Manuscripts

Recent Papers

Phylogenetic and Evolutionary Studies of Flavivirus

Abstract Viruses of Flavivirus genus are the causative agents of many common and devastating diseases, including yellow fever, dengue fever etc. so for proper development of efficient anti viral pharmaceutical strategies there is a need for proper classification of viruses of this group. To generate the most diverse phylogenetic datasets for the Flaviviruses to date, we analyzed the whole genomic sequences and phylogenetic relationships of 44 Flaviviruses by using various bioinformatics tools (MEGA, Clustal W, PHYLIP). We analyze these data for understanding the evolutionary relationship between classified and unclassified viruses and to propose for the reclassification of unclassified viruses which shows sequence similarity and also similar mode of transmission with classified viruses.

Published by: Meenu Priya Kontu, Dr. Sweta Prakash

Author: Meenu Priya Kontu

Paper ID: V2I4-1186

Paper Status: published

Published: August 22, 2016

Full Details

A Comparison of Different Techniques used to Detect and Mitigate Black Hole Attack in AODV Routing Protocol based on MANET

A Mobile ad hoc network (MANET) is a self organized system which doesn’t have any pre-defined network infrastructure where mobile devices are connected by wireless links. Hence, a MANET can be constructed quickly at a low cost, as it doesn’t rely on existing network infrastructure. This paper presents a review on different techniques used to detect and mitigate the black hole attack in MANET i.e. for single black hole and also for cooperative black hole attack which are a serious threat to ad hoc network security. In cooperative black hole attack multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to detect. In this paper a comparison of various techniques that have been proposed in the literature for detection and mitigation of such attacks is presented.

Published by: Shivani, Pooja Rani, Pritpal Singh

Author: Shivani

Paper ID: V2I4-1185

Paper Status: published

Published: August 22, 2016

Full Details

Flow Past a Rotating Circular Grooved Cylinder

CFD simulations of a two-dimensional steady state flow past a rotating circular grooved cylinder is analyzed in this study. Cylinder of diameter 0.1 m with 8 grooves of 0.01 m was examined at various Reynolds’s number (0.1 to 50) and angular velocity (0 to 100 RPS). Incompressible Navier Stokes equation in Ansys Fluent 14.0 was used to examine the flow. The pressure and velocity contours for various Reynolds’s number were generated. The result suggested that the flow remains attached to the surface of the cylinder up to the Reynolds number value of 4–5 and the flow pattern was independent of angular velocity at Reynolds’s number 45-46 and the cylinder behaved like a stationary cylinder and above these Reynolds’s numbers the flow is still two-dimensional, but no longer steady.

Published by: Ashish Kumar Saroj, Bharath Reddy, Gundu Jayadhar, D.Gokul

Author: Ashish Kumar Saroj

Paper ID: V2I4-1184

Paper Status: published

Published: August 17, 2016

Full Details

Railway Bridge & Track Condition Monitoring System

As railroad bridges and tracks are very important infrastructures, which has direct effect on railway transportation, there safety is utmost priority for railway industry. This project aims at monitoring the tracks on the bridges along with structural health condition of the bridge for accidents reduction. In this paper we introduces railway tracks and bridge monitoring system using wireless sensor networks based on ARM processor. We designed the system including sensor nodes arrangement , collecting data, transmission method and emergency signal processing mechanism of the wireless sensor network.. The proposed system reduces the human intervention, which collects and transmit data . The desired purpose of the proposed system is to monitor railway infrastructure for accident reduction and its safety.

Published by: Vinod Bolle, Santhosh Kumar Banoth

Author: Vinod Bolle

Paper ID: V2I4-1182

Paper Status: published

Published: August 12, 2016

Full Details

Security Enhancement of the Telemedicine and Remote Health Monitoring Models

The telemedicine applications are the application utilized for the remote monitoring and health assessment of the people living in the remote areas. The networks of the doctors and the field executives utilizes the various kinds of the healthcare sensors for the health checkup of the people by collecting and transmitting over the internet for the treatment of the affected ones. The information being propagated through the internet between the healthcare sensors and the online server model is always prone to the several forms o the attacks. In this paper, the proposed model has been designed to improve the level of security over the telemedicine network. The proposed model will be improved by using the robust encryption with the highly scrambled authentication key. The performance of the proposed model will be assessed under the various performance parameters which define the network health as well as the security level.

Published by: Nishu Dhiman, Tejpal Sharma

Author: Nishu Dhiman

Paper ID: V2I4-1181

Paper Status: published

Published: August 8, 2016

Full Details

Design of Low Area and Secure Encryption System using Combined Watermarking and Mix-column Approach

Lately, the significance of security in the data innovation has expanded fundamentally. This paper shows another proficient design for rapid and low range propelled encryption standard calculation utilizing part strategy. The proposed engineering is actualized utilizing Field Programmable Gate Array.

Published by: Swati Sharma, Dr. M. Levy

Author: Swati Sharma

Paper ID: V2I4-1178

Paper Status: published

Published: August 2, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X