IJSRET » November 16, 2017

Daily Archives: November 16, 2017

Archive Volume 3 Issue 6

IJSRET Volume 3 Issue 6, November-2017

An Approach for Trusted Computing of Load Balancing in Cloud Environment

Authors: Manoj Kumar Selkare, Vimal Shukla

Abstract: Cloud computing is a novel approach in order to use the resource of computing where these resources may be hardware or software. This facility is delivered as a service in the communication network. This facility known as cloud, which occurred from the use of a service as a cloud, which is an abstraction for the complex infrastructure system containing diagrams. Services of cloud computing involve trusted remote user data, and computer software. This paper proposed to an approach to efficient load balancing in cloud computing

Low Power Three Input XOR Gate For Arithmetic And Logical Operation

Authors:Ms. Poojashree Sahu, Mr. Ashish Raghuwanshi

Abstract: With advancement of microelectronics technology scaling, the main objective of design i.e. low power consumption can be easily acquired. For any digital logic design the power consumption depends on; Supply voltage, number of transistors incorporated in circuit and scaling ratios of the same. As CMOS technology supports inversion logic designs; NAND & NOR structures are useful for converting any logic equation into physical level design that comprises of PMOS and NMOS transistors. In similar way, logic can be implemented in other styles as well, with the difference in number of transistors required. The conventional CMOS design for three input XOR logic can be possible with 10 or more than 10 transistors, with the methodology discussed in this paper, the same design for three inputs XOR logic can be made possible with 16 transistors. The proposed methodology consists of transmission gate and systematic cell design methodology (SCDM). This design consumes 45% (35%) less power dissipation than that of conventional LPHS-FA and SCDM based XO10 XOR logic design with CMOS technology. Since the design for XOR logic, is useful for variety of applications such as Data encryption, Arithmetic circuits, Binary to Gray encoding etc. the XOR logic has been selected for design. The design explained in this paper is simulated with 130nm technology.

Low Read Power Delay Product Based Differential Eight Transistor SRAM cell
Authors: Ms. Jaya Sahu,Mr. Ashish Raghuwanshi

Abstract: SRAM is designed to provide an temporary storage for Central Processing Unit and replace Dynamic systems that require very low power consumption. Low power SRAM design is critical aspect since it takes a large fraction of total power and die area in high performance processors. This paper include the work on eight transistor SRAM cell that of smaller read power delay product due to cascading of pull offers 28% (74%) smaller read ‘0’ (‘1’) than exiting 7T. The SRAM cell read and cycle is characterized at 45nm technology using SPICE EDA tool.

A Robust Classification Algorithm for Multiple Type of Dataset

Authors:M.Tech. Scholar Afshan Idrees, Prof. Avinash Sharma

Abstract: With the increase in different internet services number of users are also increasing. Although while taking service user may be on risk for sharing data. So this work focus on increasing the security of the user data while taking classification service. Here algorithm provide robustness by encrypting the data and send to server, while server classify the data in encrypted form. One more security issue is that instead of transferring whole encrypted data, features are extract from the data first then encrypt and send to server for classification. Here proposed work successfully classify all type of user data in form of text, image, numeric.

An Unsupervised TLBO Based Drought Prediction By Utilizing Various Features

Authors:M.Tech. Scholar Shikha Ranjan Patel, Prof. Priyanka Verma

Abstract: Agricultural vulnerability is generally referred to as the degree to which agricultural systems are likely to experience harm due to a stress. In this work, an existing analytical method to quantify vulnerability was adopted to assess the magnitude as well as the spatial pattern of agricultural vulnerability to varying drought conditions. Based on the standardized precipitation index (SPI) was used as a measure of drought severity. A number of features including normalized difference vegetation index (NDVI), vegetation condition index (VCI), and SPI will be use for classification. Here proposed modal use Teacher Learning Based Optimization genetic approach for classify the different location present in geospatial dataset. By use of  this TLBO approach prior knowledge is not required. Experiment results shows that proposed work is better as compare to previous work.

Published by:
Volume 3 Issue 5

IJSRET Volume 3 Issue 5, September-2017

MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

Secret Sharing Schemes over MANET to Avoid Cheater Participation [102-109]

Author: Nisha Bharti, Hansa Acharya
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Web URL Classification and Malicious Activities: A Review [110-115]

Author: Anshika Bansal
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Malicious Web URL Classification using Evolutionary Algorithm [116-199]

Author: Anshika Bansal
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Attack over Email System: Review [200-206]

Author: Anuradha Kumari, Nitin Agrawal, Umesh Lilhore
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Encryption Scheme for Mobile Ad Hoc Networks: A Survey [207-209]

Author: Neha Dwivedi, Dr. Rajesh Shukla
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

 

 

Evolutionary Algorithm Based Optimized Encryption Scheme for Mobile Ad-Hoc Network [210-216]

Author: Neha Dwivedi, Dr. Rajesh Shukla
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research

MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research
MANET, Evolutionary Algorithm, Email System, encryption scheme, journal entries, international journal of current research
Published by:
Uncategorized

IJSRET Volume 3 Issue 4, July-2017

Efficient and Scalable Multiple Class Classification: A Review[76-79]

