• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues
    +91-9950712474

    Volume-3 Issue-5


    Title: Load Balance Approach based on Pushback Algorithm for Partial Mesh WSN

    Authors: Manpreet kaur and Ranjeet Singh

    Abstract: The proposed model is based on Adaptive Load Balance Algorithm with Rainbow (ALBA-R). The proposed algorithm has been designed to mitigate the problem of connectivity holes. The proposed model provides the redundancy for data transmission in the wireless sensor cluster (WSN). The WSN cluster may face many situations of connectivity holes due to many technical or natural factors. Some time the nodes are also moved by the animals in the area where the WSN has been deployed. In the case of connectivity holes, the data does not reach towards the sink or the Base Station. In order to ensure the delivery of data to the end node (sink or base station), a mechanism has to be implemented which can find and channelize the backup paths during the situations of link failure. The proposed solution is designed to find the backup links using the rainbow colour mechanism. The rainbow colour mechanism is based on the energy threshold of the available paths to reach the base station where the data is aggregated. The results have proved the effectiveness of the solution. The results have been obtained from simulation in the form of remaining energy consumption, end to end delay and packet delivery ratio.

    Download file

    Title: An Improved Cuckoo Search Based Robust Ensemble Co-Clustering Algorithm (Ics - Recca) For Enzyme Clustering

    Authors: Ms.R.Rajeswari and Dr. G.GunaSekaran

    Abstract: This research work intends to propose a system with improved cuckoo search based robust ensemble co-clustering algorithm (ICS - RECCA) for enzyme clustering. The cuckoo search algorithm has been inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds (of other species). Some host birds can engage direct conflict with the intruding cuckoos. Based on the improved cuckoo search optimization technique it has been applied for spectral co-clustering ensemble with constructive mathematical modeling. The proposed algorithm (ICS-RECCA) is capable enough to perform co-clustering with the objective function as the primary component. Simulation results proved that the proposed mechanism ICS-RECCA performs better in terms of accuracy and computation time.

    Download file

    Title: A Study on the Inverse Galois Problem in Galois Theory

    Authors: Manoj Kumar, Gyan Shekhar and Lata Misra

    Abstract: In this paper we are present a study on the inverse Galois problem in Galois Theory and Applied Mathematics. There are two separate disciplines within the general subject area ? Pure Mathematics and Applied Mathematics. In this paper we are other discussion of pure mathematics and applied mathematics. Galois Theory is the algebraic study of groups that can be associated with polynomial equations. Galois Theory also gives a clear insight into questions concerning problems in compass and straightedge construction. Problem solving, working with computers and using your mathematics to deal with real applications in science, engineering, economics and biology then you should consider enrolling in some Applied Mathematics units. You will attain a high level of mathematical expertise and a good deal of practical computer experience, both of which will stand you in good stead in a wide variety of possible careers, for example in computing, finance, telecommunications and mathematics research.

    Download file

    Title: Protection against Distributed Denial of Service Attack (DDOS) Using Secure Code Propagation in the Vehicular Adhoc Networks (VANETs)

    Authors: Mandeep Kaur and Manish Mahajan

    Abstract: VANETs are the vehicular networks used to connect the vehicles together to share their information with each other in the cluster. The hackers are used to attack VANETs with various means of attacks. Many security techniques are used to mitigate the risks caused by the attacks to cause ill-effects to the traffic movement on the roads. VANETs are also being used for the automatically driven vehicles in the controlled environments. Whereas the human vehicles use the VANETs for extra facility, the automatically driven vehicles completely depend upon the VANETs. Any incursion in the VANETs by hackers can cause major accidents or traffic chaos. A popular technique known as prankster attack is used by militants to plot attacks to cause more damage as possible or by selfish drivers to make their way clear. In this paper, we have proposed a strong security framework to mitigate threats caused by DDoS attack by using road side traffic management unit (RTMU). The RTMU is using various mathematical computations for traffic pattern analysis to detect the abnormality in data traffic between the cluster nodes. All of the nodes in the scenario are GPS location aware nodes and sharing their location actively with RTMU. Also all of the VANET nodes communicate with each other through RTMU. The results have shown the effectiveness of the proposed model to mitigate the DDoS attack and facilitate smooth traffic movement.

