Home
Issues List
1 Dec 25, 2016
An Enhancement scenario of routing protocol scheme using TAODV protocol and fuzzy logic

An ad hoc network is a peer-to-peer network without centralized server. Mobile Ad- Hoc Network (MANETs) is a promising new wireless communications standard in which network device may move around and end hosts may function as a router. It is a key of success of being deployed to properly address the security problems. There are several researches focused on delivering packets from node to node and its security that will sure us for authentication delivery. Some nodes may behave maliciously, resulting in degradation of the performance of the network or even disruption of its operation altogether. Towards a solution of secure routing on MANETs, in this paper, we propose an enhanced algorithm for to reducing packet dropped rate. The feasibility of the proposed scheme of secure routing will be demonstrated by using OPNET simulator. In this paper we enhance AODV protocol and implement it in a 15 node scenario....

Authors: Ashish Khare, Anubhav Sharma, Rajeev Kumar Singh.

2 Dec 25, 2016
Delineate Groundwater Prospect Zones and Identification of Artificial Recharge Sites Using Geospatial Technique

Present study was carried out to delineate groundwater prospect zones and identification of artificial recharge sites using Indian remote sensing satellite (IRS) 1D PAN geocoded data on 1:12,500 scale and Survey of India (SOI) topographical sheets. The information based on lithology, geomorphology, soil, land-use/ land-cover, structures/lineament, slope, drainage and hydrology were generated and integrated to prepare groundwater prospect and artificial recharge site map of the study area. Geographical Information System (GIS) was used to prepare database in the above layers, analysis of relationship and integrated map preparation. On the bases of hydrology and geomorphic characteristics, five categories on groundwater prospect zones are identified: Excellent, good, moderate poor and very poor. The analysis reveals that the river terraces and water bodies with alluvium has excellent (about 15% area), buried pediplain with black cotton soil have good potential (about 24% areas). These unite has highly favorable for ground water exploration and development. Deeply buried pediment with black cotton soil are marked under moderate ground water prospect zones (about 26% area), shallow buried pediment with Deccan basalt and dykes are grouped under poor ground water prospect zones (about 24% area), except along the fractures/lineaments. Residual hills, dykes, linear ridges and plateau, are group have very poor groundwater prospects (about 11% area). Fourartificial recharge sites ware identify out of witch the moderate and poor categories occupy more than 42% area and these are mainly plateau, ridges and buried pediment shallow. The most suitable artificial recharge sites occupy less area about 19% and mainly confined to buried pediplain and river terraces. The residual hill and linear ridge with steep slope (covering about 39% areas) have not suitable for artificial recharge sites. This vital information could be used effectively for identification of suitable location for groundwater potential and artificial recharged sites. The good interrelationship was found among the geological units, hydromorphological units and lineament density. The field data have further helped in quantifying various lithological and hydromorphological units with reference to their potential for groundwater occurrence....

Authors: Jyoti sarup, Manish K. Tiwari, Vardichand Khatediya.

3 Dec 25, 2016
Energy Efficient and Cluster Based Routing Protocol for Wireless Sensor Network: A Review

Wireless Sensor Network consists of spatially circulated sovereign sensors to politely monitor physical conditions. Wireless Sensor Networks have gained a lot of interested in the research field in last few years. To increase the lifetime of the whole networks energy attentiveness is the necessary consideration to design and analyze the routing protocols. In this paper we present a study of different protocols which are used in increasing energy efficiency of the Wireless Sensor Network such as LEACH(Low Energy Adaptive Clustering Hierarchy),CB-DHRP(Cluster Based Directed Hierarchical Routing Protocol),BCBE(Balanced Cluster and Balanced Energy). Finally conclude this paper with future research and challenges....

Authors: Neha Jain.

4 Dec 25, 2016
Effective E-Learning through Moodle

E-learning is an emerging field as a promising instructional medium as well as a ripe arena in which to conduct research on its impact on teaching and learning activities. The fundamental nature of e-learning as an instructional medium differs substantially from face-to-face delivery, thereby requiring more new features for course development, online assessment and interaction. Moodle is a software package for producing internet-based courses and websites. It is a Learning Management System (LMS) that allows better cooperation among learners, tutors and students. In this paper we explore the implementation of effective e-learning through moodle and also present how the various facilities of Moodle are used by tutors to provide interactive and stimulating learning experiences in providing higher education in various colleges of technology...

Authors: Dharmendra Chourishi, Chanchal Kumar Buttan, Abhishek Chaurasia, Anita Soni .

