Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume IV Issue III

Author Name
P.K.Sharma, Lohitashav Sharma
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
In today's situation, the fundamental weight age of examination is to lessen the heaviness of item while maintaining its quality. To take care of issue in such manner composite materials assume a critical part. In this paperDiminishing the heaviness of light vehicle is considered. The principal segment of the suspension arrangement of vehicle is leaf spring, it has significant measure of weight, and it is vital it would have adequate quality since it needs to oppose vibrations and shocks amid its working. The unmistakable quality of the paper is to lessen the general weight of suspension framework and enhance stack conveying limit of the leaf spring by utilizing the composite material. The outline contemplations for this review are stress and diversion. The work additionally gives concentrate on the use of FEA idea to think about two materials for leaf spring and propose the one having higher quality to weight proportion. Two materials utilized for examinations are; ordinary steel and
PaperID
2017/IJTRM/3/2017/8027

Author Name
Abhijeet Kour Bagga, Er. Anand S. Sen, Er. Harish Patidar
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
The problem of organizing web application’s web contents in a semantically and systematically is considered under the web structure mining. In addition of that organization of contents according to their importance is subject of content mining in web mining. In this presented work both the techniques are fussed for improving the website/ web application reachability, scalability and search engine friendly structure. Therefore a new model for organizing the web documents on server space using the web mining technique is presented. Basically the web mining is a domain where the web data is analyzed for improving the web structure, web contents and others. In this context proposed data model is an effective effort for improving the performance of web applications.In order to perform the required improvement in automatic manner the web site data is analyzed in three different parameters.
PaperID
2017/IJTRM/3/2017/8028

Author Name
Dipali Patel, Prof. Amiteshwar Bhalavi
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
Mobile ad-hoc network is a promising research area with sensible application. Dynamic and reliable protocols are necessary in MANETs, as they have no infrastructure and their Network topology keep changing continuously. There are different types of protocols for the routing in MANET. In this paper we concentrate on the three popular algorithms Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector Routing (DSDV), Ad-hoc On-Demand Distance Vector Routing (AODV) and Multi Path Multicast Routing Protocol for Provisioning QoS in MANET’s. We are also making a review of comparison among DSDV, OLSR and AODV routing protocols in different network scenario.
PaperID
2017/IJTRM/3/2017/8030

Author Name
Yogita Barange, Assit. Prof. Lal singh Chauhan
Year Of Publication
2017
Volume and Issue
Volume 4 Issue 3
Abstract
Security is important factor for several sensor network applications. Wireless sensor Networks (WSN) when deployed in hostile environments as static or mobile, an antagonist will try to physically capture some of the nodes, once a node is captured, it collects all the credentials like keys and identity etc. the attacker will re-program it and repeat the node so as to form replicas and listen the transmitted messages or adjust the functionality of the network. Identity felony ends up in 2 sorts attack: clone and Sybil. In particularly a catastrophic attack against sensor networks wherever one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack is tremendously injurious to many important functions of the sensor network like routing, resource allocation, mis-behavior detection, etc. This paper inspect the threat posed by the replication attack and a number of other novel techniques to find and preserve adjacent to t
PaperID
2017/IJTRM/3/2017/8031