Manuscripts

Recent Papers

Implementation of Plagiarism Detection Tool in JAVA

With the advent of internet everything that has been researched is available on the internet. This information can be copied and used as original by someone in their own work which poses a major challenge for academia and industries like publications. A lot of work has been done in the field to detect plagiarism in the documents and algorithms have been made. In this paper, we have implemented porter algorithm for stemming, TF-IDF and cosine similarity to detect plagiarism

Published by: Attinderpal Singh

Author: Attinderpal Singh

Paper ID: V2I6-1149

Paper Status: published

Published: November 10, 2016

Full Details

Efficient Reception of Packets using Zigbee Protocol Wireless Sensor Network

The great potential of Wireless Sensor Network is being seen in industrial, consumer and commercial application. The wireless technology is becoming one of the most prominent areas of research. With the development of network and communication technology, the WSN has solved the inconvenience into people’s lives. WSN has good functions of data collection, transmission, and processing. In the older technology there was a shortcoming of average packet time delay, large power dissipation, less efficient reception of packets, large propagation delay, low speed communication. Besides there were other limitations like limited battery life time nodes incapability of data aggregation, processing, storing and then passing it to the base station accordingly.. As in the earlier Technologies WSN node based leach protocol could not provide the above necessary requirements for the system to operate under well adverse environmental situations. In this dissertation, we have used a ZigBee protocol in WSN system for ensuring that the nodes may operate for a longer period of time, reducing packet time delay, establishment of a re-linking algorithm and provides an efficient reception packet and sufficient throughput The advantage of ZigBee Technology is that it covers a range of 1-100m For comparison purposes, we have taken the oldest technology i.e SEP .To allow different systems to work together, standards are needed. ZigBee/IEEE 802.15.4 protocols are developed for this purpose. Moreover, ZigBee protocol in WSN has resulted in the low power consumption, enhancement of life time of battery reduced average packet time delay less power dissipation improved an efficient reception of packets, reduced propagation delay, high speed communication among wireless communication devices. On comparing the results of both that is the previous work over which work has been done earlier and present work it has been observed that modified system performs better.

Published by: Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur

Author: Khursheed Ahmad Rather

Paper ID: V2I6-1148

Paper Status: published

Published: November 10, 2016

Full Details

A Sec‎ure D‎ata Ag‎gregation Mecha‎nism in Wire‎less Senso‎r Netw‎ork

The addition of mobility in WSN ha‎s att‎racted signific‎ant i‎nterest in recent years. Mo‎bile nodes incre‎ase the ca‎pabilities of the WSN in m‎any way‎s. W‎e c‎lassify mobile wireless sensor networks (MWSNs) as a spec‎ial and ada‎ptable c‎lass of WSN, in which one or more th‎an one e‎lement of the network is mobile. The mobile componen‎t can b‎e any of the sensor nodes, rela‎ys (i‎f any), data c‎ollectors or sink or any combina‎tion of them. Fr‎om d‎eployment to data disseminat‎ion, mobility p‎lays a‎n i‎mportant rol‎e in ever‎y f‎unction of sensor networks. F‎or examp‎le, a mobile node can visi‎t oth‎er nodes in the network and ga‎ther data direct‎ly t‎hrough sin‎gle-ho‎p tra‎nsmissions. Simila‎rly a mobile node can trave‎l ar‎ound the sensor network and collect data from sens‎ors, bu‎ffer them, and t‎hen t‎ransfer them to base station. This considerabl‎y red‎uces onl‎y colli‎sions and data loss‎es, and als‎o minimiz‎es the pres‎sure of data forward‎ing ta‎sk by nodes and as a r‎esult spre‎ads the energy cons‎umption more consi‎stently througho‎ut the network. The proposed data aggregati‎on mechani‎sm us‎es bacteria‎l foraging optimization algorithm. This techn‎ique is i‎nspired by the so‎cial foraging behav‎iour lik‎e a‎nt col‎ony and pa‎rticle swar‎m optimization. The proposed algorithm improves WSN th‎roughput, coll‎ects data more efficientl‎y, and save‎s energy.

Published by: Sandhya Sehraw‎at, Dr. D‎INESH SIN‎GH

Author: Sandhya Sehraw‎at

Paper ID: V2I6-1147

Paper Status: published

Published: November 10, 2016

Full Details

Optimizing Channel Estimation for SCFDMA

The third generation partnership project has employed SCFDMA for its uplink transmission because of its low PAPR. SCFDMA signal while travelling through channel is affected by noise contained in the channel. Various channel estimation techniques has been given in the literature. This paper presents a channel estimation based on LMS with its parameters being optimised using PSO. The paper also compares result with existing LMS algorithm based systems. It has been observed that the proposed technique provides improvement in Bit Error Rate as compared to other technique.

Published by: Priyanka Malhotra, Garima Saini

Author: Priyanka Malhotra

Paper ID: V2I6-1146

Paper Status: published

Published: November 9, 2016

Full Details

Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network

OSPF is mainly designed for IP networks from scratch and runs in almost all sorts of environments like enterprise, data centers, or service providers, while ISIS, which was mainly designed by ISO was not intended to run for IP based networks from scratch and IETF in the early 1990’s adopted ISIS for its advantages. As a scalability purpose ISIS is better than OSPF, but when we have a large database or a large service provider, with only a single level design inside the service provider Both the routing protocols have different authentication mechanisms with ISIS providing key chain based mechanism and provides both plain-text and MD5 based integration with it, while OSPF also provide MD5 and SHA1 hashing based authentication when used with IPv6. Multiprotocol label switching technology (MPLS) is used to transfer the data in service provider network. Apart from Interconnecting Data Centers, L2VPNs are also used for Inter-AS service provider’s connectivity and connecting various Enterprise Branch offices with each other. Selection of right L2VPN technology is very important as wrong technology can harm the network. The main focus of this technique to give the solutions for slow speed, quality of service, lack of traffic engineer, less security and problem in trouble shouting. The motive is to improve the speed, high security, easily trouble shoot, high quality in terms of packet transformation and better results for traffic engineering.

Published by: Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur

Author: Vikasdeep Kaur

Paper ID: V2I6-1145

Paper Status: published

Published: November 9, 2016

Full Details

Proposed Approach on CSTR with PID

In this paper conventional PID controller provides satisfactory results, still inefficiency persists due to extreme non-linear nature and uncertainty in the dynamics of the plant. So optimize the pidnon linear behavior by Gravitational search algorithm and partical swarm optimization. The PID controller is the most common form of feedback. PID control isused at the lowest level; the multivariable controller gives the set points to the controllers at the lower level. The PID controller can thus be saidto be the “bread and butter’ of control engineering. It is an importantcomponent in every control engineer’s tool box.PIDcontrollers have survived many changes in technology, from mechanicsand pneumatics to microprocessors via electronic tubes, transistors,integrated circuits.

Published by: Ramandeep Kaur, Jaspreet Kaur

Author: Ramandeep Kaur

Paper ID: V2I6-1144

Paper Status: published

Published: November 9, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X