Review on Routing Approaches of MANET with Opportunistic Network
VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. It is autonomous & self-organizing wireless communication network, where nodes in VANET involve themselves as servers and/or clients for exchanging & sharing information.
Published by: Karan Sharma, Shelly Bhalla
Author: Karan Sharma
Paper ID: V2I5-1171
Paper Status: published
Published: October 17, 2016
A Comparative Study of Lakshanas and Samprapti of BhasmakRog w.s.r to Hyperthyroidism
Agni is the fundamental concept of Ayurveda, which has described an important factor of Digestion and Metabolism in our body. Agni converts Food in the form of Energy, which is responsible for all the Vital Functions of our body. According to Ayurveda, रोगाः सर्वेपि मंदाग्नौः.............॥ all diseases occurs due to Mandagni except Bhasmaka Rog. It occurs due to Agni vruddhi which response to Kshudda vriddhi, Dhatu ksheenta with various Pitta prakop Lakshanas, hence Bhasmaka Rog directly effects on Metabolism. In human body, Thyroxin Hormone also plays an important role in Metabolism. If level of this hormone increased, results to increase Appetite, Sweating etc. This high level of thyroxin called Hyperthyroidism and its symptoms are same as Pitta Prakopa Lakshana. So the question arises whether there is any correlation between Bhasmaka Rog and Hyprthyroidism? What are the Lakshanas and Samprapti of both conditions? With the present article, we are trying to study the Lakshana and Samprapti of Bhasmaka Rog with special reference Hyperthyroidism.
Published by: Dr. Ankita U. Mandpe, Dr. G.H. Kodwani, Dr. Meera .A. Aurangabadkar
Author: Dr. Ankita U. Mandpe
Paper ID: V2I5-1170
Paper Status: published
Published: October 17, 2016
Implementing Multiple Security in the Cloud Environment
Cloud computing is continuously evolving and considered next generation architecture for computing. Typically, cloud computing is a combination of computing resources accessible via internet. Historically, the clients or the organizations store data in data centers with firewall and other security techniques to protect data against intruders. However, in cloud computing, since the data is stored anywhere across the globe, the client organizations have less control over the stored data. To build the trust for the growth of cloud computing, the cloud providers must protect the user data from unauthorized access and disclosure. Here in this work hybrid approach of encryption techniques and the storage of data are considered in the cloud system. The main advantage of the hybrid scheme is to provide more security in the cloud.
Published by: Anuradha, Dr. Suman Sangwan
Author: Anuradha
Paper ID: V2I5-1169
Paper Status: published
Published: October 13, 2016
An IDS by Correlation & KPCA with Neural Network Optimized By Genetic Algorithm
— An Intrusion Detection System is an application used for monitoring the network and protecting it from the intruder. Intrusion is a set of actions aimed to compromise these security goals. IDS have the computer security goals which are important for the data mining for extraction of data like confidentiality, integrity, and availability. This research study the performance measures of IDS is important for the security purposes. KDD 99 has 41 features. The IDS approached is used with the help of neural network technique of data mining and the Genetic algorithm is used as a classifier. The all features of KDD99 are used in this study. In this research, the feature is selected and extracted instead of using all features. The feature selection is done with the help of Correlation and feature extraction is done with the help of KPCA. The selection of features is according to the Eigen values of the features. The neural network is used for the change the weightage of the error. The neural network is basically runs many times and change weightage according to this.
Published by: Harpreet Kaur, Gaganpreet Kaur Bhalla
Author: Harpreet Kaur
Paper ID: V2I5-1168
Paper Status: published
Published: October 10, 2016
Natural Language Processing
Language is way of communicating your words Language helps in understanding the world ,we get a better insight of the world. Language helps speakers to be as vague or as precise as they like. NLP Stands for natural language processing. . Natural languages are those languages that are spoken by the people.Natural language processing girdles everything a computer needs to understand natural language and also generates natural language.Natural language processing (NLP) is a field of computer science, artificial intelligence, and linguistics mainly focuses on the interactions between computers and human languages or natural languages. NLP is focussed on the area of human computer interaction. The need for natural language processing was also felt because there is a wide storage of information recorded or stored in natural language that could be accessible via computers. Information is constantly generated in the form of books, news, business and government reports, and scientific papers, many of which are available online or even in some reports. A system requiring a great deal of information must be able to process natural language to retrieve much of the information available on computers. Natural language processing is an interesting and difficult field in which we have to develop and evaluate or analyse representation and reasoning theories. All of the problems of AI arise in this domain; solving "the natural language problem" is as difficult as solving "the AI problem" because any field can be expressed or can be depicted in natural language.
Published by: Aparna Priyadarsini Khadanga, Suvendu Kumar Nayak
Author: Aparna Priyadarsini Khadanga
Paper ID: V2I5-1166
Paper Status: published
Published: October 10, 2016
Introduction to Wireless Sensor
Recently underwater sensor network has attracted great attention of many researchers. Here determining the location of sensor node is very important. The required information will not be useful if sensing nodes are not localized. There are various methods for localization in sensor networks but these are different in case of terrestrial sensor network and underwater sensor network. This paper explores some of the localization schemes in case of underwater sensor network and there comparison is made so that they can be utilized on basis of application requirement.
Published by: Smridhi
Author: Smridhi
Paper ID: V2I5-1165
Paper Status: published
Published: October 8, 2016