SlideShare a Scribd company logo
1 of 14
Welcome to IJEETR
International Journal of Engineering and Extended Technologies Research
(IJEETR) is an open access online peer reviewed international journal that publishes
research and review articles in the fields of Computer Science, Neural Networks,
Electrical Engineering, Software Engineering, Information Technology, Mechanical
Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile
Engineering, Nano Technology & science, Power Electronics, Electronics &
Communication Engineering, Computational mathematics, Image processing, Civil
Engineering, Structural Engineering, Environmental Engineering, VLSI Testing &
Low Power VLSI Design etc.
IJEETR publishes original and review papers, technical reports, case studies,
conference reports, management reports, book reviews, and notes commentaries and
news. Suggestions for special issues and publications are welcome
Please Submit Your Paper to Our Email Id
ijeetr11@gmail.com
Author Guidance
Writing Tips...
Paper Tittles
Times New Roman, 20 point, Bold.
Headings
Times New Roman, 12 point, Bold.
Subheading
Times New Roman, 11 point, Bold.
Text
Times New Roman, 11 point.
Page setup
Full research paper (only 5 to 10 pages) must be in 2 columns only.
Author name should consist of first name, middle initial, last name. The author
affiliation should consist of the following,
- Name of Company or college.
- Present address
- City, state, zip code
- Country name
- Telephone, and e-mail id
Abstraction
This part should start on a new page and should detail the difficulties, untested
approach, major outcome and deduction in one paragraph and should emerge on the
second page Avoid abbreviation, design drawing and quotations in the abstract
Introduction
Explain the reasons for bearing out the work, summarize the absolutely vital
background and clearly state the environment of the hypothesis
Result & Conclusion
The result and conclusion should be accurate with consideration and be a clear in
giving the facts and figures. It may be sustained and presented by the graphs, numbers
and tables
Acknowledgement
If authors refer to themselves as recipients of aid or funding, they should do so by
their initials separated by points (e.g. A.B.C.).
Reference
References should be recorded at the end of the paper in alphabetical order. Articles
submitted for publication, unpublished facts, individual communications, etc. should
not be included in the reference list but should only be cited in the article text.
Authors are completely to blame for the correctness of the quotations.
Publication Fees
International Journal of Engineering and Extended Technologies Research has
accepted each paper will be charged by publication fee. INR 4000 up to 10 pages will
charge Indian authors*. While Foreign Authors will be charged by USD 120 up to 10
pages*. For more details, please download Payment Form.
Publishing an articles in IJEETR needs articles processing charges that will be paid by
the submitting Author upon acceptance of the articles for publication in agreement
with the following criteria
IJEETR Member: - INR 1000 / USD 100
Standard Author: - INR 1000 / USD 120
Payment of fee can be done in the following ways
1) Through online cash deposit/ NEFT/ RTGS
2) Wire transfer
3) Western Union/ MoneyGram
About Us
International Journal of Engineering & Extended Technologies Research is an open
access journal that provides publication of articles in all areas of Engineering and
Technical Research. It is an international refereed e-journal as well as print journal.
IJEETR have the aim to propagate innovative scientific research and eminence in
knowledge. IJEETR Journal is making the seawall between research and
developments. Our key objectives are as follows:
To encourage new research for the applications in engineering fields.
To publish knowledge and results in an efficient and effective manner.
To produce the authentic and qualitative research.
Contributions must be original, not previously or simultaneously published
elsewhere, and are critically reviewed before they are published.
Our journal system primarily aims to bring out the research talent over the
world.
IJEETR would take much care in making your research paper published
without much delay with your kind co-operation.
Call for Paper
IJEETR Welcomes Author Submission of Papers Related to any branch of the
Engineering, Basic and Applied Sciences and Innovative Technology.
We give very quick response to every query
The paper will be reconsidered inside 7-10 days
All the acknowledged papers will be open accessible at IJEETR
No details and numbers from this website can be copied or used any place
without Pre-permission
All material in IJEETR look reconsider to double-check equitable, Objectivity,
independency and informative need
IJEETR disclaims all liability with consider to your get access to of such
connected World Wide Web sites
Paper Submission Email: -
ijeert11@gmail.com
Covered Subject
Computer Science and Engineering
Computer Applications
Computer Software / Hardware
Information Technology
Embedded Systems & Applications
Object-OP Analysis and Design
Operating Systems
Remote sensing
Software Testing
Applications of Computer Science
Artificial intelligence
Computational Statistics
Computer Architecture
Cyber-Science and Cyber-Space
E-commerce
Image Processing
Computer Networking
Network Security
Adaptive applications
Broadband Communications
Broadband Networks
Congestion & flow control
Cross-layer optimization
Network analysis
Network architecture
Network Applications
Network reliability and security
Network traffic characterization
Protocols
Routing, Scheduling and Switching
Network security and Privacy
Wireless networks
Computer Business Network-based automation
Cloud Computing and Applications Neuro-Fuzzy application
Computational intelligence Networked vehicles applications
Computer and microprocessor-based
control
Network Modeling and Simulation
Computer Vision Network Measurement
Computing Ethics Network Sensor
Software evolution and maintenance Network Protocols
Internet Technologies, Infrastructure, Networking theory and technologies
Knowledge based systems High-speed Network Architectures
Database
Data and Information Systems
Data Bases and its applications
Data Compression
Data Mining
Data Warehousing
Mobile Computing
Mobility and Location Management
Operating System and Middleware
Privacy in Mobile Multimedia
Mobility and Location Management
Wireless Networks
Databases
Database Design of Algorithms
Distributed Data Base
Distributed Real Time Systems
Interworking of Wired Networks
Digital Speech Processing
Security in Mobile Multimedia
Blue-Tooth Technologies
Data Storage Management Mobile networks and services
Multimedia Computing
Image Recognition
Processing and Transformation
Content Based Image Retrieval
Image Clustering
Image Modeling and Editing
Interfaces for Multimedia Creation
Multimedia Databases
Multimedia Coding and Encryption
Video Analysis
Processing and Transformation
Multimedia Systems and Technologies
Software Engineering
Topics in Software Engineering
Visual Software Engineering
Software Testing
Software Process
Web Engineering
Knowledge-based Systems
