Notice Board :

Call for Paper
Vol. 5 Issue 8

Submission Start Date:
Aug 01, 2018

Acceptence Notification Start:
Aug 10, 2018

Submission End:
Aug 15, 2018

Final MenuScript Due:
Aug 30, 2018

Publication Date:
Sep 01, 2018
                         Notice Board: Call for PaperVol. 5 Issue 8      Submission Start Date: Aug 01, 2018      Acceptence Notification Start: Aug 10, 2018      Submission End: Aug 15, 2018      Final MenuScript Due: Aug 30, 2018      Publication Date: Sep 01, 2018




Volume II Issue II

Author Name
Akshay Gupta, Prof. Rupali Bhartiya
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 2
Abstract
In today’s world most of the applications are based on the location information of users for identifying the point of interest automatically without the explicit query. Mainly the usages are involving with mobility based devices such as cell phones, PDSA’s, laptops, GPS based devices etc. The device transmits the location information along with the device identity to the location server. Sometimes the application demands more data than it actually needs. There is also a situation where the application uses location information up to certain accuracy. If more accuracy is passed to those applications than there is a chance of security compromises related to confidentiality, integrity and availability. Thus, there must privacy based information handling before passing the values to location server. During the last few years there are various architectural based solutions suggested for serving more privacy in least cost.
PaperID
2015/IJTRM/2/2015/4913

Author Name
Roopesh Kumar Sharma, B. P. Patel, Y. K. Rana, R. S. Pippal
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 2
Abstract
Wireless network is a most popular technique now days where wireless Sensor network is one of the emerging applications of wireless network. The sensor network uses some kinds of devices. There are large number of devices are used in such type of network. These devices are use to collect the data from sensing the environment. Due to huge number of devices the input data collection is also high. To reduce processing of this data there is a need to narrow the processing space. This is knows as data aggression. As there are many approach used in classification of data of sensors. This paper is a general review of wireless sensor network. It also gives some idea on the protocols and security issues of WSN.
PaperID
2015/IJTRM/3/2015/4943

Author Name
Ojasvi Chaniwal, Prof. Minakshi Haldar
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 2
Abstract
Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic positionWiMAX are considered to be the special application of infrastructure-less wireless Mobile ad-hoc network (MANET). In these networks, the speed of the data transmission is very rapid The paper is based on comparison between Ad hoc on demand Distance Vector routing protocol (AODV) and Destination sequenced distance vector routing (DSDV) in WiMAX Scenario on the basis of packet delivery ratio and average delay. Researchers are continuously publishing papers on performance work on WiMAX hence we worked on the issue. The tools which we used for the work of performance analysis are TRACEGRAPH and NETWORK SIMULATOR(NS2).
PaperID
2015/IJTRM/3/2015/4948