Articles
Back

(Current Issue - Computer Science & Engineering)

Article Title Download
A Search Technique On Databases Based On User Expertise
Urvashi Sangwan,  ,  ,  
Show Abstract Data plays a vital role for any organization to succeed. For matching the string in large databases, certain technology or process is to be followed. In the vast scenario of World Wide Web, search engines are of great help which enhance our access to the otherwise unlimited information.
Download
An Intelligence Railway Inquiry System Development Using Expert System
Mudasser Nazar, Amit Kumar Sharma,  ,  
Show Abstract The proposal depicts this new calculated methodology to utilize expert frameworks to support as a part of an intelligence railway inquiry tool.
Download
Hop Count And Load Analysis In MANET Using Simulations In MDPF
Arun Bharthi, Md. Israr Alam, Sanjeev Kumar,  
Show Abstract Key facts to our work are the Destination-Sequenced Distance Vector (DSDV) and the Ad hoc On-interest Distance Vector (AODV) conventions, which are separation vector directing conventions intended for MANET situations. Our proposed Minimum Distance Packet Forwarding (MDPF) calculation is dependent upon the same fundamental idea utilized by separation vector routing conventions in that it advances the pursuit message to the closest hub that possibly saves the imaginary information thing.
Download
A Comparison Review Among GPRS, ALARM And ALERT Security Protocols In Mobile Ad Hoc Networks
Mohd Safeer, Gaurav Pathak, Sanjeev Kumar,  
Show Abstract Some protocols which supply security features by introducing encryption algorithms or key swap algorithms, protocols are GPSR, ALARM and ALERT. The main goals of the paper is to demonstrate comparison among different routing and security protocols applied in MANET using NS2 based on different parameters such as Average Delay, Packet Delivery Ratio.
Download
Implementation Of Fuzzy Logics To Design MPPT Controller For Photovoltaic Systems Using Matlab
Sarfraz Ahmed, Arvind Kumar Pandey,  ,  
Show Abstract The resultant system is capable and satisfactory in terms of fastness and dynamic performance. The results also indicate that the control system works without steady state error and has the ability of tracking MPPs rapid and accurate which is useful for the sudden changes in the atmospheric condition.
Download
Controlling IP Spoofing Through Packet Filtering Using Simulations In Blowfish Algorithm
Yogesh Singh, Hariom Awasthi,  ,  
Show Abstract To implement the technique of IDPF we use simulations in Blowfish algorithm. Blowfish algorithm is utilized for encryption and decryption. It is a symmetric piece figure that could be viably utilized for encryption and decryption and safeguarding of information. Blowfish is utilized to keep the tracking of the route.
Download
Data Owner Security Key Using Spatial Encryption In Clouds
Tahir Iqbal, Aman Ahmad Ansari,  ,  
Show Abstract In the results of this research we will show the enhancement work using graphs and comparison analysis. The graph analysis represents the comparison among existing and extended spatial technique. Through this research we reported that proposed spatial encryption technique is more secured technique for any cloud network.
Download
An Efficient Mechanism To Recover Databases From Its Failures
Taseem Nazir, Amit Kumar Sharma,  ,  
Show Abstract We compare the runtime overhead and recovery performance to those of two-phase commit, the gold standard for log-based recovery, on a three node distributed database system. Our paper demonstrates that it suffers lower runtime overhead, has recovery performance comparable to ARIES’s, and can possibly tolerate the fault of a worker and efficiently bring it back online.
Download
An Efficient Mechanism To Recover Databases From Its Failures
Taseem Nazir, Amit Kumar Sharma,  ,  
Show Abstract We compare the runtime overhead and recovery performance to those of two-phase commit, the gold standard for log-based recovery, on a three node distributed database system. Our paper demonstrates that it suffers lower runtime overhead, has recovery performance comparable to ARIES’s, and can possibly tolerate the fault of a worker and efficiently bring it back online.
Download
Extending Alert Protocol For The Mitigation Of Salander Attacks
Yusera Farooq Khan, Aman Ahmad Ansari,  ,  
Show Abstract This paper presents and analyzes a mechanism with the help of what we can surmount salander attacks in case of Alert protocols. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed mechanism considers the recommendation of trustworthy neighbors and the previous experiences of the node itself.
Download
Performance Analysis of Daubechies Wavelets for Music Signals
Narender Hooda, Manish Kumar Saini, Ashutosh Kharb, Seema Kharb
Show Abstract Performance of different daubechies family wavelets is observed for different five music signal. The signal has been decomposed into sub-bands and the features have also been extracted using different Daubechies wavelets. The extracted features have been classified and performance checks of different wavelet have been done.
Download
Cyclostationary Spectrum Detection: A Review
Anil ,  ,  ,  
Show Abstract In this model, the statistical properties of the signals are time invariant and examine for a small time sample of a signal. The stationary property with respect to first and second order statistical moments is Wide Sense Stationarity (WSS). If the signal mean is constant and its autocorrelation is time independent then the wide sense stationarity is satisfied that ignores cyclic properties of manmade signals. These cyclostationary properties are used to identify the random signal from others.
Download
A Review on Intrusion Detection in Mobile Ad Hoc Network
Urvashi Sangwan,  ,  ,  
Show Abstract A node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes.
Download