Dwivedi S.,SRCEM |
International Journal of Future Generation Communication and Networking | Year: 2016
VANET is a special type of MANET, where in vehicles act as nodes. Not like MANET, vehicles move on predefined roads, vehicles speed is determined by the velocity signs and additionally these vehicles additionally must comply with road traffic signs and road traffic signals. There are numerous challenges in VANET which can be wanted to be solved to be able to provide reliable offerings. Steady & reliable routing in VANET is likely one of the fundamental disorders. Accordingly more study is needed to be carried out in an effort to make VANET more relevant. As vehicles have dynamic conduct, excessive velocity and mobility that make routing much more difficult. In this paper, presenting a brief study on VANET its characteristics, types of routing protocols, Trust models and its security. © 2016 SERSC.
Rathour S.S.,SRCEM |
International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016 | Year: 2017
There are lots of work done in a mobile ad-hoc network for enhancing its security still there are some issues regarding security. In this paper, we study about the mobile network and various techniques by which network prevents attacks. In our proposed work we apply the trust method which calculates by dempsters shafer theory, after trust calculation we apply support vector machine to classify nodes behavior on the basis of classification we find out malicious behavior of nodes. The simulation we have done on NS-2.35, with the help of these techniques we improve network efficiency in the form of packet delivery ratio or throughput. © 2016 IEEE.
Chauhan B.K.,ABESIT |
IEEE Green Technologies Conference | Year: 2013
This study concerns with the developments in the field of power grids in India. It traces its evolution, the need to upgrade and its current state of affairs in terms of various initiatives being undertaken to realize significant transformation in the area of power grids development. © 2013 IEEE.
Sharma V.,SRCEM |
International Journal of Bio-Science and Bio-Technology | Year: 2015
In this paper we are elaborating the concept of disease detection in the human body using the nail image of human fingers and analyzing the data from the image on the basis of nail color and texture. Fingernail has to be detected from the entire hand region using distribution density of the nail color pixels on the surface of nail. The methodology for creating a finger nail detection system involves removing the skin area from shiny/glossy nail portion; this is known as image segmentation concept that separates the specific object. Image segmentation is the method of dividing the image pixels into homogenous region. © 2015 SERSC.
Soni H.,SRCEM |
Tripathi P.,SRCEM |
Proceedings - 2014 4th International Conference on Communication Systems and Network Technologies, CSNT 2014 | Year: 2014
Wireless sensor network is mainly used for real time applications which raise fundamental problems. These problems are like limited energy resources and replacement task. Therefore good functioning of such networks depends on energies of nodes. In this paper we have introduced analytical model which predict the energy consumption. We have also compared two different formats of nodes which are organized as cluster based and grid based. We have used new existing tool for simulation analysis QualNet. © 2014 IEEE.
Agarwal K.,SRCEM |
Magraiya V.K.,SRCEM |
Proceedings - 2013 International Conference on Communication Systems and Network Technologies, CSNT 2013 | Year: 2013
In this paper a NAND flash memory controller was designed. For the best use of NAND type flash memory we design a new Arithmetical and Logical Unit (ALU) for calculating increment, addition, subtraction, decrement operations etc. In this memory controller we design single memory cell, memory module, a decoder etc. These all are encapsulated inside a controller and this is on top most in hierarchy. NAND flash memory is a non volatile storage media used in today daily life electronic equipments. NAND flash memory is programmed on page by page basis. Typically programming time is very less few micro second per page. This NAND flash memory controller architecture can be used with a real secure digital card, multimedia card (SD/MMC), digital cameras etc. The NAND Flash memory controller can be an internal device, built into the application processor or host, or designs can incorporate an external, stand-alone chip. Experimental results show that the designed controller give good performance and full fill all the system specifications. We have used FPGA chip for download our code. © 2013 IEEE.
Agrawal N.,SRCEM |
2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016 | Year: 2016
The increasing use of internet has made human a slave of technology. The dependency of the user on internet is leading to the path in which various types of knowledge that can easily be available on the internet. People get knowledge about any website or matter over the internet. The page visited and various methods used can easily be find out based on various techniques. WUM and pre-processing has shown a new field of development in web. Path completion is a difficult and critical task in preprocessing phase. The pattern discovery and analysis are also important phases of wum. In recent years Recommender system have become extremely common. This proposed paper focuses on the user based data that can be fetched from the web log. The results show the user behavior towards various fields over the internet. The results are calculated on time-dependent and independent domains with consideration of the factors like page visited, time spent on pages, operating system used and browser used. © 2016 IEEE.
Shrivastava A.,SRCEM |
International Journal of Security and its Applications | Year: 2015
Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc network is infrastructure less network so it is vulnerable to several security attacks that are on different layers. Wormhole attack is one of the serious routing attack on network layer. This paper focuses on the wormhole attack, its classification and the modes by which they are launched. This paper summarizes various detection techniques proposed for wormhole attack and also present the effect of wormhole attack on various performance parameters. © 2015 SERSC.
Nigam S.,SRCEM |
Proceedings - 2015 5th International Conference on Communication Systems and Network Technologies, CSNT 2015 | Year: 2015
Many of search engines are habitual to access these personal names aliases for betterment of search. Perfect recognition of existing article is valuable in diverse web related tasks like sentiment analysis, information reclamation, personal name disambiguation, and relation extraction. With the growth of web data many users try to share their knowledge over Internet. Various methods are proposed to personal name bipolarization from the web and web related data. Variety of scheme is also proposed for data mining and information extraction apart from web text analysis. Although the person name bipolarization can be predicted using PCA, but here bipolarization of person name can be predicted using kernel based PCA so that the proposed methodology provides high accuracy as compared to the existing PCA technique. © 2015 IEEE.
Soni H.,SRCEM |
Tripathi P.,SRCEM |
Proceedings - 5th International Conference on Computational Intelligence and Communication Networks, CICN 2013 | Year: 2013
In the Wireless Sensor Network, the routing protocol is a major issue. In this paper we discuss the contents of three routing protocol of WSN i.e. Location-based routing protocol, Data-centric routing protocol and lastly Hierarchical routing protocol in short and later we will compare these protocols based on some parameters. © 2013 IEEE.