Manuscripts

Recent Papers

Homomorphism and Isomorphism of Rough Group

The chief objective of this study is to show the usefulness of Rough set theory in Group theory. The aim of this paper is to determine the definable and undefinable groups also construct the rough group ,upper rough group, homomorphism and isomorphism of rough group using rough set theory.

Published by: L. Jesmalar

Author: L. Jesmalar

Paper ID: V3I3-1541

Paper Status: published

Published: June 21, 2017

Full Details

Implementing Secure And Efficient Auditing Protocol For Cloud Storage

In cloud storage environment, data owners host their data on cloud servers and users can access the data from cloud servers. Due to the data outsourcing, this process of data hosting service introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. Because, owner need to be convinced that the data are correctly stored in the cloud. Two-Party storage auditing system could not be guaranteed to provide proper auditing result thus Third-Party auditing is the better choice for the storage auditing in cloud computing. In this we try to evaluate ECC algorithm for encryption and decryption.A Third-Party auditor is capable to do a more efficient work and convinces both the cloud serviceproviders and the owner. There are chances of data being lost or get misplaced in cloud storage environment. For this we propose replication mechanism to third party auditing such that it will enhance the data availability. We divide a data file into fragments and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker.Furthermore, the nodes storing the fragments are separated with certain distance to prohibit an attacker of guessing the locations of the fragments. Hence user will get the belief that his data is safely stored on the cloud and could retrieve data without any modification.To better protect data security, the first attempt to formally address the problem of authorized data deduplication.

Published by: Manisha L. Narad, Prof. Amruta Amune

Author: Manisha L. Narad

Paper ID: V3I3-1577

Paper Status: published

Published: June 21, 2017

Full Details

Design and Analysis of Hybrid Nanogrid

With pace of time there is a huge development in technologies. In recent time there is a concern of energy as right now fossil fuel is used but as population increasing in near future to meet demand it would be very tough that why we are focusing on renewable energy. Distributed energy resources based micro grid and Nano-grid framework is most technically viable bottom-top approach to sustainably meet ever-increasing demand of rural and urban communities. Recently the growth of DC operative home appliances like mobile and lap top chargers, ovens and hair dryer’s etc. are increasing and therefore a DC/DC converter is an efficient way to meet the electricity need from the local DER and helps in improving the system efficiency. In our dissertation we took three different section of solar panel and after that simulation carried out with help of buck boost converter and besides this MPPT algorithm (P & O method) for solar PV module and closed loop PI control system also used. The proposed methodology is to extract maximum DC power from solar PV system and it is directly fed to DC load or DC Nano grid. The simulation results demonstrate the buck boost converter application for maintain constant voltage at DC bus irrespective of variation of solar PV generation. Also it improves the system efficiency by reducing no. of conversions. In our dissertation work analysis of ploy crystalline, mono crystalline and thin film crystalline is done and got different simulation result.

Published by: Vijeta Pal, Sourabh Maheshwari, Ameer Faisal

Author: Vijeta Pal

Paper ID: V3I3-1548

Paper Status: published

Published: June 21, 2017

Full Details

Designing and Performance Evaluation of Low Bit Rate Audio Streaming Over Wireless Personal Area Network

The IEEE 802.15.4 is a Personal Area Network well-known designed for programs like wireless monitoring and control of lights, protection alarms, movement sensors, thermostats and smoke detectors. IEEE 802.15.4 specifies bodily and media access manages layers that have been optimized to make certain low strength consumption. For the conversation among two nodes, best throughput for IEEE 802.15.4 is 250 kbps on a 2.4GHz band. However, because of header overhead, the done throughput is much less than 250 kbps. Also the range of nodes taking element in a conversation has a substantial impact on throughput. The best bit rate for Zigbee/IEEE 802.15.4 is 250 kbps for the 2.4GHz band. The bit rate of 250 Kbit/s consistent with the channel and cannot be fully used for the payload (audio records). There is an overhead associated with the manner that the conversation works. Numerous mechanisms have to be taken into account while estimating the powerful transmission rate. ZigBee has a layer shape, and every layer adds additional header statistics, in order that the payload at the quit is less than the quantity of information this is sent. The overall amount of more bytes relies upon at the layer from which the utility runs, and on the operating mode of the verbal exchange machine. The principle goal is to calculate maximum throughput for audio streaming the usage of IEEE 802.15.4 for 10 different nodes. IEEE 802.15.4 defines specific layers but right here, we do not forget the Physical layer (PHY) and Medium Access manage (MAC) sublayer.

Published by: Manoj, Gurpeet Kaur

Author: Manoj

Paper ID: V3I3-1573

Paper Status: published

Published: June 21, 2017

Full Details

Enhancement in Cooperative Positioning Using Ad-Hoc on Demand Vector Protocol in Vehicular Ad-Hoc Network

In a city environment, the routing protocol is designed for VANET. Obtaining not only shortest path but the most efficient path for the packet to reach its destination is the main goal in VANET. Packets are routed through the fastest path rather than the shortest path. Fastest path is considered as the shortest time for the packet to reach destination irrespective distance. While the shortest path is the path that adopted by routing protocol to a network condition and performs routing accordingly. VANET have transported system which consists real-time vehicle safety estimated traffic condition on real-time dense vehicle network. A number of safety models in vehicle applications such as collision avoidance, lane management, and emergency braking assistance system fully depends on accurate and reliable knowledge of vehicles positioning their one-hop node area. In this paper presents, the performance of evaluation of Ad-Hoc On Demand Vector Routing (AODV) protocol in terms of energy consumption, packet delivery ratio, average end-to-end delay, packet loss. In our approach, we propose the VBFR algorithm to improve the performance of the cooperative positioning. In AODV, the node inside each hop is allowed to communicate themselves and RSU to reach their destination node. This system considers each vehicle get to communicate with nearest node and RSU to transmit or receive the message like the emergency or update their position and send RREQ to them and wait for RREP after selecting a one-hop node in a forward direction.

Published by: Prachi Vasant Magare, Kailash T. Jadhao

Author: Prachi Vasant Magare

Paper ID: V3I3-1569

Paper Status: published

Published: June 20, 2017

Full Details

Study of Tosca of Cloud Application with Its Services

With the advent of Cloud Computing, organizations are increasingly migrating their information and communication technology (ICT) resources to the cloud. Cloud computing is driving formidable change in the technology industry and transforming how to do business in around the world. [4] Using TOSCA, the cloud providers are able to define the interoperable description of services and their relationships, and to enable the portability and automated management across cloud platforms and infrastructures. However the verification of the cloud orchestration design with TOSCA is still crucial to ensure and alert when the safety properties of the cloud design are violated. In this paper, formal verification of cloud orchestration design is described and also presents the different services of TOSCA.

Published by: Snehal V. Raut, Dr. H. R Deshmukh

Author: Snehal V. Raut

Paper ID: V3I3-1559

Paper Status: published

Published: June 20, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X