Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Raza, Mudassar
- Microscopic Feature Extraction Method
Abstract Views :102 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Sciences, COMSATS Institute of Information Technology, Wah Cantt, 47040, PK
1 Department of Computer Sciences, COMSATS Institute of Information Technology, Wah Cantt, 47040, PK
Source
International Journal of Advanced Networking and Applications, Vol 4, No 5 (2013), Pagination: 1700-1703Abstract
In this paper a new method of microscopic feature extraction on image processing has been proposed. The proposed technique is effective in extracting desired microscopic features from an image. In this technique dynamic threshold technique is applied on the image in order to remove the background, then vector median filter is applied to remove the noisy pixels for achieving clear image, and finally by digital morphological algorithm to find the desired location in an image is obtained.Keywords
Microscopic, Features, Image, Pixels, Grey Level.- A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks
Abstract Views :119 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, PK
1 Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, PK
Source
International Journal of Advanced Networking and Applications, Vol 3, No 5 (2012), Pagination: 1298-1301Abstract
In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbour detection protocol with certain modifications. In the technique, sender floods the route request packets in search of destination and in return the receiver responds by sending the route reply. The route reply contains the number of routes that lead to it, sending and receiving time, the identification of intermediate nodes and the request that the sender had sent. During analyzing the reply, sender confirms the number of routes by sending packets of verification to individual nodes whose identification has been stated by the receiver and based upon the delay in time i.e., Δt, wormhole link is detected. Analysis proves that the proposed technique not only detects the wormhole link but also provides a verification mechanism to judge the validity of nodes.Keywords
Wormhole, Ad Hoc Networks, Intrusion, Packets.- Priority Based Congestion Control Routing in Wireless Mesh Network
Abstract Views :108 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, PK
1 Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, PK