Top Banner
Welcome to IJEETR International Journal of Engineering and Extended Technologies Research (IJEETR) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc. IJEETR publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, and notes commentaries and news. Suggestions for special issues and publications are welcome Please Submit Your Paper to Our Email Id [email protected] Author Guidance Writing Tips... Paper Tittles Times New Roman, 20 point, Bold. Headings Times New Roman, 12 point, Bold. Subheading Times New Roman, 11 point, Bold. Text Times New Roman, 11 point. Page setup Full research paper (only 5 to 10 pages) must be in 2 columns only. Author name should consist of first name, middle initial, last name. The author affiliation should consist of the following, - Name of Company or college.
17

Welcome to IJEETR

Jun 09, 2015

Download

Business

Hemant Mahajan

International journal of Engineering & Extended Technology Research
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Welcome to IJEETR

Welcome to IJEETR          International Journal of Engineering and Extended Technologies Research (IJEETR) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.        IJEETR publishes original and review papers, technical reports, case studies,

conference reports, management reports, book reviews, and notes commentaries and

news. Suggestions for special issues and publications are welcome

Please Submit Your Paper to Our Email Id [email protected]

Author Guidance Writing Tips...Paper TittlesTimes New Roman, 20 point, Bold.HeadingsTimes New Roman, 12 point, Bold.SubheadingTimes New Roman, 11 point, Bold.TextTimes New Roman, 11 point.Page setupFull research paper (only 5 to 10 pages) must be in 2 columns only.

Author name should consist of first name, middle initial, last name. The author affiliation should consist of the following,- Name of Company or college.- Present address- City, state, zip code- Country name- Telephone, and e-mail idAbstractionThis part should start on a new page and should detail the difficulties, untested approach, major outcome and deduction in one paragraph and should emerge on the second page Avoid abbreviation, design drawing and quotations in the abstractIntroductionExplain the reasons for bearing out the work, summarize the absolutely vital background and clearly state the environment of the hypothesisResult & ConclusionThe result and conclusion should be accurate with consideration and be a clear in

Page 2: Welcome to IJEETR

giving the facts and figures. It may be sustained and presented by the graphs, numbers and tablesAcknowledgementIf authors refer to themselves as recipients of aid or funding, they should do so by their initials separated by points (e.g. A.B.C.).ReferenceReferences should be recorded at the end of the paper in alphabetical order. Articles submitted for publication, unpublished facts, individual communications, etc. should not be included in the reference list but should only be cited in the article text. Authors are completely to blame for the correctness of the quotations.

Publication Fees International Journal of Engineering and Extended Technologies Research has accepted each paper will be charged by publication fee. INR 4000 up to 10 pages will charge Indian authors*. While Foreign Authors will be charged by USD 120 up to 10 pages*. For more details, please download Payment Form.Publishing an articles in IJEETR needs articles processing charges that will be paid by the submitting Author upon acceptance of the articles for publication in agreement with the following criteriaIJEETR Member: - INR 1000 / USD 100Standard Author: - INR 1000 / USD 120Payment of fee can be done in the following ways1) Through online cash deposit/ NEFT/ RTGS2) Wire transfer 3) Western Union/ MoneyGram

About Us International Journal of Engineering & Extended Technologies Research is an open access journal that provides publication of articles in all areas of Engineering and Technical Research. It is an international refereed e-journal as well as print journal. IJEETR have the aim to propagate innovative scientific research and eminence in knowledge. IJEETR Journal is making the seawall between research and developments. Our key objectives are as follows:

To encourage new research for the applications in engineering fields.

To publish knowledge and results in an efficient and effective manner.

To produce the authentic and qualitative research.

Contributions must be original, not previously or simultaneously published elsewhere, and are critically reviewed before they are published.

Our journal system primarily aims to bring out the research talent over the world.

Page 3: Welcome to IJEETR

IJEETR would take much care in making your research paper published without much delay with your kind co-operation.

Call for Paper IJEETR Welcomes Author Submission of Papers Related to any branch of the

Engineering, Basic and Applied Sciences and Innovative Technology. We give very quick response to every query

The paper will be reconsidered inside 7-10 days

All the acknowledged papers will be open accessible at IJEETR

No details and numbers from this website can be copied or used any place without Pre-permission

All material in IJEETR look reconsider to double-check equitable, Objectivity, independency and informative need

IJEETR disclaims all liability with consider to your get access to of such connected World Wide Web sites

Paper Submission Email: [email protected]

