A Survey on Energy-Efficient Techniques to Reduce Energy Consumption in Delay Tolerant Networks Lalit Kulkarni, Nimish Ukey, Jagdish Bakal and

Size: px
Start display at page:

Download "A Survey on Energy-Efficient Techniques to Reduce Energy Consumption in Delay Tolerant Networks Lalit Kulkarni, Nimish Ukey, Jagdish Bakal and"

Transcription

1 Contents Trust Model for Secure Routing and Localizing Malicious Attackers in WSN... 1 G.M. Navami Patil and P.I. Basarkod Probabilistic Analysis of Performance Measures of Redundant Systems Under Weibull Failure and Repair Laws Indeewar Kumar, Ashish Kumar, Monika Saini and Kuntal Devi Blockage With in Wi-Fi Sensor Networks in Addition to Systems Regarding Controlling Congestion Konda Hari Krishna, Tapas Kumar, Y. Suresh Babu, R. Madan Mohan, N. Sainath and V. Satyanarayana Privacy Preserving Using Video Encryption Technique the Hybrid Approach Karishma Chaudhary and Gayatri Pandi (Jain) Performance Analysis of Improved AODV Routing Protocol in Mobile Ad hoc Network Sanjeev Kumar Srivastava, Ranjana D. Raut and P.T. Karule Slots Loaded Multilayered Circular Patch Antenna for Wi-Fi/WLAN Applications Brijesh Mishra, Vivek Singh, Ajay Kumar Dwivedi, Akhilesh Kumar Pandey, Azeem Sarwar and Rajeev Singh Triggering a Functional Electrical Stimulator Based on Gesture for Stroke-Induced Movement Disorder P. Raghavendra, Viswanath Talasila, Vinay Sridhar and Ramesh Debur Academic Dashboard Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm Aishwarya Suresh, H.S. Sushma Rao and Vinayak Hegde xi

2 xii Contents A Survey on Energy-Efficient Techniques to Reduce Energy Consumption in Delay Tolerant Networks Lalit Kulkarni, Nimish Ukey, Jagdish Bakal and Nekita Chavan Triband Handset Antenna Designing with a High Gain for UMTS/WiMAX/WLAN Applications Sonam Parekh, Rajeev Mathur and Payal Jain Architectural Outline of Decision Support System for Crop Selection Using GIS and DM Techniques Preetam Tamsekar, Nilesh Deshmukh, Parag Bhalchandra, Govind Kulkarni, Kailas Hambarde, Pawan Wasnik, Shaikh Husen and Vijendra Kamble Eval Is Evil: Analyzing Performance of Web Applications Based on PHP and JavaScript by Static Analysis Nilay Shah and Praveen Gubbala A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System) Rita Dewanjee and Ranjana Vyas Simulation and Performance Analysis of Modified Energy Efficient DSR Protocol in MANETs Siddalingappagouda C. Biradar and Prahlad Kulkarni Emotion Recognition on the Basis of Eye and Mouth Arnima Chaurasia, Shailendra Pratap Singh and Divya Kumar Exploration of Machine Learning Techniques for Defect Classification B.V. Ajay Prakash, D.V. Ashoka and V.N. Manjunath Aradya Design and Development of a Real-Time, Low-Cost IMU Based Human Motion Capture System P. Raghavendra, M. Sachin, P.S. Srinivas and Viswanath Talasila Design and Fabrication of Level Sensor for Remote Monitoring of Liquid Levels Fouzan Javeed, Uha Durbha, Fakruddin Baig and Khan Samida A Novel Outlier Detection Scheme (ODS) in Wireless Sensor Networks Shantala Devi Patil and B.P. Vijayakumar Energetic Routing Protocol Design for Real-time Transmission in Mobile Ad hoc Network Mamata Rath, Binod Kumar Pattanayak and Bibudhendu Pati

