A Survey on Energy-Efficient Techniques to Reduce Energy Consumption in Delay Tolerant Networks Lalit Kulkarni, Nimish Ukey, Jagdish Bakal and
|
|
- Terence Jackson
- 6 years ago
- Views:
Transcription
1 Contents Trust Model for Secure Routing and Localizing Malicious Attackers in WSN... 1 G.M. Navami Patil and P.I. Basarkod Probabilistic Analysis of Performance Measures of Redundant Systems Under Weibull Failure and Repair Laws Indeewar Kumar, Ashish Kumar, Monika Saini and Kuntal Devi Blockage With in Wi-Fi Sensor Networks in Addition to Systems Regarding Controlling Congestion Konda Hari Krishna, Tapas Kumar, Y. Suresh Babu, R. Madan Mohan, N. Sainath and V. Satyanarayana Privacy Preserving Using Video Encryption Technique the Hybrid Approach Karishma Chaudhary and Gayatri Pandi (Jain) Performance Analysis of Improved AODV Routing Protocol in Mobile Ad hoc Network Sanjeev Kumar Srivastava, Ranjana D. Raut and P.T. Karule Slots Loaded Multilayered Circular Patch Antenna for Wi-Fi/WLAN Applications Brijesh Mishra, Vivek Singh, Ajay Kumar Dwivedi, Akhilesh Kumar Pandey, Azeem Sarwar and Rajeev Singh Triggering a Functional Electrical Stimulator Based on Gesture for Stroke-Induced Movement Disorder P. Raghavendra, Viswanath Talasila, Vinay Sridhar and Ramesh Debur Academic Dashboard Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm Aishwarya Suresh, H.S. Sushma Rao and Vinayak Hegde xi
2 xii Contents A Survey on Energy-Efficient Techniques to Reduce Energy Consumption in Delay Tolerant Networks Lalit Kulkarni, Nimish Ukey, Jagdish Bakal and Nekita Chavan Triband Handset Antenna Designing with a High Gain for UMTS/WiMAX/WLAN Applications Sonam Parekh, Rajeev Mathur and Payal Jain Architectural Outline of Decision Support System for Crop Selection Using GIS and DM Techniques Preetam Tamsekar, Nilesh Deshmukh, Parag Bhalchandra, Govind Kulkarni, Kailas Hambarde, Pawan Wasnik, Shaikh Husen and Vijendra Kamble Eval Is Evil: Analyzing Performance of Web Applications Based on PHP and JavaScript by Static Analysis Nilay Shah and Praveen Gubbala A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System) Rita Dewanjee and Ranjana Vyas Simulation and Performance Analysis of Modified Energy Efficient DSR Protocol in MANETs Siddalingappagouda C. Biradar and Prahlad Kulkarni Emotion Recognition on the Basis of Eye and Mouth Arnima Chaurasia, Shailendra Pratap Singh and Divya Kumar Exploration of Machine Learning Techniques for Defect Classification B.V. Ajay Prakash, D.V. Ashoka and V.N. Manjunath Aradya Design and Development of a Real-Time, Low-Cost IMU Based Human Motion Capture System P. Raghavendra, M. Sachin, P.S. Srinivas and Viswanath Talasila Design and Fabrication of Level Sensor for Remote Monitoring of Liquid Levels Fouzan Javeed, Uha Durbha, Fakruddin Baig and Khan Samida A Novel Outlier Detection Scheme (ODS) in Wireless Sensor Networks Shantala Devi Patil and B.P. Vijayakumar Energetic Routing Protocol Design for Real-time Transmission in Mobile Ad hoc Network Mamata Rath, Binod Kumar Pattanayak and Bibudhendu Pati
3 Contents xiii Securing Network Communication Between Motes Using Hierarchical Group Key Management Scheme Using Threshold Cryptography in Smart Home Using Internet of Things Gagandeep Kaur and Er. Kamaljit Singh Saini A Framework for Recyclable Household Waste Management System in Smart Home Using IoT Manpreet Kaur and Er. Kamaljit Singh Saini Feature Extraction in Permanent Human Dentition Radiographs Kanika Lakhani, Bhawna Minocha and Neeraj Gugnani Index-Based Image Retrieval-Analyzed Methodologies in CBIR B. Prasanthi, P. Suresh and D. Vasumathi Advanced Cyber Hiding of Key Logging During Cyber Communication D. Veeraiah and D. Vasumathi Development of Path Loss Models for Localization and Creation of Wi-Fi Map in a Wireless Mesh Test Bed Moirangthem Sailash Singh, Pramod Jayaram, R.K. Nikshitha, P. Prerna, Meghana Deepak and Viswanath Talasila Clustering Algorithms: Experiment and Improvements Anand Khandare and A.S. Alvi Urban Traffic State Estimation Techniques Using Probe Vehicles: A Review Vivek Mehta and Inderveer Chana A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm Deepti Jyotiyana and Varun P. Saxena Proposing an Architecture for Scientific Workflow Management System in Cloud Vahab Samandi and Debajyoti Mukhopadhyay Hand Gesture-Based Control of Electronic Appliances Using Internet of Things Ritima Paul and Bhanu Prakash Joshi VTrack: Emergency Services for Vehicular Networks with Enhanced Security Using Raspberry Pi Pradnya Shidhaye, Pooja Pawar, Hitesh Jha and Jeril Kuriakose
