Manuscripts

Recent Papers

Optimise the Gain of Optical Signal by SOA with Saturated ASE and Unsaturated ASE

Optical Amplifiers are essentials components in long haul fibre optic system. An amplifier is a electronic device that can increase the power of signal. An Optical Amplifier is effectively the opposite of attenuator while Optical Amplifiers provide gain and attenuator provides loss. When a signal travels in a optical fibre medium the signal suffer from various losses such as fibre losses, attenuation losses, fibre splice losses, reduce these losses use the Semiconductor method with saturated and unsaturated Amplified Spontaneous Emission. It reduces the phase shift and recover original signal.

Published by: Shilpa Thakur, Er. Vivek Gupta

Author: Shilpa Thakur

Paper ID: V2I3-1197

Paper Status: published

Published: June 29, 2016

Full Details

A Novel Pre-Shared Information Defense Mechanism for Spoofed IP Attack in SDN – A Review

The software defined networks are being used in many scenarios where the ordinary or traditional network management becomes the real problem. Such networks are defined or managed with the SDN platform, which is used as the network programming rather than the network configuration. The problem of user legitimacy is a big issue in the cloud platforms. The user legitimacy assurance is quite important to protect the cloud platforms from several types of attacks. The user legitimacy assurance must be performed on two given events, one is pre-setup, second is post-setup. The existing models incorporate the post-setup phase authentication only, where the pre-setup phase is left immature, where the hackers can easily attack over. In this paper, we are proposing the model for the security of cloud by user legitimacy assurance during the pre-setup phase with the use of pre-shared information in the form or RUID (rigid user ID), which is provided to the user during the registration. The RUID will add the new layer of security by mitigating the threat of user session hijacking, which will make the cloud infrastructure highly secure in comparison with the existing models.

Published by: Manisha Lalotra, Meenakashi Sharma, Gurjeet Kaur,

Author: Manisha Lalotra

Paper ID: V2I3-1196

Paper Status: published

Published: June 25, 2016

Full Details

Trusted Key Management with RSA based Security Policy for MANETS

A mobile ad-hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or an already existing infrastructure. Various key management authorities distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Thus many efforts have been made to adapt key management authority’s tasks to the dynamic environments of MANETS and distribute the tasks of among MANET nodes. At present various cryptographic techniques are being deployed to meet the ever-changing needs, which compels to device unique security mechanism for MANET, enabling individual and corporate entities to protect the transmission of data without any intrusion by illegal means. Cryptographic techniques could be either of symmetric key cryptography and or asymmetric key cryptography or hash functions. Symmetric cryptosystem requires the existence of common shared secret key between two communicating nodes whereas asymmetric cryptosystem maintains unique key pair between any two communicating nodes (peers). An asymmetric cryptosystem is more efficient in a given task oriented key utilization process. In this mechanism, the private key needs to be kept secret with one entity but the authenticity of the corresponding public key for the same entity must be guaranteed somehow by a trusted third party in this paper, a novel mutual authentication and key management (agreement) protocol has been developed for one hop communication in mobile ad-hoc networks. The protocol has several salient features like mutual authentication, confidentiality, integrity and key agreement. The protocol utilizes RSA signature generation and verification algorithm.

Published by: Vandana Arora, Sunil Ahuja

Author: Vandana Arora

Paper ID: V2I3-1195

Paper Status: published

Published: June 24, 2016

Full Details

Efficient Scheduling by Genetic Algorithm and Simulated Annealing

Multiprocessing is the ability of a system to support more than one processor and the ability to allocate tasks between them. The main advantage of using multiprocessor system is to get more work done in shorter period of time. To improve the efficiency of CPU, we do scheduling by the use of genetic algorithms. Genetic algorithms are powerful and widely applicable stochastic search and optimization methods based on the concepts of natural selection and natural evaluation. Simulated annealing is a generic probabilistic met heuristic for the worldwide optimization issue of finding a great approximation into the global optimum of a given function .In this paper, efficient genetic algorithm and simulated annealing have been proposed for solving the problem of CPU scheduling. The operator which are used for implementing the genetic algorithm such as real value encoding for encoding, Roulette wheel method is used for selection, Uniform crossover operator is used for crossover, interchange for mutation.

Published by: Pooja Nehra, Mr. Sunil Ahuja

Author: Pooja Nehra

Paper ID: V2I3-1194

Paper Status: published

Published: June 23, 2016

Full Details

A Region based Offloading Mechanism in Mobile Cloud Computing Environment

Cloud computing permits the end user to access the required software or hardware structures on demand. This will reduce the cost of installation and maintenance. Mobile Cloud Computing (MCC) is introduced to increase the experience of end user by providing them the services at best. The development of cloud computing and virtualization techniques, enables smart phones to overcome the resource limitation constrained by allowing them to computation offload and transfer several parts of application for computation to very powerful cloud servers. The proposed system is based upon the user’s moving path mobility. It will assume the user’s region to finish the process. The proposed system will reduce the response time as well as improve the load balancing.

Published by: Arshdeep Singh, Neena Madan

Author: Arshdeep Singh

Paper ID: V2I3-1193

Paper Status: published

Published: June 23, 2016

Full Details

On the Selection of Optimum Topology for QoS Aware ZigBee-WiMAX based Healthcare Monitoring System

In this work I have proposed different network architectures using OPNET which consists of combination of ZigBee and WiMAX topologies. ZigBee is used to sense the data from the human body whereas WiMAX is used as a backbone to deliver the data at the distant location using microwave links. The nee of using WiMAX with ZigBee arises as ZigBee network’s coverage area is limited to few meters. This paper provides the layout architecture on the healthcare monitoring system developed using different combination of topologies of WiMAX and ZigBee in OPNET. The successful implementation of ZigBee-WiMAX based healthcare network depends upon the performance of the different proposed networks. In this paper the performance comparison is done between six different ZigBee-WiMAX topology combinations which include ZigBee mesh WiMAX mesh, ZigBee star WiMAX mesh, ZigBee tree WiMAX mesh, ZigBee mesh WiMAX Point to Multipoint (P2MP), ZigBee star WiMAX P2MP and ZigBee tree WiMAX P2MP topologies. Through simulations performed in OPNET, QoS parameters like throughput, load and delay have been evaluated to obtain the optimal performance of the proposed system based and to select best suitable topology combination out of the proposed network architectures.

Published by: Karanvir Singh, Jyoteesh Malhotra

Author: Karanvir Singh

Paper ID: V2I3-1192

Paper Status: published

Published: June 23, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X