Maintenance Software Projects
Languages and Formal Methods
Learning Applications
Decision Making
Search Engines
Image analysis and processing Computing environments
Industrial automated process Software Engineering
Multidimensional signal processing Speech processing
Smart devices and intelligent Navigation Systems
Active safety systems Operations research
Autonomous vehicle Pervasive Computing
Collaborative applications Virtual immersive communications
E & TC / Electrical Engineering
Coding and Recognition
Power Transmission
Technology- related design
Mixed analog / Digital Systems
Signal Processing theory
Asynchronous circuit design
Audio Signal Processing, Coding
Measurement & Testing
Nano Technology
Devices & Systems
Semiconductors
Management And Security
Management Theory
Management information systems
Information Management
Mixed analog / Digital Systems
Information indexing and retrieval
Security and risk management
Security middleware
Security, Privacy and Trust
Security Systems and Technologies
Scalability of middleware
Signal processing in education
Digital signal processing theory Mobility management
Electronic transceiver device Innovation Technology &Mngt
Information processing Healthcare Management Information
Hybrid Sensor Knowledge management
Other Subject
Biotechnology
CAD/CAM/CAT/CIM
Content Distribution
Real-time computer control
Relay assisted and cooperative
Remote health monitoring
Resource allocation and interference
ID and sensor network applications
Service oriented middleware
Speech interface
Flexible manufacturing systems
Services in pervasive computing
Multisensory fusion
Navigation and Guidance
Nonlinear and adaptive control
GPS and location-based applications
Virtual reality
Pattern Recognition
Agent-based middleware
Applications in CAGD
Computational Fluid Dynamics
Computational Logic
Graph Algorithms
Mathematical digital libraries
Computational engineering
Computational Intelligence
Computational statistics
Environmental simulation
Geographic information system
Green Computing
Intelligent Control System
Innovation & product development
Infrastructure monitoring & control
Human-machine interfaces
1. Analysis of VANET Mobility Models with New Cluster Based On
Routing Protocol.
Author: - Mr. Hemant B. Mahajan.
Abstract— As we understand that MANET and vehicle technology is growing and
hence becoming the emerging field for most of researchers. Recently, new routing
protocol proposed by some authors in order to overcome the problem of
discovering and maintaining the efficient and effective route for the data
transmission over the wireless network. At first stage of this study we are
presenting investigation of that new approach of routing called cluster based
routing for VANET and compare their performances with living routing protocols.
This new routing approach-having aim of increasing the overall network
throughput, minimize end-to-end delay. Apart from this the main goal of this
project is to investigate the performance of different mobility models and traffic
scenarios with this cluster based routing protocol in order to evaluate the
performance of VANET using cluster based routing protocol in different mobility
models. Here we are considering the mobility models like: random waypoint
mobility model and group mobility model. Simulation studies are conducted using
NS2.
Keywords- VANET, Road Based Routing, Receiver-Based Next-hop Election,
Vehicular Traffic-Aware Routing, Clustering, Hybrid Mobility, Flooding, Traffic
regulation. (Key words).
2. Investigation of Designing Least Cost Network Topology Based on
Graph Theory.
Author: - Mr. Hemant B. Mahajan.
Abstract— As we know that perfect compute network is not easily disturb due to
any reasons. For such networks it is expected that the communication network be
a remains connected in case of any node or link failures. The communication
links, which used to build the physical computer network, are costly, and hence
we always want to build computer network with minimum number of links in order
to reduce cost of building computer network. The feature of fault tolerant is also
major factor to define good computer networks. If the computer network is having
alternative paths among the vertices along with more disjoint paths then such
network is fault tolerant network. Hence in this paper we are investigating the
once of such method, which is used to design the least cost computer networks
based on graph theory. We are discussing the efficient method for generating least
cost physical network topology using the concept of spanning tree bipartite graph.
Our experiment shows that using these methods we can build least cost computer
networks.
Keywords- Network Topology, graph theory, spanning tree, links, k-connected
networks, and survivable network. (Key words).
3. Security Analysis in VANET: Black hole Attack Detection Survey.
Author: - Mr. Hemant B. Mahajan.
Abstract-- VANET means mobile ad hoc network is nothing but the group of
independent mobile nodes, which are moving throughout the mobile network
freely. Such kind of networks are temporary as they mobile nodes and their
positions are not fixed and hence the all the routing paths which are established
in order to make the communication in between the source and destination are on
demand and depends on the nodes movement into the network. The architecture is
not at all needed for such kind of networks. Role of routing protocols is most
important for the VANET, which is used to route the data from source to
destination, but they are also vulnerable to the many of the security attacks in the
VANET. Due to the unprotected nature of the VANET networks routing protocols,
such networks also unprotected from the malicious mobile nodes in the network
itself. Thus the main aim of this research work is to simulate the Black hole
attacks in order to detect them and prevent it for the DSR routing protocol.
Networks like VANET are based on their mobile nodes which are acts the host
node as well as the router. In short, for the operations such as routing and data
forwarding VANET networks are depends on their mobile nodes. But if the
VANET network is having the nodes which are acts like the selfish or misbehave
nodes in the network, then such nodes not performing the operations such as
routing and data forwarding rather only dropping of the data which is arriving at
such nodes. In this thesis work we are presenting the simulation of such
misbehaving nodes and removing such nodes from the routing path in order to
prevent the Black hole attack. For the simulation purpose we evaluate the DSR
protocol for the same in the NS2 tool.
Keywords— Black hole attack, selfish node, DSR, DOS Attacks. (Key words).
4. Study of Methods of Estimating The Actual Evapotranspiration In
Irrigation Project.
Author: - Mrs. LataKamthekar.
Abstract-- the term of Evapotranspiration is nothing but the total of the water that
is employed by plants in a very given space in transpiration as well as the water
evaporated from the adjacent soil within the area in any given time.
Evapotranspiration from irrigated land is a helpful indicator to guage the
adequacy and responsibility of irrigation moreover because the equity in water