Covered Subject 

Computer Science and Engineering

Computer ApplicationsComputer Software / HardwareInformation TechnologyEmbedded Systems & ApplicationsObject-OP Analysis and DesignOperating SystemsRemote sensingSoftware TestingApplications of Computer ScienceArtificial intelligenceComputational StatisticsComputer ArchitectureCyber-Science and Cyber-SpaceE-commerceImage Processing

Computer Networking

Network SecurityAdaptive applicationsBroadband CommunicationsBroadband NetworksCongestion & flow controlCross-layer optimizationNetwork analysisNetwork architectureNetwork ApplicationsNetwork reliability and securityNetwork traffic characterizationProtocolsRouting, Scheduling and SwitchingNetwork security and PrivacyWireless networks

Computer Business Network-based automation

Page 4: Welcome to IJEETR

Cloud Computing and Applications Neuro-Fuzzy applicationComputational intelligence Networked vehicles applicationsComputer and microprocessor-based control

Network Modeling and Simulation

Computer Vision Network MeasurementComputing Ethics Network SensorSoftware evolution and maintenance Network ProtocolsInternet Technologies, Infrastructure, Networking theory and technologiesKnowledge based systems High-speed Network Architectures

Database

Data and Information SystemsData Bases and its applicationsData CompressionData MiningData WarehousingDatabasesDatabase Design of AlgorithmsDistributed Data BaseDistributed Real Time Systems

Mobile Computing

Mobility and Location ManagementOperating System and MiddlewarePrivacy in Mobile MultimediaMobility and Location ManagementWireless NetworksInterworking of Wired NetworksDigital Speech ProcessingSecurity in Mobile MultimediaBlue-Tooth Technologies

Data Storage Management Mobile networks and services

Multimedia Computing

Image RecognitionProcessing and TransformationContent Based Image RetrievalImage ClusteringImage Modeling and EditingInterfaces for Multimedia CreationMultimedia DatabasesMultimedia Coding and EncryptionVideo AnalysisProcessing and TransformationMultimedia Systems and Technologies

Software Engineering

Topics in Software EngineeringVisual Software EngineeringSoftware TestingSoftware ProcessWeb EngineeringKnowledge-based SystemsMaintenance Software ProjectsLanguages and Formal MethodsLearning ApplicationsDecision MakingSearch Engines

Image analysis and processing Computing environmentsIndustrial automated process Software EngineeringMultidimensional signal processing Speech processingSmart devices and intelligent Navigation SystemsActive safety systems Operations researchAutonomous vehicle Pervasive ComputingCollaborative applications Virtual immersive communications

Page 5: Welcome to IJEETR

E & TC / Electrical Engineering

Coding and RecognitionPower TransmissionTechnology- related designMixed analog / Digital SystemsSignal Processing theoryAsynchronous circuit designAudio Signal Processing, CodingMeasurement & TestingNano TechnologyDevices & SystemsSemiconductors

Management And Security

Management TheoryManagement information systemsInformation ManagementMixed analog / Digital SystemsInformation indexing and retrievalSecurity and risk managementSecurity middlewareSecurity, Privacy and TrustSecurity Systems and TechnologiesScalability of middlewareSignal processing in education

Digital signal processing theory Mobility managementElectronic transceiver device Innovation Technology & MngtInformation processing Healthcare Management InformationHybrid Sensor Knowledge management

Other Subject

BiotechnologyCAD/CAM/CAT/CIMContent DistributionReal-time computer controlRelay assisted and cooperativeRemote health monitoringResource allocation and interferenceID and sensor network applicationsService oriented middlewareSpeech interfaceFlexible manufacturing systemsServices in pervasive computingMultisensory fusionNavigation and GuidanceNonlinear and adaptive controlGPS and location-based applicationsVirtual realityPattern Recognition

Agent-based middlewareApplications in CAGDComputational Fluid DynamicsComputational LogicGraph AlgorithmsMathematical digital librariesComputational engineeringComputational IntelligenceComputational statisticsEnvironmental simulationGeographic information systemGreen ComputingIntelligent Control SystemInnovation & product developmentInfrastructure monitoring & controlHuman-machine interfaces

1. Analysis of VANET Mobility Models with New Cluster Based On Routing Protocol.

Author: - Mr. Hemant B. Mahajan.

Page 6: Welcome to IJEETR

Abstract— As we understand that MANET and vehicle technology is growing and hence becoming the emerging field for most of researchers. Recently, new routing protocol proposed by some authors in order to overcome the problem of discovering and maintaining the efficient and effective route for the data transmission over the wireless network. At first stage of this study we are presenting investigation of that new approach of routing called cluster based routing for VANET and compare their performances with living routing protocols. This new routing approach-having aim of increasing the overall network throughput, minimize end-to-end delay. Apart from this the main goal of this project is to investigate the performance of different mobility models and traffic scenarios with this cluster based routing protocol in order to evaluate the performance of VANET using cluster based routing protocol in different mobility models. Here we are considering the mobility models like: random waypoint mobility model and group mobility model. Simulation studies are conducted using NS2.

