منابع مشابه
Review On Jelly Fish Detection and Prevention Schemes in Manets
The Mobile ad Hoc Networks work for number of applications in the present times. Some of the uses require quick transmission of the data from an emergency disaster prone area to the help centers. If the objective of least end to end delay between the transmissions is defeated for the delay sensitive applications, then it could lead to more harm. Jelly Fish attack is one such kind of many possib...
متن کاملEnhancing Effect of Starch on Jelly Strength of Fish Meat Jelly-II. Effect of Amylose and Amylopectin
In the first paper of this series, it was shown that gelatinization of starch was necessary to enhance jelly strength of fish meat jelly (Kamaboko), and that starch added in Kamaboko , though gelatinized, chiefly existed in the jelly as granules and partly dispersed into meat as amylose. In the present paper, amylose and amylopectin, the two components of starch , were isolated by an improved S...
متن کاملJelly wobbles
(Pelagia noctiluca) — a well-known summer problem off Spain’s Mediterranean beaches – thriving through the winter. Joseph Maria Gili, leading the survey, said that these animals developed last autumn and will themselves reproduce in the spring in readiness for what is expected to be another massive summer population around Spain’s beaches this year. While measures are now being considered to pr...
متن کاملA Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networks
Mobile Adhoc Networks have become a part and parcel of technology advancements due to its working as autonomous system. MANET networks are vulnerable to various types of attacks and threats due to its unique characteristics like dynamic topology, Shared physical medium, distributed operations and many more. There are many attacks which effect the functioning of MANETS’ such as denial of service...
متن کاملEffects of Jelly Fish Attack on Mobile Ad-Hoc Network’s Routing Protocols
This Paper focuses on the effects of jelly fish attack on MANET’s routing protocols. Here four protocols AODV, DSR, TORA and GRP are used. Performance of the network has been evaluated in terms of Data dropped (buffer overflow), Data dropped (retry threshold exceeded), Load, Media access delay, Retransmission attempts. Simulations were carried out by using OPNET 14.5 simulator.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1880
ISSN: 0028-0836,1476-4687
DOI: 10.1038/023170e0