use. Standard strategies to work out evapotranspiration are supported climate
information and solely provide point estimates. Better regional estimation of
evapotranspiration is retrieved from satellite remote sensing. Such strategies offer
a strong means to calculate actual evapotranspiration from individual pixel to a
whole image. During this investigation paper, varied methods used for the
estimation of actual evapotranspiration are mentioned. Remote sensing technique
employed by all such strategies so as to induce the bottom information like ratio,
NDVI (Normalized distinction Vegetation Index) that are, in turn, accustomed
realize parameters like land surface temperature, crop co-efficient, phase
transition fraction etc. The strategies that are used are FAO Penman-Monteith
technique, Carlson-Buffum technique, granger technique and SEBAL (Surface
Energy Balance rule On Land).
Keywords—SQLEvapotranspiration, Carlson-Buggfum, Granger, SEBAL, ET,
NDVI, surface temperature (Key words).
5. Web Log Analysis Using Web Usage Mining.
Author:- Miss. Monica B. Shinde.
Abstract— Web usage mining is the method of extracting useful information from
server logs. World Wide Web usage mining is the method of finding out what
users are looking for on the Internet using log documents. These log documents
contains data that can’t be exactly interpreted, for demonstration data like who is
accessing, which sheets are accessing by who, how much time user is accessing a
particular page, can’t be got exactly these log documents. Since log documents
are unformatted text documents, complex to understand and investigate. In this
paper we propose an innovative approach utilizing unanimously accepted
formatting language XML. In our approach text founded log documents are
altered into XML format utilizing parsers. One time log file is in XML format,
utilizing DOM API or other types of parser API’s, we can get the needed
information in a very simple kind such as no. Of user who travelled to your
website, each page hits, attack acknowledgement on website.
Keywords— Web Usage Mining, Data Mining, Pattern discovery, log file, DOM
API (Key words).
6. Detection of SQL Injection Attacks in Web applications.
Author: - Miss. Prerana B. Shewale.
Abstract— A SQL injection attack consists of insertion or "injection" of a SQL
query via the input data from the client to the application and a successful SQL
injection exploit can read sensitive data from the database, modify database data
like insert or update or delete, execute administration operations on the database
(i.e. shutdown the DBMS), recover the content of a given file present on the
DBMS file system and in some cases issue commands to the operating system.
Type of injection attack is SQL injection attacks, in which SQL commands are
injected into data-plane input in order to effect the execution of predefined SQL
commands. Numerous investigators and practitioners have suggested diverse
methods to explain the SQL injection problem, present ways either go wrong to
explain the full scope of the difficulty or have limitations that avert their use.
Numerous investigators and practitioners are familiar with only a subset of the
wide variety of techniques accessible to attackers who are trying to take benefit of
SQL injection vulnerabilities. We proposed such methods, which defend SQL
injection attack successfully like a filter, cryptographic hash-function, linear
probing technique and customized error message, and POST method. Filter is
used to detect malformed SQL queries whereas the hash function is used to match
hash values of usernames and passwords against stored hash values. Here a
linear probing technique is used to address the data collision and debug error
message problems.
Keywords— SQL injection, practitioners, diverse, SQL injection vulnerabilities,
strike (Key words).
7. Path To-ward The Cyber Security of Cloud.
Author: - Mr. Uday P. Kulkarni.
Abstract— As a cloud computing is the buzzword of the current era and every one
want to migrate toward the cloud computing because of it easy to use easy to
establish nature. Cloud computing gives number of option to solve the daily IT
need. But as every technology have their benefits with some disadvantages too. In
this paper we are going to discuss about the one of the big issue of the cloud
computing that is Cyber Security of Cloud and try to rectify the problem with
some solutions like TVES and Domain Based Approach.
Keywords— Smart Grid, SCADA, Cyber Security, Cloud Computing, TVES, NTP,
SHAMIR’S Algorithm (Key words).
8. Pattern Discovery for Text Mining Procedure Using Taxonomy.
Author: - Mr. Uday P. Kulkarni.
Abstract— Text-mining mentions usually to the procedure of extracting
interesting and non-trivial information from unstructured text. Text mining
encompasses some computer research disciplines with a mighty orientation in the
direction of artificial comprehending in general, including but not restricted to
pattern acknowledgement, neural networks, natural language processing,
information retrieval and appliance learning. In addition, caution needs to be
taken when these techniques are directed in international situations. Numerous
classic methods evolved in the English dialect world; do not habitually work as
well on other languages In proposed system we can take .xml file or .txt file as
input & we request diverse algorithms & develop expected outcomes. This paper
presents an innovative and effective pattern breakthrough technique, which
encompasses the methods of pattern establishing and pattern evolving, to advance
the effectiveness of using, and updating found out patterns for finding applicable
and interesting data. Considerable experiments on RCV1 information assemblage
and TREC topics illustrate that the suggested solution accomplishes performance.
Text mining techniques shall play a necessary role among the approaching back
years throughout this continued technique. Among the specialty subject of text
mining, generally jointly called text analytics, several attention-grabbing
technologies like computers, IT, linguistics, cognition, pattern recognition and
statistics also advanced mathematic techniques, computing, image, and not
forgetting knowledge retrieval.
Keywords— Text mining, pattern mining, pattern evolving, information filtering,
text classification (Key words).
Editor Board
Editor in Chief
Mr. Hemant B. Mahajan.
Research & Development Head at
Projectsgoal.com
Owner of Godwit Technologies.
Mail Id: - ijeetr11@gmail.com /
projectsgoal@gmail.com
Advisory Board Members
Mr. Mahesh Mahajan
Project Manager at projectsgoal.com
Indexing
Term And Condition
Read below Terms and Conditions Provided by IJEETR
All Authors and visitors please read following term and condition carefully and these
Terms and Condition represent an agreement between the International Journal of
Engineering and Extended Technologies Research (IJEETR) And You Web site
Visitor for Used of IJEETR website. These Terms apply to all Visitors and
Authorized Users can accept and understood.
Authorized User
Only Authorized user can access these website.
Visitor
Visitor able to access all material, access may require completion of a registration
process.

