Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume I Issue VI

Author Name
Gaurav Jain, Yagyapal Yadav
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 6
Abstract
Computer science educators are uniquely positioned to promote greater awareness of Green Computing, using the academic setting to encourage environmentally conscious use of technology. This paper reports on practical techniques that can engage faculty and students, enabling Green computing to be integrated into the classroom and research laboratory. Analysis and empirical evaluation of each reported technique is given, comparing the efficacy of each in terms of energy, environmental and financial cost savings. These results are provided as technological and economic evidence for the benefits of “Going Green,” and to promote education in Green Computing in the classroom, department and research lab
PaperID
2014/IJTRM/11/2014/2813

Author Name
Prachi Lodhi, Prof. Prashant Lakkadwala, Prof. Kamlesh Chopra
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 6
Abstract
In MANET there are many attacks, the black hole attack is one of the well-known security threats in mobile ad-hoc networks. The attacker node utilizes the illegal action to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we will suggest a solution for prevention of attacks and discuss the state-ofthe- art for various routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.
PaperID
2014/IJTRM/11/2014/2841

Author Name
Neha Gupta, Mukti Awad
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 6
Abstract
Current electronics progression has led to many products that have the need to communicate between a series of microcontrollers, whether they be do-it-yourself projects or a commercial product. There are many multiple methods of talking from controller to controller, the popular ones being SPI, I2C, and UART/USART. Out of the mentioned options, UART and USART have gained popularity due to their simplicity; they require no addressing (though it can be used), only two wires to function. A USART is essentially a piece of computer hardware, usually used in conjunction with popular communication standards (such as RS-232), that translates data between parallel and serial forms over a computer or peripheral device serial port.
PaperID
2014/IJTRM/11/2014/2867

Author Name
Ms. Shikha Dongre, Ms. Swati Singh Lodhi, Mr. Dharmendra Gupta
Year Of Publication
2014
Volume and Issue
Volume 1 Issue 6
Abstract
Popularity of internet, attract the user to search data from the web, instead from the book or any other documents. The reason behind this popularity is, everything related to any filed is available on the internet very easily; user does not need to work hard to for searching any data from the web. Persons need to just type the query on the search engine to get result. Sometimes, during search, user does not get proper result after searching, and the huge links open in front of user to select his/her require answer. So by this search, user gets confused and impatient. This has become a big problem of searching on web. In this paper we will be going to show a proposed architecture for semantic question answering system, which will show the significant result in place of unmatched and ambiguous data.
PaperID
2014/IJTRM/12/2014/2905