Hydrosol of Au nanoparticles was prepared by citrate reduction of chloroauric acid. The synthesized nanoparticles were characterized through transmission electron microscopy (TEM) and UV–Visible spectroscopy. The prepared nanoparticles were almost spherical in shape with their mean diameter ∼6 nm and possessed face-centred-cubic (fcc) structure. The absorption spectrum of the as-prepared nanoparticles shows the SPR peak at 530 nm in agreement with that predicted from calculations based on Mie theory. These nanoparticles were dispersed in poly(vinyl alcohol) (PVA) using the sol–gel method to prepare PVA–Au nanocomposite films with different concentrations of Au. Optical and structural properties of these nanocomposites were studied using UV–Visible spectroscopy, x-ray diffraction (XRD) and FTIR spectroscopy. The value of optical band gap deduced from the UV–Visible absorption spectroscopy is found to be reduced from 4.98 eV (for pure PVA) to 3.85 eV after embedding 0.074 wt% of Au nanoparticles. Further, the refractive index behaviour for pure PVA and PVA–Au nanocomposite films was studied through transmission and reflection behaviour. The induced structural changes, revealed through XRD and FTIR spectroscopy, are responsible for the observed changes in optical behaviour of PVA after embedding Au nanoparticles in it.
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on fundamental security attacks in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. However, these solution are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. MANET can operate in isolation or in coordination with a wired infrastructure, often through a gateway node participating in both networks for traffic relay. This flexibility, along with their selforganizing capabilities, are some of MANET's biggest strengths, as well as their biggest security weaknesses. In this paper different routing attacks, such as active(flooding, black hole, spoofing, wormhole) and passive(eavesdropping, traffic monitoring, traffic analysis) are described. INTRODUCTIONIn [1,3,4,6] Mobile Ad Hoc Networks (MANETs) has become one of the most prevalent areas of research in the recent years because of the challenges it pose to the related protocols. MANET is the new emerging technology which enables users to communicate without any physical infrastructure regardless of their geographical location, that's why it is sometimes referred to as an "infrastructure less" network. The proliferation of cheaper, small and more powerful devices make MANET a fastest growing network.An adhoc network is self organizing and adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network. The set of applications for MANETs is diverse, ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are constrained by power sources. Besides the legacy applications that move from traditional infrastructure environment into the ad hoc context, a great deal of new services can and will be generated for the new environment. Security solutions are important issues for MANET, especially for those selecting sensitive applications, have to meet the following design goals while addressing the above challenges.MANET is more vulnerable than wired network due to mobile nodes, threats from compromised nodes inside the network, limited physical security, dynamic topology, scalability and lack of centralized management. Because of these vulnerabilities, MANET are more prone to malicious attacks. The primary focus of this work is to provid...
In this article, we have reported the results of our measurements, related to the tuning of the refractive index of the poly(vinyl alcohol) (PVA) polymer on embedding Cu and Ag nanoparticles at different concentrations. The size distribution and dispersion behaviour of embedded nanoparticles within PVA have been studied through transmission electron microscopy. A systematic increase in refractive index of PVA on increasing the concentration of embedded nanoparticles has been observed. These results have been tried to be explained using Bhar and Pinto model based on the Lorimar's theory for polymer composites. The values of refractive index of these nanocomposites have also been calculated using the Lorentz-Lorenz effective medium theory and found to be in close agreement with the experimental data. Nanoparticles embedded induced modifications in the structure of PVA have been revealed through FTIR spectroscopy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.