Wireless Sensor Networks (WSN’s) have become an important and challenging issue in last year. Wireless Sensor Networks consist of nodes with limited power are deployed to gather useful information from the field and send the gathered data to the users. In WSNs, it is critical to collect the information in an energy efficient manner. Ant Colony Optimization, a swarm intel...
Paper Information
Authors Dr. Anjali, Navpreet Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 39

Some optimal incomplete block designs for complete diallel cross method 4 are known in literature. These designs require several replications for each cross and thus consume more resources such as experimental units, experimental material, time etc. So, there is a need to evolve designs which require minimum possible replications of parental lines. In this paper a method of construction ...
Paper Information
Authors Dr. M.K.Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21

A Proposed SAT Algorithm
Published In: GJCST Part: D: Neural & AI Volume: 13 Issue: 1
This paper reviews existing SAT algorithms and proposes a new algorithm that solves the SAT problem.The proposed algorithm differs from existing algorithms in several aspects. First, the proposed algorithm does not do any backtracking during the searching process that usually consumes significant time as it is the case with other algorithms.Secondly, the searching process in the proposed...
Paper Information
Authors Dr. Bagais A., Junaidu S. B., Abdullahi M.
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 16

This paper presents a design of secure and economical (low cost) way of GPRS based fully automated energy metering system that measures and transmits the total electrical energy consumption to main server using general packet radio service (GPRS) technology provided by GSM networks and also present how the meter reading, disconnection and reconnection can be controlled from server end. T...
Paper Information
Authors Dr. Md. Abul Bashar, Maruf Ahmad, Sobuj Kumar Ray, Fahad Bin Sayed, Asif Ahmed
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 15

IP TRACEBACK Scenarios
Published In: GJCST Part: E: Network, Web & Security Volume: 13 Issue: 3
Internet Protocol (IP) trace back is the enabling technology to control Internet crime. In this paper, we present novel and practical IP traceback systems which provide a defense system with the ability to find out the real sources of attacking packets that traverse through the network. IP traceback is to find the origin of an IP packet on the Internet without relying on the source IP ad...
Paper Information
Authors Dr. Tenali.Naga Mani, Jyosyula.Bala Savitha
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

Now a day’s a number of manufacturing firms in developing countries do not practice affordable, efficient and user friendly inventory management tools which has been identified as a major cause of high inventory cost for adequate planning. This study focuses on the development of Material Requirements Planning (MRP) software with programming language C that can be used b...
Paper Information
Authors Md. Saiful Islam, Ripon Kumar Saha, Md. Mahbubur Rahman, Abu Md. Saifuddoha
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 21

In this paper we present a technique to extract features from a document image which can be used in machine learning algorithms in order to recognize characters from document image. The proposed method takes the scanned image of the handwritten character from paper document as input and processes that input through several stages to extract effective features. The object in the converted...
Paper Information
Authors Mohammad Imrul Jubair, Prianka Banik
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The main research objective of this paper is to detecting object boundaries in outdoor scenes of images solely based on some general properties of the real world objects. Here, segmentation and recognition should not be separated and treated as an interleaving procedure. In this project, an adaptive global clustering technique is developed that can capture the non-accidental structural r...
Paper Information
Authors Anju.J.A, Mr. Jenopaul.P
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12

The cloud computing is a computing technology that allows us to share the pool of configurable sources where the data of individuals or the organisations can be stored remotely those can be accessible on-demand high quality applications. Even though there are many advantages associated with cloud computing still it brings new challenges in terms of security provided for the data storage ...
Paper Information
Authors Swathi Sambangi
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Sustainability is a burning factor in the forestry sector around the world. Understanding sustainability is also a critical question. This research examined the status of Bangladesh forestry by indicating the needs of forest products and the efficiency of forest policy and management practices, and relates sustainability with scarcity situations Bangladesh is a country of beauty with for...
Paper Information
Authors Dr. Md Saiful Islam, Md Kamor Uddin Sikder
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 17