4 xiv Contents Pre-processing Algorithm for Rule Set Optimization Throughout Packet Classification in Network Systems V. Anand Prem Kumar and N. Ramasubramanian Simulation and Comparison of AODV Variants Under Different Mobility Models in MANETs Shiwani Garg and Anil Kumar Verma A Novel Trust Mechanism for Collaborative Recommendation Systems Manjeet Kaur and Shalini Batra Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard Vijay Kumar Sharma and Devesh Kumar Srivastava Comparison and Analysis of RDF Data Using SPARQL, HIVE, PIG in Hadoop Anshul Chandel and Deepak Garg IoT-Enabled Integrated Intelligence System for Automatic Pothole Detection, Pollution Monitoring, Post-Accident Medical Response, and Breakdown Assistance Nikhil Bhat, Krunal P. Bhatt, S. Prithvi Alva, B.M. Tanvi Raj and R. Sanjeetha Railway Security Through Novel Machine-to-Machine Network Implementation Chitra Suman, Lokesh Tharani and Saurabh Maheshwari A Honeypot Scheme to Detect Selfish Vehicles in Vehicular Ad-hoc Network Priya Patel and Rutvij Jhaveri Secret Information Sharing Using Extended Color Visual Cryptography Shivam Sharma, Shivam Modi and Akanksha Sharma Particle Swarm Optimization for Disconnected Wireless Sensor Networks Ramya Sharma and Virender Ranga A Review on Cloud-Based Intelligent Traffic Controlling and Monitoring System Swati Nigade and Anushri Kulkarni Author Index
5
2013 International Conference on Information Systems and Computer Networks (ISCON 2013) Mathura, India 9 10 March IEEE Catalog Number: ISBN:
2013 International Conference on Information Systems and Computer Networks (ISCON 2013) Mathura, India 9 10 March 2013 IEEE Catalog Number: ISBN: CFP1362U-PRT 978-1-4673-5987-0 Table of Contents TRACK:
More informationUNIVERSITY OF DELHI. (P.G)-M.A. SANSKRIT Part II (Semester IV) Examination, May/June
(P.G)-M.A. SANSKRIT Part (Semester IV) Examination, May/June - 07 GAZ- SNO/AER/07/550 Page : Date: 8-08-07 The following candidates of Part (IV Semester) Examination held in May, 07 are declared to have
More informationDIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS
DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS K. Devarajan and V. Padmathilagam Department of Electrical Engineering FEAT, Annamalai University, Annamalai
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationALLOTMENT OF TOPICS FOR TERM PAPER WRITING
Course: BCA ALLOTMENT OF TOPICS FOR TERM PAPER WRITING Appendix A Year: 2 nd Group: BCA-41 Semester: 4 th S. No. 1 2 3 4 5 6 7 8 9 10 11 University Roll No. 16065106001 16065106002 Name of Students Aayushi
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationEradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data
Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using
More informationPart I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis
Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,
More informationA SURVEY ON MULTI-PATH ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK
A SURVEY ON MULTI-PATH ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK 1 Er. Rahul K. Ambekar, 2 Dr. Uttam D. Kolekar 1 Research Scholar, Faculty of Engineering, Pacific Academy of Higher, Education and Research
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationExcellence Awardees Q4 (Jan 2017 Mar 2017)
Individual Awards: Excellence Awardees Q4 (Jan 2017 Mar 2017) AP: 1 G Anesh Kumar Land Lease Management 2 A Hanumantha Rao EB ASSAM & NORTH EAST: 1 Alok Kumar Mishra Sales & Marketing BIHAR: 1 Manish Kumar
More informationA Survey on Wormhole attack in VANET
A Survey on Wormhole attack in VANET Shreya Patel 1, Prof. Pratik Modi 2 1 Research Scholar, Computer Engineering Department, LDRP Institute of Technology & Research, Gujarat, India 2 Professor, LDRP Institute
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationAGE AS ON S.NO ROLL NO NAME OF STUDENT FATHER'S NAME SESSION CLASS DOB 11/02/2018 GENDER
