A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Agrawal, Bijendra
- Push Notification-Web Based Service Oriented Architecture for Mobile Augmented Reality System
Authors
1 Research Scholar, KSV University, Gandhinagar, Gujarat, IN
2 VJKM Groups of Institution, Vadu, Kalol, Gujarat, IN
Source
International Journal of Computational Intelligence Research, Vol 9, No 1 (2013), Pagination: 55-61Abstract
Push notification allows an app to notify you of new messages or events without the need to actually open the application, similar to how a text message will make a sound and pop up on your screen. This is a great way for apps to interact with us in the background, whether it be a game notifying us of some event occurring in our game world or simply the iPad's mail application beeping as a new message appears in our inbox.
Push notifications are one of the key features of today's smartphones. They constantly feed you information from a variety of services. From Twitter mentions to Facebook replies to e-mails to system notifications: they're the daily dose for information addicts. And now they're coming to the land of PC with Windows 8 and OS X Mountain Lion-which is a little worrying. While they're designed to keep you updated and thus increase your productivity, they're flurrying nature often does the opposite.
References
- http://msdn.microsoft.com/en-in/library/windows/apps/hh913756.aspx
- http://msdn.microsoft.com/en-in/library/windows/apps/hh465407.aspx developer.apple.com/appstore/push-notifications/
- support.apple.com/kb/HT3576 tokudu.com/2010/how-to-implement-pushnotifications- for-android/
- https://mixpanel.com/docs/people-analytics/android-push
- https://developers.google.com/android/c2dm/ www.abolkog.com/portal/java.../117-android-push-notifications
- www.blackberryforums.com/.../243377-blackberry-push-notification..
- http://devblog.blackberry.com/2010/03/introducing-blackberry-push-servicesto- developers/
- Major Challenges of Mobile Adhoc Networks
Authors
1 Janardhan Rai Nagar, Rajasthan Vidhyapeeth, Udaipur- 313001, Rajasthan, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 2 (2017), Pagination: 417-421Abstract
In the unknown environment of network the security the major issue for safe communication between the nodes. In such networks a lot of active and passive attacks are done by the attackers in groups in the data packets and routing messages. Mobile Adhoc networks are such type of networks which does not have any centralized authentication and the nodes communicate with each other. In MANET security plays a vital role for safe communication. The focus is given on security of Mobile Adhoc Networks. MANET is open network which is available for the malicious and trustworthy users to communicate. The MANET has to design a robust solution which deals with such type of malicious attackers so that a health network transmission takes place between trustworthy nodes. The Mobile Adhoc Networks are the network which works in isolation along with the wired infrastructure. This elasticity of MANET is its biggest strength but it is also a big vulnerability for security issues. In paper we will discuss the active and passive attacks including black hole attacks, spoofing, warm hole, flooding and traffic monitoring, traffic analysis and eavesdropping respectively.Keywords
MANET, Intrusion Detection, Attacks, Security, AODV.References
- Mobile Adhoc Network (MANET). Routing Protocol Performance Issues and Evaluation Considerations. URL: http://www.ietf.org/rfc/rfc2501.txt
- S. Basagni et al., Mobile Ad Hoc Networking, IEEE Press and John Wiley and Sons, 2003.
- Conti, M.; Maselli, G.; Turi, G.; Giordano, S.; , “Cross-layering in mobile ad hoc network design,” Computer , vol.37, no.2, pp. 48- 51, Feb 2004, doi: 10.1109/MC.2004.1266295 URL: http://ieeexplore.ieee.org/ stamp/stamp.jsp?tp= andarnumber = 1266295andisnumber=28321
- Chakrabarti, S.; Mishra, A.;, “QoS issues in ad hoc wireless networks,” IEEE Communications Magazine, vol. 39, no.2, pp.142-148, Feb 2001, doi: 10.1109/35.900643 URL: http://ieeexplore.ieee.org/ stamp/stamp.jsp?tp=andarnumbe r=900643andisnumber =19494
- Royer, E.M.; Chai-Keong Toh; , “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications, vol.6, no.2, pp.46-55, Apr 1999, doi: 10.1109/98.760423 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=andarnumber= 760423andisnumber=16455
- J. Macker, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”. IETF RFC 2501, January 1999.
- Mohammed Saeed Al-kahtani, “Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs),” IEEE 2012.
- G Gagandeep, Aashima, Pawan Kumar,” Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012.
- Priyanka Goyal, Sahil Batra, Ajit Singh “A Literature Review of Security Attack in Mobile Ad-hoc Networks”, International Journal of Computer Applications (0975-8887) Volume 9– No.12, November 2010