More Related Content

What's hot

CV_Wael_Dghais_2015
CV_Wael_Dghais_2015CV_Wael_Dghais_2015
CV_Wael_Dghais_2015Wael Dghais
 
prezentare upb-workshop-ieee-5mai2015
prezentare upb-workshop-ieee-5mai2015prezentare upb-workshop-ieee-5mai2015
prezentare upb-workshop-ieee-5mai2015Marius Vlad
 
OBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACS
OBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACSOBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACS
OBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACSUstredni knihovna VUT
 
Thrust Areas in Electronics Engineering
Thrust Areas in Electronics Engineering Thrust Areas in Electronics Engineering
Thrust Areas in Electronics Engineering Mathankumar S
 
IRJET - Smart Traffic System for Emergence Vehicles
IRJET - Smart Traffic System for Emergence VehiclesIRJET - Smart Traffic System for Emergence Vehicles
IRJET - Smart Traffic System for Emergence VehiclesIRJET Journal
 
Final presentation engineering as a career version1.1
Final presentation engineering as a career version1.1Final presentation engineering as a career version1.1
Final presentation engineering as a career version1.1Deepesh Divaakaran
 
Review paper on IoT based technology
Review paper on IoT based technologyReview paper on IoT based technology
Review paper on IoT based technologyIRJET Journal
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a surveySana
 

What's hot (12)

CV_Wael_Dghais_2015
CV_Wael_Dghais_2015CV_Wael_Dghais_2015
CV_Wael_Dghais_2015
 
prezentare upb-workshop-ieee-5mai2015
prezentare upb-workshop-ieee-5mai2015prezentare upb-workshop-ieee-5mai2015
prezentare upb-workshop-ieee-5mai2015
 
Ijcsea
IjcseaIjcsea
Ijcsea
 
OBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACS
OBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACSOBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACS
OBJEVTE MOŽNOSTI PUBLIKOVÁNÍ S VYDAVATELSTVÍM IEEE - by ESZTER LUKACS
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
Thrust Areas in Electronics Engineering
Thrust Areas in Electronics Engineering Thrust Areas in Electronics Engineering
Thrust Areas in Electronics Engineering
 
Bob fugerer bio
Bob fugerer bioBob fugerer bio
Bob fugerer bio
 
IRJET - Smart Traffic System for Emergence Vehicles
IRJET - Smart Traffic System for Emergence VehiclesIRJET - Smart Traffic System for Emergence Vehicles
IRJET - Smart Traffic System for Emergence Vehicles
 
