Notice Board :

Call for Paper
Vol. 5 Issue 12

Submission Start Date:
Dec 01, 2018

Acceptence Notification Start:
Dec 10, 2018

Submission End:
Dec 15, 2018

Final MenuScript Due:
Dec 30, 2018

Publication Date:
Jan 01, 2019
                         Notice Board: Call for PaperVol. 5 Issue 12      Submission Start Date: Dec 01, 2018      Acceptence Notification Start: Dec 10, 2018      Submission End: Dec 15, 2018      Final MenuScript Due: Dec 30, 2018      Publication Date: Jan 01, 2019




Volume IV Issue III

Author Name
P.K.Sharma, Lohitashav Sharma
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
In today's situation, the fundamental weight age of examination is to lessen the heaviness of item while maintaining its quality. To take care of issue in such manner composite materials assume a critical part. In this paperDiminishing the heaviness of light vehicle is considered. The principal segment of the suspension arrangement of vehicle is leaf spring, it has significant measure of weight, and it is vital it would have adequate quality since it needs to oppose vibrations and shocks amid its working. The unmistakable quality of the paper is to lessen the general weight of suspension framework and enhance stack conveying limit of the leaf spring by utilizing the composite material. The outline contemplations for this review are stress and diversion. The work additionally gives concentrate on the use of FEA idea to think about two materials for leaf spring and propose the one having higher quality to weight proportion. Two materials utilized for examinations are; ordinary steel and
PaperID
2017/IJTRM/3/2017/8027

Author Name
Abhijeet Kour Bagga, Er. Anand S. Sen, Er. Harish Patidar
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
The problem of organizing web application’s web contents in a semantically and systematically is considered under the web structure mining. In addition of that organization of contents according to their importance is subject of content mining in web mining. In this presented work both the techniques are fussed for improving the website/ web application reachability, scalability and search engine friendly structure. Therefore a new model for organizing the web documents on server space using the web mining technique is presented. Basically the web mining is a domain where the web data is analyzed for improving the web structure, web contents and others. In this context proposed data model is an effective effort for improving the performance of web applications.In order to perform the required improvement in automatic manner the web site data is analyzed in three different parameters.
PaperID
2017/IJTRM/3/2017/8028

Author Name
Dipali Patel, Prof. Amiteshwar Bhalavi
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
Mobile ad-hoc network is a promising research area with sensible application. Dynamic and reliable protocols are necessary in MANETs, as they have no infrastructure and their Network topology keep changing continuously. There are different types of protocols for the routing in MANET. In this paper we concentrate on the three popular algorithms Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector Routing (DSDV), Ad-hoc On-Demand Distance Vector Routing (AODV) and Multi Path Multicast Routing Protocol for Provisioning QoS in MANET’s. We are also making a review of comparison among DSDV, OLSR and AODV routing protocols in different network scenario.
PaperID
2017/IJTRM/3/2017/8030

Author Name
Yogita Barange, Assit. Prof. Lal singh Chauhan
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
Security is important factor for several sensor network applications. Wireless sensor Networks (WSN) when deployed in hostile environments as static or mobile, an antagonist will try to physically capture some of the nodes, once a node is captured, it collects all the credentials like keys and identity etc. the attacker will re-program it and repeat the node so as to form replicas and listen the transmitted messages or adjust the functionality of the network. Identity felony ends up in 2 sorts attack: clone and Sybil. In particularly a catastrophic attack against sensor networks wherever one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack is tremendously injurious to many important functions of the sensor network like routing, resource allocation, mis-behavior detection, etc. This paper inspect the threat posed by the replication attack and a number of other novel techniques to find and preserve adjacent to t
PaperID
2017/IJTRM/3/2017/8031