Manuscripts

Recent Papers

A Review on Performance Analysis of Energy Detection Technique for Cognitive Radio over Different Windowing Techniques

The Spectrum is based on the tremendous growth in the wireless communication network which raises the demand of the frequency user.The most efficient way of allocating spectrum and reliable spectrum sensing is Dynamic spectrum allocation. Cognitive radio is one of the emerging technology in wireless communications in which a network can flexible changes its transceiver parameter. The Primary user can take the priority decision to detect the presence of the primary user, this can be done by a technology so-called cognitive radio. This can happen if we prefer the appropriate window technique to evaluate system parameter for sensing the availability of vacant band. We show that by comparing the different windows techniques, cognitive radios not only provide better spectrum opportunity but also provide the chance to a huge number of wireless users. In this paper Energy detection based Spectrum Sensing with different windowing methods i.e. rectangular and hamming are developed, that uses to detect the energy of the received signal. We detect the spectral correlation between the two peaks of the signal to sense the presence of the primary user.Therefore windowing strategies are used for improves system performance by reducing spectrum leak. The comparative analysis using different windowing methods shows in Energy detection method.

Published by: Preeti Garud, Shivangini Morya

Author: Preeti Garud

Paper ID: V3I2-1189

Paper Status: published

Published: March 9, 2017

Full Details

Black hole Attack in Mobile ad Hoc Networks: A Review

Mobile ad hoc networks are widely used networks in the present times. The nodes in such network consist of laptops, mobile phones etc. These devices often have very important information in them. Security of these networks is very vital. These networks are prone to various kinds of attacks such as black hole attack, wormhole attack, DDoS attack etc. Out of many other attacks possible, black hole attack is pretty dangerous as it drops all the packets received by it. This paper presents various studies that have been done by many authors in the past regarding detection and prevention of such attacks.

Published by: Harsimran Kaur, KamalJeet Mangat

Author: Harsimran Kaur

Paper ID: V3I2-1185

Paper Status: published

Published: March 8, 2017

Full Details

Wormhole Attack Prevention and Detection in MANETs Using HRL Method

In order to prevent MANET from wormhole attack, a new method is proposed. In this, wormhole attack in MANET is detected and prevented by using Hop Count, Reverse Trip Time and Link Length method. According to the scheme, hop count specifies the actual reverse trip time from source to destination. To find the presence of tunnel, the source will compare calculated reverse trip time with actual reverse trip time and to verify the presence of tunnel, the source will compare calculated link length with actual link length of the links in paths. This scheme provides a security to mobile ad hoc networks from both short as well as long wormhole tunnels. Network simulator is used to evaluate the performance of mobile ad hoc network. The simulation results show that the proposed scheme outperformed in terms of throughput and packet delivery ratio.

Published by: Neelima Singla, Ramanjeet Singh

Author: Neelima Singla

Paper ID: V3I2-1184

Paper Status: published

Published: March 8, 2017

Full Details

An Assessment on Clustering and its Protocols in VANET

Vehicular ad-hoc Network (VANET) is fundamentally a collection of vehicles and keen access points for communication, transmission and gathering information of nodes and environment for managing traffic loads. Thus the steering of destination, supervise speed and track of vehicles becomes a critical issue in VANETs. Previous researchers only focus on individually. VANETs will enhance driver safety and reduce traffic deaths and injuries by implementing collision avoidance and warning systems. In this paper, I am going to describe the importance of clustering in VANET and also subcategories of clustering and its protocols.

Published by: A. Mythili

Author: A. Mythili

Paper ID: V3I2-1183

Paper Status: published

Published: March 8, 2017

Full Details

A Survey on Authentication in Cloud Computing For Data Storage Security

Cloud computing is an internet-based computing, where a set of resources and services such as applications, storage, and servers are delivered to computers and devices through the Internet. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi-tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods.

Published by: Mohammed Ubada

Author: Mohammed Ubada

Paper ID: V3I2-1182

Paper Status: published

Published: March 8, 2017

Full Details

Skew Minimization with Low Power for Wide Voltage Range Using Coarse Grain Technique

Skew is one of the most important parameters that decides the performance of the system.Though skew is reduced using two-stage serially connected power mode aware buffers using two power gating techniques, power consumption and area is considerably larger in fine grain power gating. So, in the proposed system, coarse grain minimization is used at both stages which will effectively reduce power consumption and area.The coarse grain approach implements the grid style sleep transistors which drive cells locally through shared virtual power networks.This approach is less sensitive to PVT variation, introduces less IR drop and imposes a smaller area overhead than the cell or cluster based implementations.In coarse grain power gating, transistor is a part of the power distribution network rather than the standard cell

Published by: Moonisha S. N, Anitha .R, Nikila .G, Murali Parthasarathy .K, Nandhini .M

Author: Moonisha S. N

Paper ID: V3I2-1181

Paper Status: published

Published: March 8, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X