Notice Board :

Call for Paper
Vol. 5 Issue 8

Submission Start Date:
Aug 01, 2018

Acceptence Notification Start:
Aug 10, 2018

Submission End:
Aug 15, 2018

Final MenuScript Due:
Aug 30, 2018

Publication Date:
Sep 01, 2018
                         Notice Board: Call for PaperVol. 5 Issue 8      Submission Start Date: Aug 01, 2018      Acceptence Notification Start: Aug 10, 2018      Submission End: Aug 15, 2018      Final MenuScript Due: Aug 30, 2018      Publication Date: Sep 01, 2018




Volume II Issue XII

Author Name
Yogesh k Yadav, Prof. Sujeet Mishra
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
Wireless sensor network (WSN) is an important and protesting analysis sphere. The routing protocols become distinguish and protect a good route between source and destination nodes in these static networks. Numerous routing protocols have been recommended for mobile ad hoc networks, and none can be perceived as the finest under all conditions. This work consist a systematic comparative evaluation of AODV, DSDV, AOMDV and PEGASIS. This work containing evaluates the static network on a range of WSN’s with between 10, 15 and 20 nodes, which are static nodes. The network comparison metrics is Residual Energy.
PaperID
2015/IJTRM/12/2015/6218

Author Name
Apurva Patidar, Mohsin Sheikh
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
In cloud computing, data is moved to a remotely located cloud server. Cloud server faithfully stores the data and return back to the owner whenever needed. Data and computation integrity and security are major concerns for users of cloud computing facilities. Today's clouds typically place centralized, universal trust in all the cloud's nodes. This simplistic, full-trust model has the negative consequence of amplifying potential damage from node compromises, leaving such clouds vulnerable to myriad attacks. Many users place their data in the cloud and so data integrity is very important issue in cloud storage. After moving the data to the cloud, owner hopes that their data and applications are in secured manner. The Main Aim of this research is to provide security in the cloud with the help of the Third Party Auditor. This is done to enhance the hardness in security by the RSA encryption algorithms by adding some more security codes. Encryption is the vital part of information sharing
PaperID
2015/IJTRM/12/2015/6227

Author Name
Chudaman Bhute, Anil Khandekar, K. Anil Kumar
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, healthiness related applications, control and tracking applications and atmosphere and locale monitoring applications.How to use Energy saving and QoS of the network. However, sensor nodes represent a major drawback mainly in terms of energy autonomy and therefore of life period, for the batteries have to be too little power. This is the reason why demanding research is being conducted nowadays on how to control sensor energy consumption within a network. For this purpose we use our approach to design energy saving methodology and calculate energy consumption within wireless sensor network for each node wireless sensor networks, according to the packet data rate (PDR), and throughput.PDR is the proportion to the total amount of packets reached the receiver and amount of packet sent by source the quantity of nodes and the distance between them. Sensor networks are constructed to
PaperID
2015/IJTRM/12/2015/6230

Author Name
Pinky Singh, Margi Patel
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
Mobile Ad-Hoc Network is an autonomous group of mobile users that communicate using wireless links with no support from any pre-existing infrastructure network and used as a highly reliable endto- end protocol for transporting applications. In this paper analysis of the four TCP variants (New Reno, SACK, TCP TAHOE and VEGAS) under a variety of network conditions. The simulations results reveal that out of the four, the SACK variant can adapt relatively well to the changing network sizes while the VEGAS performs most robustly in different node density scenarios. On the other hand, the research asserts the fact of superiority of, reactive protocol over proactive protocol when routing the same traffic in the network. Nonetheless, among the reactive protocols AODV performance (in the presence of a high mobility) has been found to be remarkable.
PaperID
2015/IJTRM/12/2015/6249