Welcome to IJEETR
International Journal of Engineering and Extended Technologies Research
(IJEETR) is an open access online peer reviewed international journal that publishes
research and review articles in the fields of Computer Science, Neural Networks,
Electrical Engineering, Software Engineering, Information Technology, Mechanical
Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile
Engineering, Nano Technology & science, Power Electronics, Electronics &
Communication Engineering, Computational mathematics, Image processing, Civil
Engineering, Structural Engineering, Environmental Engineering, VLSI Testing &
Low Power VLSI Design etc.
IJEETR publishes original and review papers, technical reports, case studies,
conference reports, management reports, book reviews, and notes commentaries and
news. Suggestions for special issues and publications are welcome
Please Submit Your Paper to Our Email Id
Times New Roman, 20 point, Bold.
Times New Roman, 12 point, Bold.
Times New Roman, 11 point, Bold.
Times New Roman, 11 point.
Full research paper (only 5 to 10 pages) must be in 2 columns only.
Author name should consist of first name, middle initial, last name. The author
affiliation should consist of the following,
- Name of Company or college.
- Present address
- City, state, zip code
- Country name
- Telephone, and e-mail id
This part should start on a new page and should detail the difficulties, untested
approach, major outcome and deduction in one paragraph and should emerge on the
second page Avoid abbreviation, design drawing and quotations in the abstract
Explain the reasons for bearing out the work, summarize the absolutely vital
background and clearly state the environment of the hypothesis
Result & Conclusion
The result and conclusion should be accurate with consideration and be a clear in
giving the facts and figures. It may be sustained and presented by the graphs, numbers
If authors refer to themselves as recipients of aid or funding, they should do so by
their initials separated by points (e.g. A.B.C.).
References should be recorded at the end of the paper in alphabetical order. Articles
submitted for publication, unpublished facts, individual communications, etc. should
not be included in the reference list but should only be cited in the article text.
Authors are completely to blame for the correctness of the quotations.
International Journal of Engineering and Extended Technologies Research has
accepted each paper will be charged by publication fee. INR 4000 up to 10 pages will
charge Indian authors*. While Foreign Authors will be charged by USD 120 up to 10
pages*. For more details, please download Payment Form.
Publishing an articles in IJEETR needs articles processing charges that will be paid by
the submitting Author upon acceptance of the articles for publication in agreement
with the following criteria
IJEETR Member: - INR 1000 / USD 100
Standard Author: - INR 1000 / USD 120
Payment of fee can be done in the following ways
1) Through online cash deposit/ NEFT/ RTGS
2) Wire transfer
3) Western Union/ MoneyGram
International Journal of Engineering & Extended Technologies Research is an open
access journal that provides publication of articles in all areas of Engineering and
Technical Research. It is an international refereed e-journal as well as print journal.
IJEETR have the aim to propagate innovative scientific research and eminence in
knowledge. IJEETR Journal is making the seawall between research and
developments. Our key objectives are as follows:
To encourage new research for the applications in engineering fields.
To publish knowledge and results in an efficient and effective manner.
To produce the authentic and qualitative research.
Contributions must be original, not previously or simultaneously published
elsewhere, and are critically reviewed before they are published.
Our journal system primarily aims to bring out the research talent over the
IJEETR would take much care in making your research paper published
without much delay with your kind co-operation.
Call for Paper
IJEETR Welcomes Author Submission of Papers Related to any branch of the
Engineering, Basic and Applied Sciences and Innovative Technology.
