Notice Board :

Call for Paper
Vol. 6 Issue 3

Submission Start Date:
March 01, 2020

Acceptence Notification Start:
March 20, 2020

Submission End:
March 25, 2020

Final ManuScript Due:
March 31, 2020

Publication Date:
March 31, 2020
                         Notice Board: Call for PaperVol. 6 Issue 3      Submission Start Date: March 01, 2020      Acceptence Notification Start: March 20, 2020      Submission End: March 25, 2020      Final ManuScript Due: March 31, 2020      Publication Date: March 31, 2020



Volume I Issue IV

Author Name
AKSHAY JAIN, PRIYANKA DHASAL
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to overcome the attack of initiating / forwarding fake Route Requests (RREQs) that lead to hogging of network resources and hence denial of service to genuine nodes. In this paper, a proactive scheme is proposed that could prevent a spe-cific kind of DoS attack and identify the misbehaving node. Since the proposed scheme is distributed in nature it has the capability to prevent Distributed DoS (DDoS) as well. The performance of the proposed algorithm in a series of simu-lations reveal that the proposed scheme provides a better solution than existing approaches with no extra overhead.
PaperID
14016

Author Name
NATWARLAL PATIDAR
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
BACKGROUND - Hypertension is fast emerging as a modern epidemic in the world. Developed countries are considering it as a leading cause of death but even developing countries do not lag behind in being affected by it. The Hypertension is often called the “Silent Killer as it is asymptomatic in early stages. Foot reflexology is a well-known complementary therapy which claims to help the body achieve homeostasis. It is believed that pressing specific areas on the feet related to specific glands or organs of the body can help these glands and organs to function at their peak, allowing the body to heal itself. METHODOLOGY - The research approach used for study was quasi-experimental (Non-equivalent control group) research design. The sample size consisted of 60 hypertensive patients and were selected on the basis of the sampling criteria of convenient purposive sampling technique for the study. The tool used were, Part–A: Consists of demographic data of the samples &Part–B: consist of Ass
PaperID
14018

Author Name
SAPNA RAJAK, SONAL CHOUDHARY
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
The wireless sensor network is an emerging technology in the current scenario. There are number of devices are dependent on the approach of ad-hoc network. Sensors are also one of the important devices among them. In sensor network attack can possible due to loophole of the network. The wormhole attack is one of the types in this manner. This paper is a brief study of wireless sensor network and various types of attacks which can happen in this type network.
PaperID
14022

Author Name
Chandrashekhar Sahu, Nikhilesh Barve
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
Resource allocation in wireless mesh network is very critical task. For the allocation of resource such as channel used various scheduling technique such as centralized and distributed. In centralized technique the allocation of channel resource shares in single window process. For the improvement of the performance various authors used various optimization techniques such as DCF game theory and other heuristic function. In this paper used genetic algorithm for the selection of resource such as cannel in wireless mesh network. By the genetic algorithm the selection of channel is very fair and improved the channel capacity and decreases the value of degree of interference. The proposed system of channel selection simulate in MATLAB 7.8.0 software. This software is well known simulation software for the analysis of communication network
PaperID
IJETAS/AUG/2015/14020

Author Name
Megha Jain, Pushpa Singh
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
In this research article we've introduced brand method for image retrieval fast, In this paper we propose an engine to retrieve an image with the help of wavelet transform using the color histogram method, and the major issues of this project are the fixed size of an image dataset because to maintain the efficiency of the proposed system. We use two main functions for calculating the system performance is PRECISISON and RECALL. The primary aim is to design a system from low level feature towards high level feature and retrieving image based on content such as texture and color is still a big issue of challenging. Color and texture are the abstract information about our research. Further the recent wavelet based retrieval has been a new way of pictorial data storage and retrieval within limited space. The proposed system is implemented in MATlab 8.0 software. MATlab software contains the discrete wavelet transform structure for implementation. MATlab is easy and pl
PaperID
IJETAS/AUG/2015/14024

