• Send Your paper at :
  • ijirtm@gmail.com
  • editor@ijirtm.com

Impact Factor - 5.445
Impact Factor - 5.68

By SJIF

SNo

IJIRTM: Volume-3, Issue-4, 2019

1
Paper Title : Neighbor Discovery in Vehicular Ad-hoc Network for Efficient Data Transmission
Author Name : Mr.Hukum SIngh Bisen, Mr. Jitendra Mishra
Keywords : Mobile ad-hoc network, Vehicular Ad hoc networks, Intelligent transportation systems, Vehicle-to-vehicle, Vehicle-to-infrastructure.
Abstract :

VANET is a variation of MANET (Mobile Ad-hoc Network). MANET comprises of nodes which communicate without central network and where nodes are equipped with networking capabilities. VANET on the other side has emerged as a challenging and more liable class or variation of MANET. The communication between devices expands in such as way where nodes are free to join and leave the network i.e. it is an open network. The new vehicles being launched in the market are now coming with equipped on board sensors which make it easy for the vehicle to easily join and merge in the network and leverage the benefits of VANET. In this paper we proposed the route discovery mechanism for the best route for a communication in a minimum delay and maximum throughput, our experimental result shows that the proposed method gives better results than the previous method.

Download IJIRTM-0304201901
2
Paper Title : Intrusion Detection Techniques: Survey & Discussions
Author Name : Ms.Amita Tiwari, Prof.Atul Shrivastava
Keywords : Intrusion detection system, Neural network, Cyber security, KDDCUP, Attack.
Abstract :

Cyber security is becoming increasingly important; therefore, countries have started to make big investments in order to protect their critical infrastructures. The IDS is tasked with monitoring and analyzing network activity to differentiate between normal and anomalous activities. If anomalous activity goes undetected, this could potentially cause severe damage to the infrastructure and reliability of a computer system. Therefore, the detection rate of anomalous activity must be maximized. In this paper we present the comparative performance evaluation for the various techniques in intrusion detection system.

Download IJIRTM-0304201902
3
Paper Title : Intrusion Detection Techniques with Features Classification: Survey & Discussions
Author Name : Ms.Pooja Kushwah, Prof.Praveen Kataria
Keywords : Anomaly Intrusion Detection, Intrusion Detection System (IDS), Naive Bayes Classifier; KDDCUP, Machine learning.
Abstract :

Nowadays, the Internet is accessible from all over the place. With the growing number of electronic devices connected to the web, computer network security could be endangered. This problem has raised the question on how to effectively defend the computer network from internal and external attacks, Due to the dynamic nature of wireless network, security and efficient intrusion detection system (IDS) is a challenging task to detect the intruder nodes. The classification algorithm is used to detect the intrusions in an efficient manner. In this paper we present the literature survey and the problem identification for the current intrusion detection system.

Download IJIRTM-0304201903
4
Paper Title : Image Compression Techniques for the General Application: Survey & Discussions
Author Name : Ms.Sana Azam, Prof.Praveen Kataria
Keywords : Image compression, Wavelet transform, Compression ratio, Compression rate, MSE, PSNR.
Abstract :

Image compression is the techniques of to reduce the data size without any loss of information or data, the image is available in many forms such as digital images, grey scale images, x-ray image etc. image compression is done by using two techniques lossless image compression techniques and lossy image compression techniques. There are various techniques are presents here to complete the compression process like wavelet transform, principal component analysis, classification techniques etc. wavelet transform is further classified as discrete wavelet transform, haar wavelet transform etc. In this paper we presents the literature survey for the image compression using various techniques and applications.

Download IJIRTM-0304201904
5
Paper Title : Vehicular Ad-hoc Network for Road Safety Applications: Survey & Discussions
Author Name : Mr.Navin Kumar, Dr.Neetesh Gupta
Keywords : Mobile ad-hoc network, Vehicular ad-hoc network, Vehicle to vehicle, Vehicle to infrastructure, Single hop, Multi hop.
Abstract :

In the recent years, car manufacturing industries, academia and government agencies have started putting much joint efforts together towards realizing the concept of vehicular communications in wide scale. In the near future, vehicles will have the capability to communicate with each other directly in a Vehicle-to-Vehicle (V2V) manner or indirectly using the existing infrastructure alongside the road in a Vehicle-to-Infrastructure (V2I) way. This will enable the implementation of numerous Intelligent Transportation Systems (ITS) applications, including road safety, traffic efficiency and infotainment applications, assisting drivers in avoiding dangerous situations or provisioning of convenience applications for passengers. In this paper we survey for the vehicular ad-hoc network and discuss their applications for the road safety.

