Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I7.234
Z. Shaikh
Patient and Family Rights (PFR) is a common chapter available in the Joint Commission International (JCI) Accreditation[i] (fifth edition) and Central Board for Accreditation of Healthcare Institutions (CBAHI) Standards for hospitals (second edition)[ii]. JCI Accreditation is a USA based international healthcare accrediting organization, whereas CBAHI is the Kingdom of Saudi Arabia based national health care accrediting organization. However, both these standards are accredited by Ireland based International Society for Quality in Health Care (ISQua), which is the only accrediting organization who “accredit the accreditors' in the world. In Patient and Family Rights (PFR) chapter of JCI Accreditation for hospitals, there are nineteen (19) standards and seventy-seven (77) measurable elements (ME) whereas in CBAHI Accreditation there are thirty one (31) standards, ninety nine (99) sub-standards and fifty (50) evidence(s) of compliance (EC). The scoring mechanism is totally different in both these accrediting organizations. The researcher has identified thirty two (32) common parameters from JCI Accreditation and CBAHI standards, intent statement, measurable elements, sub-standard and evidence of compliance. On the basis of these identified common parameters, the researcher has compared the Patient and Family Rights chapter in JCI Accreditation and CBAHI Standards. Methods: This is a comparison study (normative comparison) in which the researcher has critically analyzed and compared the Patient and Family Rights (PFR) standards of JCI (Joint Commission International) Accreditation of USA (United States of America) and CBAHI (Central Board for Accreditation of Healthcare Institutions) of the Kingdom of Saudi Arabia. Data Collection: Primary data are collected from the JCI Accreditation Standards for hospitals, fifth edition, 2013 and CBAHI Standards for hospitals of Kingdom of Saudi Arabia, second edition, 2011. Secondary data are collected from relevant published journals, articles, research papers, academic literature and web portals. Objectives of the Study: The aim of this study is to analyze critically Patient and Family Rights (PFR) Standards in JCI Accreditation and CBAHI Standards to point out the best in among both these standards. Conclusion: This critical analysis of Patient and Family Rights (PFR) Standards in JCI Accreditation and CBAHI Standards for hospitals clearly show that the PFR Standards in CBAHI Standards are very comprehensive than the JCI Accreditation standards.
{"title":"Critical Analysis of Patient and Family Rights in JCI Accreditation and Cbahi Standards for Hospitals","authors":"Z. Shaikh","doi":"10.23956/IJERMT.V6I7.234","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.234","url":null,"abstract":"Patient and Family Rights (PFR) is a common chapter available in the Joint Commission International (JCI) Accreditation[i] (fifth edition) and Central Board for Accreditation of Healthcare Institutions (CBAHI) Standards for hospitals (second edition)[ii]. JCI Accreditation is a USA based international healthcare accrediting organization, whereas CBAHI is the Kingdom of Saudi Arabia based national health care accrediting organization. However, both these standards are accredited by Ireland based International Society for Quality in Health Care (ISQua), which is the only accrediting organization who “accredit the accreditors' in the world. In Patient and Family Rights (PFR) chapter of JCI Accreditation for hospitals, there are nineteen (19) standards and seventy-seven (77) measurable elements (ME) whereas in CBAHI Accreditation there are thirty one (31) standards, ninety nine (99) sub-standards and fifty (50) evidence(s) of compliance (EC). The scoring mechanism is totally different in both these accrediting organizations. The researcher has identified thirty two (32) common parameters from JCI Accreditation and CBAHI standards, intent statement, measurable elements, sub-standard and evidence of compliance. On the basis of these identified common parameters, the researcher has compared the Patient and Family Rights chapter in JCI Accreditation and CBAHI Standards. Methods: This is a comparison study (normative comparison) in which the researcher has critically analyzed and compared the Patient and Family Rights (PFR) standards of JCI (Joint Commission International) Accreditation of USA (United States of America) and CBAHI (Central Board for Accreditation of Healthcare Institutions) of the Kingdom of Saudi Arabia. Data Collection: Primary data are collected from the JCI Accreditation Standards for hospitals, fifth edition, 2013 and CBAHI Standards for hospitals of Kingdom of Saudi Arabia, second edition, 2011. Secondary data are collected from relevant published journals, articles, research papers, academic literature and web portals. Objectives of the Study: The aim of this study is to analyze critically Patient and Family Rights (PFR) Standards in JCI Accreditation and CBAHI Standards to point out the best in among both these standards. Conclusion: This critical analysis of Patient and Family Rights (PFR) Standards in JCI Accreditation and CBAHI Standards for hospitals clearly show that the PFR Standards in CBAHI Standards are very comprehensive than the JCI Accreditation standards.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I6.244
S. Banu, M. Prabakar
In the past several years, the development in non functional requirement such as CPU and memory has been done. Due to the workload characteristics the energy efficiency of non functional component has made a large coverage. We develop Ecope to attain energy proportionality for different methods of services of virtual machine in data centres’ decrease non functional energy for servers in large data centers. Demonstrate three input methods to illustrate our concept to real world services such as file processing, backend services and content processing. These services are applying on virtual machine in large data centers. In short, our aim is to recognize the preeminent non functional configuration among various workloads.