Final presentation engineering as a career version1.1
Final presentation engineering as a career version1.1Final presentation engineering as a career version1.1
Final presentation engineering as a career version1.1
 
Review paper on IoT based technology
Review paper on IoT based technologyReview paper on IoT based technology
Review paper on IoT based technology
 
FLOOD ALERTING SYSTEM USING RASPBERRY PI & THINGSPEAK
FLOOD ALERTING SYSTEM USING RASPBERRY PI  & THINGSPEAKFLOOD ALERTING SYSTEM USING RASPBERRY PI  & THINGSPEAK
FLOOD ALERTING SYSTEM USING RASPBERRY PI & THINGSPEAK
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a survey
 

Similar to Welcome to IJEETR

International Journal on Soft Computing, Artificial Intelligence and Appli...
   International Journal on Soft Computing, Artificial Intelligence and Appli...   International Journal on Soft Computing, Artificial Intelligence and Appli...
International Journal on Soft Computing, Artificial Intelligence and Appli...ijscai
 
IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...
IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...
IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...ijscai
 
IJSCAI - cfp23-05.pdf
IJSCAI - cfp23-05.pdfIJSCAI - cfp23-05.pdf
IJSCAI - cfp23-05.pdfijscai
 
International Journal on Soft Computing, Artificial Intelligence and Applica...
 International Journal on Soft Computing, Artificial Intelligence and Applica... International Journal on Soft Computing, Artificial Intelligence and Applica...
International Journal on Soft Computing, Artificial Intelligence and Applica...ijscai
 
International Journal on Soft Computing, Artificial Intelligence and Applic...
  International Journal on Soft Computing, Artificial Intelligence and Applic...  International Journal on Soft Computing, Artificial Intelligence and Applic...
International Journal on Soft Computing, Artificial Intelligence and Applic...ijscai
 
International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...ijscai
 
International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...ijscai
 
International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...ijscai
 

Similar to Welcome to IJEETR (20)

Ijcsea
IjcseaIjcsea
Ijcsea
 
Ijcsea
IjcseaIjcsea
Ijcsea
 
CAIJ
CAIJCAIJ
CAIJ
 
International Journal on Soft Computing, Artificial Intelligence and Appli...
   International Journal on Soft Computing, Artificial Intelligence and Appli...   International Journal on Soft Computing, Artificial Intelligence and Appli...
International Journal on Soft Computing, Artificial Intelligence and Appli...
 
Ijserd
IjserdIjserd
Ijserd
 
IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...
IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...
IJSCAI -CFP.pdfAInternational Journal on Soft Computing, Artificial Intellige...
 
IJSCAI - cfp23-05.pdf
IJSCAI - cfp23-05.pdfIJSCAI - cfp23-05.pdf
IJSCAI - cfp23-05.pdf
 
International Journal on Soft Computing, Artificial Intelligence and Applica...
 International Journal on Soft Computing, Artificial Intelligence and Applica... International Journal on Soft Computing, Artificial Intelligence and Applica...
International Journal on Soft Computing, Artificial Intelligence and Applica...
 
Ijcsit
IjcsitIjcsit
Ijcsit
 
International Journal on Soft Computing, Artificial Intelligence and Applic...
  International Journal on Soft Computing, Artificial Intelligence and Applic...  International Journal on Soft Computing, Artificial Intelligence and Applic...
International Journal on Soft Computing, Artificial Intelligence and Applic...
 
Ijcsit
IjcsitIjcsit
Ijcsit
 
Ijcsit
IjcsitIjcsit
Ijcsit
 
Ijaca
IjacaIjaca
Ijaca
 
Ijserd
IjserdIjserd
Ijserd
 
Ijcsea
IjcseaIjcsea
Ijcsea
 
Ijserd
IjserdIjserd
Ijserd
 
International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...
 
Ijcsea
IjcseaIjcsea
Ijcsea
 
International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...
 
International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...International Journal on Soft Computing, Artificial Intelligence and Applicat...
International Journal on Soft Computing, Artificial Intelligence and Applicat...
 

Recently uploaded

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 

Recently uploaded (20)

