|Research Topic||Paper ID|
|Forward Selection Call Admission Control with Intrusion Detection System In IEEE 802.16E WIMAX Network
Gharge D. M., Dr. Halse S. V., Dr. Jagtap S. B.
Abstract: To the usage of wireless communication in IEEE802.16e, It has allowing the calls using Call Admission Control. By using CAC serves as great utility for WiMAX, but it has some drawbacks to accept or admit the call so the system Quality of service is very greatly affected. Existing CAC schemes only depend on the priority, bandwidth, and frequency of the call admission or FIFO methods, so it gives more priority to high balance calls then it wouldn’t allow to the low balance calls. Here we propose a new algorithm Forward Selection Call Admission Control with Intrusion Detection System [FSCACIDS], It provides proper and reliable communication for all WiMAX nodes. It access the gateway based on higher energy and low mobility nodes and provide high security using Intrusion detection system. We are using NS2 simulator for performance evolution. Simulation results show the performance of network improved and network reliability as well as reduced routing overhead, Delay, Jitter throughput.
|A Region based Classification of SAR Images Using IMA Algorithm
Ritu Devi, Mukesh Sharma
Abstract: Classification is one of the major research area of image mining. The classification is basically to categorize the related images in similar groups. In this paper, the image classification for the satellite images is performed. The complete work is the hybrid approach that will use the concept of moment analysis along with histogram analysis to perform the image classification. Finally the segment detection will be performed by using the improved moment analysis (IMA) algorithm. The work is divided in two phases, the histogram analysis phase will improve the efficiency and the moment based analysis will improve the accuracy of the work. Finally a new technique to polarimetric SAR image classification is introduced & obtained results are compared with other competitive classifiers result.
|Process Parameter optimization of T4 heat treated Mg. Alloy (AZ91C) for Wire Electrical Discharge machining by Taguchi Methodology
Vibhu Sharma, Mukesh Verma
Abstract: The Experimental study was designed for optimizing the process of multiple quality characteristics response for Wire Electrical Discharge Machining (WEDM) of magnesium alloy AZ91C for intricate shape cutting after giving the Tempering Heat Treatment. Multiple quality characteristics response involved Cutting Speed, Surface roughness, Material Removal Rate (MRR) and Percentage of Dimension Deviation (%DD). Taguchi L9 orthogonal array was used to design the experiment. Anova test confirmed the experimentation. The optimum parameter confirmed with the experimental value for the optimum response characteristics. Result shows that machining AZ91C Mg. Alloy, for maximum material removal rate servo voltage is very significant factor having a contribution of 49.84% respectively. Similarly, for minimum percentage dimension deviation pulse off time (78.47%) was the significant factor.
|To Analyze the Performance of Various Digital Filters in OCDMA Multi-User Environment with 3d Codes
Pankaj Sharma, Sandeep Kaushal, Anurag Sharma
Abstract: To achieve the high speed connectivity for access networks, the combination of the large bandwidth of the fiber medium with the flexibility of the Code Division Multiple Access (CDMA) technique is used and referred as Optical Code Division Multiple Access(OCDMA). This paper presents the simulation results for 24 user OCDMA environment system with the help of various system parameters like Bit Error Rate(BER), Q- factor and eye pattern with Raised Cosine filter, Gaussian filter, Fabry Perot filter, Trapezoidal filter and Lorentzian filter. The proffered network concede high number of users to communicate with high data rate over the conventional OCDMA system. The analysis of simulation assures that the system frame with Fabry Perot filter method is of minimum distortion, while maintaining BER 6.81×e-20 for the correctly decoded signal.
|Implementation of Apriori Algorithm in Health Care Sector: A Survey
Divya Jain, Sumanlata Gautam
Abstract: This research presents a review of the implementation of Apriori Algorithm on different healthcare datasets using machine learning tool Weka. Association rule mining greatly helps to identify trends and patterns from huge databases. This research paper analyses the various results generated by implementing the Association Apriori Algorithm in Weka and compares its performance with other algorithms. In this paper we have evaluated the results generated by this algorithm executed in Weka. With the results obtained, we find that although there are significant drawbacks associated with Apriori Algorithm, it is found to be the simplest algorithm for mining frequent itemsets and that it achieves better results than Predictive Apriori Algorithm and Tertius Algorithm. This paper reviewed the research papers which mainly concentrated on implementation of Apriori Algorithm on different healthcare datasets.
|Steganography Techniques: Concepts and Overview
Bhavneet Kaur, Pooja Nagpal, Harish Kundra
Abstract: Steganography is the art of inconspicuously hiding data within data. Steganography’s goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. For this reason, it is important that we are aware of digital steganography technology and its implications. Equally important are the ethical concerns of using steganography and steganalysis. Steganography enhances rather than replaces encryption. Messages are not secure simply by virtue of being hidden.
|5G Technology of Mobile Communication
Puneet kumar, Prof. J.K.Sharma, Manwinder Singh
Abstract: The modern world is shrinking due to the development of science and its technology. Over the years, wireless telecommunication market has long been recognized as one of the most dynamic and fastest growing segments of the global telecommunication industry. But requirement of human being augment day by day. However further modernization will be on convergence of the existing technology in to a single platform. Mobile broadband is becoming a reality, as the internet generation grows accustomed to having broadband access wherever they go and not just at home or in the office. This paper mainly focuses on how a 5G network can provide more approach to a common man to utilize his available possessions in an immense way to make him to feel the real progress.
|Multimedia Data Security enhancing DES & UTF8 parameterizing time constraint
Ashish Sharma ,Vikas Gupta
Abstract: Internet and networking growing quickly. So it’s very necessary to secure the data transmitted over different networks and
|A Novel Clustering Technique Using MST
Ranshul Chaudhary, Prabhdeep Singh
Abstract: Among the several applications for Machine Learning , the most significant is data mining. Machine learning can often be successfully applied to improve the efficiency of systems. Most clustering algorithms become ineffective when provided with unsuitable parameters or applied to datasets which are composed of clusters with diverse shapes, sizes, and densities. To alleviate these deficiencies, we propose a novel split-and-merge hierarchical clustering method in which a minimum spanning tree (MST) and an MST-based graph are employed to guide the splitting and merging process.