{"title":"Ecope: Task Aware Workload Elastic Scheduling and Customization for Infrastructure","authors":"S. Banu, M. Prabakar","doi":"10.23956/IJERMT.V6I6.244","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.244","url":null,"abstract":"In the past several years, the development in non functional requirement such as CPU and memory has been done. Due to the workload characteristics the energy efficiency of non functional component has made a large coverage. We develop Ecope to attain energy proportionality for different methods of services of virtual machine in data centres’ decrease non functional energy for servers in large data centers. Demonstrate three input methods to illustrate our concept to real world services such as file processing, backend services and content processing. These services are applying on virtual machine in large data centers. In short, our aim is to recognize the preeminent non functional configuration among various workloads.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"278 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I7.219
A. Roc, P. R. Banuprakash, G. Raj, L. Prasad
Traffic signals are the most efficient way of controlling traffic in a busy junction. But, we can see that these signals fail to control the traffic effectively when a particular lane has got more traffic than the other lanes. The idea behind this project is to implement a system which would easily control the traffic and helps for the emergency vehicles to reach at their destination easily and quickly. In our project, a system of cameras are used to regulate traffic. They obtain information in their respective places and coordinate with other cameras in the system to change traffic signals and suggest green signal for that route to avoid maximum traffic. Emergency vehicle can be detected with the help of sound sensors placed in the junction, which coordinates with the microcontroller and makes the particular Lane free.
{"title":"Smart Traffic Light Systems","authors":"A. Roc, P. R. Banuprakash, G. Raj, L. Prasad","doi":"10.23956/IJERMT.V6I7.219","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.219","url":null,"abstract":"Traffic signals are the most efficient way of controlling traffic in a busy junction. But, we can see that these signals fail to control the traffic effectively when a particular lane has got more traffic than the other lanes. The idea behind this project is to implement a system which would easily control the traffic and helps for the emergency vehicles to reach at their destination easily and quickly. In our project, a system of cameras are used to regulate traffic. They obtain information in their respective places and coordinate with other cameras in the system to change traffic signals and suggest green signal for that route to avoid maximum traffic. Emergency vehicle can be detected with the help of sound sensors placed in the junction, which coordinates with the microcontroller and makes the particular Lane free.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127523780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I6.237
Reza Sadeghi Rashed, Mohammad Bagher Mohammadi Lame
In the world, despite the efforts sparse for the use of information and communication technologies in some industries and businesses carried out, due to the lack of capacities and infrastructure required, preparation Forensic, causing a sharp drop in the performance of investments undertaken and the lack of benefits of ICT and mistrust and insecurity in And the vulnerability of information assets. In this regard Forensicpreparation assessment models provide the most help in understanding the status quo. Elements such as access mechanism, event tags, structure, communication systems and operating systems, intrusion detection systems, standards for data collection run by technical and non-technical factors affect protection of witnesses and the time this location. In this paper, according to the progress of society in the field of computer networking vacuum talk Forensic and preparedness in this area due to the emergence of e-government, there is discussed that requires the review process liable to digital evidence is in case any thing happened to information assets to risk losing assets and lowered consumer expenditure in this area to ensure future Forensic assets.
{"title":"Provide an Approach to Development and Security Preparation Forensic","authors":"Reza Sadeghi Rashed, Mohammad Bagher Mohammadi Lame","doi":"10.23956/IJERMT.V6I6.237","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.237","url":null,"abstract":"In the world, despite the efforts sparse for the use of information and communication technologies in some industries and businesses carried out, due to the lack of capacities and infrastructure required, preparation Forensic, causing a sharp drop in the performance of investments undertaken and the lack of benefits of ICT and mistrust and insecurity in And the vulnerability of information assets. In this regard Forensicpreparation assessment models provide the most help in understanding the status quo. Elements such as access mechanism, event tags, structure, communication systems and operating systems, intrusion detection systems, standards for data collection run by technical and non-technical factors affect protection of witnesses and the time this location. In this paper, according to the progress of society in the field of computer networking vacuum talk Forensic and preparedness in this area due to the emergence of e-government, there is discussed that requires the review process liable to digital evidence is in case any thing happened to information assets to risk losing assets and lowered consumer expenditure in this area to ensure future Forensic assets.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I7.191
Resmi M., R. Chezian
The majority of the traffic in the internet is dedicated to video streaming and its applications. Content Network Networks are good enough in live video streaming. But, implementing live video streaming is not an easy task. Delivery of live video streams can be complicated because of the variety of platforms, network types and streaming formats competing in today's online media services. Every user’s expecting reliable high quality performance with data availability using heterogeneous choices. And it is now tougher than ever to ensure an agreeable, problem less viewing experience on live streaming. Another problem of video streaming is handling security issues, which need fast verification and effective attack resistance. CDN suffers from various security issues, here, a new prototype to perform secure content delivery especially on live video streaming. A lightweight video streaming authentication technique is developed, this authenticates and transmits the data and eliminates the unauthorized access.
