American Journal of Networks and Communications

Volume 4, Issue 3, May 2015

  • C2 Torus New Interconnection Network Topology Based on 2D Torus

    Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 1-4
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: Mesh and Torus are most popular interconnection topologies based on 2D-mesh. Comparison between Mesh and Torus will be considered and new interconnection topology will be proposed to provide better performance. The C2Mesh is an enhanced mesh interconnected network. This paper enhances the Performance of torus network based on the theme of C2Mesh. T... Show More
  • Selection of Efficient Relay for Energy-Efficient Cooperative Ad Hoc Networks

    Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 5-11
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 18, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. This paper identify the challenges in the devel... Show More
  • An Adaptive Algorithm to Prevent SQL Injection

    Ashish John, Ajay Agarwal, Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 12-15
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: SQL Injection attacks are one of the top most threats for application written for the web. SQL Injection is a type of attack in which the attacker uses SQL commands to gain access or make changes to data. It allows attacker to obtain unauthorized access to the database to change the intended queries. In the web environment, end user privacy is one ... Show More
  • Ontology Based Fuzzy Query Execution

    Geetanjali tyagi, kumar kaushik, Arnika Jain, Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 16-21
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: Database engineering has been progressed up to the Relational database stage. Fuzzy information administration in databases is a complex process in view of adaptable information nature and heterogeneous database frameworks. Relational Database Management System (RDBMS) can just handle fresh information but cannot handle precise data information. St... Show More
  • Efficient Routing with Reduced Routing Overhead and Retransmission of Manet

    Megha Sharma, Shivani Rohilla, Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 22-26
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: Adhoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure. In manet nodes can change location and configure itself, the mobility of nodes causes continuous link breakage due to which frequent path failure occur and route discov... Show More
  • Security in Ad Hoc Networks

    Sanjana Lakkadi, Amit Mishra, Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 27-34
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad h... Show More
  • Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement

    Laith Ali Abdul-Rahaim, Ammar Abdulrasool Muneer

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 35-44
    Received: Dec. 16, 2014
    Accepted: Jan. 10, 2015
    Published: Jan. 22, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: This work shows new and efficient algorithm of cryptographic purpose based symmetric and conventional techniques that considers the representation of the cipher text by using the three dimensional Discrete Wavelet Transform to find the wavelet decomposition vector containing the approximation and the detail coefficients then build the three dimensi... Show More
  • Privacy Preserving Data Publishing through Slicing

    Shivani Rohilla, Megha Sharma, A. Kulothungan, Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 45-53
    Received: Dec. 22, 2014
    Accepted: Dec. 27, 2014
    Published: Feb. 12, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: Microdata publishing should be privacy preserved as it may contain some sensitive information about an individual. Various anonymization techniques, generalization and bucketization, have been designed for privacy preserving microdata publishing. Generalization does not work better for high dimensional data. Bucketization failed to prevent membersh... Show More
  • Secure Route Selection in Manet Using Ant Colony Optimization

    Somesh Maheshwari, Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 54-56
    Received: Dec. 22, 2014
    Accepted: Dec. 27, 2014
    Published: Feb. 12, 2015
    Downloads:
    Views:
    This article belongs to the Special Issue Ad Hoc Networks
    Abstract: A Mobile Adhoc network is a collection of nodes that are dynamically and arbitrarily located in such a manner that the inter connections between nodes are capable of changing on a continual basis. Ad hoc wireless networks are increasing in popularity, because of the spread of laptops, sensor devices, personal digital assistants, and other mobile el... Show More