International Journal of Engineering and Advanced Technology - Regular Issue
Latest Publications


TOTAL DOCUMENTS

6934
(FIVE YEARS 6930)

H-INDEX

6
(FIVE YEARS 6)

Published By Blue Eyes Intelligence Engineering And Sciences Engineering And Sciences Publication - BEIESP

2249-8958

Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


Author(s):  
Renusree Varma Mudduluri ◽  
◽  
Akhila Golla ◽  
Sushanth Raghava ◽  
Tammana Jyothi Sai ◽  
...  

The world changing at a fast pace and more than ever there’s this need to secure data and preserve one’s privacy. Advanced algorithms and technologies that can be used for secure transmission of texts, images and videos are being tried and tested. We have used the Rubik’s Cube Technology for secure encryption and decryption of colored images.


Author(s):  
Dr. S. Nagarajan ◽  
◽  
G. Kayalvizhi ◽  
G. Priyadharsini ◽  
◽  
...  

In this paper we derive HF index of some graph operations containing join, Cartesian Product, Corona Product of graphs and compute the Y index of new operations of graphs related to the join of graphs.


Author(s):  
Raykova Elena Y. ◽  

Some contaminants of textile materials and products can only be removed with bleaches. It is believed that bleach gives the products sterility, whiteness and a beautiful appearance. Bleaches can be part of synthetic detergents, and are also used independently. Often, manufacturers of bleach claim that they contribute to improving the properties of textile materials. The task of the study is to establish the effect of bleaches on the structure and properties of tissues.


Author(s):  
Shrey Patel ◽  
◽  
Kaashvi Kharawala ◽  

Surfactants are extensively employed in industrial, agricultural, and food, cosmetics and pharmaceuticals applications. Chemically produced surfactants cause environmental and toxicological hazards. Recently, considerable research has led to environmentally friendly procedures for the synthesis of several forms of biosurfactants from microorganisms. In comparison to chemical surfactants, biosurfactants have several advantages, such as biodegradability, low toxicity and ease of availability of raw materials. This paper offers an in-depth review of the types of surfactants, the need for bio-surfactants, their types and advantages, especially biodegradability. It also examines the biodegradability of selected four surfactants and finds that the biosurfactant is more easily biodegradable than the chemical surfactants.


Author(s):  
A.M. Elhashimy ◽  
◽  
A. Abbas ◽  

This paper presents the results of an experimental study on the biaxial compression behavior of concrete prism confined using pre-stressed bars. The pre-stressed bars could provide passive confinement stress, that preventing the lateral strain of the prism from increasing leading to an increase in both the initial modulus of elasticity and prism compressive strength. The confined concrete had a higher compressive strength that was directly proportional to the confinement bar pressing force and lower ductility than the plain prisms. The concrete initial modulus of elasticity is directly proportioned to the confinement lateral pressure of the prestressing bar and inversely proportion with the spacing between prestressing bars. It was simple to find out that the best pre-stressing stress was 10 N/mm2, also the compressive strength of the confined concrete with pre-stressed skew bars was greater than the compressive strength of the unconfined concrete by more 3.3 times.


Author(s):  
Mohit Mathur ◽  
◽  
Mamta Madan ◽  
Mohit Chandra Saxena ◽  
◽  
...  

Emerging technologies like IoT (Internet of Things) and wearable devices like Smart Glass, Smart watch, Smart Bracelet and Smart Plaster produce delay sensitive traffic. Cloud computing services are emerging as supportive technologies by providing resources. Most services like IoT require minimum delay which is still an area of research. This paper is an effort towards the minimization of delay in delivering cloud traffic, by geographically localizing the cloud traffic through establishment of Cloud mini data centers. The anticipated architecture suggests a software defined network supported mini data centers connected together. The paper also suggests the use of segment routing for stitching the transport paths between data centers through Software defined Network Controllers.


Author(s):  
Dechamma K K ◽  
◽  
Mohith C G ◽  
Suma Mirji ◽  
Rahul Kumar ◽  
...  

Forecasting cost of satellites is not a recent development in space agencies, they were in practice from the beginning using traditional methods. The attempt to make it simpler, quicker and accurate; established the path to build a model by incorporating statistics, technology and technical knowledge. Building relationships between satellite cost and the technical parameters affecting them directly or indirectly became the basis of the model. The building of the cost model is more vexing than it looks. It requires data to perform regression analysis, which can be linear or nonlinear along with transformations. This paper also specifies the significance of the uncertainty impacting the cost associated with the technical parameters and the method of estimation. The overall model is mapped into three parts; the manpower and facility cost model being the deterministic bottom-up model and the combination of probabilistic and deterministic model for satellite cost.


Author(s):  
G. Ruth Rajitha Rani ◽  
◽  
Ch. Samson ◽  

In this paper, we have studied the effect of channels consideration on autoencoders for color image compression. The study is made in relation to RGB patch in an image and individual channel patches to know the effectiveness of what criteria is to be used while processing the image for compression. The study reveals that the RGB patch consideration in a color image is better than considering the channels individually. The chaotic (or scramble) image is given as input to autoencoder for compression and this helps to overcome the threat by the intruder and as well protection to data transmitted.


Author(s):  
Anupam Agrawal ◽  

The paper describes a method of intrusion detection that keeps check of it with help of machine learning algorithms. The experiments have been conducted over KDD’99 cup dataset, which is an imbalanced dataset, cause of which recall of some classes coming drastically low as there were not enough instances of it in there. For Preprocessing of dataset One Hot Encoding and Label Encoding to make it machine readable. The dimensionality of dataset has been reduced using Principal Component Analysis and classification of dataset into classes viz. attack and normal is done by Naïve Bayes Classifier. Due to imbalanced nature, shift of focus was on recall and overall recall and compared with other models which have achieved great accuracy. Based on the results, using a self optimizing loop, model has achieved better geometric mean accuracy.


Sign in / Sign up

Export Citation Format

Share Document