Author Name
JYOTI PATEL, RAVI VISHWAKARMA
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
Automobile have become a very important part of our modern life style. But the future of automobile based on internal combustion engines has been badly affected by two major problems. That is less availability of fuel and environmental degradation. So it is very important to found some new renewable non polluting alternative fuels to ensure the proper and safe survival of internal combustion engines. In this study, the first approach was selected with the aim of improving the combustion characteristics of gasoline, which will be reflected in improving the engine Performance and that is done by mixing ethanol as a Additives which is integral part of today’s fuel. They are chemicals, which are added in small quantities either to enhance fuel performance or to correct a deficiency. They can have surprisingly large effects even when added in little amount. As we all know that modification in engine and change in composition of fuel are two methods by which we improve the performance of an
PaperID
IJETAS/AUG/2015/14032

Author Name
Sheeraz khan, RAVI VISHWAKARMA
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
The demand for effective and compact heat exchangers are continuously increasing in the automotive industry, refrigeration and air-conditioning applications has necessitated the use of various interrupted surfaces to augment air-side heat transfer. Fins are normally used to increase heat transfer coefficient and increasing efficiency of heat exchanger. We are using computational fluid dynamics (CFD) suitable software for analyse the heat transfer rate of heat exchanger with different boundary conditions, we can analyse easily all data as compared to experimental setup. And find out best feasible solution by CFD analysis. The objective of this study was to numerically simulate the heat transfer and flow characteristics for a helical fintube heat exchanger for different fin pitch (p) and different Reynolds no.(Re) using CFD analysis software Ansys FLUENT.
PaperID
IJETAS/AUG/2015/14030

Author Name
Himashu Mudgal, Pankaj jaiswal
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
Security is relevant for many sensor network applications. Wireless Sensor Networks (WSN) is often deployed in hostile environments as static or mobile, where an antagonist can physically capture some of the nodes, once a node is captured, antagonist collects all the credentials like keys and identity etc. the attacker can re-program it and repeat the node in order to eavesdrop the transmitted messages or adjustment the functionality of the network. Identity burglary leads to two types attack: clone and Sybil. In particularly a catastrophic attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be enormously injurious to many important functions of the sensor network such as routing, resource allocation, mis-behavior detection, etc. This paper inspect the threat posed by the replication attack and several novel techniques to detect and defend against
PaperID
IJETAS/AUG/2015/14028

Author Name
Manoj Patidar, Zaheer Uddin
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
In this paper we observe how wavelet transforms can be implemented to scale and translate a noise speckle image into a multi-resolution analysis representation. Bivariate shrinkage function used to reduce noise speckle at different resolution levels. These results obtained have shown significant speckle reduction then standard filter methods such as Lee filter, Kuan filter and median filter are among the better denoising algorithms in radar community. In this paper we see the performance of different speckle filters. In recent years, wavelet-based denoising algorithm has been studied and applied successfully for speckle removal in SAR images. Compact support of wavelet basis functions allows wavelet transformation to efficiently represent functions or signals, which have localized features. Then we remove speckle noise using wavelet-based method. Finally we concluded that denoising using wavelet-based algorithm is more efficient than standard speckle filters.
PaperID
IJETAS/AUG/IJETAS/14034

Author Name
Pritesh Kumar Agnihotri, Pratima Gautam
Year Of Publication
2015
Volume and Issue
Volume 1 Issue 4
Abstract
In this Paper we proposing an encryption method in which transfer of files between two peer occur efficiently. This model propose downloading and uploading a file in encrypted form. This model proposed practical approach to transfer data efficiently and show the enhanced performance of system for better throughput. This proposed method predicts the performance of the system and computes the values of the technical parameters that achieve a desired performance. It increases the performance of network by reducing file transfer delay. This method is easy to implement and also provide good security for the information exchanged. This method is useful in peer to peer network for providing security as well as greater throughput.
PaperID
IJETAS/AUG/14026