Digital image processing works effectively together with soft computing techniques to improve efficiency of recognizing human facial behaviour through machine. This paper gives a review on the mechanisms of human facial behavior recognition using soft computing techniques, which includes a brief detail on framework, literature survey and key issues in facial behaviour recognition using soft computing. © 2015 IEEE. Source


Mistry H.P.,Shri Sad Vidya Mandal Institute of Technology | Mistry N.H.,Shri Sad Vidya Mandal Institute of Technology
International Conference on Advanced Computing and Communication Technologies, ACCT | Year: 2015

Wireless Sensor Networks (WSNs) are most growing research area because of its low cost, infrastructure less, increase capabilities of nodes, real time and accurate. Localization is a major issue in the wireless sensor networks because it has a number of sensor nodes which are deployed at positions and they may not be fixed at their own position. In localization different techniques are used for distance and position estimation. In this paper we will focus on RSSI based localization in WSN which will show how to reduce location errors and improve accuracy by using various models and techniques. After that we will focus on how to make an algorithm scalable and improve the energy efficiency by providing authentication and key management. © 2015 IEEE. Source

Discover hidden collaborations