Manuscripts

Recent Papers

Review on Routing Approaches of MANET with Opportunistic Network

VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. It is autonomous & self-organizing wireless communication network, where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information.

Published by: Karan Sharma, Shelly Bhalla

Author: Karan Sharma

Paper ID: V2I5-1171

Paper Status: published

Published: October 17, 2016

Full Details
Review Paper

A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism

Agni is the fundamental concept of Ayurveda, which has described an important factor of Digestion and Metabolism in our body. Agni converts Food in the form of Energy, which is responsible for all the Vital Functions of our body. According to Ayurveda, रोगाः सर्वेपि मंदाग्नौः.............॥ all diseases occurs due to Mandagni except Bhasmaka Rog. It occurs due to Agni vruddhi which response to Kshudda vriddhi, Dhatu ksheenta with various Pitta prakop Lakshanas, hence Bhasmaka Rog directly effects on Metabolism. In human body, Thyroxin Hormone also plays an important role in Metabolism. If level of this hormone increased, results to increase Appetite, Sweating etc. This high level of thyroxin called Hyperthyroidism and its symptoms are same as Pitta Prakopa Lakshana. So the question arises whether there is any correlation between Bhasmaka Rog and Hyprthyroidism? What are the Lakshanas and Samprapti of both conditions? With the present article, we are trying to study the Lakshana and Samprapti of Bhasmaka Rog with special reference Hyperthyroidism.

Published by: Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar

Author: Dr. Ankita U. Mandpe

Paper ID: V2I5-1170

Paper Status: published

Published: October 17, 2016

Full Details

Implementing Multiple Security in the Cloud Environment

Cloud computing is continuously evolving and considered next generation architecture for computing. Typically, cloud computing is a combination of computing resources accessible via internet. Historically, the clients or the organizations store data in data centers with firewall and other security techniques to protect data against intruders. However, in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. To build the trust for the growth of cloud computing, the cloud providers must protect the user data from unauthorized access and disclosure. Here in this work hybrid approach of encryption techniques and the storage of data are considered in the cloud system. The main advantage of the hybrid scheme is to provide more security in the cloud.

Published by: Anuradha, Dr. Suman Sangwan

Author: Anuradha

Paper ID: V2I5-1169

Paper Status: published

Published: October 13, 2016

Full Details

An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm

— An Intrusion Detection System is an application used for monitoring the network and protecting it from the intruder. Intrusion is a set of actions aimed to compromise these security goals. IDS have the computer security goals which are important for the data mining for extraction of data like confidentiality, integrity, and availability. This research study the performance measures of IDS is important for the security purposes. KDD 99 has 41 features. The IDS approached is used with the help of neural network technique of data mining and the Genetic algorithm is used as a classifier. The all features of KDD99 are used in this study. In this research, the feature is selected and extracted instead of using all features. The feature selection is done with the help of Correlation and feature extraction is done with the help of KPCA. The selection of features is according to the Eigen values of the features. The neural network is used for the change the weightage of the error. The neural network is basically runs many times and change weightage according to this.

Published by: Harpreet Kaur, Gaganpreet Kaur Bhalla

Author: Harpreet Kaur

Paper ID: V2I5-1168

Paper Status: published

Published: October 10, 2016

Full Details

Natural Language Processing

Language is way of communicating your words Language helps in understanding the world ,we get a better insight of the world. Language helps speakers to be as vague or as precise as they like. NLP Stands for natural language processing. . Natural languages are those languages that are spoken by the people.Natural language processing girdles everything a computer needs to understand natural language and also generates natural language.Natural language processing (NLP) is a field of computer science, artificial intelligence, and linguistics mainly focuses on the interactions between computers and human languages or natural languages. NLP is focussed on the area of human computer interaction. The need for natural language processing was also felt because there is a wide storage of information recorded or stored in natural language that could be accessible via computers. Information is constantly generated in the form of books, news, business and government reports, and scientific papers, many of which are available online or even in some reports. A system requiring a great deal of information must be able to process natural language to retrieve much of the information available on computers. Natural language processing is an interesting and difficult field in which we have to develop and evaluate or analyse representation and reasoning theories. All of the problems of AI arise in this domain; solving "the natural language problem" is as difficult as solving "the AI problem" because any field can be expressed or can be depicted in natural language.

Published by: Aparna Priyadarsini Khadanga, Suvendu Kumar Nayak

Author: Aparna Priyadarsini Khadanga

Paper ID: V2I5-1166

Paper Status: published

Published: October 10, 2016

Full Details

Introduction to Wireless Sensor

Recently underwater sensor network has attracted great attention of many researchers. Here determining the location of sensor node is very important. The required information will not be useful if sensing nodes are not localized. There are various methods for localization in sensor networks but these are different in case of terrestrial sensor network and underwater sensor network. This paper explores some of the localization schemes in case of underwater sensor network and there comparison is made so that they can be utilized on basis of application requirement.

Published by: Smridhi

Author: Smridhi

Paper ID: V2I5-1165

Paper Status: published

Published: October 8, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X