Manuscripts

Recent Papers

A Comparison of Different Techniques used to Detect and Mitigate Black Hole Attack in AODV Routing Protocol based on MANET

A Mobile ad hoc network (MANET) is a self organized system which doesn’t have any pre-defined network infrastructure where mobile devices are connected by wireless links. Hence, a MANET can be constructed quickly at a low cost, as it doesn’t rely on existing network infrastructure. This paper presents a review on different techniques used to detect and mitigate the black hole attack in MANET i.e. for single black hole and also for cooperative black hole attack which are a serious threat to ad hoc network security. In cooperative black hole attack multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to detect. In this paper a comparison of various techniques that have been proposed in the literature for detection and mitigation of such attacks is presented.

Published by: Shivani, Pooja Rani, Pritpal Singh

Author: Shivani

Paper ID: V2I4-1185

Paper Status: published

Published: August 22, 2016

Full Details

Flow Past a Rotating Circular Grooved Cylinder

CFD simulations of a two-dimensional steady state flow past a rotating circular grooved cylinder is analyzed in this study. Cylinder of diameter 0.1 m with 8 grooves of 0.01 m was examined at various Reynolds’s number (0.1 to 50) and angular velocity (0 to 100 RPS). Incompressible Navier Stokes equation in Ansys Fluent 14.0 was used to examine the flow. The pressure and velocity contours for various Reynolds’s number were generated. The result suggested that the flow remains attached to the surface of the cylinder up to the Reynolds number value of 4–5 and the flow pattern was independent of angular velocity at Reynolds’s number 45-46 and the cylinder behaved like a stationary cylinder and above these Reynolds’s numbers the flow is still two-dimensional, but no longer steady.

Published by: Ashish Kumar Saroj, Bharath Reddy, Gundu Jayadhar, D.Gokul

Author: Ashish Kumar Saroj

Paper ID: V2I4-1184

Paper Status: published

Published: August 17, 2016

Full Details

Railway Bridge & Track Condition Monitoring System

As railroad bridges and tracks are very important infrastructures, which has direct effect on railway transportation, there safety is utmost priority for railway industry. This project aims at monitoring the tracks on the bridges along with structural health condition of the bridge for accidents reduction. In this paper we introduces railway tracks and bridge monitoring system using wireless sensor networks based on ARM processor. We designed the system including sensor nodes arrangement , collecting data, transmission method and emergency signal processing mechanism of the wireless sensor network.. The proposed system reduces the human intervention, which collects and transmit data . The desired purpose of the proposed system is to monitor railway infrastructure for accident reduction and its safety.

Published by: Vinod Bolle, Santhosh Kumar Banoth

Author: Vinod Bolle

Paper ID: V2I4-1182

Paper Status: published

Published: August 12, 2016

Full Details

Security Enhancement of the Telemedicine and Remote Health Monitoring Models

The telemedicine applications are the application utilized for the remote monitoring and health assessment of the people living in the remote areas. The networks of the doctors and the field executives utilizes the various kinds of the healthcare sensors for the health checkup of the people by collecting and transmitting over the internet for the treatment of the affected ones. The information being propagated through the internet between the healthcare sensors and the online server model is always prone to the several forms o the attacks. In this paper, the proposed model has been designed to improve the level of security over the telemedicine network. The proposed model will be improved by using the robust encryption with the highly scrambled authentication key. The performance of the proposed model will be assessed under the various performance parameters which define the network health as well as the security level.

Published by: Nishu Dhiman, Tejpal Sharma

Author: Nishu Dhiman

Paper ID: V2I4-1181

Paper Status: published

Published: August 8, 2016

Full Details

Design of Low Area and Secure Encryption System using Combined Watermarking and Mix-column Approach

Lately, the significance of security in the data innovation has expanded fundamentally. This paper shows another proficient design for rapid and low range propelled encryption standard calculation utilizing part strategy. The proposed engineering is actualized utilizing Field Programmable Gate Array.

Published by: Swati Sharma, Dr. M. Levy

Author: Swati Sharma

Paper ID: V2I4-1178

Paper Status: published

Published: August 2, 2016

Full Details

Lexicon Analysis based Automatic News Classification Approach

The news classification approach is the primary approach for the online news portals with the news data sourced from the various portals. The various types of data is received and accepted over the news classification portals. The lexicon analysis plays the key role in the categorization of the news automatically using the automatic news category recognition by analyzing the keyword data extracted from the input image data. The N-gram news analysis approach will be utilized for the purpose of the keyword extraction, which will further undergo the support vector classification. The support vector machine based classification engine analyzes the extracted keywords against the training keyword data and then returns the final decision upon the detected category. The proposed model is aimed at improving the overall performance of the existing models , which will be measured on the basis of precision, recall, etc.

Published by: Kamaldeep Kaur, Maninder Kaur

Author: Kamaldeep Kaur

Paper ID: V2I4-1175

Paper Status: published

Published: August 1, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X