    Download file

    Title: Design and Implementation of Different types of Compressor used for Multiplier in 45nm CMOS Technology

    Authors: Bharat H. Nagpara

    Abstract: In this paper a novel CMOS 3:2, 4:2 and 5:2 compressors using pass transistor logic is presented. For high speed applications, a huge number of adders or compressors are to be used in multiplications to perform the partial product addition. The whole circuit has been implemented using an XOR-XNOR combination gate while totally eliminating the use of inverters. The 3:2, 4:2 and 5:2 compressors are the basic components in many applications like partial product summation in Multipliers. The High Speed (HS)-Wallace tree Multiplier uses 4:2 and 5:2 compressor structures for the partial product addition in the final stage of product accumulation stage. The proposed compressor architecture can be built using combinations of XOR-XNOR gates and multiplexer circuits. The performance of basic compressor architectures with these low power XOR-XNOR gates and multiplexer blocks is found to be efficient in terms of area and power. The designs have been implemented using PTM 45nm CMOS process technology at 1.0v supply voltage in TANNER EDA V.15 tool.

    Download file

    Title: A Contemporary Approach for Calibration of Force Transducers

    Authors: Er. Dharmendra Kumar dubey and Dr. R.L. Yadav

    Abstract: Force transducers are very vital in various engineering applications and have applications in various applications like thrust measurement, weighing scales, cutting force measurement, and material testing machines. Calibration of force transducers is a concern and there is need of discussion of well documented procedure for calibration of force transducers, which will enable the readers to have better understanding of the calibration procedure of force transducers. The paper presents the calibration procedure according to the standard ISO 376-2011, with details of different factors contributing to the uncertainty of measurement of force transducers. Calculations of relative uncertainty due to different factors have been discussed with suitable example. The paper further discusses the comparison of the different relative uncertainty factors in case of analogue and digital force transducers.

    Download file

    Title: Energy Efficient Path Optimization using Non-Cooperative Game Theory in Wireless Sensor Network

    Authors: Manpreet kaur and Ranjeet Singh

    Abstract: The wireless sensor networks are the networks build of sensor nodes to collect the data from various sources such as snow data for avalanche studies, weather data from various places, water monitoring of rivers or reservoirs, activity monitoring in the sensitive areas, etc. The proposed model is based upon the all new dynamic and powerful routing algorithm for the sensor networks using the combination of energy based route cost calculation with the pushback mechanism for the failover and fault tolerance against the connectivity holes. The proposed model has been combined with the game theoretic approach in the non-cooperative manner in order to facilitate the dynamic load balancing. The proposed model results have been obtained in the form of various network performance parameters of network load, throughput, transmission delay, etc. The experimental results have shown the effectiveness of the proposed model.

    Download file

    Title: A Study of Total Variation Flow Scheme for Face Liveness Detection

    Authors: Smriti Priyadarshani

    Abstract: Face Liveness Detection is an anti-spoofing technique used to occlude the attacks on face recognition and verification systems. Total variation flow is a real time and an extrusive method for detecting photograph and video spoofs. It is based on the variation in the surface properties of the diffusion speeds of real and fake faces in a single image. It involves determining the local patterns of the diffusion speed of the sampled image. This method uses the invariants obtained in the illumination of the image which is further used for face identification systems.

    Download file

    Title: Channel Capacity Enhancement of a Cellular System using Cell division with reducing Call Blocking and Call Delay Probability

    Authors: Ankita Sharma and Anita Chopra

    Abstract: This paper bewares of the CDMA system and look for the appropriate way of enhancing the cellular capacity using cell division. In this paper, the analysis has shown the performance of CDMA system in telecommunication by using cell division technique in which large number of cells divided into smaller one. The result of spectrum efficiency shows that, if the area of cells reduces then spectrum efficiency is increase. The transmit power of the new cells after division with half of radius of the original cells, the transmit power has reduced with respect to radius of the cells.As the number of users in a cellular system increases, the traffic per unit time also increases. The allocated spectrum becomes gradually congested and eventually becomes used up. Congestion of the spectrum means that the call blocking probability has increased and this is not desired in the system. The cell division is a technique of enhancing channel capacity in cellular communication system. It also show that increase in channel capacity directly reduces call blocking probability and call delay probability using Erlang B and Erlang C formulas. The results of performance parameters are shown by the graphs using MATLAB? software tool.

    Download file

    Title: A Literature Survey based Study of Deflections of the Robot Hands for Intelligent Systems

    Authors: Rajinder Tiwari and Abhishek Srivastava

    Abstract: Generally dumb people use sign language for communication but it has been very difficult to create communication with them as others do not understand sign language very well without learning. Therefore we have try to develop an electronic device that can translate sign language into speech in order to make the communication take place between the mute communities with the normal people easily, a Wireless data gloves is used which is a normal cloth driving gloves fitted with flex sensors along the length of each finger and the thumb. Mute people can use the gloves to perform hand gesture and it will be converted into speech so that normal people can understand their expression. This paper provides the map for developing such a digital glove. It also analyses the characteristics of the device and discusses future wok. A foremost goal of this paper is to provide readers with a basis for understanding glove system technology used in biomedical science.

