......

..

IJCTA-Volume 8 Issue 6 / November-December 2017
S.No
Title/Author Name
Page No
1
Improve the efficiency of Detection Technique of different types of attack In VANET:A review paper
-Ajay Wadekar,Dr.Kamlesh Namdev
Abstract
Vehicular ad hoc network (VANET) has attracted the attention of many researchers in recent years. It enables value-added services such as road safety and managing traffic on the road. Security issues are the challenging problems in this network. Sybil attack is one of the serious security threats that attacker tries to forge some identities. One of the main purposes for creating invalid identities is disruption in voting based systems. In this paper we propose a secure protocol for solving two conflicting goals privacy and Sybil attack in vehicle to vehicle (V2V) communications in VANET. The proposed protocol is based on the Boneh-Shacham (BS) short group signature scheme and batch verification. Experimental results demonstrate efficiency and applicability of the proposed protocol for providing the requirements of privacy and Sybil attack detection in V2V communications in VANET
634-639
PDF
2
A Study and Comparison of Wireless Routing Protocols Performance Parameters
-
M.Nagaraju,Dr.K.Raghava Rao,Dr.K.Vijayalakshmi
Abstract
MANET, which acts like a intellect configured framework collection of portable devices. All the nodes in the framework are equal and isolated. We focus on taxonomy of wireless protocols; we categorized the wireless protocols are Proactive, Reactive and hybrid depends on casting they are hierarchical, geographic and flat. The protocols are designed with certain mobility scenario to achieve effective and optimized routing. The paper we have studied designed scenario with different segmentations on wireless network protocols we are mainly consider analysis measures such as Throughput, Packet delivery, delay and latency.
Keywords: - MANET, Routing Protocols, Performance evaluation
640-649
PDF
3
Need of Advance Clipboard Manager
-
Sarang B. Kimmatkar
Abstract
Clipboard is a temporary storage or buffer which is used by an Operating System for storing temporary data. Clipboard is also defined as a software facility used for short-term data storage and/or data transfer between documents or applications, via copy and paste operations. It is most commonly a part of a graphical user interface (GUI) environment and is usually implemented as an anonymous, temporary data buffer, sometimes called the paste buffer, that can be accessed from most or all programs within the environment via defined programming interfaces. Any operating system has its own clipboard. The functionality provided by operating system, considering clipboard, are very limited for users. If the system is to be used for operation requiring fast use, say faster development of programs and structures, then the ordinary clipboard will not provide this supportive environment. Hence there is need of some software mechanism, called as clipboard manager, which will increase functionalities of clipboard so that ordinary clipboard can be used for satisfying needs of the faster working environment.
Keywords—Clipboard; Clipboard Manager; Buffer of sytem; Cliped data; Paste buffer;
650-652
PDF
4
Fuzzy Logic based Maximum Power Point Tracking for Photovoltaic system
-
P.S.Gotekar,Dr.S.P.Muley,Dr.D.P.Kothari
Abstract
A novel modeling technique is presented in this paper for maximum power point tracking using fuzzy logic of PV system. The main focus of this paper is to simplify modeling of single phase PV system . Then a fuzzy based maximum power point has been implemented which helps to track power efficiently.
Keywords—Fuzzy Logic, MPPT, PV model,MATLAB/SIMULINK
653-657
PDF
5
Association rule mining through PNTH for Web recommendations
-
T.Veerraju,G.S.N Murthy,S.Sai Ganesh
Abstract
Web structure mining can analyze pages that are accessed by the hyperlinks, and find relationship between web pages in a web site. The useful information which is hidden in web logs data can discover by web usage mining. The organization of the web page is not making an allowance for by the web recommendation systems which are constructed on web usage mining. The link based model HITS (Hypertext Induced Topic Selection) rank the web pages in web structure mining, but the importance of page is not obtained on visiting time bounds. A new approach PNTH (Preferred Navigation Tree with Hits) introduced in this paper as a measure to invent user access comportment on timely based web navigation, and the patterns among web pages. We refer these patterns to mine association rules. To mention web pages within a website the association rule mining (ARM) is useful to form a set of analytical rules which has a superior prospective of reducing the user access time on the web and furthermore increases the overall performance of the web recommendations.
Keywords— Web mining, HITS, PNTH algorithm, Association Rule Mining.
658-665
PDF
6
Feature Selection using Wrapper Method for Writer Identification of Tamil Handwritten Documents
-
D.Rajalakshmi,Dr.S.K.Jayanthi
Abstract
A novel modeling technique is presented in this paper for maximum power point tracking using fuzzy logic of PV system. The main focus of this paper is to simplify modeling of single phase PV system . Then a fuzzy based maximum power point has been implemented which helps to track power efficiently.
Keywords—Fuzzy Logic, MPPT, PV model,MATLAB/SIMULINK
666-671
PDF
7
Privacy Preserving Protocols in VANET: A Survey
-
G. Santhana Devi,M.Germanus Alex
Abstract
The vehicular ad-hoc networks (VANETs) are temporal networks which are self organized by vehicles and road side unit at the movement. In VANET each node to broadcast traffic associated message to other vehicles, which can be used to improve the traffic efficiency and safety. That message privacy and security are the major requirements in VANET. In this paper, we discuss the research challenges of security requirements in VANET and survey the recent privacy preserving protocols for VANET and finally compare the protocols with those utilize cryptographic primitives.
Keyword:Vehicular Ad-hoc Network (VANET), Trusted Authorities (TA), Road Side Unit (RSU), On-Board Unit(OBU), Tamper Proof Device (TPD), Security, Privacy, Message Authentication Code (MAC).
672-677
PDF
8
Application of QR Codes in Tourism Industry: A Review of literature
-
Anitha Elango Pillai,Devika Prakash,Nidhal Amur Al-Marhoobi,Mithun Shrivastava
Abstract
The impact of technology on our lives has resulted in the rise of innovative tools and applications designed to make everyday tasks simpler. QR codes is one such tool that is popularly used today in the service industry – especially in tourism industry – to enhance customer experiences. This review paper explores various aspects of QR codes and the ways in which QR codes are currently being used globally in tourism industry. This is done through review of available literature on and related to the theme of this paper. The trend of adoption of the same by countries is traced. The paper concludes that though several opportunities for QR code implementation exist, it also faces several challenges like lack of awareness of QR code technology, among others. However, addressing these challenges along with designing innovative applications for use of QR codes in tourism will catalyse the acceptance and use of these applications.
678-687
PDF
 
Publishing of articles is in progress...
 
     
     
IJCTA © Copyrights 2017| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.