Manuscripts

Recent Papers

A Study on Friction Stir Welding of Various Aluminum Alloys

The comprehensive body of knowledge that has built up with respect to the friction stir welding (FSW) of aluminum alloys since the technique was invented in 1991 is reviewed on this paper. The basic principles of FSW are described, including metal flow and thermal history, before discussing how process parameters affect the weld microstructure and the likelihood of defects. Finally, the range of mechanical properties that can be achieved is discussed. It is demonstrated that FSW of aluminum is becoming an increasingly mature technology with numerous commercial applications. Keywords - Friction stir welding, metal flow, process parameters, mechanical properties

Published by: Neeraj Kumar, Virender Kumar

Author: Neeraj Kumar

Paper ID: V2I5-1143

Paper Status: published

Published: September 2, 2016

Full Details
Research Paper

Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks

-- The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.

Published by: Neetika Lalotra, Devasheesh Sharma

Author: Neetika Lalotra

Paper ID: V2I5-1142

Paper Status: published

Published: September 1, 2016

Full Details

Comparative Analysis of PCF, DCF and EDCF over IEEE 802.11 WLANs

with the enhancement of wireless network, QoS has become major researcher area. IEEE802.11 standard has two sub layers MAC protocols like as Distribution Coordination Function (DCF), Point Coordination Function (PCF). Medium access coordination function basically implements the Distribution Coordination Function (DCF) and Point Coordination Function (PCF) which support just to best effort service but have limited to QoS services. A new standard, Enhanced Distribution Coordination Function (EDCF) is reported .The IEEE 802.11e (EDCF) which defines the MAC procedures to support QoS requirements and that specifies distribution based access scheme to access the shared wireless media. In this paper, Protocols are tested under realistic conditions to perform evaluation of the coordination functions. Various parameters such as load, network load, media access delay, data dropped are tested in wireless network. Furthermore, the simulative observation is reported at data rate of 66Mbps using a physical layer protocols such as IEEE 802.11n to stumble the best one to implement with EDCF to achieved improved QoS.

Published by: Jagdish Singh, Joykaran Singh

Author: Jagdish Singh

Paper ID: V2I5-1141

Paper Status: published

Published: September 1, 2016

Full Details

Review on Rank Base Data Routing Scheme with Grey Hole Detection & Prevention in MANETS

MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various networks without infrastructure or any centralized administration. While the nodes communicate with each other, they assist by forwarding data packets to other nodes in the network. Thus the nodes discover a path to the destination node using routing protocols. Gray hole attack among the different types of attacks possible in a MANET. Gray Hole attack is one type of active attack which tends to drop the packets during transmission the routing from source to destination .In this paper, we simulate gray hole attack Detection and prevention technique using AODV and AODV+PSO. Performance metrics Packet dropped or packet loss, End to End delay and Average throughput, the performance analysis has been done by using simulation tool ns-2 which is the main infrastructure.

Published by: Reena Kumari, Neha Goyal

Author: Reena Kumari

Paper ID: V2I5-1138

Paper Status: published

Published: August 31, 2016

Full Details

Review of Image Watermarking Technique for Medical Images

In this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity …) and management. We review sample cases where watermarking has been deployed. We conclude that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical images. The concern of medical experts on the preservation of documents diagnostic integrity remains paramount. Medical image watermarking is an appropriate method used for enhancing security and authentication of medical data, which is crucial and used for further diagnosis and reference. This paper discusses the available medical image watermarking methods for protecting and authenticating medical data. The paper focuses on algorithms for application of watermarking technique on Region of Non Interest (RONI) of the medical image preserving Region of Interest (ROI).

Published by: Kamalpreet Kaur, Er. Suppandeep Kaur

Author: Kamalpreet Kaur

Paper ID: V2I5-1139

Paper Status: published

Published: August 31, 2016

Full Details

Review on Grey- Hole Attack Detection and Prevention

— These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks

Published by: Suman Brar, Mohit Angurala

Author: Suman Brar

Paper ID: V2I5-1137

Paper Status: published

Published: August 31, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X