3 Contents xiii Securing Network Communication Between Motes Using Hierarchical Group Key Management Scheme Using Threshold Cryptography in Smart Home Using Internet of Things Gagandeep Kaur and Er. Kamaljit Singh Saini A Framework for Recyclable Household Waste Management System in Smart Home Using IoT Manpreet Kaur and Er. Kamaljit Singh Saini Feature Extraction in Permanent Human Dentition Radiographs Kanika Lakhani, Bhawna Minocha and Neeraj Gugnani Index-Based Image Retrieval-Analyzed Methodologies in CBIR B. Prasanthi, P. Suresh and D. Vasumathi Advanced Cyber Hiding of Key Logging During Cyber Communication D. Veeraiah and D. Vasumathi Development of Path Loss Models for Localization and Creation of Wi-Fi Map in a Wireless Mesh Test Bed Moirangthem Sailash Singh, Pramod Jayaram, R.K. Nikshitha, P. Prerna, Meghana Deepak and Viswanath Talasila Clustering Algorithms: Experiment and Improvements Anand Khandare and A.S. Alvi Urban Traffic State Estimation Techniques Using Probe Vehicles: A Review Vivek Mehta and Inderveer Chana A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm Deepti Jyotiyana and Varun P. Saxena Proposing an Architecture for Scientific Workflow Management System in Cloud Vahab Samandi and Debajyoti Mukhopadhyay Hand Gesture-Based Control of Electronic Appliances Using Internet of Things Ritima Paul and Bhanu Prakash Joshi VTrack: Emergency Services for Vehicular Networks with Enhanced Security Using Raspberry Pi Pradnya Shidhaye, Pooja Pawar, Hitesh Jha and Jeril Kuriakose

4 xiv Contents Pre-processing Algorithm for Rule Set Optimization Throughout Packet Classification in Network Systems V. Anand Prem Kumar and N. Ramasubramanian Simulation and Comparison of AODV Variants Under Different Mobility Models in MANETs Shiwani Garg and Anil Kumar Verma A Novel Trust Mechanism for Collaborative Recommendation Systems Manjeet Kaur and Shalini Batra Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard Vijay Kumar Sharma and Devesh Kumar Srivastava Comparison and Analysis of RDF Data Using SPARQL, HIVE, PIG in Hadoop Anshul Chandel and Deepak Garg IoT-Enabled Integrated Intelligence System for Automatic Pothole Detection, Pollution Monitoring, Post-Accident Medical Response, and Breakdown Assistance Nikhil Bhat, Krunal P. Bhatt, S. Prithvi Alva, B.M. Tanvi Raj and R. Sanjeetha Railway Security Through Novel Machine-to-Machine Network Implementation Chitra Suman, Lokesh Tharani and Saurabh Maheshwari A Honeypot Scheme to Detect Selfish Vehicles in Vehicular Ad-hoc Network Priya Patel and Rutvij Jhaveri Secret Information Sharing Using Extended Color Visual Cryptography Shivam Sharma, Shivam Modi and Akanksha Sharma Particle Swarm Optimization for Disconnected Wireless Sensor Networks Ramya Sharma and Virender Ranga A Review on Cloud-Based Intelligent Traffic Controlling and Monitoring System Swati Nigade and Anushri Kulkarni Author Index

5

2013 International Conference on Information Systems and Computer Networks (ISCON 2013) Mathura, India 9 10 March IEEE Catalog Number: ISBN:

2013 International Conference on Information Systems and Computer Networks (ISCON 2013) Mathura, India 9 10 March IEEE Catalog Number: ISBN: 2013 International Conference on Information Systems and Computer Networks (ISCON 2013) Mathura, India 9 10 March 2013 IEEE Catalog Number: ISBN: CFP1362U-PRT 978-1-4673-5987-0 Table of Contents TRACK:

More information

UNIVERSITY OF DELHI. (P.G)-M.A. SANSKRIT Part II (Semester IV) Examination, May/June

UNIVERSITY OF DELHI. (P.G)-M.A. SANSKRIT Part II (Semester IV) Examination, May/June (P.G)-M.A. SANSKRIT Part (Semester IV) Examination, May/June - 07 GAZ- SNO/AER/07/550 Page : Date: 8-08-07 The following candidates of Part (IV Semester) Examination held in May, 07 are declared to have

More information

DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS

DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS K. Devarajan and V. Padmathilagam Department of Electrical Engineering FEAT, Annamalai University, Annamalai

