Manuscripts

Recent Papers

Hybrid Adaptive Antenna Design for Comparison Analysis of Different Technology Using BPSK, QPSK and QAM

As we know with time there is the huge development in wireless communication and with the pace of time traffic congestion problem arise and also ISP is unable to provide good quality of service. In our research paper, we implemented simulation result CDMA, OFDM, and UWB for different band pass technique, for example, BPSK, QPSK, QAM, 16 QAM, 64QAM etc. We calculated Transmitter and receiver message of CDMA, OFDM, and UWB for BPSK QPSK, QAM 16, QAM, 64 and QAM 256 modulation technique. Bit Error Rate (BER) and Signal-to-Noise ratio (SNR) for BPSK QPSK, QAM 16, QAM, 64 and QAM 256 modulation technique. MSE Equalizer for BPSK QPSK, QAM 16, QAM, 64 and QAM 256 modulation technique. It is impossible without smart antenna 4 by 8 means 4 transmitter and 8 receivers. Earlier we use only single or dual antenna now we use the array of an antenna to provide much efficient and good quality of service or we can say MIMO (Multi-input Multi Output).

Published by: Joshika Singh Sindhu

Author: Joshika Singh Sindhu

Paper ID: V3I1-1262

Paper Status: published

Published: January 25, 2017

Full Details

Software Piracy Production System

In this paper entitled as “software piracy protection system” is mainly used to protect the piracy of the system. Now a day’s and a number of users download the software without having the permission of the owner of the software, however, the software have the product key the unknown person also find the key and it’s used that software. A one user pays and download the software and it has them the specific product key of that software. The authorized user share the key to another user (like as friends, relatives and organizations etc), other users are using that software without buying and download. Overcome this problem to implement this project, it is used for the online process. First the user registers to the website when the user downloads the software, first, the user pays the amount for online and then starts the download the software. Mutually it read the MAC (Medium Access Control) address of the corresponding user. Then the owner of the software generates the product key of the corresponding downloaded software and it's sent to the user. After receiving the key, when the user installs the software on the system it asks the product key, the user type that product key. It checks the product key corresponds MAC address. If it is correct the software is installing, else the software is not installed on the system. In this system only allows the authorized person, because it checks the MAC address. The MAC address is the unique address of the system, so the MAC address is not used for another user.

Published by: B. Karpakavalli, Miss. R. Arunadevi

Author: B. Karpakavalli

Paper ID: V3I1-1261

Paper Status: published

Published: January 25, 2017

Full Details

Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two properties traceability and the large universe, CP-ABE is enriching the commercial applications. But to achieve this it requires more computation overhead. In this paper, a novel approach for construction of efficient ciphertext-policy ABE supporting flexible attributes is proposed, which helps to reduce the computation overhead and improves security by providing privacy-preserving data access policies.

Published by: Mr. Mayur D. Ghodeswar, Dr. S. S Sherekar, Dr. V. M Thakare

Author: Mr. Mayur D. Ghodeswar

Paper ID: V3I1-1259

Paper Status: published

Published: January 24, 2017

Full Details

An Experimental study on Effect of Rice Husk Ash and Glass Fibre on properties of Cement with Partial Replacement of Fine Aggregate by Quarry Dust

Fiber reinforced concrete is a composite material consisting of mixtures of cement, fine aggregate, coarse aggregate, and fibers. The fiber reinforced concrete exhibits better fatigue strength and increased static and dynamic tensile strength and compressive strength. In this project, the strength of fiber reinforced concrete was investigated partial replacement of cement with rice husk ash and fine aggregate with quarry dust. Glass fiber was added in the order of 0.25% and 0.5% by weight of cement. Rice husk ash was used to replace Ordinary Portland Cement by 10%, 20% and 30% by weight of cement proportions. Quarry dust was used as partial replacement of fine aggregate by 20%.

Published by: S. Nambirajan

Author: S. Nambirajan

Paper ID: V3I1-1258

Paper Status: published

Published: January 24, 2017

Full Details

A Detailed Classification of Routing Attacks Against RPL in Internet of Things

With the advancement in mobile computing and wireless communications, a new paradigm called Internet of Things is generating a lot of research interest and the industrial revolution. The increasing interest for this paradigm has resulted in the large-scale deployment of Low power and Lossy Networks (LLN), such as wireless sensor networks and home automation systems. These networks are typically composed of many embedded devices with limited power, memory, and processing resources interconnected by a variety of links, such as IEEE 802.15.4 or low-power Wi-Fi. These networks have a wide scope of applications such as industrial monitoring, connected home, healthcare, environmental monitoring, urban sensor networks, energy management, and assets tracking etc.RFC 7228. In order to address the specific properties and constraints of these networks, RPL (Routing Protocol for low power Lossy network) has been developed by the IETF working group [ROLL WG]. RPL is a lightweight, rank based routing protocol. However, this routing protocol is exposed to various attacks which can significantly impact the network resources and its performance. This paper presents an elaborate classification of the possible attacks against RPL in IoT network. Further, we have analyzed and compared the severity of these attacks.

Published by: Ishani Mishra, Divya Sharma, Dr. Sanjay Jain

Author: Ishani Mishra

Paper ID: V3I1-1257

Paper Status: published

Published: January 24, 2017

Full Details

A Survey on Pattern Discovery of Web Usage Mining

In the recent years with the development of Internet technology the growth of World Wide Web exceeded all expectations. A lot of information is available in different formats and retrieving content has become a very difficult task. One possible approach to solving problem is Web Usage Mining (WUM). Web mining is the application of data mining on web data and web usage mining is an important component of web mining. The goal of web usage mining is to understand the behavior of website users through the process of data mining of web data and Web usage mining is to understand the behavior of website users through the process of data mining of web Access data. knowledge obtained from web usage mining can be used to enhance web design, introduce personalization service and facilitate more effective browsing the important an application of web mining extracting the hidden knowledge in the log files of a web server recognizing various interests of web users, discovering customer behaviour while at the site are normally referred as the application of web usage mining. In this paper, we provide an updated focused survey on different pattern discovery techniques of web usage mining.

Published by: Manoj Kumar, Mrs. Meenu

Author: Manoj Kumar

Paper ID: V3I1-1254

Paper Status: published

Published: January 24, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X