Abstract- In mobile ad-hoc networks (MANETs), providing quality of service is more challenging than wired networks, because of multi hop communication, node connectivity and lack of central co-ordination. Mobile ad-hoc networks need sure distinctive characteristics which might cause difficulties providing QoS in such network. Coming up with of multi constrained QoS routing protocols rema...
Paper Information
Authors M.L.Ravi Chandra, Dr. P. Chandra Sekhar Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 13

Large centralized biometric databases, accessible over networks in real time are especially used for identification purposes. Multimodal biometric systems which are more robust and accurate in human identification require multiple templates storage of the same user analogous to individual biometric sources. This may raises concern about their usage and security when these stored template...
Paper Information
Authors Madhavi Gudavalli, Dr. D.Srinivasa Kumar, Dr. S.Viswanadha Raju
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 37

Abstract- Wireless sensor networks are self-organizing networks in which sensor nodes with limited resource are scattered in an area of interest to gather information. WSNs need to have effective node’s energy management methods for stable and seamless communication. Power efficient clustering is done in WSN to prolong the life of the network. In WSN, many algorithms are...
Paper Information
Authors Manpreet Kaur, Lokesh Pawar, Rohit Bhullar
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud, so that they square measure being replaced by identity verification mechanisms. Among b...
Paper Information
Authors P,Sreenivasa Moorthy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

Different networks are used to transfer data from one device to another with acceptable accuracy. For most applications, a system must guarantee that the data received are identical to the data transmitted. Transmission media are most error-prone link. In a network, the capacity of nodes is different and the rate at which the sender is sending data might not be the same rate at which the...
Paper Information
Authors Monika Singh, Ruhi Saxena
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

ENCRYPTION of data has become essential, for sending confidential information from one system to another system, especially in banking sector. NTRU labs have done pioneering work using a ring of truncated polynomials which was based on the impossibility (with proper choice of parameters) of finding the polynomial with knowledge of its inverse in modular arithmetic. Recently, Learning Wit...
Paper Information
Authors M.N.M. Prasad , Mohammed Ali Hussain, C.V. Sastry
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 34

Space partitioning is the process of dividing a Euclidean space into a non-overlapping regions. Kdimensional tree is such space-partitioning data structure for partitioning a Euclidean plane like the surface of earth. This paper describes a tool-based logically partitioning technique of earth surface using K-dimensional tree to segregate the edge servers over the earth surface into a non...
Paper Information
Authors Debabrata Sarddar, Sandip Roy, Rajesh Bose
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 17

Cognitive neuroscience and contemporary physicalist philosophies of mind typically hold the view that minds somehow reduce to brain activity. This is achieved through representations that evolved to map reality and are subjected to computational activity. The received view has been criticized mostly through thought experiments that rely on the notion of qualia, but philosopher Alva NoÃ...
Paper Information
Authors Dr. Gabriel Jucu00c3u00a1 De Hollanda
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

In this research work, performance of different channel equalization techniques and various M-ary modulation schemes (MPSK, MQAM and DPSK) for DWT based MIMO Multi-Carrier Code Division Multiple Access (MC-CDMA) wireless communication system has been analyzed through simulation. We propose this system using convolutional coding scheme over AWGN and Rayleigh fading channel with implementa...
Paper Information
Authors Rifat Ara Shams, M. Hasnat Kabir, Mohammed Mustaqim Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 30

This paper about the study of Secure message Recovery and batch verification using Digital Signature. Security is increased in batch verification through triple DES algorithm. Encryption is used for the Security in which the plaintext is transforming into the cipher text. A digital signature scheme involves two phases, the signature generation phase which is performed at the sender side ...
Paper Information
Authors Makkar,Sarika, Thakral,Silvi
Read Journal Click Here
Read Paper Click Here
Page No. 55 to 57