1 1 RISHAV SRIVASTAVA SRI KRISHNA KANHAIYA KUMAR 2017-20 BCA Ist SEM 16-01-2000 18 M 2 2 ANKIT KUMAR SRI AKHILESHWAR KUMAR 2017-20 BCA Ist SEM 13-01-2000 18 M 3 3 SUMIT KUMAR SINGH SRI NARENDRA KUMAR SINGH
More informationPaper publications: A.Y
Paper s: A.Y 2017-18 a. Faculty Name: Dr. Mrs. Neeta Deshpande 6. 7. Dr. Mrs. Neeta A. Deshapande C0 Classification over Encrepated rational Data Double Faced Data Hiding in images &^ Videos using RIT
More informationPramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India
Comparative Study and Analysis of Cloud Intrusion Detection System Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India ABSTRACT
More informationSecure Routing with Detection Black Hole in MANET: A Study
Secure Routing with Detection Black Hole in MANET: A Study Kulwinder singh 1, Shilpa sharma 2 Student of Lovely Professional University, India 1 Assistant Professor, Dept of CSE, Lovely Professional University,
More informationSession Schedule(Computer & IT) SESSION - I
SESSI - I DATE: 10/3/2017 TIME: 12.15 P.M. to 1.45 P.M. LOCATI:C-229 SR NO. PAPER ID TITLE AUTHOR 1 17NC333 Clustering for Keyword Extraction in Document Conversation Shivangi. B. Chothani, Prof. Chintan
More informationSHUBHAM ROHILLA 27/02/1998 Male BCA
Provisional Merit List for 50% State Quota Open Merit (BCA) for 2nd Round Counseling 1 303608 SHUBHAM ROHILLA 27/02/1998 Male BCA 82102179 491 491.000000 90.000 93.333333 2 302902 SHIVANSH AGGROHIYA 27/11/1996
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationDr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering
ISSN: 2321-7782 (Online) Impact Factor: 6.047 Volume 4, Issue 8, August 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case
More informationPRA - EXAMINATION Held in the month of May-2015 Result
Page 1 of 7 GTotal % 1 SANGITA KUMARI 16201210401 131520100004 46 36 52 45 79 258 -- Fail 2 RAJESH PRIYEDARSI 16201310179 141340100022 47 62 74 54 84 321 64.20 Ist Div 3 SURAJ KUMAR JHA 16201310209 141370100002
More informationMultimedia Processing, Communication and Information Technology 2013
Multimedia Processing, Communication and Information Technology 2013 International Conference on Multimedia Processing, Communication and Information Technology (MCIT 2013) Advances in Engineering and
More informationABSTRACT I. INTRODUCTION II. PROPOSED FRAMEWORK
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 A Framework to Detect Black Hole Attack in WSN
More informationYMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD
YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD DEPARTMENT OF COMPUTER ENGINEERING List of Ph.D. Students Enrolled in the University for the year: - 2010-2011 S. No. Name of the student Title/ Topic
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationPerformance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario
Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Reputation
More informationBlack Hole Attack Prevention on AODV Routing Protocol using Clustering Approach (CBAODV) in MANET
Black Hole Attack Prevention on Routing Protocol using Clustering Approach () in MANET Pandi Selvam Raman Assistant Professor & Head, Department of Computer Science & IT Ananda College, Devakottai, Tamilnadu,India
More informationCharacterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs
Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic in MANETs Tania Nagpal, Krishan Kumar M. Tech Research Scholar, Associate Professor SBS State Technical Campus, Ferozepur Punjab,
More informationA Review Paper on Secure Routing Technique for MANETs
A Review Paper on Secure Routing Technique for MANETs Sonali Sharma 1, Simranjit Kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani),
More informationGSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid
More informationGeographical Grid Based Clustering for WSN
Geographical Grid Based Clustering for WSN Nancy Jain, Gunjan Jain and Brijesh Kumar Chaurasia ITM University Gwalior India Bkchaurasia.itm@gmail.com Abstract In this work, we have proposed a clustering
More informationMitigation of Jellyfish Attack in AODV
Mitigation of Jellyfish Attack in AODV Kamna Sharma 1, Harish Saini 2 1,2 Computer Science and Engineering Department, GNI, Mullana, Haryana, India Abstract: The rapid proliferation of wireless networks,
More informationDetection and Removal of Black Hole Attack in Mobile Ad hoc Network
