Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume I Issue II

Author Name
Alka Soniya, Pawan Ratadiya
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 2
Abstract
The software system development came in to existence around 60 years ago. Right from the start to until date the software engineering is continuously evolving the new techniques for developing fast, cheap and top quality software. During this paper, we've given an outline of existing size and effort estimates for software. Of these estimates are delineated a lot of or less on their own. Size & effort estimation could be a very talked-about task. Everything revolves around cost, schedule and quality. One such evolving field of software development is estimation models for software size and effort. Software size estimation is one among the most necessary inputs for software cost and effort estimation. Therefore improving the accuracy of software size estimation ultimately results in improving the accuracy of the software effort and cost estimates. These estimates are utilized in staffing, scheduling, planning, budgeting etc. however after we figure these estimates, solely high level project necessities are accessible to us. Using this high level data to provide correct software size estimates could be an extremely difficult task.
PaperID
IJTRM/01/02/1019

Author Name
Umesh Namdev
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 2
Abstract
Security threat and routing holes in wireless scenario are additional frequent than different networks. Lack of infrastructure and centralized watching exploitation limited battery power are the crucial purpose. Attackers can merely launch associate degree attack to consumed resources of wireless network like battery power packet dropping attack in device network. In such exploiting condition associate degree antagonist node may launch various attacks to disturb the communication in WSN. Amidst of such attacks packet dropping and modifier are the foremost prevailing attacks. In packet dropping attack compromising nods starts dropping each and each packet pass from him (node) or modify the packet before forwarding in a very later attack. In wireless device network, there are such a big amount of challenges and issues as already been mentioned and projected. The foremost challenges are how to offer most periods of time to network and also the way to supply hardiness to network. In device network, the energy is principally consumed for three purposes: data transmission, signal process, and hardware operation. Throughout this article we've Propose machine learning based mechanism to spot the routing holes on wireless device network. The conception lies on social behavior of the human society within that individual’s behavior is that the benchmark to create your mind up his credibility within the network. Projected system works on the conception of the anomaly detection owing to unlabelled data manufacture by the device nodes. The target of this analysis article is to identify packet dropping and modifier in wireless device network against the set of qualitative performance metrics.
PaperID
IJTRM/01/02/1021

Author Name
Harish Indriya, G.S. Darbar
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 2
Abstract
Mobile ad hoc Netwo is bank on the cooperation of nodes to provide the basic operation like routing. For industrial deployment of those networks, it's important that they consider adequate security measures. Selfish behavior of ad hoc network nodes like wormhole attack could be a serious threat to mobile ad-hoc network because it cannot be detected easily may greatly degrade the performance of network. Such behavior ought to be known and isolated. This paper uses demonstrate totally different existing worm hole deduction mechanism and discus downside in existing mechanism.
PaperID
IJTRM/01/02/1030