Manuscripts

Recent Papers

Review on Grey- Hole Attack Detection and Prevention

— These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks

Published by: Suman Brar, Mohit Angurala

Author: Suman Brar

Paper ID: V2I5-1137

Paper Status: published

Published: August 31, 2016

Full Details
Research Paper

Diabetes Prediction by Supervised and Unsupervised Learning with Feature Selection

: Two approaches to building models for prediction of the onset of Type diabetes mellitus in juvenile subjects were examined. A set of tests performed immediately before diagnosis was used to build classifiers to predict whether the subject would be diagnosed with juvenile diabetes. A modified training set consisting of differences between test results taken at different times was also used to build classifiers to predict whether a subject would be diagnosed with juvenile diabetes. Supervised were compared with decision trees and unsupervised of both types of classifiers. In this study, the system and the test most likely to confirm a diagnosis based on the pre-test probability computed from the patient's information including symptoms and the results of previous tests. If the patient's disease post-test probability is higher than the treatment threshold, a diagnostic decision will be made, and vice versa. Otherwise, the patient needs more tests to help make a decision. The system will then recommend the next optimal test and repeat the same process. In this thesis find out which approach is better on diabetes dataset in weka framework. Also use feature selection techniques which reduce the features and complexities of process

Published by: Rabina, Er. Anshu Chopra

Author: Rabina

Paper ID: V2I5-1136

Paper Status: published

Published: August 30, 2016

Full Details

Analyze the Effect of Base Station and Node Failure and Recovery on the Performance of Wimax

In this paper the effect of Base and node failure and Recovery is analyzed on the performance of Wimax by using different modulation techniques in a network. To analyze the performance opnet modeler is used. The performance is compared in terms of Delay, throughput and Load. The result shows that when base station fails then the performance Decrease and when node fail then performance increase. The result also shows that when different modulation techniques in different cells are used in same network then there is no change in performance.

Published by: Kanika, Er. Amardeep Singh Virk

Author: Kanika

Paper ID: V2I4-1187

Paper Status: published

Published: August 23, 2016

Full Details

Phylogenetic and Evolutionary Studies of Flavivirus

Abstract Viruses of Flavivirus genus are the causative agents of many common and devastating diseases, including yellow fever, dengue fever etc. so for proper development of efficient anti viral pharmaceutical strategies there is a need for proper classification of viruses of this group. To generate the most diverse phylogenetic datasets for the Flaviviruses to date, we analyzed the whole genomic sequences and phylogenetic relationships of 44 Flaviviruses by using various bioinformatics tools (MEGA, Clustal W, PHYLIP). We analyze these data for understanding the evolutionary relationship between classified and unclassified viruses and to propose for the reclassification of unclassified viruses which shows sequence similarity and also similar mode of transmission with classified viruses.

Published by: Meenu Priya Kontu, Dr. Sweta Prakash

Author: Meenu Priya Kontu

Paper ID: V2I4-1186

Paper Status: published

Published: August 22, 2016

Full Details

A Comparison of Different Techniques used to Detect and Mitigate Black Hole Attack in AODV Routing Protocol based on MANET

A Mobile ad hoc network (MANET) is a self organized system which doesn’t have any pre-defined network infrastructure where mobile devices are connected by wireless links. Hence, a MANET can be constructed quickly at a low cost, as it doesn’t rely on existing network infrastructure. This paper presents a review on different techniques used to detect and mitigate the black hole attack in MANET i.e. for single black hole and also for cooperative black hole attack which are a serious threat to ad hoc network security. In cooperative black hole attack multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to detect. In this paper a comparison of various techniques that have been proposed in the literature for detection and mitigation of such attacks is presented.

Published by: Shivani, Pooja Rani, Pritpal Singh

Author: Shivani

Paper ID: V2I4-1185

Paper Status: published

Published: August 22, 2016

Full Details

Flow Past a Rotating Circular Grooved Cylinder

CFD simulations of a two-dimensional steady state flow past a rotating circular grooved cylinder is analyzed in this study. Cylinder of diameter 0.1 m with 8 grooves of 0.01 m was examined at various Reynolds’s number (0.1 to 50) and angular velocity (0 to 100 RPS). Incompressible Navier Stokes equation in Ansys Fluent 14.0 was used to examine the flow. The pressure and velocity contours for various Reynolds’s number were generated. The result suggested that the flow remains attached to the surface of the cylinder up to the Reynolds number value of 4–5 and the flow pattern was independent of angular velocity at Reynolds’s number 45-46 and the cylinder behaved like a stationary cylinder and above these Reynolds’s numbers the flow is still two-dimensional, but no longer steady.

Published by: Ashish Kumar Saroj, Bharath Reddy, Gundu Jayadhar, D.Gokul

Author: Ashish Kumar Saroj

Paper ID: V2I4-1184

Paper Status: published

Published: August 17, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X