No. |
Title and Author |
Area |
Country |
Page |
401 |
A Survey for Black Hole Attack in MANET
-Abdullah Mukhtar ; Arun Kumar
Mobile Ad Hoc Network (MANET) is a major next generation wireless technology which is mostly used in future. MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predefine organization of available links. In a MANET mobile node will be increases and moveable, so that attacker will be attack by a malicious node which brings great challenges to the security of Mobile Ad Hoc network. The Black hole attack is one of such security issue in MANET. Our focus is specifically is on ensuring the security against the Black hole attack with the help of the popular routing protocol which is mostly used in MANET. Read More...
|
Computer Science & engineering |
India |
1530-1533 |
402 |
Doubleguard: Detecting Intrusion in Multitier Web Application
-Rekha Chauhan ; Raina Ritu; Charu Nair
Nowadays web services and applications have become an integral part of our life which lets us communicate, store and handle our data from any part of the world. These services and applications are provided through web servers which use database server. These web servers are vulnerable to attacks. Hence, it becomes necessary to prevent an unauthorized access that threats the confidentiality, integrity and authority of an user. Tools available in the market individually detect the abnormal network traffic sent either to the web IDS and database IDS. In proposed system, Double Guard an IDS , which monitors both web and subsequent database requests by modeling the network behavior of user sessions which prevents attacks that an independent IDS would not identify. The proposed system uses Apache web server with MYSQL and Lightweight Virtualization. Read More...
|
Information Technology |
India |
1534-1537 |
403 |
A Multifunctional Robotic Arm for Industrial Application
-T.Sam David ; R.Giridharan; P.Tamilarasan
Robotics playing a vital role in the modern era of technology. A robot can be defined as a mechanical device programmed to perform a manipulative task under automatic control. Robots are normally used in conjunction with auxiliary devices such as machines and fixtures. Due to technological advancement robot has become an integral part of automation in a manufacturing process. Because of rapid advancement in technology, automation is must in all areas of manufacturing and in human comfort. We propose a designing model which gives an idea about how robotics can improve production, accuracy in industrial applications as well as reduce human casualties in hazardous area. Read More...
|
BIOMEDICAL ENGINEERING |
India |
1538-1540 |
404 |
Implementation of an Algorithm for Efficient Congestion Control in Wireless Sensor Networks
-Krunal S.Dhengre ; K.S.Bapat
as applications in Wireless Sensor Networks are evolving day by day, congestion control remains an open and a critical problem. In wireless sensor networks, congestion occurs when traffic load exceeds maximum buffer capacity that is known as stack overflow. It also occurs because of channel contention, packet collision, reporting rate and dynamically time variable wireless channel conditions. Because of this overall channel quality get degrade and leads to buffer drops and increased delays. Hence in this paper we are going to use such a hybrid congestion control algorithm which can bridge two different techniques so that nodes in the network are able to understand which algorithm they should go with depending on the type of congestion occurs in a network. Read More...
|
Electronics & Telecommunication |
India |
1541-1542 |
405 |
Review on Energy Aware Virtual Machines Consolidation in Data Centers of Cloud
-Naisargi Patel ; Govind Patel; Rajesh Patel
the numbers of datacenters are increasing with the use of cloud services. Datacenters are actually hazardous to the environment because of high energy usage and increase in carbon emission. Energy efficiency in datacenters is major issue in cloud computing, it will lead to improve physical infrastructure of modern datacenters through energy management and resource utilization. It is quint essential to reduce energy in delivery of computing resources and utilization of resources to serve application workload. Dynamic virtual machine consolidation is effective way to reduce energy consumption and better utilization of resources. The VM consolidation ensures that computing resources are efficiently utilized to serve applications workload so as to minimize energy consumption while maintaining the required QoS. VM consolidation determines in four sub problem like host overload/ under load detection, VM selection, VM placement to reduce overall energy consumption. Read More...
|
Computer Engineering |
India |
1543-1547 |
406 |
An Analysis of Mobile Gaming Development
-M Rajesh Roshan
Mobiles, Tablets and other wearable devices are much relies on gaming platform. The mobile games are vital in making mobile industry beneficial for media and entertainment industries. Since they rely there is a major shift in the gaming industry towards mobile platform. This paper mainly stress on different mobile platforms and industrial ecosystem. This shift has brought good tidings for the major mobile game companies to develop mobile Apps and to market them. Apart from communication through mobile with the apps platform the usage of mobile has rapidly increased. Being people spent much time on Apps and Mobile Games on smart phones these shift gaming companies to beneficial level. The profit census of top gaming companies are higher and profit percentage going to increase in coming years. Read More...
|
Computer ScienceEengineering |
India |
1548-1551 |
407 |
Overview of Structural Quality process and Error Sensitivity in Image Processing
-M.Yuvaraj
There are methods for assessing original image quality. These are traditionally designed to find the errors (differences) between the distorted images and a reference images, using a different properties of human image visual system. The quality image processing is based on good assessment of structural information and error sensitivity. This paper is all about developing Structural image visual process. Read More...
|
computer science engineering |
India |
1552-1555 |
408 |
Experimental Investigation of PMEDM on AISI 1045
-Rathod Ramdevsinh R. ; Asst. Prof. Divyesh Patel
The EDM is a non-traditional machining process that involved a transient spark discharges through the fluid due to the difference between the electrode and the work piece. In PMEDM process Powder of different material is being suspended in dielectric during machining, numerous research results show that PMEDM process improve the MRR, surface roughness and surface quality. In the present work, it is aimed to perform Powder mixed electro discharge machining of Al 1045 material of specified depth using electrode made from copper material while Graphite powder of varied concentration is suspended in dielectric. Taguchi orthogonal array has been used for present experimentation. Discharge current (Ip), Gap voltage (Vg), Pulse-on time (ton). Read More...
|
Mechanical Engineering |
India |
1556-1559 |
409 |
Performance Analysis of Binary to Gray Code Converter Using Reversible Logic Gates
-A. Ellakkia ; N. Dharshini; G. Dinesh Kumar; S. Gowtham; A. Ram Kumar
In this technological world development in the field of nanometer technology makes power consumption of logic gates as minimum as possible. Reversible logic design became the promising technologies gaining greater interest due to less dissipation of heat and low power consumption .the main objective of the proposed system is To reduce the transistor count, power consumption and delay using reversible logic gates .In digital systems code conversion is a widely used process for reasons such as enhancing security of data. Using the micro wind software which is Reducing the complexity of arithmetic operations and thereby reducing the hardware required, dropping the level of switching activity leading to more speed of operation and power saving. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1560-1562 |
410 |
Characteristics, Applications and Attacks of Wireless Sensors Networks Based Upon Its Working
-S.Sai Srinvas ; T.Fahad Iqbal
Wireless device networks of spatially distributed autonomous sensors to observe physical or environmental conditions, like high temperature, sound, force etc. and to hand in glove pass their knowledge through the network to a main location. however deed knowledge from the preparation space of a WSN isn't continually simple and multiple problems arise, Wireless device networks utilize quick, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. further Wireless device networks issues embody the external atmosphere, routing, knowledge aggregation, and guaranteeing quality of service and security. Solutions are developed for numerous forms of application situations, however several issues static stay as open analysis challenges. the event of wireless device networks was actuated by military applications like field of battle surveillance; nowadays such networks are utilized in several industrial and shopper applications, like process watching and management, machine health watching. Wireless Sensor Networks: Present Status and Upcoming Trends shields the numerous issues related with WSNs, including their construction, actions, and applications. Read More...
|
computer science engineering |
India |
1563-1565 |