{"title":"Lightweight Authentication Scheme for Live Video Streaming Security","authors":"Resmi M., R. Chezian","doi":"10.23956/IJERMT.V6I7.191","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.191","url":null,"abstract":"The majority of the traffic in the internet is dedicated to video streaming and its applications. Content Network Networks are good enough in live video streaming. But, implementing live video streaming is not an easy task. Delivery of live video streams can be complicated because of the variety of platforms, network types and streaming formats competing in today's online media services. Every user’s expecting reliable high quality performance with data availability using heterogeneous choices. And it is now tougher than ever to ensure an agreeable, problem less viewing experience on live streaming. Another problem of video streaming is handling security issues, which need fast verification and effective attack resistance. CDN suffers from various security issues, here, a new prototype to perform secure content delivery especially on live video streaming. A lightweight video streaming authentication technique is developed, this authenticates and transmits the data and eliminates the unauthorized access.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I6.288
Amritpal Singh, S. Chhillar
Category classification, for news, is a multi-label text classification problem. The goal is to assign one or more categories to a news article. A standard technique in multi-label text classification is to use a set of binary classifiers. For each category, a classifier is used to give a “yes” or “no” answer on if the category should be assigned to a text. Some of the standard algorithms for text classification that are used for binary classifiers include Naive Bayesian Classifiers, Support Vector Machines, artificial neural networks etc. In this distinctive bag of words have been used as feature set based on high frequency word tokens found in individual category of news. The algorithm presented in this work is based on a keyword extraction algorithm that is capable of dealing with English language in which different news categories i.e. Business, entertainment, politics, sports etc. has been considered. Intra-class news classification has been carried out in which Cricket and Football in sports category has been selected to verify the performance of the algorithm. Experimental results shows high classification rate in describing category of a news document.
{"title":"News Category Classification Using Distinctive Bag of Words and ANN Classifier","authors":"Amritpal Singh, S. Chhillar","doi":"10.23956/IJERMT.V6I6.288","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.288","url":null,"abstract":"Category classification, for news, is a multi-label text classification problem. The goal is to assign one or more categories to a news article. A standard technique in multi-label text classification is to use a set of binary classifiers. For each category, a classifier is used to give a “yes” or “no” answer on if the category should be assigned to a text. Some of the standard algorithms for text classification that are used for binary classifiers include Naive Bayesian Classifiers, Support Vector Machines, artificial neural networks etc. In this distinctive bag of words have been used as feature set based on high frequency word tokens found in individual category of news. The algorithm presented in this work is based on a keyword extraction algorithm that is capable of dealing with English language in which different news categories i.e. Business, entertainment, politics, sports etc. has been considered. Intra-class news classification has been carried out in which Cricket and Football in sports category has been selected to verify the performance of the algorithm. Experimental results shows high classification rate in describing category of a news document.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I7.188
Snehal S. Rajole, J. Shinde
In this paper we proposed unique technique which is adaptive to noisy images for eye gaze detection as processing noisy sclera images captured at-a-distance and on-the-move has not been extensively investigated. Sclera blood vessels have been investigated recently as an efficient biometric trait. Capturing part of the eye with a normal camera using visible-wavelength images rather than near infrared images has provoked research interest. This technique involves sclera template rotation alignment and a distance scaling method to minimize the error rates when noisy eye images are captured at-a-distance and on-the move. The proposed system is tested and results are generated by extensive simulation in java.
