Manuscripts

Recent Papers

Effect of Varying Source Node, Relay Node and Mobility in MANET

In this paper the effect of entering different routing protocol in a network is analyzed. To analyze this effect number of nodes are vary from 25 to 65 nodes. In this paper the 25 nodes are move at low speed and 65 nodes are moving at high speed. To analyze this effect opnet modeler 14.5 is used. The performance is compared in terms of throughput, load and media access delay. Results show that when only aodv is used performance is good when other protocols enter into the network then performance decrease.

Published by: Lovepreet Singh, Pankaj Sharma, Puneet Jain

Author: Lovepreet Singh

Paper ID: V2I6-1264

Paper Status: published

Published: December 27, 2016

Full Details

Improved Color Image Steganographic Technique in Transform Domain

Steganography is the process of embedding original message bits on some carrier file. The carrier file may be text file, image file, audio file or video file etc. If that carrier file is an image file, then that technique is called Image steganography [1]. If color image is used as a carrier file to embed data bits, then that type of steganography technique is called as color image steganography [7]. In this proposed work, embedding the original message bits in the transform domain of the carrier color image without considering the green plane, hence it is resulting in high quality stego image. Hence this technique is called as improved color image steganography technique in transform domain. Here in this paper, DCT (Discrete Cosine Transform) technique has been used.

Published by: K. S. Sadasiva Rao, Dr A. Damodaram

Author: K. S. Sadasiva Rao

Paper ID: V2I6-1260

Paper Status: published

Published: December 26, 2016

Full Details

Physicochemical Studies on Schiff Bases Derived from Substituted Coumarins with Substituted Diamines in Aqueous-Alcohol Medium

Schiff bases derived from substituted coumarins with substituted diamines were synthesized by cyclo-condensation. Proton-ligand ionization constants and metal-ligand stability constants at constant ionic strength in aqueous-alcohol medium (50/50% V/V) were evaluated using Irving-Rossotti method. The ligands exhibit pKa values around 11.5 due to the phenolic –OH group. The metal ligand stability constants with Cu (II), Co(II), Ni(II), Zn(II), Cd(II) and Hg(II) were also determined. The effects of substitutions on the stability constants were studied.

Published by: Uma Desai, Suresh

Author: Uma Desai

Paper ID: V2I6-1259

Paper Status: published

Published: December 26, 2016

Full Details

Class Imbalance Problem in Data Mining using Probabilistic Approach

Class imbalance problem are raised when one class having maximum number of examples than other classes. The classical classifiers of balance datasets cannot deal with the class imbalance problem because they pay more attention to the majority class. The main drawback associated with it majority class is loss of important information. The Class imbalance problem is a difficult due to the amount and nature of data. This paper focuses different methods of class imbalance problem. It is been considered the majority class to achieve the class imbalanced problem. This paper mainly focuses the minority class sample to achieve the problem and proposed method for class imbalance problem using minority sample data. The oversampling and undersampling both concept were used to identify the correct class label of the sample using probabilistic approach, the main objective of this paper, to proposed method to minimize the misclassification rate of minority class sample, balance and classify the data more accurately thereby improving the performance of classifier.

Published by: Disha Gupta, Reetu Gupta, Prashant Khobragade

Author: Disha Gupta

Paper ID: V2I6-1258

Paper Status: published

Published: December 26, 2016

Full Details

A Review on Wireless Transport Layer Security

Wireless Application Protocol (WAP) is one of the technical standards for information over a mobile wireless network. Mobile devices such as mobile phones that use the protocol have a WAP browser as a web browser. WTLS (wireless transport layer security) inherited from TLS (Transport Layer Security). WTLS uses similar semantics adapted for a low bandwidth mobile device. As compared to TLS main changes are compressed data structures where possible packet sizes are reduced by using bit-fields, discarding redundancy and truncating some cryptographic elements. WTLS defines a compressed certificate format. This broadly follows the X.509 v3 certificate structure, but uses smaller data structures. Packet based design TLS is designed for use over a data stream. WTLS adapts that design to be more appropriate on a packet based network. WTLS design is based on a requirement that it be possible to use a packet network such as SMS as a data transport. There are number of WTLS security issues. WTLS processing more is fast as compared to using SSL. So it is suitable for wireless system. WTLS uses modern cryptography tools to enhance security. WTLS can provide different level of security for privacy, data integrity and authentications.

Published by: Chandan Sharma

Author: Chandan Sharma

Paper ID: V2I6-1254

Paper Status: published

Published: December 22, 2016

Full Details

Antibacterial and Antifungal Activity from Seed Extracts Of Peganum Harmala

The aim of the study was to determine the strong antimicrobial and antifungal activity from the extracts of Peganum Harmala plant species by solvent extraction procedure. P. harmala seeds extract contains several important alkaloids such an important Oxamide compound was used for this study. Extracted product was isolated, purified and identified by Thin Layer Chromatography, UV-VIS Spectroscopy, FT-IR Spectroscopy and 1H-NMR, 13C-NMR Spectroscopy. Finally, the isolated compound Oxamide activity was checked and proved through the Candida albicans, Klebsiella pneumonia and Pseudomonas aeruginosa with MIC studies.

Published by: Jayaprakash Chinnappan, Veeran Mohanraj

Author: Jayaprakash Chinnappan

Paper ID: V2I6-1252

Paper Status: published

Published: December 21, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X