Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume II Issue I

Author Name
Nilesh Patidar
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
The software quality moon-faced a serious problem of software bugs and error estimation. For the estimation of error and bugs used numerous data processing techniques. Within the series of knowledge mining technique used cluster and classification technique. During this paper presents a survey of software quality analysis victimization cluster technique. Software is of top quality and extremely reliable if it's error-free. Software is error-free if there's no bug present in it or it's free from bugs. Bugs are terribly exhausting to search out. Software Engineering tasks are Programming, Testing, Bug Detection, Debugging and Maintenance. Data mining Techniques are applied on software engineering tasks. Data mining techniques are accustomed mine software engineering knowledge and extract the significant and helpful data. Techniques used for mining software engineering knowledge are matching, clustering, classification etc.
PaperID
2014/IJTRM/12/2014/4816

Author Name
Monti Pal
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
RSA cryptosystem is that the most ordinarily used public key cryptosystem. It’s the primary public key cryptosystem. The strength of this cryptosystem relies on the larger key size. There are several algorithms and variants of RSA. In RSA, encryption keys are Public, however cryptography keys aren’t, thus only the person with the right decryption key will in a position convert cipher into decipher or encrypted message. The keys should be creating in such the way that the decryption key might not be terribly simply deduced from the general public encryption key. During this paper, we've projected an implementation of some trendy variants of the RSA algorithm. In our projected cryptosystem, the decryption is quicker as compared to current RSA Cryptosystem and conjointly secure against common module attack. Also our projected cryptosystem is safer against low decryption involution attack, as a result of we tend to area unit employing a massive worth of d and in our projected cry
PaperID
2014/IJTRM/12/2014/4864

Author Name
Shruti Khare, B. P. Patel, Dr. Ravi Singh Pippal, Dr. Y. K. Rana
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 1
Abstract
In the recent years, the technology of wireless sensor networks has gained a lot of importance. Wireless sensor networks are a special case of ad-hoc wireless networks. A wireless sensor network is a collection of sensor nodes that communicate through wireless links to work together to carry out functions. The sensor nodes’ basic function is to monitor the physical and environmental changes in terms of pressure, humidity, temperature etc. (referred as sensing). Sensor nodes have processing, communication and sensing capabilities. WSNs are used in number of diverse scenarios including area monitoring, health care monitoring, air pollution monitoring, natural disaster prevention, industrial health monitoring, calamity prevention etc. Sensor nodes have small batteries with limited power. Large number of sensor nodes in WSN makes it impractical to replace sensor node batteries. Thus the life time of sensor nodes is an important attribute of a wireless sensor network. The life time
PaperID
2014/IJTRM/12/2014/4905