Skip to main content
The main motivation of the research paper is to analyze different performance parameters of three well known Ad-hoc network routing protocols (AODV, DSDV, DSR) with varying node density and velocity. As in real world the movements of... more
    • by 
    •   6  
      Computer ScienceComputer NetworkRouting ProtocolWireless Ad Hoc Network
DDoS attacks are launched through sending a large quantity of packets to a target machine, using instantaneous teamwork of multiple hosts which are distributed throughout the Grid computing environment. Today DDoS attacks on the Internet... more
    • by 
    •   10  
      EngineeringComputer ScienceGrid ComputingNetwork Security
A real-time system must respond fast enough that it can serve the task in a particular time interval. The key constraints in real-time systems are to meet timing bounds and for these systems it is necessary to complete all of their tasks... more
    • by 
    •   7  
      Computer ScienceDistributed ComputingMultidisciplinaryWorkload
A vehicular Ad-hoc network is composed of moving cars as nodes without any infrastructure. Nodes selforganize to form a network over radio links. Security issues are commonly observed in vehicular ad hoc networks; like authentication and... more
    • by 
    •   5  
      Computer ScienceComputer NetworkCluster AnalysisVehicular ad hoc network
    • by 
    •   6  
      Computer ScienceComputer NetworkVehicular ad hoc networkInformation Dissemination
Named Data Networking (NDN) is one of the future envisioned networking paradigm used to provide fast and efficient content dissemination with interest-based content retrieval, name-based routing and in-network content caching. On the one... more
    • by 
    •   5  
      Computer ScienceComputer SecurityMusic and identityThe Internet
Unlike commercial networks, the tactical networks drive in a critical environment and without a backbone infrastructure. These networks involve mission-critical operations that are dependent on the rapid and reliable transfer of... more
    • by 
    •   3  
      Computer ScienceSoftware Defined RadioSoftware
With population growth, the demand for vehicles has increased tremendously, which has created an alarming situation in terms of traffic hazards and road accidents. The road accidents percentage is growing exponentially and so are the... more
    • by 
    •   5  
      Computer ScienceTransport EngineeringInternet of ThingsCrash
Transactions related to vehicles include manufacturing, buying, selling, paying insurance(takaful), obtaining regular inspection, leasing a vehicle from banks, getting in an accident, engaging in a traffic violation, calculating price... more
    • by 
    •   7  
      Computer ScienceComputer SecurityDecentralizationVehicle Tracking
With the exponential rise in government and private health-supported schemes, the number of fraudulent billing cases is also increasing. Detection of fraudulent transactions in healthcare systems is an exigent task due to intricate... more
    • by 
    •   2  
      Computer ScienceHealth Care
In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and... more
    • by 
    •   9  
      Information SystemsComputer ScienceEnergy ConsumptionInternet of Things
Gender inclusion and female participation in STEM courses have always been challenging in a patriarchal country like Pakistan. Women are often underrepresented in engineering fields, as engineering fields are usually considered manly.... more
    • by 
    •   5  
      PsychologySocial SupportTechnical and Vocational Education and TrainingLikert Scale
Fog computing is a technology that brings computing and storage resources near to the end user. Being in its infancy, fog computing lacks standardization in terms of architectures and simulation platforms. There are a number of fog... more
    • by 
    •   2  
      Computer ScienceFog Computing
Streaming large amounts of data to cloud data centers cause network congestion resulting in high network and energy consumption. The concept of fog computing is introduced to reduce workload from backbone networks and support... more
    • by 
    •   6  
      Computer ScienceEnergy ConsumptionCloud ComputingComputer Network
The main motivation of the research paper is to analyze different performance parameters of three well known Ad-hoc network routing protocols (AODV, DSDV, DSR) with varying node density and velocity. As in real world the movements of... more
    • by 
    •   16  
      Computer ScienceRouting algorithmMobile Ad Hoc NetworkVideo Streaming
    • by 
    •   17  
      Computer NetworksAdaptive Video StreamingVideo StreamingQoS
    • by 
    •   17  
      Computer NetworksAdaptive Video StreamingVideo StreamingQoS
    • by 
    •   13  
      Performance EvaluationQuality of ServiceBusiness ModelVideo Quality
    • by 
    •   17  
      Distributed ComputingMultimedia CommunicationQuality of ServiceComplex network
    • by 
    •   6  
      Resource AllocationQuality of ServiceService DeliveryReal Time