Keywords- VANET, Road Based Routing, Receiver-Based Next-hop Election, Vehicular Traffic-Aware Routing, Clustering, Hybrid Mobility, Flooding, Traffic regulation. (Key words).

2. Investigation of Designing Least Cost Network Topology Based on Graph Theory.

Author: - Mr. Hemant B. Mahajan.

Abstract— As we know that perfect compute network is not easily disturb due to any reasons. For such networks it is expected that the communication network be a remains connected in case of any node or link failures. The communication links, which used to build the physical computer network, are costly, and hence we always want to build computer network with minimum number of links in order to reduce cost of building computer network. The feature of fault tolerant is also major factor to define good computer networks. If the computer network is having alternative paths among the vertices along with more disjoint paths then such network is fault tolerant network. Hence in this paper we are investigating the once of such method, which is used to design the least cost computer networks based on graph theory. We are discussing the efficient method for generating least cost physical network topology using the concept of spanning tree bipartite graph. Our experiment shows that using these methods we can build least cost computer networks.

Keywords- Network Topology, graph theory, spanning tree, links, k-connected networks, and survivable network. (Key words).

Page 7: Welcome to IJEETR

3. Security Analysis in VANET: Black hole Attack Detection Survey.

Author: - Mr. Hemant B. Mahajan.

Abstract-- VANET means mobile ad hoc network is nothing but the group of independent mobile nodes, which are moving throughout the mobile network freely. Such kind of networks are temporary as they mobile nodes and their positions are not fixed and hence the all the routing paths which are established in order to make the communication in between the source and destination are on demand and depends on the nodes movement into the network. The architecture is not at all needed for such kind of networks. Role of routing protocols is most important for the VANET, which is used to route the data from source to destination, but they are also vulnerable to the many of the security attacks in the VANET. Due to the unprotected nature of the VANET networks routing protocols, such networks also unprotected from the malicious mobile nodes in the network itself. Thus the main aim of this research work is to simulate the Black hole attacks in order to detect them and prevent it for the DSR routing protocol. Networks like VANET are based on their mobile nodes which are acts the host node as well as the router. In short, for the operations such as routing and data forwarding VANET networks are depends on their mobile nodes. But if the VANET network is having the nodes which are acts like the selfish or misbehave nodes in the network, then such nodes not performing the operations such as routing and data forwarding rather only dropping of the data which is arriving at such nodes. In this thesis work we are presenting the simulation of such misbehaving nodes and removing such nodes from the routing path in order to prevent the Black hole attack. For the simulation purpose we evaluate the DSR protocol for the same in the NS2 tool. Keywords— Black hole attack, selfish node, DSR, DOS Attacks. (Key words).

4. Study of Methods of Estimating The Actual Evapotranspiration In Irrigation Project.

Author: - Mrs. Lata Kamthekar.

Abstract-- the term of Evapotranspiration is nothing but the total of the water that is employed by plants in a very given space in transpiration as well as the water evaporated from the adjacent soil within the area in any given time. Evapotranspiration from irrigated land is a helpful indicator to guage the adequacy and responsibility of irrigation moreover because the equity in water use. Standard strategies to work out evapotranspiration are supported climate information and solely provide point estimates. Better regional estimation of

Page 8: Welcome to IJEETR

evapotranspiration is retrieved from satellite remote sensing. Such strategies offer a strong means to calculate actual evapotranspiration from individual pixel to a whole image. During this investigation paper, varied methods used for the estimation of actual evapotranspiration are mentioned. Remote sensing technique employed by all such strategies so as to induce the bottom information like ratio, NDVI (Normalized distinction Vegetation Index) that are, in turn, accustomed realize parameters like land surface temperature, crop co-efficient, phase transition fraction etc. The strategies that are used are FAO Penman-Monteith technique, Carlson-Buffum technique, granger technique and SEBAL (Surface Energy Balance rule On Land).Keywords—SQLEvapotranspiration, Carlson-Buggfum, Granger, SEBAL, ET, NDVI, surface temperature (Key words).

5. Web Log Analysis Using Web Usage Mining.

Author:- Miss. Monica B. Shinde.

