Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume V Issue XI

Author Name
Swarna Soni, Prof. Gaurav Gupta
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 11
Abstract
Mobile Ad hoc network (MANET) is a set of two or more nodes that are used for wireless communication and networking capacity. These nodes are formed by the wireless hosts, without using preinstalled infrastructure and do not use centralized administration. Routing protocol define a set of rules which regulates the flow of data packets from source to destination. Distinctive features of MANET makes the routing process complex, therefore the routing protocol is very significant for determining the network performance and its networking capacity. In this paper study of AODV, DSDV, AOMDV and PEGASIS is done and the important issue is Energy consumption as mobile nodes in Ad hoc use battery power for operation.
PaperID
2018/IJTRM/11/2018/20513

Author Name
Aakanksha Wasnik, Shalini Sahay
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 11
Abstract
Document binarization plays important role to preserve the historical document. Recently number of researcher present numerous techniques of document binarization that can vary in sensitivity, quality and some more control parameters. Document image analysis (DIA) intends to extract the textual information from image document. Document image binarization, as a pre-processing step of many DIA systems, is very important for the document image understanding and has been investigated for decades. Document digitization is an elderly but still a difficult task. Appearance of historical handwritten document varies with quality of ink and periodic shadings that leads to degrade quality of image.
PaperID
2018/IJTRM/11/2018/20556

Author Name
Pooja Mehra, Dr. Harish Patidar
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 11
Abstract
Vehicular ad hoc Networks (VANETs) allow vehicles to form a self- organized network. VANETs are likely to be widely deployed in the future, given the interest shown by industry in self-driving cars and satisfying their customers various interests. Problems related to Mobile ad-hoc Networks (MANETs) such as routing, security, etc. have been extensively studied. Even though VANETs are special type of MANETs, solutions proposed for MANETs cannot be directly applied to VANETs because all problems related to MANETs have been studied for small networks. Moreover, in MANETs, nodes can move randomly. On the other hand, movement of nodes in VANETs are constrained to roads and the number of nodes in VANETs is large and covers typically large area.
PaperID
2018/IJTRM/11/2018/20623

Author Name
Varsha Kushwah, Prof. Shiva Bhatnagar
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 11
Abstract
In this paper, we design and formulate a novel trust-based routing protocol to secure nodes from attack i.e. Distributed denial-of service attack, in mobile ad hoc networks (MANETs). The innovative approach is employing the idea of a trust model in the network layer of MANET so as to achieve security in mobile ad hoc networks cost-effectively. The main security threat on MANET could be a DDoS attack. DDoS attack has the flexibility to make immense quantity of unwanted traffic. as a result of this the licensed user cannot used the resources properly. It is terribly laborious to notice and management the DDoS attack as a result of massive scale and complicated network environments. The scope of this paper is to study the effects of DDos attack in Ad hoc On-demand Distance Vector (AODV) routing protocol. The new protocol, called TAODV and prevention this attack using security AODV and (T-AODV) Comparative analysis of DDoS attack for both protocols is taken into account.
PaperID
2018/IJTRM/11/2018/20625