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationOPT: Ondemand Probabilistic Time Variant Approach for Dynamic Route Selection on Wireless Mesh Networks under Dynamic Traffic Conditions
European Journal of Applied Sciences 8 (2): 87-92, 2016 ISSN 2079-2077 IDOSI Publications, 2016 DOI: 10.5829/idosi.ejas.2016.8.2.22878 OPT: Ondemand Probabilistic Time Variant Approach for Dynamic Route
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationHYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS
HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS Apeksha Vartak 1 Darshika Pawaskar 2 Suraj Pangam 3 Tejal Mhatre 4 Prof. Suresh Mestry 5 1,2,3,4,5 Department of Computer Engineering,
More informationDetection of Vampire Attack in Wireless Adhoc
Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,
More informationImproving ZRP Protocol against Blackhole Attack
Improving ZRP Protocol against Blackhole Attack 1 Chaitas Shah, 2 Prof. Manoj Patel 1 M.E.Scholar, 2 Professor Alpha College of Engineering and Technology, Gandhinagar, India 1 chaitashah@gmail.com Abstract
More informationImpact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,
More informationIEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic
3118 IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic J.Jaslin deva gifty Department of ECE, Dr. Mahalingam College
More informationDETECTION AND PREVENTION OF WORMHOLE ATTACK IN ADHOC NETWORK USING AODV PROTOCOL
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationA Review Paper on Routing Protocols in Wireless Sensor Networks
A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,
More informationSelf-Organization in Sensor and Actor Networks
Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations
More informationMODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING
MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING Krishna Dilip Suchak Computer engineering, GEC, Gandhinagar, 382028, Gujarat, India. ABSTRACT Mobile ad hoc network (MANET) is an
More informationEMBEDDED MAJOR PROJECTS LIST
CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse
More informationKeywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized
More informationMethods to Resolve Traffic Jams using VANET
Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract VANET has been an important technology for managing
More informationPritesh Jain Asst Professor, Department of CSE, Patel College of Science & Technology, Indore, Madhya Pradesh, India
Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection and Prevention
More informationA Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks
A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks Abdulrahman Issa Kh Shybub 1, Tarek Mosbah Abdala 2 1, Computer Department Higher Institute
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 INTRUSION DETECTION IN INTERNET OF THINGS A SURVEY T. S. Urmila, Dr. B. Balasubramanian
More informationOptimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol
More informationA Survey And Comparative Analysis Of Data
A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th
More information2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme
2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationA survey on AODV routing protocol for AD-HOC Network
A survey on AODV routing protocol for AD-HOC Network Parveen Kumar Jatin Sharma Kriti saini Astt. Professor Research fellow Research fellow Dept. of Computer Science Dept. of Computer Science Dept. of
More informationSecure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging
More informationEnergy-Efficient Cluster Formation Techniques: A Survey
Energy-Efficient Cluster Formation Techniques: A Survey Jigisha Patel 1, Achyut Sakadasariya 2 P.G. Student, Dept. of Computer Engineering, C.G.P.I.T, Uka Tarasadia University, Bardoli, Gujarat, India
More informationA Review on Mobile Ad Hoc Network Attacks with Trust Mechanism
A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance
More informationPROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME
Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET
More informationEMBEDDED SYSTEMS 2017 IEEE PROJECT
EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.
