Notice Board :

Call for Paper
Vol. 5 Issue 11

Submission Start Date:
Nov 01, 2018

Acceptence Notification Start:
Nov 10, 2018

Submission End:
Nov 15, 2018

Final MenuScript Due:
Nov 30, 2018

Publication Date:
Dec 01, 2018
                         Notice Board: Call for PaperVol. 5 Issue 11      Submission Start Date: Nov 01, 2018      Acceptence Notification Start: Nov 10, 2018      Submission End: Nov 15, 2018      Final MenuScript Due: Nov 30, 2018      Publication Date: Dec 01, 2018




Volume V Issue V

Author Name
Monika Koriya, Khushboo Pawar
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
Wireless sensor nodes can be deployed on a battlefield and organize themselves in a large-scale ad-hoc network. Traditional routing protocols do not take into account that a node contains only a limited energy supply. Optimal routing tries to maximize the duration over which the sensing task can be performed, but requires future knowledge. Wireless sensor network is an ad hoc network. Each sensor is defined with limited energy. Wireless sensor node deployed into the network to monitor the physical or environmental condition such as temperature, sound, vibration at different location. Each node collected the information than transmit to the base station.
PaperID
2018/IJTRM/5/2018/14703

Author Name
Rajib Kumar Roy, Dr. Y.V. Rao
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
An Entrepreneur is the person who not only responsible to start a new business but also wears multiple hats to play various roles. Burning fingers from idea generation to skill assessments, various analysis related to market, business risk, finance, developing overall business strategy, plan forbusiness execution & delivery.Thus, the overall job of an entrepreneur turns out to be very critical as he/she might be responsible to make crucial decisions for business. The understanding of various business processes, organization processes and cater them from thick sense to lean and tailor to business, which plays major role on “making business looks simpler and successful”. Our study will bring the top three areas where every entrepreneur should put more focus to ensure maximumcontrol over business process and confirm success.
PaperID
2018/IJTRM/5/2018/14708

Author Name
Archana Luhan, Prof. Apurva Kukade
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
Wireless networks are gaining popularity to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. there's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed.
PaperID
2018/IJTRM/5/2018/14712

Author Name
Aditi Rawal
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
Voice over Internet Protocol (VoIP) is a transmission technology which integrates the entire world of telephony and data; it has been widely deployed as it reduces the management cost and effort in comparison with services provided by the PSTN. But the combination of telephony and data in one untangled network brings both gains and hindrances to the users. Among several issues that are discussed while using this technology, security is the most vital one. This paper will describe the security threats associated with VoIP and the counter-measures to eradicate the problem. The paper also includes recommendations in respect to the risks and vulnerabilities.
PaperID
2018/IJTRM/5/2018/14720