Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume V Issue V

Author Name
Monika Koriya, Khushboo Pawar
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
Wireless sensor nodes can be deployed on a battlefield and organize themselves in a large-scale ad-hoc network. Traditional routing protocols do not take into account that a node contains only a limited energy supply. Optimal routing tries to maximize the duration over which the sensing task can be performed, but requires future knowledge. Wireless sensor network is an ad hoc network. Each sensor is defined with limited energy. Wireless sensor node deployed into the network to monitor the physical or environmental condition such as temperature, sound, vibration at different location. Each node collected the information than transmit to the base station.
PaperID
2018/IJTRM/5/2018/14703

Author Name
Rajib Kumar Roy, Dr. Y.V. Rao
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
An Entrepreneur is the person who not only responsible to start a new business but also wears multiple hats to play various roles. Burning fingers from idea generation to skill assessments, various analysis related to market, business risk, finance, developing overall business strategy, plan forbusiness execution & delivery.Thus, the overall job of an entrepreneur turns out to be very critical as he/she might be responsible to make crucial decisions for business. The understanding of various business processes, organization processes and cater them from thick sense to lean and tailor to business, which plays major role on “making business looks simpler and successful”. Our study will bring the top three areas where every entrepreneur should put more focus to ensure maximumcontrol over business process and confirm success.
PaperID
2018/IJTRM/5/2018/14708

Author Name
Archana Luhan, Prof. Apurva Kukade
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
Wireless networks are gaining popularity to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. there's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed.
PaperID
2018/IJTRM/5/2018/14712

Author Name
Aditi Rawal
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 5
Abstract
Voice over Internet Protocol (VoIP) is a transmission technology which integrates the entire world of telephony and data; it has been widely deployed as it reduces the management cost and effort in comparison with services provided by the PSTN. But the combination of telephony and data in one untangled network brings both gains and hindrances to the users. Among several issues that are discussed while using this technology, security is the most vital one. This paper will describe the security threats associated with VoIP and the counter-measures to eradicate the problem. The paper also includes recommendations in respect to the risks and vulnerabilities.
PaperID
2018/IJTRM/5/2018/14720