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

ALLOTMENT OF TOPICS FOR TERM PAPER WRITING

ALLOTMENT OF TOPICS FOR TERM PAPER WRITING Course: BCA ALLOTMENT OF TOPICS FOR TERM PAPER WRITING Appendix A Year: 2 nd Group: BCA-41 Semester: 4 th S. No. 1 2 3 4 5 6 7 8 9 10 11 University Roll No. 16065106001 16065106002 Name of Students Aayushi

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,

More information

A SURVEY ON MULTI-PATH ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK

A SURVEY ON MULTI-PATH ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK A SURVEY ON MULTI-PATH ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK 1 Er. Rahul K. Ambekar, 2 Dr. Uttam D. Kolekar 1 Research Scholar, Faculty of Engineering, Pacific Academy of Higher, Education and Research

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

Excellence Awardees Q4 (Jan 2017 Mar 2017)

Excellence Awardees Q4 (Jan 2017 Mar 2017) Individual Awards: Excellence Awardees Q4 (Jan 2017 Mar 2017) AP: 1 G Anesh Kumar Land Lease Management 2 A Hanumantha Rao EB ASSAM & NORTH EAST: 1 Alok Kumar Mishra Sales & Marketing BIHAR: 1 Manish Kumar

More information

A Survey on Wormhole attack in VANET

A Survey on Wormhole attack in VANET A Survey on Wormhole attack in VANET Shreya Patel 1, Prof. Pratik Modi 2 1 Research Scholar, Computer Engineering Department, LDRP Institute of Technology & Research, Gujarat, India 2 Professor, LDRP Institute

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

AGE AS ON S.NO ROLL NO NAME OF STUDENT FATHER'S NAME SESSION CLASS DOB 11/02/2018 GENDER

AGE AS ON S.NO ROLL NO NAME OF STUDENT FATHER'S NAME SESSION CLASS DOB 11/02/2018 GENDER 1 1 RISHAV SRIVASTAVA SRI KRISHNA KANHAIYA KUMAR 2017-20 BCA Ist SEM 16-01-2000 18 M 2 2 ANKIT KUMAR SRI AKHILESHWAR KUMAR 2017-20 BCA Ist SEM 13-01-2000 18 M 3 3 SUMIT KUMAR SINGH SRI NARENDRA KUMAR SINGH

More information

Paper publications: A.Y

Paper publications: A.Y Paper s: A.Y 2017-18 a. Faculty Name: Dr. Mrs. Neeta Deshpande 6. 7. Dr. Mrs. Neeta A. Deshapande C0 Classification over Encrepated rational Data Double Faced Data Hiding in images &^ Videos using RIT

More information

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India Comparative Study and Analysis of Cloud Intrusion Detection System Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India ABSTRACT

More information

Secure Routing with Detection Black Hole in MANET: A Study

Secure Routing with Detection Black Hole in MANET: A Study Secure Routing with Detection Black Hole in MANET: A Study Kulwinder singh 1, Shilpa sharma 2 Student of Lovely Professional University, India 1 Assistant Professor, Dept of CSE, Lovely Professional University,

More information

Session Schedule(Computer & IT) SESSION - I

Session Schedule(Computer & IT) SESSION - I SESSI - I DATE: 10/3/2017 TIME: 12.15 P.M. to 1.45 P.M. LOCATI:C-229 SR NO. PAPER ID TITLE AUTHOR 1 17NC333 Clustering for Keyword Extraction in Document Conversation Shivangi. B. Chothani, Prof. Chintan

More information

SHUBHAM ROHILLA 27/02/1998 Male BCA

SHUBHAM ROHILLA 27/02/1998 Male BCA Provisional Merit List for 50% State Quota Open Merit (BCA) for 2nd Round Counseling 1 303608 SHUBHAM ROHILLA 27/02/1998 Male BCA 82102179 491 491.000000 90.000 93.333333 2 302902 SHIVANSH AGGROHIYA 27/11/1996

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Dr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering

Dr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering ISSN: 2321-7782 (Online) Impact Factor: 6.047 Volume 4, Issue 8, August 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case

