Welcome to IJEETR

1,101 views
1,027 views

Published on

International journal of Engineering & Extended Technology Research

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,101
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Welcome to IJEETR

  1. 1. Welcome to IJEETR International Journal of Engineering and Extended Technologies Research (IJEETR) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc. IJEETR publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, and notes commentaries and news. Suggestions for special issues and publications are welcome Please Submit Your Paper to Our Email Id ijeetr11@gmail.com Author Guidance Writing Tips... Paper Tittles Times New Roman, 20 point, Bold. Headings Times New Roman, 12 point, Bold. Subheading Times New Roman, 11 point, Bold. Text Times New Roman, 11 point. Page setup Full research paper (only 5 to 10 pages) must be in 2 columns only. Author name should consist of first name, middle initial, last name. The author affiliation should consist of the following, - Name of Company or college. - Present address - City, state, zip code - Country name - Telephone, and e-mail id Abstraction
  2. 2. This part should start on a new page and should detail the difficulties, untested approach, major outcome and deduction in one paragraph and should emerge on the second page Avoid abbreviation, design drawing and quotations in the abstract Introduction Explain the reasons for bearing out the work, summarize the absolutely vital background and clearly state the environment of the hypothesis Result & Conclusion The result and conclusion should be accurate with consideration and be a clear in giving the facts and figures. It may be sustained and presented by the graphs, numbers and tables Acknowledgement If authors refer to themselves as recipients of aid or funding, they should do so by their initials separated by points (e.g. A.B.C.). Reference References should be recorded at the end of the paper in alphabetical order. Articles submitted for publication, unpublished facts, individual communications, etc. should not be included in the reference list but should only be cited in the article text. Authors are completely to blame for the correctness of the quotations. Publication Fees International Journal of Engineering and Extended Technologies Research has accepted each paper will be charged by publication fee. INR 4000 up to 10 pages will charge Indian authors*. While Foreign Authors will be charged by USD 120 up to 10 pages*. For more details, please download Payment Form. Publishing an articles in IJEETR needs articles processing charges that will be paid by the submitting Author upon acceptance of the articles for publication in agreement with the following criteria IJEETR Member: - INR 1000 / USD 100 Standard Author: - INR 1000 / USD 120 Payment of fee can be done in the following ways 1) Through online cash deposit/ NEFT/ RTGS 2) Wire transfer 3) Western Union/ MoneyGram
  3. 3. About Us International Journal of Engineering & Extended Technologies Research is an open access journal that provides publication of articles in all areas of Engineering and Technical Research. It is an international refereed e-journal as well as print journal. IJEETR have the aim to propagate innovative scientific research and eminence in knowledge. IJEETR Journal is making the seawall between research and developments. Our key objectives are as follows: To encourage new research for the applications in engineering fields. To publish knowledge and results in an efficient and effective manner. To produce the authentic and qualitative research. Contributions must be original, not previously or simultaneously published elsewhere, and are critically reviewed before they are published. Our journal system primarily aims to bring out the research talent over the world. IJEETR would take much care in making your research paper published without much delay with your kind co-operation. Call for Paper IJEETR Welcomes Author Submission of Papers Related to any branch of the Engineering, Basic and Applied Sciences and Innovative Technology. We give very quick response to every query The paper will be reconsidered inside 7-10 days All the acknowledged papers will be open accessible at IJEETR No details and numbers from this website can be copied or used any place without Pre-permission All material in IJEETR look reconsider to double-check equitable, Objectivity, independency and informative need IJEETR disclaims all liability with consider to your get access to of such connected World Wide Web sites Paper Submission Email: -