We give very quick response to every query
The paper will be reconsidered inside 7-10 days
All the acknowledged papers will be open accessible at IJEETR
No details and numbers from this website can be copied or used any place
All material in IJEETR look reconsider to double-check equitable, Objectivity,
independency and informative need
IJEETR disclaims all liability with consider to your get access to of such
connected World Wide Web sites
Paper Submission Email: -
Computer Science and Engineering
Computer Software / Hardware
Embedded Systems & Applications
Object-OP Analysis and Design
Applications of Computer Science
Cyber-Science and Cyber-Space
Congestion & flow control
Network reliability and security
Network traffic characterization
Routing, Scheduling and Switching
Network security and Privacy
Computer Business Network-based automation
Cloud Computing and Applications Neuro-Fuzzy application
Computational intelligence Networked vehicles applications
Computer and microprocessor-based
Network Modeling and Simulation
Computer Vision Network Measurement
Computing Ethics Network Sensor
Software evolution and maintenance Network Protocols
Internet Technologies, Infrastructure, Networking theory and technologies
Knowledge based systems High-speed Network Architectures
Data and Information Systems
Data Bases and its applications
Mobility and Location Management
Operating System and Middleware
Privacy in Mobile Multimedia
Mobility and Location Management
Database Design of Algorithms
Distributed Data Base
Distributed Real Time Systems
Interworking of Wired Networks
Digital Speech Processing
Security in Mobile Multimedia
Data Storage Management Mobile networks and services
Processing and Transformation
Content Based Image Retrieval
Image Modeling and Editing
Interfaces for Multimedia Creation
Multimedia Coding and Encryption
Processing and Transformation
Multimedia Systems and Technologies
Topics in Software Engineering
Visual Software Engineering
Maintenance Software Projects
Languages and Formal Methods
Image analysis and processing Computing environments
Industrial automated process Software Engineering
Multidimensional signal processing Speech processing
Smart devices and intelligent Navigation Systems
Active safety systems Operations research
Autonomous vehicle Pervasive Computing
Collaborative applications Virtual immersive communications
E & TC / Electrical Engineering
Coding and Recognition
Technology- related design
Mixed analog / Digital Systems
Signal Processing theory
Asynchronous circuit design
Audio Signal Processing, Coding
Measurement & Testing
Devices & Systems
Management And Security
Management information systems
Mixed analog / Digital Systems
Information indexing and retrieval
Security and risk management
Security, Privacy and Trust
Security Systems and Technologies
Scalability of middleware
Signal processing in education
Digital signal processing theory Mobility management
Electronic transceiver device Innovation Technology &Mngt
Information processing Healthcare Management Information
Hybrid Sensor Knowledge management
Real-time computer control
Relay assisted and cooperative
Remote health monitoring
Resource allocation and interference
ID and sensor network applications
Service oriented middleware
Flexible manufacturing systems
Services in pervasive computing
Navigation and Guidance
Nonlinear and adaptive control
GPS and location-based applications
Applications in CAGD
Computational Fluid Dynamics
Mathematical digital libraries
Geographic information system
Intelligent Control System
Innovation & product development
Infrastructure monitoring & control
1. Analysis of VANET Mobility Models with New Cluster Based On
Author: - Mr. Hemant B. Mahajan.
Abstract— As we understand that MANET and vehicle technology is growing and
hence becoming the emerging field for most of researchers. Recently, new routing
protocol proposed by some authors in order to overcome the problem of
discovering and maintaining the efficient and effective route for the data
transmission over the wireless network. At first stage of this study we are
presenting investigation of that new approach of routing called cluster based
routing for VANET and compare their performances with living routing protocols.
This new routing approach-having aim of increasing the overall network
throughput, minimize end-to-end delay. Apart from this the main goal of this
project is to investigate the performance of different mobility models and traffic
scenarios with this cluster based routing protocol in order to evaluate the
performance of VANET using cluster based routing protocol in different mobility
models. Here we are considering the mobility models like: random waypoint
mobility model and group mobility model. Simulation studies are conducted using
Keywords- VANET, Road Based Routing, Receiver-Based Next-hop Election,
Vehicular Traffic-Aware Routing, Clustering, Hybrid Mobility, Flooding, Traffic
regulation. (Key words).
2. Investigation of Designing Least Cost Network Topology Based on
Author: - Mr. Hemant B. Mahajan.
Abstract— As we know that perfect compute network is not easily disturb due to
any reasons. For such networks it is expected that the communication network be
a remains connected in case of any node or link failures. The communication
links, which used to build the physical computer network, are costly, and hence
we always want to build computer network with minimum number of links in order
to reduce cost of building computer network. The feature of fault tolerant is also
major factor to define good computer networks. If the computer network is having
alternative paths among the vertices along with more disjoint paths then such
network is fault tolerant network. Hence in this paper we are investigating the
once of such method, which is used to design the least cost computer networks
based on graph theory. We are discussing the efficient method for generating least
cost physical network topology using the concept of spanning tree bipartite graph.