More information

PRA - EXAMINATION Held in the month of May-2015 Result

PRA - EXAMINATION Held in the month of May-2015 Result Page 1 of 7 GTotal % 1 SANGITA KUMARI 16201210401 131520100004 46 36 52 45 79 258 -- Fail 2 RAJESH PRIYEDARSI 16201310179 141340100022 47 62 74 54 84 321 64.20 Ist Div 3 SURAJ KUMAR JHA 16201310209 141370100002

More information

Multimedia Processing, Communication and Information Technology 2013

Multimedia Processing, Communication and Information Technology 2013 Multimedia Processing, Communication and Information Technology 2013 International Conference on Multimedia Processing, Communication and Information Technology (MCIT 2013) Advances in Engineering and

More information

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK

ABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN

More information

YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD

YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD DEPARTMENT OF COMPUTER ENGINEERING List of Ph.D. Students Enrolled in the University for the year: - 2010-2011 S. No. Name of the student Title/ Topic

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Reputation

More information

Black Hole Attack Prevention on AODV Routing Protocol using Clustering Approach (CBAODV) in MANET

Black Hole Attack Prevention on AODV Routing Protocol using Clustering Approach (CBAODV) in MANET Black Hole Attack Prevention on Routing Protocol using Clustering Approach () in MANET Pandi Selvam Raman Assistant Professor & Head, Department of Computer Science & IT Ananda College, Devakottai, Tamilnadu,India

More information

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic in MANETs Tania Nagpal, Krishan Kumar M. Tech Research Scholar, Associate Professor SBS State Technical Campus, Ferozepur Punjab,

More information

A Review Paper on Secure Routing Technique for MANETs

A Review Paper on Secure Routing Technique for MANETs A Review Paper on Secure Routing Technique for MANETs Sonali Sharma 1, Simranjit Kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani),

More information

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid

More information

Geographical Grid Based Clustering for WSN

Geographical Grid Based Clustering for WSN Geographical Grid Based Clustering for WSN Nancy Jain, Gunjan Jain and Brijesh Kumar Chaurasia ITM University Gwalior India Bkchaurasia.itm@gmail.com Abstract In this work, we have proposed a clustering

More information

Mitigation of Jellyfish Attack in AODV

Mitigation of Jellyfish Attack in AODV Mitigation of Jellyfish Attack in AODV Kamna Sharma 1, Harish Saini 2 1,2 Computer Science and Engineering Department, GNI, Mullana, Haryana, India Abstract: The rapid proliferation of wireless networks,

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

OPT: Ondemand Probabilistic Time Variant Approach for Dynamic Route Selection on Wireless Mesh Networks under Dynamic Traffic Conditions

OPT: Ondemand Probabilistic Time Variant Approach for Dynamic Route Selection on Wireless Mesh Networks under Dynamic Traffic Conditions European Journal of Applied Sciences 8 (2): 87-92, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.2.22878 OPT: Ondemand Probabilistic Time Variant Approach for Dynamic Route

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS

HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS Apeksha Vartak 1 Darshika Pawaskar 2 Suraj Pangam 3 Tejal Mhatre 4 Prof. Suresh Mestry 5 1,2,3,4,5 Department of Computer Engineering,

More information

Detection of Vampire Attack in Wireless Adhoc

Detection of Vampire Attack in Wireless Adhoc Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,

More information

Improving ZRP Protocol against Blackhole Attack

Improving ZRP Protocol against Blackhole Attack Improving ZRP Protocol against Blackhole Attack 1 Chaitas Shah, 2 Prof. Manoj Patel 1 M.E.Scholar, 2 Professor Alpha College of Engineering and Technology, Gandhinagar, India 1 chaitashah@gmail.com Abstract

More information

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,

More information

IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic

IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic 3118 IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic J.Jaslin deva gifty Department of ECE, Dr. Mahalingam College

More information

DETECTION AND PREVENTION OF WORMHOLE ATTACK IN ADHOC NETWORK USING AODV PROTOCOL

DETECTION AND PREVENTION OF WORMHOLE ATTACK IN ADHOC NETWORK USING AODV PROTOCOL Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A Review Paper on Routing Protocols in Wireless Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,