Author: Tarun Yadav

An Approach to Detect Malicious URL through Selective Classification[80-84]

Author: Ghanshyam Sen, Himanshu Yadav, Anurag Jain

Use of LC-Filters to Protect Equipment from Electromagnetic Pulse: Is it Real Necessity or “Bisiness as Usual”?[85-89]

Author: Vladimir Gurevich

Pilot Tone based Winner Filtering Approach for Carrier Channel Offset Estimation in OFDM Systems[90-95]

Author: Shweta Sharma, Minal Saxena

Node Replacement and Alternate Path based Energy Efficient Routing Protocol for MANET[96-101]

Author: Nehalastami, Hansa Acharya

Published by:
Uncategorized

IJSRET Volume 3 Issue 3, May-2017

Author: Neelam Kushwaha, Dharmendra Kumar Singh

Encrypted and Unencrypted Computation for Abstract Machine [59-62]

Author: Thripthi.P.Balakrishnan, Mr. S.Vijayanand, Dr. T. Senthil Prakash

Software Defined Visibility using REST API [63-66]

Author: Sindhu T, Shilpa Biradar

Battery Power Aware LAR Protocol for Mobile Ad-Hoc Network [67-69]

Author: Tarun Yadav

LAR Protocol over Mobile Ad-Hoc Network: Survey [70-75]

Author: Jasmeen Akhter, Akhilesh Shukla

Published by:
Uncategorized

IJSRET Volume 3 Issue 2, March-2017

Comparative Study on Pilot Tone based Approach for Channel Offset Estimation in OFDM Systems [25-28]

Author: Raghvendra Sharma, Saurabh Pandey, Anubhav Sharma

Community Detection on Social Media: A Review [29-33]

Author: Sweta Rai, Shubha Chaturvedi, Chetan Agarwal

Survey on Energy-Efficient Wireless Sensor Networks[34-38]

Author: Krishna Kant Sharma, Prof. Shivendra Dubey, Prof. Mukesh Dixit

Efficient and Scalable Multiple Class Classification using Bee Colony based Probabilistic Approach[39-44]

Author: Tarun Yadav

Real-Time Transferring of Optimized Levels with Carbon and Nitrogen Gases[45-49]

Author: K. Susitra, K. Vijayalakshmi, P.N Jeipratha

Published by:
Uncategorized

IJSRET Volume 3 Issue 1, January-2017

An Assessment of Location Aided Routing Protocol over MANET [1-5]

Author: Ankit Navgeet Joshi, Shivendra Dubey, Mukesh Dixit

Carrier Frequency Offset Estimation in OFDM Systems: Review [6-9]

Author: Padmaja Nagle, Prof. Nitin Lonbale

DFT Based Pilot tone Approach for Carrier Frequency Offset Estimation in OFDM Systems [10-15]

Author: Padmaja Nagle, Prof. Nitin Lonbale

Cloud Allocation Strategies for Load Balancing: Review [16-20]

Author: Shalini Bairagi, Prof. Vipin Verma

An Assessment of Handle Noise in Digitization of Historical Document [21-24]

Author: Anand Singh Rajput, Saurabh Pandey, Anubhav Sharma

Published by:
Uncategorized

IJSRET Volume 2 Issue 6, November-2016

Detection and Classification of One Conductor Open Faults in Parallel Transmission Line using Artificial Neural Network [139-146]

Author: A.M. Abdel-Aziz, B. M. Hasaneen, A. A. Dawood

Ant Colony based Optimized Authentication Mechanism for Vehicular Ad Hoc Networks [147-150]

Author: Priyanka Rathore, Pankaj Kawadakar

Network Lifetime Enhancement in Mobile Ad-Hoc Network: A Review [151-154]

Author: Ashok Kumar Yadav, Ravendra Ratan Singh

Ant Colony Based Optimized Encryption Scheme for Network-Coded Mobile Ad-Hoc Networks [155-159]

Author: Garima Boriya, Anubhav Sharma

Linear-Regression Based Node Relocation Scheme for Energy Efficient Wireless Sensor Network [160-164]

Author: Rishank Rathore, Mr. Akhilesh Bansiya

Review on BAT Algorithm in IDS for Optimization [165-168]

Author: Aliya Ahmad, Bhanu Pratap Singh Senger

Published by:
Uncategorized

IJSRET Volume 2 Issue 5, September-2016

DBSCAN: An Assessment of Density Based Clustering and It’s Approaches [109-113]

Author: Karuna Kant Tiwari, Virendra Raguvanshi, Anurag Jain

An Genetic Based Fuzzy Approach for Density Based Clustering by Using K-Means [114-120]

Author: Karuna Kant Tiwari, Anurag Jain

Review of Channel Estimation over Orthogonal Frequency Division Multiplexing in Communication System [121-125]

Author: Sonali L. Raulkar, Akant Raghuwanshi

A CFD Analysis of a Wind Turbine Blade Design at Various Angle of Attack and Low Reynolds Number [126-132]

Author: Raju Kumar, Priyanka Jhawar, Sanjay Kalraiya

A Survey: Analytics of Web Log File through Map Reduce and Hadoop [133-138]

Author: Chetan Sharma, Arun Jhapate

Published by: