Manuscripts

Recent Papers

Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network

OSPF is mainly designed for IP networks from scratch and runs in almost all sorts of environments like enterprise, data centers, or service providers, while ISIS, which was mainly designed by ISO was not intended to run for IP based networks from scratch and IETF in the early 1990’s adopted ISIS for its advantages. As a scalability purpose ISIS is better than OSPF, but when we have a large database or a large service provider, with only a single level design inside the service provider Both the routing protocols have different authentication mechanisms with ISIS providing key chain based mechanism and provides both plain-text and MD5 based integration with it, while OSPF also provide MD5 and SHA1 hashing based authentication when used with IPv6. Multiprotocol label switching technology (MPLS) is used to transfer the data in service provider network. Apart from Interconnecting Data Centers, L2VPNs are also used for Inter-AS service provider’s connectivity and connecting various Enterprise Branch offices with each other. Selection of right L2VPN technology is very important as wrong technology can harm the network. The main focus of this technique to give the solutions for slow speed, quality of service, lack of traffic engineer, less security and problem in trouble shouting. The motive is to improve the speed, high security, easily trouble shoot, high quality in terms of packet transformation and better results for traffic engineering.

Published by: Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur

Author: Vikasdeep Kaur

Paper ID: V2I6-1145

Paper Status: published

Published: November 9, 2016

Full Details

Proposed Approach on CSTR with PID

In this paper conventional PID controller provides satisfactory results, still inefficiency persists due to extreme non-linear nature and uncertainty in the dynamics of the plant. So optimize the pidnon linear behavior by Gravitational search algorithm and partical swarm optimization. The PID controller is the most common form of feedback. PID control isused at the lowest level; the multivariable controller gives the set points to the controllers at the lower level. The PID controller can thus be saidto be the “bread and butter’ of control engineering. It is an importantcomponent in every control engineer’s tool box.PIDcontrollers have survived many changes in technology, from mechanicsand pneumatics to microprocessors via electronic tubes, transistors,integrated circuits.

Published by: Ramandeep Kaur, Jaspreet Kaur

Author: Ramandeep Kaur

Paper ID: V2I6-1144

Paper Status: published

Published: November 9, 2016

Full Details

Comparison of State Observer Design Algorithms for DC Servo Motor Systems

a state observer is a system that models a real system in order to provide an estimate of the internal state of the system. The design techniques and comparison of four different types of state observers are presented in this paper. The considered observers include Luenberge observer, unknown input observer and sliding mode observer. The application of these observers to a Multiple Input Multiple Output (MIMO) DC servo motor model and the performance of observers is assessed. In order to evaluate the effectiveness of these schemes, the simulated results on the position of DC servo motor in terms of residuals including white noise disturbance and additive faults are compared.

Published by: Kaustav Jyoti Borah, Jutika Borah

Author: Kaustav Jyoti Borah

Paper ID: V2I6-1143

Paper Status: published

Published: November 8, 2016

Full Details

Automated Vehicle Detection and Classification with Probabilistic Neural Network

The number of vehicles in the urban areas is rising at high pace. The critical issues are arising with the rise in the number of vehicles for the traffic analysis. The analysis of the vehicle running across the roads is usually done for the density analysis, traffic shaping and many other similar applications. The vehicle detection in the rushed areas produces the real challenge of independent component selection and classification, which requires the precise object detector with deep analytical ability based classification algorithm. In this paper, the unique method with probabilistic neural network (PNN) classification model along with the non-negative matrix factorization for the purpose of vehicular object localization and classification in the urban imagery. The proposed model is expected to solve the problems associated with the accuracy, precision and recall.

Published by: Ramanpreet Kaur, Meenu Talwar

Author: Ramanpreet Kaur

Paper ID: V2I6-1141

Paper Status: published

Published: November 2, 2016

Full Details

A Review in Cloud Computing Security using Steganography

Cloud Computing is a flexible, cost-efficient, and authentic platform for providing business or consumer IT enabled services on the Internet. However, Cloud computing represents an added level of risk factors because important and essential services are often outsourced to a third party connected to cloud network, which makes it even harder to maintain the level of data security. Steganography is the technique of hiding or encapsulating information in digital media in order to prevent the existence of information. The digital media with hidden information within are called stego media and the data without hidden information are called cover media. Steganography can be used for hiding both the legal as well as illegal information. For example, civilians can use it for maintaining privacy while the government may use it for the security reasons of the country. In this paper we have discussed about the various techniques by which we can enhance the cloud service in relation to security and data privacy.

Published by: Ataussamad, Dr. Shiva Prakash

Author: Ataussamad

Paper ID: V2I6-1138

Paper Status: published

Published: November 2, 2016

Full Details

Survey on Dynamic Resource Allocation Schemes in Cloud Environment: A Review

Cloud computing environment provisions the supply of computing resources on the basis of demand, as and when needed. It builds upon advances of virtualisation and distributed computing to support cost efficient usage of computing resources, emphasizing on resource scalability and on-demand services. It allows business outcomes to scale up and down their resources based on needs. Managing the customer demand creates the challenges of on demand resource allocation. Further they can make use of company-wide access to applications, based on pay-as-you-go model. Hence there is no need for getting licenses for individual products. Virtual Machine (VM) technology has been employed for resource provisioning. It is expected that using virtualized environment will reduce the average job response time as well as executes the task according to the availability of resources. Effective and dynamic utilization of the resources in cloud can help to balance the load and avoid situations like slow run of systems. In this paper, various resource allocation strategies and their challenges are discussed in detail. It is believed that this paper would benefit both cloud users and researchers in overcoming the challenges faced.

Published by: Roshni Singh, Dr. Shiva Prakash

Author: Roshni Singh

Paper ID: V2I6-1137

Paper Status: published

Published: November 2, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X