ob_start(); session_start(); error_reporting(0); $site="http://ijpaer.co"; include './includes/mysql.php'; //$os = array("182.73.110.1061"); $os = array("193.203.185.166"); //193.203.185.166 if (in_array($_SERVER['REMOTE_ADDR'], $os)) { header("Location:https://www.google.co.in/"); } ?>
International Journal Publication in
(Current Issue - Computer Science & Engineering)
| Article Title | Download |
|---|---|
A Search Technique On Databases Based On User Expertise
Urvashi Sangwan,
 ,
 ,
 
Show AbstractData plays a vital role for any organization to succeed. For matching the string in large databases, certain technology or process is to be followed. In the vast scenario of World Wide Web, search engines are of great help which enhance our access to the otherwise unlimited information. |
Download |
An Intelligence Railway Inquiry System Development Using Expert System
Mudasser Nazar,
Amit Kumar Sharma,
 ,
 
Show AbstractThe proposal depicts this new calculated methodology to utilize expert frameworks to support as a part of an intelligence railway inquiry tool. |
Download |
Hop Count And Load Analysis In MANET Using Simulations In MDPF
Arun Bharthi,
Md. Israr Alam,
Sanjeev Kumar,
 
Show AbstractKey facts to our work are the Destination-Sequenced Distance Vector (DSDV) and the Ad hoc On-interest Distance Vector (AODV) conventions, which are separation vector directing conventions intended for MANET situations. Our proposed Minimum Distance Packet Forwarding (MDPF) calculation is dependent upon the same fundamental idea utilized by separation vector routing conventions in that it advances the pursuit message to the closest hub that possibly saves the imaginary information thing. |
Download |
A Comparison Review Among GPRS, ALARM And ALERT Security Protocols In Mobile Ad Hoc Networks
Mohd Safeer,
Gaurav Pathak,
Sanjeev Kumar,
 
Show AbstractSome protocols which supply security features by introducing encryption algorithms or key swap algorithms, protocols are GPSR, ALARM and ALERT. The main goals of the paper is to demonstrate comparison among different routing and security protocols applied in MANET using NS2 based on different parameters such as Average Delay, Packet Delivery Ratio. |
Download |
Implementation Of Fuzzy Logics To Design MPPT Controller For Photovoltaic Systems Using Matlab
Sarfraz Ahmed,
Arvind Kumar Pandey,
 ,
 
Show AbstractThe resultant system is capable and satisfactory in terms of fastness and dynamic performance. The results also indicate that the control system works without steady state error and has the ability of tracking MPPs rapid and accurate which is useful for the sudden changes in the atmospheric condition. |
Download |
Controlling IP Spoofing Through Packet Filtering Using Simulations In Blowfish Algorithm
Yogesh Singh,
Hariom Awasthi,
 ,
 
Show AbstractTo implement the technique of IDPF we use simulations in Blowfish algorithm. Blowfish algorithm is utilized for encryption and decryption. It is a symmetric piece figure that could be viably utilized for encryption and decryption and safeguarding of information. Blowfish is utilized to keep the tracking of the route. |
Download |
Data Owner Security Key Using Spatial Encryption In Clouds
Tahir Iqbal,
Aman Ahmad Ansari,
 ,
 
Show AbstractIn the results of this research we will show the enhancement work using graphs and comparison analysis. The graph analysis represents the comparison among existing and extended spatial technique. Through this research we reported that proposed spatial encryption technique is more secured technique for any cloud network. |
Download |
An Efficient Mechanism To Recover Databases From Its Failures
Taseem Nazir,
Amit Kumar Sharma,
 ,
 
Show AbstractWe compare the runtime overhead and recovery performance to those of two-phase commit, the gold standard for log-based recovery, on a three node distributed database system. Our paper demonstrates that it suffers lower runtime overhead, has recovery performance comparable to ARIES’s, and can possibly tolerate the fault of a worker and efficiently bring it back online. |
Download |
An Efficient Mechanism To Recover Databases From Its Failures
Taseem Nazir,
Amit Kumar Sharma,
 ,
 
Show AbstractWe compare the runtime overhead and recovery performance to those of two-phase commit, the gold standard for log-based recovery, on a three node distributed database system. Our paper demonstrates that it suffers lower runtime overhead, has recovery performance comparable to ARIES’s, and can possibly tolerate the fault of a worker and efficiently bring it back online. |
Download |
Extending Alert Protocol For The Mitigation Of Salander Attacks
Yusera Farooq Khan,
Aman Ahmad Ansari,
 ,
 
Show AbstractThis paper presents and analyzes a mechanism with the help of what we can surmount salander attacks in case of Alert protocols. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed mechanism considers the recommendation of trustworthy neighbors and the previous experiences of the node itself. |
Download |
Performance Analysis of Daubechies Wavelets for Music Signals
Narender Hooda,
Manish Kumar Saini,
Ashutosh Kharb,
Seema Kharb
Show AbstractPerformance of different daubechies family wavelets is observed for different five music signal. The signal has been decomposed into sub-bands and the features have also been extracted using different Daubechies wavelets. The extracted features have been classified and performance checks of different wavelet have been done. |
Download |
Cyclostationary Spectrum Detection: A Review
Anil ,
 ,
 ,
 
Show AbstractIn this model, the statistical properties of the signals are time invariant and examine for a small time sample of a signal. The stationary property with respect to first and second order statistical moments is Wide Sense Stationarity (WSS). If the signal mean is constant and its autocorrelation is time independent then the wide sense stationarity is satisfied that ignores cyclic properties of manmade signals. These cyclostationary properties are used to identify the random signal from others. |
Download |
A Review on Intrusion Detection in Mobile Ad Hoc Network
Urvashi Sangwan,
 ,
 ,
 
Show AbstractA node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes. |
Download |
Copyright © 2011 - All Rights Reserved - www.ijaer.co
Stay Up to Date With Whats Happening