  4. 4. ijeert11@gmail.com Covered Subject Computer Science and Engineering Computer Applications Computer Software / Hardware Information Technology Embedded Systems & Applications Object-OP Analysis and Design Operating Systems Remote sensing Software Testing Applications of Computer Science Artificial intelligence Computational Statistics Computer Architecture Cyber-Science and Cyber-Space E-commerce Image Processing Computer Networking Network Security Adaptive applications Broadband Communications Broadband Networks Congestion & flow control Cross-layer optimization Network analysis Network architecture Network Applications Network reliability and security Network traffic characterization Protocols Routing, Scheduling and Switching Network security and Privacy Wireless networks Computer Business Network-based automation Cloud Computing and Applications Neuro-Fuzzy application Computational intelligence Networked vehicles applications Computer and microprocessor-based control Network Modeling and Simulation Computer Vision Network Measurement Computing Ethics Network Sensor Software evolution and maintenance Network Protocols Internet Technologies, Infrastructure, Networking theory and technologies Knowledge based systems High-speed Network Architectures Database Data and Information Systems Data Bases and its applications Data Compression Data Mining Data Warehousing Mobile Computing Mobility and Location Management Operating System and Middleware Privacy in Mobile Multimedia Mobility and Location Management Wireless Networks
  5. 5. Databases Database Design of Algorithms Distributed Data Base Distributed Real Time Systems Interworking of Wired Networks Digital Speech Processing Security in Mobile Multimedia Blue-Tooth Technologies Data Storage Management Mobile networks and services Multimedia Computing Image Recognition Processing and Transformation Content Based Image Retrieval Image Clustering Image Modeling and Editing Interfaces for Multimedia Creation Multimedia Databases Multimedia Coding and Encryption Video Analysis Processing and Transformation Multimedia Systems and Technologies Software Engineering Topics in Software Engineering Visual Software Engineering Software Testing Software Process Web Engineering Knowledge-based Systems Maintenance Software Projects Languages and Formal Methods Learning Applications Decision Making Search Engines Image analysis and processing Computing environments Industrial automated process Software Engineering Multidimensional signal processing Speech processing Smart devices and intelligent Navigation Systems Active safety systems Operations research Autonomous vehicle Pervasive Computing Collaborative applications Virtual immersive communications E & TC / Electrical Engineering Coding and Recognition Power Transmission Technology- related design Mixed analog / Digital Systems Signal Processing theory Asynchronous circuit design Audio Signal Processing, Coding Measurement & Testing Nano Technology Devices & Systems Semiconductors Management And Security Management Theory Management information systems Information Management Mixed analog / Digital Systems Information indexing and retrieval Security and risk management Security middleware Security, Privacy and Trust Security Systems and Technologies Scalability of middleware Signal processing in education Digital signal processing theory Mobility management
  6. 6. Electronic transceiver device Innovation Technology &Mngt Information processing Healthcare Management Information Hybrid Sensor Knowledge management Other Subject Biotechnology CAD/CAM/CAT/CIM Content Distribution Real-time computer control Relay assisted and cooperative Remote health monitoring Resource allocation and interference ID and sensor network applications Service oriented middleware Speech interface Flexible manufacturing systems Services in pervasive computing Multisensory fusion Navigation and Guidance Nonlinear and adaptive control GPS and location-based applications Virtual reality Pattern Recognition Agent-based middleware Applications in CAGD Computational Fluid Dynamics Computational Logic Graph Algorithms Mathematical digital libraries Computational engineering Computational Intelligence Computational statistics Environmental simulation Geographic information system Green Computing Intelligent Control System Innovation & product development Infrastructure monitoring & control Human-machine interfaces 1. Analysis of VANET Mobility Models with New Cluster Based On Routing Protocol. Author: - Mr. Hemant B. Mahajan. Abstract— As we understand that MANET and vehicle technology is growing and hence becoming the emerging field for most of researchers. Recently, new routing protocol proposed by some authors in order to overcome the problem of discovering and maintaining the efficient and effective route for the data transmission over the wireless network. At first stage of this study we are presenting investigation of that new approach of routing called cluster based routing for VANET and compare their performances with living routing protocols. This new routing approach-having aim of increasing the overall network throughput, minimize end-to-end delay. Apart from this the main goal of this project is to investigate the performance of different mobility models and traffic scenarios with this cluster based routing protocol in order to evaluate the performance of VANET using cluster based routing protocol in different mobility