Abstract— Web usage mining is the method of extracting useful information from server logs. World Wide Web usage mining is the method of finding out what users are looking for on the Internet using log documents. These log documents contains data that can’t be exactly interpreted, for demonstration data like who is accessing, which sheets are accessing by who, how much time user is accessing a particular page, can’t be got exactly these log documents. Since log documents are unformatted text documents, complex to understand and investigate. In this paper we propose an innovative approach utilizing unanimously accepted formatting language XML. In our approach text founded log documents are altered into XML format utilizing parsers. One time log file is in XML format, utilizing DOM API or other types of parser API’s, we can get the needed information in a very simple kind such as no. Of user who travelled to your website, each page hits, attack acknowledgement on website. Keywords— Web Usage Mining, Data Mining, Pattern discovery, log file, DOM API (Key words).

6. Detection of SQL Injection Attacks in Web applications.

Author: - Miss. Prerana B. Shewale.

Abstract— A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application and a successful SQL injection exploit can read sensitive data from the database, modify database data

Page 9: Welcome to IJEETR

like insert or update or delete, execute administration operations on the database (i.e. shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. Type of injection attack is SQL injection attacks, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands. Numerous investigators and practitioners have suggested diverse methods to explain the SQL injection problem, present ways either go wrong to explain the full scope of the difficulty or have limitations that avert their use. Numerous investigators and practitioners are familiar with only a subset of the wide variety of techniques accessible to attackers who are trying to take benefit of SQL injection vulnerabilities. We proposed such methods, which defend SQL injection attack successfully like a filter, cryptographic hash-function, linear probing technique and customized error message, and POST method. Filter is used to detect malformed SQL queries whereas the hash function is used to match hash values of usernames and passwords against stored hash values. Here a linear probing technique is used to address the data collision and debug error message problems. Keywords— SQL injection, practitioners, diverse, SQL injection vulnerabilities, strike (Key words).

7. Path To-ward The Cyber Security of Cloud.

Author: - Mr. Uday P. Kulkarni.

Abstract— As a cloud computing is the buzzword of the current era and every one want to migrate toward the cloud computing because of it easy to use easy to establish nature. Cloud computing gives number of option to solve the daily IT need. But as every technology have their benefits with some disadvantages too. In this paper we are going to discuss about the one of the big issue of the cloud computing that is Cyber Security of Cloud and try to rectify the problem with some solutions like TVES and Domain Based Approach.Keywords— Smart Grid, SCADA, Cyber Security, Cloud Computing, TVES, NTP, SHAMIR’S Algorithm (Key words).

8. Pattern Discovery for Text Mining Procedure Using Taxonomy.

Author: - Mr. Uday P. Kulkarni.

Abstract— Text-mining mentions usually to the procedure of extracting interesting and non-trivial information from unstructured text. Text mining encompasses some

Page 10: Welcome to IJEETR

computer research disciplines with a mighty orientation in the direction of artificial comprehending in general, including but not restricted to pattern acknowledgement, neural networks, natural language processing, information retrieval and appliance learning. In addition, caution needs to be taken when these techniques are directed in international situations. Numerous classic methods evolved in the English dialect world; do not habitually work as well on other languages In proposed system we can take .xml file or .txt file as input & we request diverse algorithms & develop expected outcomes. This paper presents an innovative and effective pattern breakthrough technique, which encompasses the methods of pattern establishing and pattern evolving, to advance the effectiveness of using, and updating found out patterns for finding applicable and interesting data. Considerable experiments on RCV1 information assemblage and TREC topics illustrate that the suggested solution accomplishes performance. Text mining techniques shall play a necessary role among the approaching back years throughout this continued technique. Among the specialty subject of text mining, generally jointly called text analytics, several attention-grabbing technologies like computers, IT, linguistics, cognition, pattern recognition and statistics also advanced mathematic techniques, computing, image, and not forgetting knowledge retrieval. Keywords— Text mining, pattern mining, pattern evolving, information filtering, text classification (Key words).

Editor Board 

Editor in Chief

Mr. Hemant B. Mahajan.Research & Development Head at Projectsgoal.comOwner of Godwit Technologies.Mail Id: - [email protected] / [email protected]

Advisory Board Members

Mr. Mahesh MahajanProject Manager at projectsgoal.com

Indexing  

Page 11: Welcome to IJEETR
Page 12: Welcome to IJEETR

Term And Condition Read below Terms and Conditions Provided by IJEETR

All Authors and visitors please read following term and condition carefully and these

Page 13: Welcome to IJEETR

Terms and Condition represent an agreement between the International Journal of Engineering and Extended Technologies Research (IJEETR) And You Web site Visitor for Used of IJEETR website. These Terms apply to all Visitors and Authorized Users can accept and understood.Authorized UserOnly Authorized user can access these website.VisitorVisitor able to access all material, access may require completion of a registration process.