Open Access
Subscription Access
Open Access
Subscription Access
A Multi Way Acknowledgment Protocol to Detect Misbehaving Nodes in Manets
Subscribe/Renew Journal
Quality Function Deployment (QFD) is a product development process that encompasses a sheer amount of data gathered from customers through several market research techniques like personal interview, focus groups, surveys, video conferencing etc. This massive, unsorted and unstructured data is required to be transformed into a limited number of structured information to represent the actual 'Customer Needs'. However the process is tedious and time consuming and cannot be dealt with manually. In order to address these issues, this paper proposes a futuristic software framework based on an Affinity Process. The paper begins with the topic introduction and outlines the QFD process. The paper then describes the Affinity Process, builds the data structure and then makes an attempt to build the proposed framework using tools Visual Basic (VB) and MS-Access. The proposed framework is developed as a part of QFD software and it is anticipated that when completely developed, it would act as a vital component of QFD software.
Keywords
QFD, Affinity Process, Visual Basic, MS-Access, Software, Customer Needs
Subscription
Login to verify subscription
User
Font Size
Information
- L. Buttyan and J.-P. Hubaux,(2000) “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proc. MobiHoc.
- L. Buttyan and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM .
- S. Zhong, J. Chen, and Y.R. Yang, (2003)“Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc.INFOCOM.
- S. Marti, T. Giuli, K. Lai, and M. Baker,(2000) “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom.
- S. Buchegger and J.-Y. Le Boudec,(2002) “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks,” Proc. MobiHoc.
- K. Balakrishnan, J. Deng, and P.K. Varshney, (2005 ) “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05).
- S. Zhong, J. Chen, and Y.R. Yang,(2005) “Sprite: A Simple, Cheat-Proof, Proc. IEEE Wireless Comm. and Networking Conf.
- Y. Hu, D.B. Johnson, and A. Perrig, (2003)“SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 175-192.
- D. Johnson, D. Maltz, Y.C. Hu, and J. Jetcheva, (2002) “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Internet draft.
- B. Awerbuch, D. Holmer, C.-N. Rotaru, and H. Rubens,( 2002 ) “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,” Proc. ACM Workshop Wireless Security (WiSe).
- L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks, (2003)” IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999. Proc. INFOCOM.
- H. Miranda and L. Rodrigues, (2002) “Preventing Selfishness in OpenMobile Ad Hoc Networks,” Proc. Seventh CaberNet RadicalsWorkshop.
- (13)L. Buttyan and J.-P. Hubaux, (2006) “Security and Cooperation in Wireless Networks,” http://secowinet.epfl.ch,
- S. Buchegger and J.-Y. L. Boudec, (2002 )“Performance analysis of the CONFIDANT protocol: Cooperation of nodes -fairness in dynamic ad-hoc networks,” in Proceedings ofIEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). IEEE.
- The network simulator http://www.isi.edu/nsnam/ns
Abstract Views: 482
PDF Views: 1