    Download file

    Title: Enernet ? Changing the Future: A Review

    Authors: Pooja Rani

    Abstract: Enernet is the convergence of Smart Grid and the Internet of Things. The Internet has provided the recent advancement in technology. It has connected millions of people. The Internet of Things, abbreviated as IoT is the network of things. The ?Things? are the embedded systems embedded with various software and hardware. The Internet of Things is a scenario where things have an ability to transfer data over network without human to human interaction or human to computer interaction. While Smart Grid is a system which includes various operational devices and measures, i.e., smart meters, energy measures etc. Smart Grid controls the production of electricity, distribution of electricity smartly. The Internet of Things is growing ubiquitously, even it is cost effective. It provides a platform to Smart Grid. This paper gives an idea about the emerging technology ?ENERNET? which consist of the Smart Grid and The Internet of Things.

    Download file

    Title: A Review on Android Security

    Authors: Pratik S. Dhumal

    Abstract: Android is currently the most popular smartphone operating system. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antivirus software promises to effectively protect against malware on mobile devices and many products are available for free or at reasonable prices. Their effectiveness is supported by various reports, attesting very high detection rates. However, a more detailed investigation is required in order to understand thereal risk level arising from malware for the Android platform. Neither do the exceedingly high numbers of different malware variants reflect the real threat in comparison to other platforms, nor do the results of testing antivirus software against a set of already known malware samples provide a clear picture of the capabilities and limitations of antivirus software on the Android platform.

    Download file

    Title: Comprehensive Review on Image Enhancement Techniques

    Authors: Harjeet Kaur and Silky Narang

    Abstract: Image enhancement deals with the enhancement of various features of the image to get the better results. This paper discuss various techniques of image enhancement .Image enhancement technique improves the visual quality of the image. The choice of image enhancement technique largely depends on the viewing condition and for purpose for which the enhancement is to be performed. Survey of the various techniques of enhancement is done and is has been found that no single technique is efficient for all types of the technique.

    Download file

    Title: A Comprehensive Review on Speech Recognition and Its Techniques

    Authors: Er. Raman Kaur

    Abstract: This paper provides a review on speech recognition system and its techniques. And provide the advancement in the field of speech recognition system. As speech is a way for the communication between the sender and receiver. A speech recognition system takes speech signal as the input and gives the output in the form of text. This paper describes the basic Automatic Speech Recognition (ASR) System. Provide various Speech recognition techniques such as speech analysis, feature extraction techniques, and matching techniques. This paper gives brief description of feature extraction techniques such as Linear Prediction coding (LPC), Mel frequency Cepstral coefficient (MFCC) and Perceptual Linear Predictive (PLP) technique.

    Download file

    Title: A Review on Data Transmission through LASERS ?Advanced Typeof LI-FI?

    Authors: Pravin Ahirwar and Dhande Dhananjay S

    Abstract: Li-Fi is a new wireless technology which provides the connectivity within localized network environment. These days the usage of Wi-Fi has reached to every nook and corner of the world. There are some downsides belong to the usage of Wi-Fi such as those concerning to the speed, limited bandwidth, security and range of its usage. In order to overcome these hitches we can use the Advanced Version of Li-Fi which is efficient, high speed, and fully networked wireless communication, like Wi-Fi, using light. We mean to use ?LASERS?, in order to produce the Advanced Version of Li-Fi technology where the transmission of information takes place at higher speeds and reduced losses with an increased amount of bandwidth.

    Download file

    Title: A Novel Energy as a Metric for Energy Efficient Multipath WSN Data Delivery

    Authors: Manpreet kaur and Ranjeet Singh

    Abstract: The energy efficient routing is the primary issue in the case of wireless sensor networks. The efficient routing scheme with adequacy in the route updates and route stabilization may be considered as the best routing algorithm for the stable wireless sensor networks. An idle routing algorithm must keep an eye over the energy comparison of the available paths, which may reduce the load from the high energy consuming paths. In this paper, we are proposing the energy efficient routing approach which enables the energy as route metric. The route metric calculation follows the node with least energy available as the route metric. The energy based elected route conserves the maximum energy during the data transmissions, hence enables the maximum lifetime for the WSNs. The proposed model has been designed to work in the multipath scenario to deliver the data efficiently over the multiple paths available to the same destination. The experimental results have proved the effectiveness of the energy efficient routing based model.

    Download file