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Welcome to IJEETR

  • 1. Welcome to IJEETR International Journal of Engineering and Extended Technologies Research (IJEETR) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc. IJEETR publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, and notes commentaries and news. Suggestions for special issues and publications are welcome Please Submit Your Paper to Our Email Id ijeetr11@gmail.com Author Guidance Writing Tips... Paper Tittles Times New Roman, 20 point, Bold. Headings Times New Roman, 12 point, Bold. Subheading Times New Roman, 11 point, Bold. Text Times New Roman, 11 point. Page setup Full research paper (only 5 to 10 pages) must be in 2 columns only. Author name should consist of first name, middle initial, last name. The author affiliation should consist of the following, - Name of Company or college. - Present address - City, state, zip code - Country name - Telephone, and e-mail id Abstraction
  • 2. This part should start on a new page and should detail the difficulties, untested approach, major outcome and deduction in one paragraph and should emerge on the second page Avoid abbreviation, design drawing and quotations in the abstract Introduction Explain the reasons for bearing out the work, summarize the absolutely vital background and clearly state the environment of the hypothesis Result & Conclusion The result and conclusion should be accurate with consideration and be a clear in giving the facts and figures. It may be sustained and presented by the graphs, numbers and tables Acknowledgement If authors refer to themselves as recipients of aid or funding, they should do so by their initials separated by points (e.g. A.B.C.). Reference References should be recorded at the end of the paper in alphabetical order. Articles submitted for publication, unpublished facts, individual communications, etc. should not be included in the reference list but should only be cited in the article text. Authors are completely to blame for the correctness of the quotations. Publication Fees International Journal of Engineering and Extended Technologies Research has accepted each paper will be charged by publication fee. INR 4000 up to 10 pages will charge Indian authors*. While Foreign Authors will be charged by USD 120 up to 10 pages*. For more details, please download Payment Form. Publishing an articles in IJEETR needs articles processing charges that will be paid by the submitting Author upon acceptance of the articles for publication in agreement with the following criteria IJEETR Member: - INR 1000 / USD 100 Standard Author: - INR 1000 / USD 120 Payment of fee can be done in the following ways 1) Through online cash deposit/ NEFT/ RTGS 2) Wire transfer 3) Western Union/ MoneyGram
  • 3. About Us International Journal of Engineering & Extended Technologies Research is an open access journal that provides publication of articles in all areas of Engineering and Technical Research. It is an international refereed e-journal as well as print journal. IJEETR have the aim to propagate innovative scientific research and eminence in knowledge. IJEETR Journal is making the seawall between research and developments. Our key objectives are as follows: To encourage new research for the applications in engineering fields. To publish knowledge and results in an efficient and effective manner. To produce the authentic and qualitative research. Contributions must be original, not previously or simultaneously published elsewhere, and are critically reviewed before they are published. Our journal system primarily aims to bring out the research talent over the world. IJEETR would take much care in making your research paper published without much delay with your kind co-operation. Call for Paper IJEETR Welcomes Author Submission of Papers Related to any branch of the Engineering, Basic and Applied Sciences and Innovative Technology. We give very quick response to every query The paper will be reconsidered inside 7-10 days All the acknowledged papers will be open accessible at IJEETR No details and numbers from this website can be copied or used any place without Pre-permission All material in IJEETR look reconsider to double-check equitable, Objectivity, independency and informative need IJEETR disclaims all liability with consider to your get access to of such connected World Wide Web sites Paper Submission Email: -
  • 4. ijeert11@gmail.com Covered Subject Computer Science and Engineering Computer Applications Computer Software / Hardware Information Technology Embedded Systems & Applications Object-OP Analysis and Design Operating Systems Remote sensing Software Testing Applications of Computer Science Artificial intelligence Computational Statistics Computer Architecture Cyber-Science and Cyber-Space E-commerce Image Processing Computer Networking Network Security Adaptive applications Broadband Communications Broadband Networks Congestion & flow control Cross-layer optimization Network analysis Network architecture Network Applications Network reliability and security Network traffic characterization Protocols Routing, Scheduling and Switching Network security and Privacy Wireless networks Computer Business Network-based automation Cloud Computing and Applications Neuro-Fuzzy application Computational intelligence Networked vehicles applications Computer and microprocessor-based control Network Modeling and Simulation Computer Vision Network Measurement Computing Ethics Network Sensor Software evolution and maintenance Network Protocols Internet Technologies, Infrastructure, Networking theory and technologies Knowledge based systems High-speed Network Architectures Database Data and Information Systems Data Bases and its applications Data Compression Data Mining Data Warehousing Mobile Computing Mobility and Location Management Operating System and Middleware Privacy in Mobile Multimedia Mobility and Location Management Wireless Networks
  • 5. Databases Database Design of Algorithms Distributed Data Base Distributed Real Time Systems Interworking of Wired Networks Digital Speech Processing Security in Mobile Multimedia Blue-Tooth Technologies Data Storage Management Mobile networks and services Multimedia Computing Image Recognition Processing and Transformation Content Based Image Retrieval Image Clustering Image Modeling and Editing Interfaces for Multimedia Creation Multimedia Databases Multimedia Coding and Encryption Video Analysis Processing and Transformation Multimedia Systems and Technologies Software Engineering Topics in Software Engineering Visual Software Engineering Software Testing Software Process Web Engineering Knowledge-based Systems Maintenance Software Projects Languages and Formal Methods Learning Applications Decision Making Search Engines Image analysis and processing Computing environments Industrial automated process Software Engineering Multidimensional signal processing Speech processing Smart devices and intelligent Navigation Systems Active safety systems Operations research Autonomous vehicle Pervasive Computing Collaborative applications Virtual immersive communications E & TC / Electrical Engineering Coding and Recognition Power Transmission Technology- related design Mixed analog / Digital Systems Signal Processing theory Asynchronous circuit design Audio Signal Processing, Coding Measurement & Testing Nano Technology Devices & Systems Semiconductors Management And Security Management Theory Management information systems Information Management Mixed analog / Digital Systems Information indexing and retrieval Security and risk management Security middleware Security, Privacy and Trust Security Systems and Technologies Scalability of middleware Signal processing in education Digital signal processing theory Mobility management