  7. 7. models. Here we are considering the mobility models like: random waypoint mobility model and group mobility model. Simulation studies are conducted using NS2. Keywords- VANET, Road Based Routing, Receiver-Based Next-hop Election, Vehicular Traffic-Aware Routing, Clustering, Hybrid Mobility, Flooding, Traffic regulation. (Key words). 2. Investigation of Designing Least Cost Network Topology Based on Graph Theory. Author: - Mr. Hemant B. Mahajan. Abstract— As we know that perfect compute network is not easily disturb due to any reasons. For such networks it is expected that the communication network be a remains connected in case of any node or link failures. The communication links, which used to build the physical computer network, are costly, and hence we always want to build computer network with minimum number of links in order to reduce cost of building computer network. The feature of fault tolerant is also major factor to define good computer networks. If the computer network is having alternative paths among the vertices along with more disjoint paths then such network is fault tolerant network. Hence in this paper we are investigating the once of such method, which is used to design the least cost computer networks based on graph theory. We are discussing the efficient method for generating least cost physical network topology using the concept of spanning tree bipartite graph. Our experiment shows that using these methods we can build least cost computer networks. Keywords- Network Topology, graph theory, spanning tree, links, k-connected networks, and survivable network. (Key words). 3. Security Analysis in VANET: Black hole Attack Detection Survey. Author: - Mr. Hemant B. Mahajan. Abstract-- VANET means mobile ad hoc network is nothing but the group of independent mobile nodes, which are moving throughout the mobile network freely. Such kind of networks are temporary as they mobile nodes and their positions are not fixed and hence the all the routing paths which are established in order to make the communication in between the source and destination are on demand and depends on the nodes movement into the network. The architecture is not at all needed for such kind of networks. Role of routing protocols is most
  8. 8. important for the VANET, which is used to route the data from source to destination, but they are also vulnerable to the many of the security attacks in the VANET. Due to the unprotected nature of the VANET networks routing protocols, such networks also unprotected from the malicious mobile nodes in the network itself. Thus the main aim of this research work is to simulate the Black hole attacks in order to detect them and prevent it for the DSR routing protocol. Networks like VANET are based on their mobile nodes which are acts the host node as well as the router. In short, for the operations such as routing and data forwarding VANET networks are depends on their mobile nodes. But if the VANET network is having the nodes which are acts like the selfish or misbehave nodes in the network, then such nodes not performing the operations such as routing and data forwarding rather only dropping of the data which is arriving at such nodes. In this thesis work we are presenting the simulation of such misbehaving nodes and removing such nodes from the routing path in order to prevent the Black hole attack. For the simulation purpose we evaluate the DSR protocol for the same in the NS2 tool. Keywords— Black hole attack, selfish node, DSR, DOS Attacks. (Key words). 4. Study of Methods of Estimating The Actual Evapotranspiration In Irrigation Project. Author: - Mrs. LataKamthekar. Abstract-- the term of Evapotranspiration is nothing but the total of the water that is employed by plants in a very given space in transpiration as well as the water evaporated from the adjacent soil within the area in any given time. Evapotranspiration from irrigated land is a helpful indicator to guage the adequacy and responsibility of irrigation moreover because the equity in water use. Standard strategies to work out evapotranspiration are supported climate information and solely provide point estimates. Better regional estimation of evapotranspiration is retrieved from satellite remote sensing. Such strategies offer a strong means to calculate actual evapotranspiration from individual pixel to a whole image. During this investigation paper, varied methods used for the estimation of actual evapotranspiration are mentioned. Remote sensing technique employed by all such strategies so as to induce the bottom information like ratio, NDVI (Normalized distinction Vegetation Index) that are, in turn, accustomed realize parameters like land surface temperature, crop co-efficient, phase transition fraction etc. The strategies that are used are FAO Penman-Monteith technique, Carlson-Buffum technique, granger technique and SEBAL (Surface Energy Balance rule On Land). Keywords—SQLEvapotranspiration, Carlson-Buggfum, Granger, SEBAL, ET, NDVI, surface temperature (Key words). 5. Web Log Analysis Using Web Usage Mining.
