Manuscripts

Recent Papers

Wireless Sensor Network: A Review

Wireless Sensor Networks (WSN) consists of nodes with limited power deployed in the area of interest. Nodes cooperate to collect, transmit and forward data to a base station. In WSN, clustering and scheduling techniques ensure collecting data in an energy efficient manner. In this work, we have reviewed many papers relating to clustering and scheduling of sensor network. After reviewing many papers and considering the latest one as the base paper we believe that the work done in it is the latest one, modifications in the work is suggested in report. This review give the basic description of wireless sensor network and their importance in energy efficiency and give a brief about most famous protocol is described leach and their improved version.

Published by: Sashi, Pooja Dhankar

Author: Sashi

Paper ID: V2I3-1199

Paper Status: published

Published: June 29, 2016

Full Details

A Novel Self Organizing Clustering Scheme for Clusters Setup

Wireless Sensor Networks (WSN) consists of nodes with limited power deployed in the area of interest. Nodes cooperate to collect, transmit and forward data to a base station. In WSN, clustering and scheduling techniques ensure collecting data in an energy efficient manner. In this work, we have reviewed many papers relating to clustering and scheduling of sensor network. After reviewing many papers and considering the latest one as the base paper we believe that the work done in it is the latest one, modifications in the work is suggested in this report. This proposal give the basic description of wireless sensor network and their importance in energy efficiency and give a brief about most famous protocol is describes leach and their improved version In this work we have proposed a novel self organizing clustering scheme which considers the real time parameters for setting up the clusters for data collection. Unlike several proposed algorithm, this scheme re-clusters the network only when CH fall below a threshold level. Repeated unnecessary clustering in every round depletes the energy of the network more quickly. We have introduced heterogeneity in the proposed work. By virtue of heterogeneity in terms of energy, lifetime of the network can be extended. An algorithm is functional if the area of interest is covered by active nodes. The period for which the network is functional is termed as persistent period in our work. Simulation results show that the proposed scheme is comparatively more energy efficient, scalable robust and has longer persistent period. And later part of the proposal gives the advantage and disadvantage of these protocols.

Published by: Sashi, Pooja Dhankar

Author: Sashi

Paper ID: V2I3-1198

Paper Status: published

Published: June 29, 2016

Full Details

Optimise the Gain of Optical Signal by SOA with Saturated ASE and Unsaturated ASE

Optical Amplifiers are essentials components in long haul fibre optic system. An amplifier is a electronic device that can increase the power of signal. An Optical Amplifier is effectively the opposite of attenuator while Optical Amplifiers provide gain and attenuator provides loss. When a signal travels in a optical fibre medium the signal suffer from various losses such as fibre losses, attenuation losses, fibre splice losses, reduce these losses use the Semiconductor method with saturated and unsaturated Amplified Spontaneous Emission. It reduces the phase shift and recover original signal.

Published by: Shilpa Thakur, Er. Vivek Gupta

Author: Shilpa Thakur

Paper ID: V2I3-1197

Paper Status: published

Published: June 29, 2016

Full Details

A Novel Pre-Shared Information Defense Mechanism for Spoofed IP Attack in SDN – A Review

The software defined networks are being used in many scenarios where the ordinary or traditional network management becomes the real problem. Such networks are defined or managed with the SDN platform, which is used as the network programming rather than the network configuration. The problem of user legitimacy is a big issue in the cloud platforms. The user legitimacy assurance is quite important to protect the cloud platforms from several types of attacks. The user legitimacy assurance must be performed on two given events, one is pre-setup, second is post-setup. The existing models incorporate the post-setup phase authentication only, where the pre-setup phase is left immature, where the hackers can easily attack over. In this paper, we are proposing the model for the security of cloud by user legitimacy assurance during the pre-setup phase with the use of pre-shared information in the form or RUID (rigid user ID), which is provided to the user during the registration. The RUID will add the new layer of security by mitigating the threat of user session hijacking, which will make the cloud infrastructure highly secure in comparison with the existing models.

Published by: Manisha Lalotra, Meenakashi Sharma, Gurjeet Kaur,

Author: Manisha Lalotra

Paper ID: V2I3-1196

Paper Status: published

Published: June 25, 2016

Full Details

Trusted Key Management with RSA based Security Policy for MANETS

A mobile ad-hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or an already existing infrastructure. Various key management authorities distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Thus many efforts have been made to adapt key management authority’s tasks to the dynamic environments of MANETS and distribute the tasks of among MANET nodes. At present various cryptographic techniques are being deployed to meet the ever-changing needs, which compels to device unique security mechanism for MANET, enabling individual and corporate entities to protect the transmission of data without any intrusion by illegal means. Cryptographic techniques could be either of symmetric key cryptography and or asymmetric key cryptography or hash functions. Symmetric cryptosystem requires the existence of common shared secret key between two communicating nodes whereas asymmetric cryptosystem maintains unique key pair between any two communicating nodes (peers). An asymmetric cryptosystem is more efficient in a given task oriented key utilization process. In this mechanism, the private key needs to be kept secret with one entity but the authenticity of the corresponding public key for the same entity must be guaranteed somehow by a trusted third party in this paper, a novel mutual authentication and key management (agreement) protocol has been developed for one hop communication in mobile ad-hoc networks. The protocol has several salient features like mutual authentication, confidentiality, integrity and key agreement. The protocol utilizes RSA signature generation and verification algorithm.

Published by: Vandana Arora, Sunil Ahuja

Author: Vandana Arora

Paper ID: V2I3-1195

Paper Status: published

Published: June 24, 2016

Full Details

Efficient Scheduling by Genetic Algorithm and Simulated Annealing

Multiprocessing is the ability of a system to support more than one processor and the ability to allocate tasks between them. The main advantage of using multiprocessor system is to get more work done in shorter period of time. To improve the efficiency of CPU, we do scheduling by the use of genetic algorithms. Genetic algorithms are powerful and widely applicable stochastic search and optimization methods based on the concepts of natural selection and natural evaluation. Simulated annealing is a generic probabilistic met heuristic for the worldwide optimization issue of finding a great approximation into the global optimum of a given function .In this paper, efficient genetic algorithm and simulated annealing have been proposed for solving the problem of CPU scheduling. The operator which are used for implementing the genetic algorithm such as real value encoding for encoding, Roulette wheel method is used for selection, Uniform crossover operator is used for crossover, interchange for mutation.

Published by: Pooja Nehra, Mr. Sunil Ahuja

Author: Pooja Nehra

Paper ID: V2I3-1194

Paper Status: published

Published: June 23, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X