More information

Self-Organization in Sensor and Actor Networks

Self-Organization in Sensor and Actor Networks Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations

More information

MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING

MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING Krishna Dilip Suchak Computer engineering, GEC, Gandhinagar, 382028, Gujarat, India. ABSTRACT Mobile ad hoc network (MANET) is an

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

Keywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,

Keywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network, Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized

More information

Methods to Resolve Traffic Jams using VANET

Methods to Resolve Traffic Jams using VANET Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract VANET has been an important technology for managing

More information

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India

Pritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection and Prevention

More information

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks Abdulrahman Issa Kh Shybub 1, Tarek Mosbah Abdala 2 1, Computer Department Higher Institute

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 INTRUSION DETECTION IN INTERNET OF THINGS A SURVEY T. S. Urmila, Dr. B. Balasubramanian

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme 2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

A survey on AODV routing protocol for AD-HOC Network

A survey on AODV routing protocol for AD-HOC Network A survey on AODV routing protocol for AD-HOC Network Parveen Kumar Jatin Sharma Kriti saini Astt. Professor Research fellow Research fellow Dept. of Computer Science Dept. of Computer Science Dept. of

More information

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging

More information

Energy-Efficient Cluster Formation Techniques: A Survey

Energy-Efficient Cluster Formation Techniques: A Survey Energy-Efficient Cluster Formation Techniques: A Survey Jigisha Patel 1, Achyut Sakadasariya 2 P.G. Student, Dept. of Computer Engineering, C.G.P.I.T, Uka Tarasadia University, Bardoli, Gujarat, India

More information

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance

More information

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET

More information

EMBEDDED SYSTEMS 2017 IEEE PROJECT

EMBEDDED SYSTEMS 2017 IEEE PROJECT EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.

More information

BCA / MCA Viva-voce Exam May, 2018 Venue: IGNOU, REGIONAL CENTRE DELHI-3 (DWARKA) Palam Extension,Near Shaheed Ramphal Chowk, New Delhi

BCA / MCA Viva-voce Exam May, 2018 Venue: IGNOU, REGIONAL CENTRE DELHI-3 (DWARKA) Palam Extension,Near Shaheed Ramphal Chowk, New Delhi INDIRA GANDHI NATIONAL OPEN UNIVERSITY IGNOU REGIONAL CENTRE DELHI-3 (DWARKA) Palam Extension,Near Shaheed Ramphal Chowk, New Delhi-110077 Ph: 011-25088939, 25088944, E. Mail ID: rcdelhi3project@ignou.ac.in

More information

Shivani Dubey JSS Academy of Technical Education, Noida, India. Mamta Dhaiya Ansal University, Gurgram, India

Shivani Dubey JSS Academy of Technical Education, Noida, India. Mamta Dhaiya Ansal University, Gurgram, India Implementation of Latency by Using Distributed Load Balancing Algorithm for Logistics Shivani Dubey JSS Academy of Technical Education, Noida, India Mamta Dhaiya Ansal University, Gurgram, India Sunayana

More information

[Shilpa R et al., 3(6): June, 2016] ISSN Impact Factor 2.675

[Shilpa R et al., 3(6): June, 2016] ISSN Impact Factor 2.675 GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES A SURVEY ON ROUTING PERFORMANCE IN VANET Shilpa R*, Dr. B R Prasad Babu, Mr. Ravi Kumar M * M. Tech Student Dept. of CSE, R&D Centre EPCET,

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Keywords: LEACH, RFID, HARP,

Keywords: LEACH, RFID, HARP, Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Heterogeneous Enhanced

More information

MODAInnovations Complete Academic Project Solutions

MODAInnovations Complete Academic Project Solutions MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In

More information

Overview (Advantages and Routing Protocols) of MANET

Overview (Advantages and Routing Protocols) of MANET Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)

More information

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY Sunil Goyal1 M.Tech Student, Deptt. of CSE GKU TalwandiSabo,India Vinod sharma2 Assistant Professor, Deptt. of CSE GKU TalwandiSabo,India Abstract-The

