Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume II Issue IX

Author Name
Nitesh Mishra, Prof. Shaileena John
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 9
Abstract
TCP Congestion management is finish to finish management mechanism. that is enforced through dominant some important parameter amendment scrutiny to wireless networks, there are many various characteristics in wireless environments. In this paper Enhanced mechanism for tcp |transmission management protocol TCP protocol communications protocol corruption control is presented. It considers the influences to protocol sender’s packet sending rate not solely by the congestion however conjointly by the corruption. The causation window are going to be calculated when every transmission, in line with range of corrupt data packet. So, there is less packet drop occurring in data transmission. The comparative study of recent protocol traffic control with alternative protocol variants is additionally presented with variation in node speeds, pause time and number of nodes in network.
PaperID
2015/IJTRM/9/2015/5640

Author Name
Mahendra patel, Rajesh Kumar Chakrawarti
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 9
Abstract
though Cloud offers sophisticated storage and access environment. it is not hundred percent reliable; the challenge exists in ensure the authoritative access. Since third parties formulate the decision concerning our data, security is a big concern. So cloud be required to ensure that the data accessed is by the trusted users. Cloud computing uses multi-domain environments and every of which having dissimilar necessities for security. To get better the document retrieval accuracy, the search consequence should be ranked by the cloud server according to a number of ranking criteria. at last, the access control technique is working to supervise decryption capabilities given to users and the data compilation can be updated in terms of inserting novel documents, updating existing documents, and deleting alive documents.
PaperID
2015/IJTRM/9/2015/5650

Author Name
Dr. Vikash Kumar Singh, Devendra Singh Kushwaha, Manish Taram, Nikhilesh Ganvir
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 9
Abstract
Big data is a collection of data sets which is very large in size as well as complex. Generally size of the data is Petabyte and Exabyte. Every organization has big data. This big data contains structured, semi structured and unstructured data. Social networking users are increasing so the data of the social networking sites are also increasing rapidly. Mostly these data consists of images, videos, audios, conversations and e-mails. They are unstructured big data. So there is a need to process this data intelligent. In this paper, we discuss security issues for cloud computing, Big data, Map Reduce and Hadoop environment. The main focus is on security issues in cloud computing that are associated with big data. Big data applications are a great benefit to organizations, business, companies and many large scale and small scale industries.We also discuss various possible solutions for the issues in cloud computing security and Hadoop.
PaperID
2015/IJTRM/9/2015/5661

Author Name
Ms. Harsha verma, Mr. Jitendra Dangra, Dr. M.K. Rawat
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 9
Abstract
This paper presents the review of the various existing and recently proposed location privacy preserving techniques in wireless sensor networks (WSNs) against a local as well as global eavesdropper. Knowledge of the network topology in Local eavesdropper is limited while global eavesdropper can analyze the overall traffic pattern. Privacy preservation techniques are broadly classified into two categories data oriented privacy and context oriented privacy. Data oriented privacy focuses on the data that is being collected and then send to the sink. Context oriented privacy is the contextual information like that of the physical location or time of the event. This survey paper compares the various privacy preserving techniques on the basis of parameters like efficiency, message overhead, power consumption, accuracy and delay.
PaperID
2015/IJTRM/9/2015/5684