Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume II Issue XII

Author Name
Yogesh k Yadav, Prof. Sujeet Mishra
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
Wireless sensor network (WSN) is an important and protesting analysis sphere. The routing protocols become distinguish and protect a good route between source and destination nodes in these static networks. Numerous routing protocols have been recommended for mobile ad hoc networks, and none can be perceived as the finest under all conditions. This work consist a systematic comparative evaluation of AODV, DSDV, AOMDV and PEGASIS. This work containing evaluates the static network on a range of WSN’s with between 10, 15 and 20 nodes, which are static nodes. The network comparison metrics is Residual Energy.
PaperID
2015/IJTRM/12/2015/6218

Author Name
Apurva Patidar, Mohsin Sheikh
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
In cloud computing, data is moved to a remotely located cloud server. Cloud server faithfully stores the data and return back to the owner whenever needed. Data and computation integrity and security are major concerns for users of cloud computing facilities. Today's clouds typically place centralized, universal trust in all the cloud's nodes. This simplistic, full-trust model has the negative consequence of amplifying potential damage from node compromises, leaving such clouds vulnerable to myriad attacks. Many users place their data in the cloud and so data integrity is very important issue in cloud storage. After moving the data to the cloud, owner hopes that their data and applications are in secured manner. The Main Aim of this research is to provide security in the cloud with the help of the Third Party Auditor. This is done to enhance the hardness in security by the RSA encryption algorithms by adding some more security codes. Encryption is the vital part of information sharing
PaperID
2015/IJTRM/12/2015/6227

Author Name
Chudaman Bhute, Anil Khandekar, K. Anil Kumar
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, healthiness related applications, control and tracking applications and atmosphere and locale monitoring applications.How to use Energy saving and QoS of the network. However, sensor nodes represent a major drawback mainly in terms of energy autonomy and therefore of life period, for the batteries have to be too little power. This is the reason why demanding research is being conducted nowadays on how to control sensor energy consumption within a network. For this purpose we use our approach to design energy saving methodology and calculate energy consumption within wireless sensor network for each node wireless sensor networks, according to the packet data rate (PDR), and throughput.PDR is the proportion to the total amount of packets reached the receiver and amount of packet sent by source the quantity of nodes and the distance between them. Sensor networks are constructed to
PaperID
2015/IJTRM/12/2015/6230

Author Name
Pinky Singh, Margi Patel
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 12
Abstract
Mobile Ad-Hoc Network is an autonomous group of mobile users that communicate using wireless links with no support from any pre-existing infrastructure network and used as a highly reliable endto- end protocol for transporting applications. In this paper analysis of the four TCP variants (New Reno, SACK, TCP TAHOE and VEGAS) under a variety of network conditions. The simulations results reveal that out of the four, the SACK variant can adapt relatively well to the changing network sizes while the VEGAS performs most robustly in different node density scenarios. On the other hand, the research asserts the fact of superiority of, reactive protocol over proactive protocol when routing the same traffic in the network. Nonetheless, among the reactive protocols AODV performance (in the presence of a high mobility) has been found to be remarkable.
PaperID
2015/IJTRM/12/2015/6249