More information

Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2

Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2 Research Journal of Computer and Information Technology Sciences ISSN 232 6527 Simulation Based Performance Analysis of, and Routing Algorithm in Wireless Personal Area Network Using NS-2 Shivlal Mewada

More information

Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks

Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science (214) www.elsevier.com/locate/procedia Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks

More information

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com

More information

Detection and Prevention of Wormhole Attack in Wireless Sensor Network

Detection and Prevention of Wormhole Attack in Wireless Sensor Network Detection and Prevention of Wormhole Attack in Wireless Sensor Network Aaditya Jain 1, Shalini Sharma 2, Dr. Bala Buksh 3 1 M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

Survey on Delay Based Jellyfish Attack

Survey on Delay Based Jellyfish Attack Survey on Delay Based Jellyfish Attack 1 Mr. Ankit M Vaghela, 2 Prof. Mayank Gour, 3 Prof. Ashish Patel 2 Assistant Professor, 3 Assistant Professor 1, 2, 3 Computer Engineering Department, 1, 2, 3 Silver

More information

Qualitative Based Study of Hybrid Routing Protocols in MANET

Qualitative Based Study of Hybrid Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 12, December 2015,

More information

International Journal of Advance Engineering and Research Development. Improved Technique for Prevention of Black Hole Attack in Mobile Ad Hoc Network

International Journal of Advance Engineering and Research Development. Improved Technique for Prevention of Black Hole Attack in Mobile Ad Hoc Network Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 9, September -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Improved

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 SN

International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 SN International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 146 Survey of Swarm Intelligence Inspired Routing Algorithms and Mobile Ad-Hoc Network Routing Protocols

More information

Review of Prevention and Detection Methods of Black Hole Attack in AODV- based on Mobile Ad Hoc Network

Review of Prevention and Detection Methods of Black Hole Attack in AODV- based on Mobile Ad Hoc Network International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 381-388 International Research Publications House http://www. irphouse.com /ijict.htm Review

More information

A Survey of Digital Image Watermarking Techniques

A Survey of Digital Image Watermarking Techniques A Survey of Digital Image Watermarking Techniques 1 RUPALI NARULA, 2 MEENAKSHI CHAUDHARY 1 M.Tech Student,Deptt. Of CSE 2 Assistant professor Deptt. Of CSE JMIT,Radaur,kurukshetra ABSTRACT Multimedia security

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Prioritized Sweeping Reinforcement Learning Based Routing for MANETs

Prioritized Sweeping Reinforcement Learning Based Routing for MANETs Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 383 ~ 390 DOI: 10.11591/ijeecs.v5.i2.pp383-390 383 Prioritized Sweeping Reinforcement Learning Based

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets Global Journal of Computer Science and Technology: E Network, Web & Security Volume 18 Issue 4 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network 31 Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network Sukhvir Kaur 1, Kulwinder Singh 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2

More information

Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network

Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network S.Hemalatha 1, P.C.Senthil Mahesh 2 1,2 Professor,Panimalar Institute of Technology Chennai, Tamil Nadu 2 Professor,Annamachariyar

More information

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks Communications and Network, 2013, 5, 524-528 http://dx.doi.org/10.4236/cn.2013.53b2096 Published Online September 2013 (http://www.scirp.org/journal/cn) Research on Intrusion Detection Algorithm Based

More information

A Novel Technique to Control Congestion in MANET using Knowledge Base Learning

A Novel Technique to Control Congestion in MANET using Knowledge Base Learning A Novel Technique to Control Congestion in MANET using Knowledge Base Learning Archana Kumari 1, Dr. Shaveta Rani 2, Dr. Paramjeet Singh 3 1 M.Tech Scholar, 2 Associate Professor, 3 Associate Professor

More information

Performance Comparison of Routing Protocols for Remote Login in MANETs

Performance Comparison of Routing Protocols for Remote Login in MANETs Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 7, July 2013, pg.413

More information

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Ravneet Kaur M.Tech Scholar, Computer Science & Engineering (CSE), Lovely Professional University, India. ABSTRACT A Mobile

More information