Our experiment shows that using these methods we can build least cost computer
Keywords- Network Topology, graph theory, spanning tree, links, k-connected
networks, and survivable network. (Key words).
3. Security Analysis in VANET: Black hole Attack Detection Survey.
Author: - Mr. Hemant B. Mahajan.
Abstract-- VANET means mobile ad hoc network is nothing but the group of
independent mobile nodes, which are moving throughout the mobile network
freely. Such kind of networks are temporary as they mobile nodes and their
positions are not fixed and hence the all the routing paths which are established
in order to make the communication in between the source and destination are on
demand and depends on the nodes movement into the network. The architecture is
not at all needed for such kind of networks. Role of routing protocols is most
important for the VANET, which is used to route the data from source to
destination, but they are also vulnerable to the many of the security attacks in the
VANET. Due to the unprotected nature of the VANET networks routing protocols,
such networks also unprotected from the malicious mobile nodes in the network
itself. Thus the main aim of this research work is to simulate the Black hole
attacks in order to detect them and prevent it for the DSR routing protocol.
Networks like VANET are based on their mobile nodes which are acts the host
node as well as the router. In short, for the operations such as routing and data
forwarding VANET networks are depends on their mobile nodes. But if the
VANET network is having the nodes which are acts like the selfish or misbehave
nodes in the network, then such nodes not performing the operations such as
routing and data forwarding rather only dropping of the data which is arriving at
such nodes. In this thesis work we are presenting the simulation of such
misbehaving nodes and removing such nodes from the routing path in order to
prevent the Black hole attack. For the simulation purpose we evaluate the DSR
protocol for the same in the NS2 tool.
Keywords— Black hole attack, selfish node, DSR, DOS Attacks. (Key words).
4. Study of Methods of Estimating The Actual Evapotranspiration In
Author: - Mrs. LataKamthekar.
Abstract-- the term of Evapotranspiration is nothing but the total of the water that
is employed by plants in a very given space in transpiration as well as the water
evaporated from the adjacent soil within the area in any given time.
Evapotranspiration from irrigated land is a helpful indicator to guage the
adequacy and responsibility of irrigation moreover because the equity in water
use. Standard strategies to work out evapotranspiration are supported climate
information and solely provide point estimates. Better regional estimation of
evapotranspiration is retrieved from satellite remote sensing. Such strategies offer
a strong means to calculate actual evapotranspiration from individual pixel to a
whole image. During this investigation paper, varied methods used for the
estimation of actual evapotranspiration are mentioned. Remote sensing technique
employed by all such strategies so as to induce the bottom information like ratio,
NDVI (Normalized distinction Vegetation Index) that are, in turn, accustomed
realize parameters like land surface temperature, crop co-efficient, phase
transition fraction etc. The strategies that are used are FAO Penman-Monteith
technique, Carlson-Buffum technique, granger technique and SEBAL (Surface
Energy Balance rule On Land).
Keywords—SQLEvapotranspiration, Carlson-Buggfum, Granger, SEBAL, ET,
NDVI, surface temperature (Key words).
5. Web Log Analysis Using Web Usage Mining.
Author:- Miss. Monica B. Shinde.
Abstract— Web usage mining is the method of extracting useful information from
server logs. World Wide Web usage mining is the method of finding out what
users are looking for on the Internet using log documents. These log documents
contains data that can’t be exactly interpreted, for demonstration data like who is
accessing, which sheets are accessing by who, how much time user is accessing a
particular page, can’t be got exactly these log documents. Since log documents
are unformatted text documents, complex to understand and investigate. In this
paper we propose an innovative approach utilizing unanimously accepted
formatting language XML. In our approach text founded log documents are
altered into XML format utilizing parsers. One time log file is in XML format,
utilizing DOM API or other types of parser API’s, we can get the needed
information in a very simple kind such as no. Of user who travelled to your
website, each page hits, attack acknowledgement on website.
Keywords— Web Usage Mining, Data Mining, Pattern discovery, log file, DOM
API (Key words).