  • 6. Electronic transceiver device Innovation Technology &Mngt Information processing Healthcare Management Information Hybrid Sensor Knowledge management Other Subject Biotechnology CAD/CAM/CAT/CIM Content Distribution Real-time computer control Relay assisted and cooperative Remote health monitoring Resource allocation and interference ID and sensor network applications Service oriented middleware Speech interface Flexible manufacturing systems Services in pervasive computing Multisensory fusion Navigation and Guidance Nonlinear and adaptive control GPS and location-based applications Virtual reality Pattern Recognition Agent-based middleware Applications in CAGD Computational Fluid Dynamics Computational Logic Graph Algorithms Mathematical digital libraries Computational engineering Computational Intelligence Computational statistics Environmental simulation Geographic information system Green Computing Intelligent Control System Innovation & product development Infrastructure monitoring & control Human-machine interfaces 1. Analysis of VANET Mobility Models with New Cluster Based On Routing Protocol. Author: - Mr. Hemant B. Mahajan. Abstract— As we understand that MANET and vehicle technology is growing and hence becoming the emerging field for most of researchers. Recently, new routing protocol proposed by some authors in order to overcome the problem of discovering and maintaining the efficient and effective route for the data transmission over the wireless network. At first stage of this study we are presenting investigation of that new approach of routing called cluster based routing for VANET and compare their performances with living routing protocols. This new routing approach-having aim of increasing the overall network throughput, minimize end-to-end delay. Apart from this the main goal of this project is to investigate the performance of different mobility models and traffic scenarios with this cluster based routing protocol in order to evaluate the performance of VANET using cluster based routing protocol in different mobility
  • 7. models. Here we are considering the mobility models like: random waypoint mobility model and group mobility model. Simulation studies are conducted using NS2. Keywords- VANET, Road Based Routing, Receiver-Based Next-hop Election, Vehicular Traffic-Aware Routing, Clustering, Hybrid Mobility, Flooding, Traffic regulation. (Key words). 2. Investigation of Designing Least Cost Network Topology Based on Graph Theory. Author: - Mr. Hemant B. Mahajan. Abstract— As we know that perfect compute network is not easily disturb due to any reasons. For such networks it is expected that the communication network be a remains connected in case of any node or link failures. The communication links, which used to build the physical computer network, are costly, and hence we always want to build computer network with minimum number of links in order to reduce cost of building computer network. The feature of fault tolerant is also major factor to define good computer networks. If the computer network is having alternative paths among the vertices along with more disjoint paths then such network is fault tolerant network. Hence in this paper we are investigating the once of such method, which is used to design the least cost computer networks based on graph theory. We are discussing the efficient method for generating least cost physical network topology using the concept of spanning tree bipartite graph. Our experiment shows that using these methods we can build least cost computer networks. Keywords- Network Topology, graph theory, spanning tree, links, k-connected networks, and survivable network. (Key words). 3. Security Analysis in VANET: Black hole Attack Detection Survey. Author: - Mr. Hemant B. Mahajan. Abstract-- VANET means mobile ad hoc network is nothing but the group of independent mobile nodes, which are moving throughout the mobile network freely. Such kind of networks are temporary as they mobile nodes and their positions are not fixed and hence the all the routing paths which are established in order to make the communication in between the source and destination are on demand and depends on the nodes movement into the network. The architecture is not at all needed for such kind of networks. Role of routing protocols is most
  • 8. important for the VANET, which is used to route the data from source to destination, but they are also vulnerable to the many of the security attacks in the VANET. Due to the unprotected nature of the VANET networks routing protocols, such networks also unprotected from the malicious mobile nodes in the network itself. Thus the main aim of this research work is to simulate the Black hole attacks in order to detect them and prevent it for the DSR routing protocol. Networks like VANET are based on their mobile nodes which are acts the host node as well as the router. In short, for the operations such as routing and data forwarding VANET networks are depends on their mobile nodes. But if the VANET network is having the nodes which are acts like the selfish or misbehave nodes in the network, then such nodes not performing the operations such as routing and data forwarding rather only dropping of the data which is arriving at such nodes. In this thesis work we are presenting the simulation of such misbehaving nodes and removing such nodes from the routing path in order to prevent the Black hole attack. For the simulation purpose we evaluate the DSR protocol for the same in the NS2 tool. Keywords— Black hole attack, selfish node, DSR, DOS Attacks. (Key words). 4. Study of Methods of Estimating The Actual Evapotranspiration In Irrigation Project. Author: - Mrs. LataKamthekar. Abstract-- the term of Evapotranspiration is nothing but the total of the water that is employed by plants in a very given space in transpiration as well as the water evaporated from the adjacent soil within the area in any given time. Evapotranspiration from irrigated land is a helpful indicator to guage the adequacy and responsibility of irrigation moreover because the equity in water use. Standard strategies to work out evapotranspiration are supported climate information and solely provide point estimates. Better regional estimation of evapotranspiration is retrieved from satellite remote sensing. Such strategies offer a strong means to calculate actual evapotranspiration from individual pixel to a whole image. During this investigation paper, varied methods used for the estimation of actual evapotranspiration are mentioned. Remote sensing technique employed by all such strategies so as to induce the bottom information like ratio, NDVI (Normalized distinction Vegetation Index) that are, in turn, accustomed realize parameters like land surface temperature, crop co-efficient, phase transition fraction etc. The strategies that are used are FAO Penman-Monteith technique, Carlson-Buffum technique, granger technique and SEBAL (Surface Energy Balance rule On Land). Keywords—SQLEvapotranspiration, Carlson-Buggfum, Granger, SEBAL, ET, NDVI, surface temperature (Key words). 5. Web Log Analysis Using Web Usage Mining.
