Manuscripts

Recent Papers

Gateway Discovery in MANET: A Survey

MANET (Mobile ad-hoc network) mitigates the requirement of common control or access point for forming a transient network. The extensive growth of wired and wireless devices due to rapid enhancement in technology has led to more emphasis on this network. The tremendous use of mobile devices by the users forms temporary connection between mobile devices which form MANET. This network is although very effective in the sense that it does not need any prior infrastructure but it has limitation too like low bandwidth, frequent disconnection , limited features and low battery problem. MANET also allows internet connection with the help of Internet Gateways .These Gateways are bridge between infrastructure based and MANET based network. Several mechanisms had been proposed for the Gateway Discovery in ad-hoc network. This paper tries to analyze several Gateway discovery mechanism proposed earlier and gives a critical evaluation of those technique. The survey concludes with future scope in this area.

Published by: Rahul Mishra, Rakesh Kumar

Author: Rahul Mishra

Paper ID: V2I5-1173

Paper Status: published

Published: October 17, 2016

Full Details

Review on CSTR PLANT Error Optimization

The controller attempts to minimize the error over time by adjustment of a control variable, such as the position of a control valve, a damper, or the power supplied to a heating element, to a new value determined by a weighted sum Where k p, K i and K d all non negative, denote the coefficients for the proportional, integral and derivative terms. Dead timesproducea decrease in the system phase and also give rise to a non-rational transfer function of thesystem making them more difficult to analyse and control. Because of this characteristics dead time control problems have attracted the attention of engineers and researchers who have developed a special type of controller like PID controllers, Smith Predictor(DTC), MPC and various algorithms to control dead times.

Published by: Ramandeep Kaur, Jaspreet Kaur

Author: Ramandeep Kaur

Paper ID: V2I5-1172

Paper Status: published

Published: October 17, 2016

Full Details

Review on Routing Approaches of MANET with Opportunistic Network

VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. It is autonomous & self-organizing wireless communication network, where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information.

Published by: Karan Sharma, Shelly Bhalla

Author: Karan Sharma

Paper ID: V2I5-1171

Paper Status: published

Published: October 17, 2016

Full Details
Review Paper

A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism

Agni is the fundamental concept of Ayurveda, which has described an important factor of Digestion and Metabolism in our body. Agni converts Food in the form of Energy, which is responsible for all the Vital Functions of our body. According to Ayurveda, रोगाः सर्वेपि मंदाग्नौः.............॥ all diseases occurs due to Mandagni except Bhasmaka Rog. It occurs due to Agni vruddhi which response to Kshudda vriddhi, Dhatu ksheenta with various Pitta prakop Lakshanas, hence Bhasmaka Rog directly effects on Metabolism. In human body, Thyroxin Hormone also plays an important role in Metabolism. If level of this hormone increased, results to increase Appetite, Sweating etc. This high level of thyroxin called Hyperthyroidism and its symptoms are same as Pitta Prakopa Lakshana. So the question arises whether there is any correlation between Bhasmaka Rog and Hyprthyroidism? What are the Lakshanas and Samprapti of both conditions? With the present article, we are trying to study the Lakshana and Samprapti of Bhasmaka Rog with special reference Hyperthyroidism.

Published by: Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar

Author: Dr. Ankita U. Mandpe

Paper ID: V2I5-1170

Paper Status: published

Published: October 17, 2016

Full Details

Implementing Multiple Security in the Cloud Environment

Cloud computing is continuously evolving and considered next generation architecture for computing. Typically, cloud computing is a combination of computing resources accessible via internet. Historically, the clients or the organizations store data in data centers with firewall and other security techniques to protect data against intruders. However, in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. To build the trust for the growth of cloud computing, the cloud providers must protect the user data from unauthorized access and disclosure. Here in this work hybrid approach of encryption techniques and the storage of data are considered in the cloud system. The main advantage of the hybrid scheme is to provide more security in the cloud.

Published by: Anuradha, Dr. Suman Sangwan

Author: Anuradha

Paper ID: V2I5-1169

Paper Status: published

Published: October 13, 2016

Full Details

An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm

— An Intrusion Detection System is an application used for monitoring the network and protecting it from the intruder. Intrusion is a set of actions aimed to compromise these security goals. IDS have the computer security goals which are important for the data mining for extraction of data like confidentiality, integrity, and availability. This research study the performance measures of IDS is important for the security purposes. KDD 99 has 41 features. The IDS approached is used with the help of neural network technique of data mining and the Genetic algorithm is used as a classifier. The all features of KDD99 are used in this study. In this research, the feature is selected and extracted instead of using all features. The feature selection is done with the help of Correlation and feature extraction is done with the help of KPCA. The selection of features is according to the Eigen values of the features. The neural network is used for the change the weightage of the error. The neural network is basically runs many times and change weightage according to this.

Published by: Harpreet Kaur, Gaganpreet Kaur Bhalla

Author: Harpreet Kaur

Paper ID: V2I5-1168

Paper Status: published

Published: October 10, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X