Notice Board :

Call for Paper
Vol. 5 Issue 12

Submission Start Date:
Dec 01, 2018

Acceptence Notification Start:
Dec 10, 2018

Submission End:
Dec 15, 2018

Final MenuScript Due:
Dec 30, 2018

Publication Date:
Jan 01, 2019
                         Notice Board: Call for PaperVol. 5 Issue 12      Submission Start Date: Dec 01, 2018      Acceptence Notification Start: Dec 10, 2018      Submission End: Dec 15, 2018      Final MenuScript Due: Dec 30, 2018      Publication Date: Jan 01, 2019




Volume II Issue X

Author Name
Sapna Parmar, Prof. Priyanka Dhasal
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 10
Abstract
In the new era of communication, WiMAX (IEEE 802.16) is the most emerging technology that enables ubiquitous delivery of broadband wireless access for fixed and mobile users. It is a more innovative and commercially viable alternative to cable modems and DSL technologies as it is cost effective, easy to implement, high performance and high resource utilization technology. This economic environment has led to the development of the IEEE 802.16 standards [1] to support broadband wireless multi-service access in metropolitan area. In addition, the Worldwide Interoperability for Microwave Access (WiMAX) Forum [2] has been formed which promotes the technology and provides compatibility and interoperability for 802.16 -based products. Accordingly, the term WiMAX is often used interchangeably with IEEE 802.16 technologies.
PaperID
2015/IJTRM/10/2015/5819

Author Name
Vikas Yadav, Prof. Priyanka Dhasal
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 10
Abstract
Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability.
PaperID
2015/IJTRM/10/2015/5828

Author Name
Ms. Sonal Modh, Dr. M.K. Rawat
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 10
Abstract
In the world of wireless network Cloud computing play major role rather than as a facility in a profitable manner. In addition of that it convey services that enable us to run data and data accelerated applications. The security in cloud environment is foremost durable and the private internet entrance area is also secured. But the problem is that security is not implementing in between two secure networks it is executed over untrusted network. Therefore a service is enforced to design which transfer the data in secure manner.The mobile devices are available with powerful processing ability but their storage is found shorter. Thus a service that enables us to run data and data intensive application is desired to implement for mobile devices. Instead of security in between two secure networks during the data transmission, their storage and privacy administration is required to organize in protective manner.
PaperID
2015/IJTRM/10/2015/5873

Author Name
Preeti Sharma, Mr. Jitengra Dangra
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 10
Abstract
Mobile ad-hoc network is a wireless communication supported infrastructure network having high mobility and dynamic topologies. The nodes are continuously in motion causes dynamic change in their position updates which generates a burdensome for them to handle this without any hardware infrastructure elements. Localization is divided into two major categories of range based and range free. Range free localization requires high node density and its accuracy depends on the network topology. But sometimes there node density is not available and then the system generates the weak location estimates. Also the environmental factors such as time synchronization and accuracy are not handled properly in range free localizations. The objective with this work is to improve the localization accuracy with fewer resource constraints and reduce the dependencies on any additional hardware devices. During the study we also found that there is no uniform test bed available for implementing or
PaperID
2015/IJTRM/10/2015/5889