  • 9. Author:- Miss. Monica B. Shinde. Abstract— Web usage mining is the method of extracting useful information from server logs. World Wide Web usage mining is the method of finding out what users are looking for on the Internet using log documents. These log documents contains data that can’t be exactly interpreted, for demonstration data like who is accessing, which sheets are accessing by who, how much time user is accessing a particular page, can’t be got exactly these log documents. Since log documents are unformatted text documents, complex to understand and investigate. In this paper we propose an innovative approach utilizing unanimously accepted formatting language XML. In our approach text founded log documents are altered into XML format utilizing parsers. One time log file is in XML format, utilizing DOM API or other types of parser API’s, we can get the needed information in a very simple kind such as no. Of user who travelled to your website, each page hits, attack acknowledgement on website. Keywords— Web Usage Mining, Data Mining, Pattern discovery, log file, DOM API (Key words). 6. Detection of SQL Injection Attacks in Web applications. Author: - Miss. Prerana B. Shewale. Abstract— A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application and a successful SQL injection exploit can read sensitive data from the database, modify database data like insert or update or delete, execute administration operations on the database (i.e. shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. Type of injection attack is SQL injection attacks, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands. Numerous investigators and practitioners have suggested diverse methods to explain the SQL injection problem, present ways either go wrong to explain the full scope of the difficulty or have limitations that avert their use. Numerous investigators and practitioners are familiar with only a subset of the wide variety of techniques accessible to attackers who are trying to take benefit of SQL injection vulnerabilities. We proposed such methods, which defend SQL injection attack successfully like a filter, cryptographic hash-function, linear probing technique and customized error message, and POST method. Filter is used to detect malformed SQL queries whereas the hash function is used to match hash values of usernames and passwords against stored hash values. Here a linear probing technique is used to address the data collision and debug error
  • 10. message problems. Keywords— SQL injection, practitioners, diverse, SQL injection vulnerabilities, strike (Key words). 7. Path To-ward The Cyber Security of Cloud. Author: - Mr. Uday P. Kulkarni. Abstract— As a cloud computing is the buzzword of the current era and every one want to migrate toward the cloud computing because of it easy to use easy to establish nature. Cloud computing gives number of option to solve the daily IT need. But as every technology have their benefits with some disadvantages too. In this paper we are going to discuss about the one of the big issue of the cloud computing that is Cyber Security of Cloud and try to rectify the problem with some solutions like TVES and Domain Based Approach. Keywords— Smart Grid, SCADA, Cyber Security, Cloud Computing, TVES, NTP, SHAMIR’S Algorithm (Key words). 8. Pattern Discovery for Text Mining Procedure Using Taxonomy. Author: - Mr. Uday P. Kulkarni. Abstract— Text-mining mentions usually to the procedure of extracting interesting and non-trivial information from unstructured text. Text mining encompasses some computer research disciplines with a mighty orientation in the direction of artificial comprehending in general, including but not restricted to pattern acknowledgement, neural networks, natural language processing, information retrieval and appliance learning. In addition, caution needs to be taken when these techniques are directed in international situations. Numerous classic methods evolved in the English dialect world; do not habitually work as well on other languages In proposed system we can take .xml file or .txt file as input & we request diverse algorithms & develop expected outcomes. This paper presents an innovative and effective pattern breakthrough technique, which encompasses the methods of pattern establishing and pattern evolving, to advance the effectiveness of using, and updating found out patterns for finding applicable and interesting data. Considerable experiments on RCV1 information assemblage and TREC topics illustrate that the suggested solution accomplishes performance. Text mining techniques shall play a necessary role among the approaching back years throughout this continued technique. Among the specialty subject of text mining, generally jointly called text analytics, several attention-grabbing
  • 11. technologies like computers, IT, linguistics, cognition, pattern recognition and statistics also advanced mathematic techniques, computing, image, and not forgetting knowledge retrieval. Keywords— Text mining, pattern mining, pattern evolving, information filtering, text classification (Key words). Editor Board Editor in Chief Mr. Hemant B. Mahajan. Research & Development Head at Projectsgoal.com Owner of Godwit Technologies. Mail Id: - ijeetr11@gmail.com / projectsgoal@gmail.com Advisory Board Members Mr. Mahesh Mahajan Project Manager at projectsgoal.com Indexing
  • 12.
  • 13. Term And Condition Read below Terms and Conditions Provided by IJEETR All Authors and visitors please read following term and condition carefully and these Terms and Condition represent an agreement between the International Journal of Engineering and Extended Technologies Research (IJEETR) And You Web site Visitor for Used of IJEETR website. These Terms apply to all Visitors and Authorized Users can accept and understood.
  • 14. Authorized User Only Authorized user can access these website. Visitor Visitor able to access all material, access may require completion of a registration process.