• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues

    Volume-3 Issue-3

    Title: A proposal for Localisation of Ionospheric Time delay profiles for Improved Reliable communication navigation and surveillance systems in Indian subcontinent

    Authors: N.S.Murtisarma and S.P.Venumadhava Rao

    Abstract: In this paper, work is based on international reference ionosphere. Despite of existing of several latest models such as IRI2014, IRI-90 is chosen as it can be directly intractable with little efforts. Estimation of electron density based on IRI-90 is demonstrated. This will be base for our proposal. This is to improve the reliability of wireless communications, navigation and surveillance systems.

    Download file

    Title: Item Features Ranking

    Authors: Sonali Chaudhari, Prof. Thirumahal Rajkumar and Prof. Madhuri Gedam

    Abstract: In our paper, we would like to rank the item features as well as the items using user-item interactions. If the items are movies, features could be actors, directors or genres ect. This information is used to identify the most important actors for each movie. A ranking is a relationship between a set of items such that, for any two items, the first is either 'ranked higher than', 'ranked lower than' or 'ranked equal? ranking is the popularity of items features and suggesting popular items features. We design algorithms to rank the features of an item depending on whether interaction information is available at aggregated level granularity.

    Download file

    Title: GPS/INS Integration & Simulation with Time Synchronization Property

    Authors: Saurabh Dargan and Nidhish Tiwari

    Abstract: A modified solution for time synchronization by using GPS receiver signals as reference is proposed. In the applications of GPS/INS, the unknown time errors between INS/IMU (Inertial Measurement Unit) unit and GPS unit have a significant influence on the performance of hybrid filter with respect to data fusion. However, each of exiting methods for time synchronization are with high cost, complex or just dedicated to special situation etc. For improvement in the accuracy of time synchronization, we utilize 1 PPS (Pulse per Second) signal from GPS receiver as a synchronization reference, and also tag the time stamp on the serial data package from IMU. This scheme is implemented with a Field Programmable Gate Array (FPGA) device in Verilog programming language. Results of simulation and experiments is shown that with a simpler hardware design compared to exiting methods, the proposed time synchronizer solution can reach the time synchronization accuracy of 3 millisecond level approx.

    Download file

    Title: Pattern based Graphical Authentication for Mobile Cloud Applications

    Authors: Ramandeep Kaur and Amanpreet Kaur

    Abstract: Cloud computing is an emerging technology used for the large, small or medium enterprise applications, which usually exchange and stores larger amount of data. The cloud computing platforms provide space to a number of applications every year, which also increases the overall user base of the cloud computing infrastructures. The cloud computing application are now also being popular in the users with the touch based portable devices like smart phones, tablet PCs, etc. Most of the touch based devices are equipped with the small sized screens. The higher number of touch screen devices are equipped with lesser than 5-inch screens, where the users clash to enter their usernames and passwords. There are a lot of chances of wrong username password input using these devices. This research is aimed at providing an easy and secure graphical user authentication for the users of the cloud computing resources accessing these services from their portable touch-based devices. The proposed model is a form of multi-factor or multi-level graphical authentication for the different kinds of users. The first factor or first level of authentication is application for the normal testing users (the prototype users are the cloud administrator level users using the graphical authentication scheme for cloud platform testing), whereas the second level or second factor password or authentication scheme is applicable for the power users.

    Download file

    Title: Document Clustering by a Fuzzy Based Approach

    Authors: Bhushan .D. Talekar, Prof. Thirumahal Rajkumar and Prof. Vinayak Shinde

    Abstract: In this paper, we have shown how to apply fuzzy logic to perform document clustering. We have taken an example of document clustering where the documents have to be clustered into two categories. The method involves cleaning up the text and stemming of words. Then, we chose ?m? features which differ significantly in their word frequencies (WF), normalized by document length, between documents belonging to these two clusters. The documents to be clustered are represented as a collection of ?m? normalized WF values. Fuzzy c-means (FCM) algorithm is used to cluster these documents into two clusters. After the FCM execution finishes, the documents in the two clusters are analysed for the values of their respective ?m? features. By fuzzy logic, we not only get the cluster name, but also the degree to which a document belongs to a cluster.

    Download file

    Title: Multilevel Security Architecture for Secure Healthcare Data Transmission

    Authors: Lovepreet Kaur and Manish Mahajan

    Abstract: The cloud based healthcare record management services (CHRMS) are in trend now-a-day because of its low setup and management cost and high availability of the computing resources. Also the cloud computing enables the on-demand runtime memory management and resource allocation. The proposed model addresses the data and communication security problem in the cloud data transmissions between the holter and CHRMS. The holter is the device used for the purpose of heart rate computation from the patient?s body and deployed on the patient?s body. The proposed model adds the two-level security for the transmission security, which uses the secure initial setup phase and key exchange model at the second level. The proposed model has been tested for the transmission delay added by the encryption, decryption and key exchange process. The model adds the minimum possible delay in the time-based periodic authentication mechanisms.

    Download file

    Title: A New-Mac Protocol for Mobile Ad-Hoc Networks

    Authors: Jyoti Shekhawat and Stuti Gupta

    Abstract: In Mobile Ad-hoc networks, the basic 802.11 Media Access Control (MAC) protocol uses the distributed coordination function (DCF) to share the medium between multiple devices. But uses of MAC protocol in Ad-hoc network affected by various issues such as limited power capacity, packet losses due to transmission errors, lot of control traffic and inability to avoid packet collision. To resolve these issues many protocols have been developed. But we have not found any efficient protocol which can solve the power management, packet collision and packet loss issues efficiently. In this paper, we propose a new protocol that adjusts the upper and lower bounds of the contention window to reduce the number of collisions. It also uses a power control scheme, triggered by the MAC layer to limit the packet loss, energy wastage and decrease the number of collisions. The proposed protocol ?New-MAC? has implemented and its performance is compared with existing 802.11 MAC protocol. This paper show calculated the packet delivery fraction, average (e-e) delay, average throughput and packet losses in various situations. We found our proposed protocol is fairly better than the existing protocol.

    Download file

    Title: Performance Evaluation of Different Routing Protocols Using Different Parameters in Mobile Ad-Hoc Network (MANET)

    Authors: Saloni Gupta and Stuti Gupta

    Abstract: Mobile Ad-hoc Network (MANET) has been introduced to use in many applications. To design the networks, the factors needed to be considered are the coverage area, mobility, power consumption, communication capabilities etc. The challenging goal of this work is to create a simulator to support the MANET simulation. The main challenge in WSN is routing. Many routing protocols for MANET have proposed but no one is suitable for all situations. Dynamic source Routing Protocol (DSR) and Ad-hoc On Demand Distance Vector Routing Protocol (AODV) protocol are popular in MANET. Both DSR and AODV is reactive protocol. DSR routing protocol consumes more bandwidth because of the frequent broadcasting of routing updates. So when the network size is large in that case packet header overhead is increased. AODV doesn?t maintain any routing tables at nodes. So AODV have low overhead and more bandwidth. It reduces overhead of packet header and performs better in both high mobility and large size network. So the main focus of this work is to find the best routing protocol by evaluating the performance of different routing protocols (DSR, AODV) using different network parameters for terrain area (1500m x 1500m) in MANET. These protocols are simulated on NS-2.35 with the help of network parameters (Packet Delivery Fraction (PDF), Average Throughput and Normalized Routing Load (NRL), and Average end-to-end Delay).

    Download file