6. Detection of SQL Injection Attacks in Web applications.
Author: - Miss. Prerana B. Shewale.
Abstract— A SQL injection attack consists of insertion or "injection" of a SQL
query via the input data from the client to the application and a successful SQL
injection exploit can read sensitive data from the database, modify database data
like insert or update or delete, execute administration operations on the database
(i.e. shutdown the DBMS), recover the content of a given file present on the
DBMS file system and in some cases issue commands to the operating system.
Type of injection attack is SQL injection attacks, in which SQL commands are
injected into data-plane input in order to effect the execution of predefined SQL
commands. Numerous investigators and practitioners have suggested diverse
methods to explain the SQL injection problem, present ways either go wrong to
explain the full scope of the difficulty or have limitations that avert their use.
Numerous investigators and practitioners are familiar with only a subset of the
wide variety of techniques accessible to attackers who are trying to take benefit of
SQL injection vulnerabilities. We proposed such methods, which defend SQL
injection attack successfully like a filter, cryptographic hash-function, linear
probing technique and customized error message, and POST method. Filter is
used to detect malformed SQL queries whereas the hash function is used to match
hash values of usernames and passwords against stored hash values. Here a
linear probing technique is used to address the data collision and debug error
Keywords— SQL injection, practitioners, diverse, SQL injection vulnerabilities,
strike (Key words).
7. Path To-ward The Cyber Security of Cloud.
Author: - Mr. Uday P. Kulkarni.
Abstract— As a cloud computing is the buzzword of the current era and every one
want to migrate toward the cloud computing because of it easy to use easy to
establish nature. Cloud computing gives number of option to solve the daily IT
need. But as every technology have their benefits with some disadvantages too. In
this paper we are going to discuss about the one of the big issue of the cloud
computing that is Cyber Security of Cloud and try to rectify the problem with
some solutions like TVES and Domain Based Approach.
Keywords— Smart Grid, SCADA, Cyber Security, Cloud Computing, TVES, NTP,
SHAMIR’S Algorithm (Key words).
8. Pattern Discovery for Text Mining Procedure Using Taxonomy.
Author: - Mr. Uday P. Kulkarni.
Abstract— Text-mining mentions usually to the procedure of extracting
interesting and non-trivial information from unstructured text. Text mining
encompasses some computer research disciplines with a mighty orientation in the
direction of artificial comprehending in general, including but not restricted to
pattern acknowledgement, neural networks, natural language processing,
information retrieval and appliance learning. In addition, caution needs to be
taken when these techniques are directed in international situations. Numerous
classic methods evolved in the English dialect world; do not habitually work as
well on other languages In proposed system we can take .xml file or .txt file as
input & we request diverse algorithms & develop expected outcomes. This paper
presents an innovative and effective pattern breakthrough technique, which
encompasses the methods of pattern establishing and pattern evolving, to advance
the effectiveness of using, and updating found out patterns for finding applicable
and interesting data. Considerable experiments on RCV1 information assemblage
and TREC topics illustrate that the suggested solution accomplishes performance.
Text mining techniques shall play a necessary role among the approaching back
years throughout this continued technique. Among the specialty subject of text
mining, generally jointly called text analytics, several attention-grabbing
technologies like computers, IT, linguistics, cognition, pattern recognition and
statistics also advanced mathematic techniques, computing, image, and not
forgetting knowledge retrieval.
Keywords— Text mining, pattern mining, pattern evolving, information filtering,
text classification (Key words).
Editor in Chief
Mr. Hemant B. Mahajan.
Research & Development Head at
Owner of Godwit Technologies.
Mail Id: - firstname.lastname@example.org /
Advisory Board Members
Mr. Mahesh Mahajan
Project Manager at projectsgoal.com
Term And Condition
Read below Terms and Conditions Provided by IJEETR
All Authors and visitors please read following term and condition carefully and these
Terms and Condition represent an agreement between the International Journal of
Engineering and Extended Technologies Research (IJEETR) And You Web site
Visitor for Used of IJEETR website. These Terms apply to all Visitors and
Authorized Users can accept and understood.
Only Authorized user can access these website.
Visitor able to access all material, access may require completion of a registration