Manuscripts

Recent Papers

Adaptive Security Mechanism for Cognitive Radio Communications based on Robust Authentication

Abstract—The fundamental techniques for cognitive radio standard generates the new security threats and the primary operative issues and challenges to wireless communications. Spectrum occupancy failure, the policy management failures, wireless node localization failures, transceiver failures, framework problems and other concerns must be efficiently covered and resolved while imposing the security techniques over the cognitive channels. In the process, it will produce the security threats-primary user emulation attacks. When the attacker has detected the idle spectrum, he will send out a signal similar to the primary user’s signal in this band. The attacks will affect the secondary user detect the idle spectrum and the spectrum cannot be used effectively. An attacker occupies the unused channels by emitting a signal with similar form as the primary user’s signal so as to prevent other secondary users from accessing the vacant frequency bands. The performance of the proposed security model for cognitive radio channels would be evaluated in the performance parameters of security packet volume, authentication delay, security system overhead, etc. The trust and authentication based proposed model will be designed to offer the robust security level over the cognitive channel.

Published by: Mehakpreet Kaur, Navleen Kaur

Author: Mehakpreet Kaur

Paper ID: V2I3-1166

Paper Status: published

Published: June 9, 2016

Full Details

A Deterministic GPSR Routing Protocol for MANET

In VANET, the communication between the vehicles takes place. As the vehicles are in motion the main aim is to provide efficient routing. The position based routing protocol are better than topology based routing protocol. Working on GPSR routing protocol main aim is to improve the performance of the GPSR as well as E-GPSR routing protocol. The proposed methodology considers the border node and angle of orientation of the neighboring nodes. Based on this the D-GPSR outperforms the GPSR and E-GPSR routing protocol in terms of throughput, average end-to-end delay, packet delivery ratio and network load. D-GPSR is methodology and algorithm is studied in detailed.

Published by: Kumari Monika, Mr. Ashish Sharma

Author: Kumari Monika

Paper ID: V2I3-1165

Paper Status: published

Published: June 6, 2016

Full Details

Traffic Jam and Accident Detection Techniques

Traffic Jam is a crucial problem which is arising day by day in the whole world to overcome this problem many sensors or many algorithms have been developed for the detection of traffic jam. These sensors and algorithm played an important role in Traffic Jam Detection in every region in terms of accuracy, time of detection, signal management. This paper presents a review to the various algorithms proposed in the past.

Published by: Raveena Shaili, Sunil Pathania

Author: Raveena Shaili

Paper ID: V2I3-1164

Paper Status: published

Published: June 6, 2016

Full Details

Human Identification using Iris Recognition

Iris recognition is an invasive biometric technique used to identify human being. Iris is defined as annular region between pupil and sclera of human eye which exhibits extraordinary texture that is unique for each individual. Hence, imposes various challenges in accurate iris segmentation and feature extraction techniques to provide many opportunities for researchers in pursuing their research work in this area. This paper presents a study about different techniques used previously for iris recognition.

Published by: Geetanjali Sharma, Neerav Mehan

Author: Geetanjali Sharma

Paper ID: V2I3-1163

Paper Status: published

Published: June 6, 2016

Full Details

Palm Print: A Bio-Metric for Human Identification

As in today’s life security is main concern. So, a lot of researches are going in the field of security like password, security question, pattern matching and a very important approach is biometric security. So my work is to study about the palm print recognition to identify human. Palm print recognition system has proved its efficiency with many machine learning techniques like LBP, Repeated line tracking, junctions point matching. This paper is a comparison of different techniques. Previous research on palm print shows that palm codes from different palms are similar, with 〖45〗^°streaks.

Published by: Kalyani, Sunil Pathania

Author: Kalyani

Paper ID: V2I3-1162

Paper Status: published

Published: June 6, 2016

Full Details

An Analytical Study on Forecasting Model with Special Attention to Gold Price

A commodity with resonance is Gold. Gold is used as currency over the centuries. Gold is unique in nature due to its capability of being hedge in opposition to inflation. It has strong stability to withstand in financial crises and volatility. Although the social esteem that the gold business adds to social orders far and wide, particularly in poorer nations, is less apprehended and frequently distorted. As of late, the worldwide gold cost pattern has pulled in a great deal of consideration and the cost of gold has unnerving spike contrasted with recorded pattern. In times of vulnerability financial specialists consider gold as a fence against unexpected debacles so the fore-casted price of gold has been a subject of most elevated among all. In this research the primary focal area for examination is to add to a determining model for gold price in which this will be done through Box-Jenkins, ARIMA (Auto regressive Integrated Moving Average) and time series analysis model of forecasting. The main objective of this research is to investigate the factors which influencing gold price of the gold market. Data for analysis is collected from variable data sources in order examine the impact and contribution of factors on gold price. Based on identified factors, the gold price will be predicted for upcoming years.

Published by: P .M. Dhanalakshmi, P. R. S. Reddy

Author: P .M. Dhanalakshmi

Paper ID: V2I3-1161

Paper Status: published

Published: June 3, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X