5 Dec 25, 2016
Rectangular Microstrip Patch Antenna Loaded With Double Orthogonal Crossed Slits in Ground Plane

This paper propose a new generation of antenna that applies Metamaterial properties at ground Plane. Paper also analyzed the performance of Microstrip Patch Antenna with and without using the Metamaterial structure. The works mainly include Metamaterial as Defected ground plane. All antenna parameters such as Return Loss, Gain, VSWR and Band width were measured. The main focus of this paper was to improve Band width so that Patch antenna used for wide band applications. The additional features were its compact size and used in multiband operation....

Authors: Ashish Kumar, Rahul Tiwari.

6 Dec 25, 2016
Research Paper on Cluster Techniques of Data Variations

Cluster analysis divides data into groups (clusters) for the purposes of summarization or improved understanding. For example, cluster analysis has been used to group related documents for browsing, to find genes and proteins that have similar functionality, or as a means of data compression.. In this chapter we provide a short introduction to cluster analysis. We present a brief view of recent techniques which uses a concept-based clustering approach....

Authors: Arpit Gupta ,Er.Ankit Gupta, Amit Mishra.

7 Dec 25, 2016
Design and analysis of gain for rectangular microstrip patch antenna using symmetrical cuts

The low gain of microstrip antenna is one of the important features that that restrict its wide usage. This paper presents Bandwidth radiated microstrip patch with enhanced gain has been designed with centre frequency of 2GHz. In order to achieve gain enhancement a rectangular cut structure have been introduced in the rectangular patch antenna. Gain enhancement of 10dB at 2GHz is achieved. It is just because of Return loss is increasing in negative side as it goes from (-24dB) to (-34dB)....

Authors: Rampal Kushwaha, Kanchan Cecil.

8 Dec 25, 2016
Research Paper on Software Solution of Critical Section Problem

This theory practically depends on the critical section problem. After studying the overview of CSP, it’s seen that there are lots of drawbacks in CSP but most of the different solutions are given by the different authors. But still no one has got the perfect solution to overcome this problem. But from the my point of view, it’s considered as “it can get a solution including all four possible conditions like (Mutual exclusion, No-preemption, Bounded waiting and starvation).the best way to go for this approach, it should be completely checked it out of all the instruction, but it’s very true no any process can move Parallely in critical section, practically one has to wait finally. According to these conditions it provides a great convenience to prove this problem. No one has proved the CSP till now, it’s proved by myself in each case of set instruction and algorithms. It provides a gateway to solve the problem of CSP in coming future....

Authors: Ankit Gupta, Arpit Gupta, Amit Mishra.

9 Dec 25, 2016
Performance based Configuration and implementation of Hash Processor

Extraordinary developments in the wired and wireless communications area, the requisition for secure data transmission increases. In order to find solutions for this increasing requisition new algorithms and security standards are developed. Among these algorithms and standards, hash functions are mainly used. In this paper design and implementation of an FPGA based hash processor is described. The proposed hash processor consists of an arithmetic logic unit, a message computation block, a constants ROM, a register file, a programmable control unit, program memory and standard UART serial interface. Hash processor is configured by the instructions in the program memory and supports SHA-1. The hardware is described in VHDL and verified on Xilinx FPGAs....

Authors: Vandana Parihar, R.C.Jain.

10 Dec 25, 2016
A Layered Approach for Pattern Recognition in Large Dataset Using Meta modeling with Classification Techniques

Security of computers and networks that connect them is increasingly becoming of great significant. Intrusion detection is the act of detecting actions that attempts to compromise the clandestinely, credibility or availability of a network resource. It is an important attribute of defensive measure protecting computer system and network traffic from abuses. Here, we are focusing on two important aspects of intrusion detection; one is accuracy and other is performance. In the paper it is demonstrated that high attack detection accuracy can be achieved by using meta-modeling techniques in combination with classification techniques and high performance is attained by the layered approach. To test the results we have used NSL-KDD datasets; and also applied PCA for feature reduction that results in a significant improvement on learning algorithms. In this paper, we have designed and evaluated the combinational models for intrusion detection mechanism, and later we compared those models with each other and tried to find which is more accurate and appropriate to detect intrusion. We have applied meta-modeling because it gives better classification performance than any individual classifier. Our research has shown that the combination of meta-modeling algorithms with SVM gives better overall accuracy than any other combinational model....

Authors: Ankita Gaur, Vineet Richariya.

Announcements

  • Vol 2, Issue 5 Sept 2012 will be published on 22 Sept 2012 Evening. Kindly wait for little more time. Posted by Admin.