{"title":"Integrated Approach for Sclera Recognition and Eye Gaze Detection","authors":"Snehal S. Rajole, J. Shinde","doi":"10.23956/IJERMT.V6I7.188","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.188","url":null,"abstract":"In this paper we proposed unique technique which is adaptive to noisy images for eye gaze detection as processing noisy sclera images captured at-a-distance and on-the-move has not been extensively investigated. Sclera blood vessels have been investigated recently as an efficient biometric trait. Capturing part of the eye with a normal camera using visible-wavelength images rather than near infrared images has provoked research interest. This technique involves sclera template rotation alignment and a distance scaling method to minimize the error rates when noisy eye images are captured at-a-distance and on-the move. The proposed system is tested and results are generated by extensive simulation in java.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121305563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I7.213
G. Rao, K. Reddy, P. Rao, P. Rao
Machining of the composites materials may be was troublesome on do as of those anisotropic also non homogeneous structures from claiming composites what's more of the helter skelter abrasiveness about their reinforcing constituents. In this study of the mechanical properties about e glass/ epoxy composite materials for fillers (SiO2 Also PTFE) need focused on with explore the materials included of the grid assistance moving forward those mechanically operating properties of a composite. Those recently produced composites are described to their mechanical properties in elasticity test eventually tensile strength test and Flexural test. Those effects of Different mechanical characterization tests would account here. Those tests result bring demonstrated that higher the filler material volume rate more excellent those quality to both SiO2 also PTFE loaded glass epoxy composites, SnO2 loaded composite hint at a greater amount manage values over PTFE.
{"title":"Mechanical Properties of E-Glass Fiber Reinforced Epoxy Composites with SnO2 and PTFE","authors":"G. Rao, K. Reddy, P. Rao, P. Rao","doi":"10.23956/IJERMT.V6I7.213","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I7.213","url":null,"abstract":"Machining of the composites materials may be was troublesome on do as of those anisotropic also non homogeneous structures from claiming composites what's more of the helter skelter abrasiveness about their reinforcing constituents. In this study of the mechanical properties about e glass/ epoxy composite materials for fillers (SiO2 Also PTFE) need focused on with explore the materials included of the grid assistance moving forward those mechanically operating properties of a composite. Those recently produced composites are described to their mechanical properties in elasticity test eventually tensile strength test and Flexural test. Those effects of Different mechanical characterization tests would account here. Those tests result bring demonstrated that higher the filler material volume rate more excellent those quality to both SiO2 also PTFE loaded glass epoxy composites, SnO2 loaded composite hint at a greater amount manage values over PTFE.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I6.275
Harjyot Kaur, Manjit Kaur
High Technology entrepreneurship is very important aspect in many debates, including those which are regarding launching new firms and development, regional economic development, section of stakeholders, selection of markets, educating managers and scientists.The purpose of this article is to define the high technology entrepreneurship, and identify its various aspects in relation with economics, entrepreneurship and management.High technology entrepreneurship is an investment in a project that uses various specialized individuals and various assets to create and capture the value of firm. Collaborative experiments and production of new products, assets and their attributes, which related to advances in scientific and technological knowledge and the firm’s asset ownership rights are the various factors which distinguishes Technology entrepreneurship from other entrepreneurship types (e.g. Social entrepreneurship, Small business and Self employment).
{"title":"High Technology Entrepreneurship","authors":"Harjyot Kaur, Manjit Kaur","doi":"10.23956/IJERMT.V6I6.275","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.275","url":null,"abstract":"High Technology entrepreneurship is very important aspect in many debates, including those which are regarding launching new firms and development, regional economic development, section of stakeholders, selection of markets, educating managers and scientists.The purpose of this article is to define the high technology entrepreneurship, and identify its various aspects in relation with economics, entrepreneurship and management.High technology entrepreneurship is an investment in a project that uses various specialized individuals and various assets to create and capture the value of firm. Collaborative experiments and production of new products, assets and their attributes, which related to advances in scientific and technological knowledge and the firm’s asset ownership rights are the various factors which distinguishes Technology entrepreneurship from other entrepreneurship types (e.g. Social entrepreneurship, Small business and Self employment).","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129168840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-29DOI: 10.23956/IJERMT.V6I6.285
Kamaljit Kaur, A. Kaur
The vehicular adhoc network is the decentralized type of network. The vehicle nodes can join or leave the network when they want. In the such type of network security, routing and quality of service are the three major issues of the network. In the network malicious node is present which is responsible to trigger various types of active and passive attacks. The Sybil attack is the active types of attack in which malicious node change its identification multiple times. In this, paper various techniques are reviewed which are used to isolate malicious nodes from the network.
{"title":"Detection of Sybil Attack in VANETs","authors":"Kamaljit Kaur, A. Kaur","doi":"10.23956/IJERMT.V6I6.285","DOIUrl":"https://doi.org/10.23956/IJERMT.V6I6.285","url":null,"abstract":"The vehicular adhoc network is the decentralized type of network. The vehicle nodes can join or leave the network when they want. In the such type of network security, routing and quality of service are the three major issues of the network. In the network malicious node is present which is responsible to trigger various types of active and passive attacks. The Sybil attack is the active types of attack in which malicious node change its identification multiple times. In this, paper various techniques are reviewed which are used to isolate malicious nodes from the network.","PeriodicalId":416512,"journal":{"name":"International Journal of Emerging Research in Management and Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132466395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}