More informationBCA / MCA Viva-voce Exam May, 2018 Venue: IGNOU, REGIONAL CENTRE DELHI-3 (DWARKA) Palam Extension,Near Shaheed Ramphal Chowk, New Delhi
INDIRA GANDHI NATIONAL OPEN UNIVERSITY IGNOU REGIONAL CENTRE DELHI-3 (DWARKA) Palam Extension,Near Shaheed Ramphal Chowk, New Delhi-110077 Ph: 011-25088939, 25088944, E. Mail ID: rcdelhi3project@ignou.ac.in
More informationShivani Dubey JSS Academy of Technical Education, Noida, India. Mamta Dhaiya Ansal University, Gurgram, India
Implementation of Latency by Using Distributed Load Balancing Algorithm for Logistics Shivani Dubey JSS Academy of Technical Education, Noida, India Mamta Dhaiya Ansal University, Gurgram, India Sunayana
More information[Shilpa R et al., 3(6): June, 2016] ISSN Impact Factor 2.675
GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES A SURVEY ON ROUTING PERFORMANCE IN VANET Shilpa R*, Dr. B R Prasad Babu, Mr. Ravi Kumar M * M. Tech Student Dept. of CSE, R&D Centre EPCET,
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationKeywords: LEACH, RFID, HARP,
Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Heterogeneous Enhanced
More informationMODAInnovations Complete Academic Project Solutions
MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In
More informationOverview (Advantages and Routing Protocols) of MANET
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)
More informationBYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY
BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY Sunil Goyal1 M.Tech Student, Deptt. of CSE GKU TalwandiSabo,India Vinod sharma2 Assistant Professor, Deptt. of CSE GKU TalwandiSabo,India Abstract-The
More informationSimulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2
Research Journal of Computer and Information Technology Sciences ISSN 232 6527 Simulation Based Performance Analysis of, and Routing Algorithm in Wireless Personal Area Network Using NS-2 Shivlal Mewada
More informationDynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science (214) www.elsevier.com/locate/procedia Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks
More informationCOMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com
More informationDetection and Prevention of Wormhole Attack in Wireless Sensor Network
Detection and Prevention of Wormhole Attack in Wireless Sensor Network Aaditya Jain 1, Shalini Sharma 2, Dr. Bala Buksh 3 1 M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering
More informationA Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks
A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework
More informationSurvey on Delay Based Jellyfish Attack
Survey on Delay Based Jellyfish Attack 1 Mr. Ankit M Vaghela, 2 Prof. Mayank Gour, 3 Prof. Ashish Patel 2 Assistant Professor, 3 Assistant Professor 1, 2, 3 Computer Engineering Department, 1, 2, 3 Silver
More informationQualitative Based Study of Hybrid Routing Protocols in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 12, December 2015,
More informationInternational Journal of Advance Engineering and Research Development. Improved Technique for Prevention of Black Hole Attack in Mobile Ad Hoc Network
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 9, September -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Improved
More informationInternational Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 SN
International Journal of Advancements in Research & Technology, Volume 2, Issue 9, September-2013 146 Survey of Swarm Intelligence Inspired Routing Algorithms and Mobile Ad-Hoc Network Routing Protocols
More informationReview of Prevention and Detection Methods of Black Hole Attack in AODV- based on Mobile Ad Hoc Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 381-388 International Research Publications House http://www. irphouse.com /ijict.htm Review
More informationA Survey of Digital Image Watermarking Techniques
A Survey of Digital Image Watermarking Techniques 1 RUPALI NARULA, 2 MEENAKSHI CHAUDHARY 1 M.Tech Student,Deptt. Of CSE 2 Assistant professor Deptt. Of CSE JMIT,Radaur,kurukshetra ABSTRACT Multimedia security
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationPrioritized Sweeping Reinforcement Learning Based Routing for MANETs
Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 383 ~ 390 DOI: 10.11591/ijeecs.v5.i2.pp383-390 383 Prioritized Sweeping Reinforcement Learning Based
More informationCyber-Physical Chain (CPChain) Light Paper
Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain
More informationASurveyonTopologybasedReactiveRoutingProtocolsinVanets
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 18 Issue 4 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationIntroduction to VANET
VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of
More informationHybrid Security Using Encryption Algorithm in Wireless Adhoc Network
31 Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network Sukhvir Kaur 1, Kulwinder Singh 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2
More informationIdentifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network
Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network S.Hemalatha 1, P.C.Senthil Mahesh 2 1,2 Professor,Panimalar Institute of Technology Chennai, Tamil Nadu 2 Professor,Annamachariyar
More informationResearch on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks
Communications and Network, 2013, 5, 524-528 http://dx.doi.org/10.4236/cn.2013.53b2096 Published Online September 2013 (http://www.scirp.org/journal/cn) Research on Intrusion Detection Algorithm Based
More informationA Novel Technique to Control Congestion in MANET using Knowledge Base Learning
A Novel Technique to Control Congestion in MANET using Knowledge Base Learning Archana Kumari 1, Dr. Shaveta Rani 2, Dr. Paramjeet Singh 3 1 M.Tech Scholar, 2 Associate Professor, 3 Associate Professor
More informationPerformance Comparison of Routing Protocols for Remote Login in MANETs
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 7, July 2013, pg.413
More informationEnergy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol
Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Ravneet Kaur M.Tech Scholar, Computer Science & Engineering (CSE), Lovely Professional University, India. ABSTRACT A Mobile
More information