  9. 9. Author:- Miss. Monica B. Shinde. Abstract— Web usage mining is the method of extracting useful information from server logs. World Wide Web usage mining is the method of finding out what users are looking for on the Internet using log documents. These log documents contains data that can’t be exactly interpreted, for demonstration data like who is accessing, which sheets are accessing by who, how much time user is accessing a particular page, can’t be got exactly these log documents. Since log documents are unformatted text documents, complex to understand and investigate. In this paper we propose an innovative approach utilizing unanimously accepted formatting language XML. In our approach text founded log documents are altered into XML format utilizing parsers. One time log file is in XML format, utilizing DOM API or other types of parser API’s, we can get the needed information in a very simple kind such as no. Of user who travelled to your website, each page hits, attack acknowledgement on website. Keywords— Web Usage Mining, Data Mining, Pattern discovery, log file, DOM API (Key words). 6. Detection of SQL Injection Attacks in Web applications. Author: - Miss. Prerana B. Shewale. Abstract— A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application and a successful SQL injection exploit can read sensitive data from the database, modify database data like insert or update or delete, execute administration operations on the database (i.e. shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. Type of injection attack is SQL injection attacks, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands. Numerous investigators and practitioners have suggested diverse methods to explain the SQL injection problem, present ways either go wrong to explain the full scope of the difficulty or have limitations that avert their use. Numerous investigators and practitioners are familiar with only a subset of the wide variety of techniques accessible to attackers who are trying to take benefit of SQL injection vulnerabilities. We proposed such methods, which defend SQL injection attack successfully like a filter, cryptographic hash-function, linear probing technique and customized error message, and POST method. Filter is used to detect malformed SQL queries whereas the hash function is used to match hash values of usernames and passwords against stored hash values. Here a linear probing technique is used to address the data collision and debug error
  10. 10. message problems. Keywords— SQL injection, practitioners, diverse, SQL injection vulnerabilities, strike (Key words). 7. Path To-ward The Cyber Security of Cloud. Author: - Mr. Uday P. Kulkarni. Abstract— As a cloud computing is the buzzword of the current era and every one want to migrate toward the cloud computing because of it easy to use easy to establish nature. Cloud computing gives number of option to solve the daily IT need. But as every technology have their benefits with some disadvantages too. In this paper we are going to discuss about the one of the big issue of the cloud computing that is Cyber Security of Cloud and try to rectify the problem with some solutions like TVES and Domain Based Approach. Keywords— Smart Grid, SCADA, Cyber Security, Cloud Computing, TVES, NTP, SHAMIR’S Algorithm (Key words). 8. Pattern Discovery for Text Mining Procedure Using Taxonomy. Author: - Mr. Uday P. Kulkarni. Abstract— Text-mining mentions usually to the procedure of extracting interesting and non-trivial information from unstructured text. Text mining encompasses some computer research disciplines with a mighty orientation in the direction of artificial comprehending in general, including but not restricted to pattern acknowledgement, neural networks, natural language processing, information retrieval and appliance learning. In addition, caution needs to be taken when these techniques are directed in international situations. Numerous classic methods evolved in the English dialect world; do not habitually work as well on other languages In proposed system we can take .xml file or .txt file as input & we request diverse algorithms & develop expected outcomes. This paper presents an innovative and effective pattern breakthrough technique, which encompasses the methods of pattern establishing and pattern evolving, to advance the effectiveness of using, and updating found out patterns for finding applicable and interesting data. Considerable experiments on RCV1 information assemblage and TREC topics illustrate that the suggested solution accomplishes performance. Text mining techniques shall play a necessary role among the approaching back years throughout this continued technique. Among the specialty subject of text mining, generally jointly called text analytics, several attention-grabbing
  11. 11. technologies like computers, IT, linguistics, cognition, pattern recognition and statistics also advanced mathematic techniques, computing, image, and not forgetting knowledge retrieval. Keywords— Text mining, pattern mining, pattern evolving, information filtering, text classification (Key words). Editor Board Editor in Chief Mr. Hemant B. Mahajan. Research & Development Head at Projectsgoal.com Owner of Godwit Technologies. Mail Id: - ijeetr11@gmail.com / projectsgoal@gmail.com Advisory Board Members Mr. Mahesh Mahajan Project Manager at projectsgoal.com Indexing
  12. 12. Term And Condition Read below Terms and Conditions Provided by IJEETR All Authors and visitors please read following term and condition carefully and these Terms and Condition represent an agreement between the International Journal of Engineering and Extended Technologies Research (IJEETR) And You Web site Visitor for Used of IJEETR website. These Terms apply to all Visitors and Authorized Users can accept and understood.
  13. 13. Authorized User Only Authorized user can access these website. Visitor Visitor able to access all material, access may require completion of a registration process.

×