Download IJIRTM-0304201905
6
Paper Title : Optimal Path Routing using Reactive Routing Protocol in Mobile Ad-hoc Network
Author Name : Mr.Devesh Sarathe, Mr. Jitendra Mishra
Keywords : Mobile ad-hoc network, Cognitive radio network, Throughput, Wireless sensor networks, Local area networks.
Abstract :

Ad hoc network is a distributed, temporary network system. It is formed by the dynamic link of nodes and does not rely on the existing network infrastructures, such as router, gateway, regular power supply, etc. Ad hoc network is a kind of peer to peer networks and each node has functions of data collecting, storage, processing and forwarding. It is the cost-effective solution for the short-range communication in some particular scenarios, such as battlefield, disaster rescue, environment sensing etc., In this paper we present the reactive routing protocol and enhance the performance of ad-hoc on demand distance vector routing protocol.

Download IJIRTM-0304201906
7
Paper Title : Evaluation of Performance for the Image Fusion Techniques
Author Name : Mr.Rupesh Lokhande, Mr. Jitendra Mishra
Keywords : Image Reconstruction, Image Fusion, High Resolution, Red Green Blue, Discrete Wavelet Transform, Feature extraction, Multi-resolution.
Abstract :

Digital image processing involves many tasks, such as manipulation, storing, transmission, etc., that may introduce perceivable distortions. Since degradations occur during the processing chain, it is crucial to quantify degradations in order to overcome them. Image fusion techniques can enhance a digital image without spoiling it. The enhancement methods are of two types namely spatial domain methods and frequency domain methods. In this paper we presents the comparative experimental study for the image fusion using previous and proposed techniques, and our proposed techniques shows better results than the previous techniques.

Download IJIRTM-0304201907
8
Paper Title : Experimental Evaluation of Neural Network and Optimization Techniques for Intrusion Detection System
Author Name : Ms.Amita Tiwari, Prof.Atul Shrivastava
Keywords : Intrusion detection system, Neural network, Optimization techniques, Accuracy, Precision, Recall.
Abstract :

In today’s high technology environment, internet can be a hazardous place, since enterprises are becoming more and more competent and dependent on their information systems. The threats to information systems create security concern of both industry and public about the proper use of sensitive data. Nowadays security issues are growing in a tremendous rate. So it is expedient to have a mechanism to keep track of its security issues in the network or host. In this paper presents the comparative performance evaluation for the network based intrusion detection system and show the experimental results with the existing techniques, our simulated results shows proposed method gives better results than the existing techniques in terms of accuracy and other performance parameters.

Download IJIRTM-0304201908
9
Paper Title : Review on Grid Connected Solar Photovoltaic Power System
Author Name : Mr.Surendra Kumar Singh, Prof.Devendra Dohare
Keywords : Inverters, hybrid topologies, CHB, THD, phase shift pulse width modulation, PWM, sinusoidal pulse width modulation, Solar System, Renewable Energy, Solar power, Boost converter, Solar panel, MPPT.
Abstract :

Solar power, without a doubt, is the cleanest energy in the world and is being used as a renewable energy since years ago. Residential that uses solar power as their alternative power supply will bring benefits to them. The main objective of this project is to survey and develop a solar system. The system tracks the maximum intensity of light. When the intensity of light is decreasing, this system MPPT tries higher output. This application generates the power only sunny days. Finally, the project is able to generate electrical units and the Sun intensity in order to get maximum power.

Download IJIRTM-0304201909
10
Paper Title : Model of Grid Connected 6KWp Photovoltaic Solar Power System
Author Name : Mr.Surendra Kumar Singh, Prof.Devendra Dohare
Keywords : Inverters, hybrid topologies, CHB, THD, phase shift pulse width modulation, PWM, sinusoidal pulse width modulation, Solar System, Renewable Energy, Solar power, Boost converter, Solar panel, MPPT.
Abstract :

An installation of solar photovoltaic (PV) systems has been witnessed worldwide. It is mainly driven by the demand of “clean” power generation. Grid-connected PV systems will become an even active player in the future mixed power systems, which are linked by a vast of power electronics converters. In order to achieve a reliable and efficient power generation from PV systems, stringent demands have been imposed on the entire PV system. It in return advances the development of power converter technology in PV systems. This paper thus takes an overview of the advancement of power electronics converters in three phase PV systems, being commonly used in residential applications. Demands to three phase grid-connected PV systems as well as the general system control strategies are also addressed in this paper.

Download IJIRTM-0304201910
11
Paper Title : NB Tree based Intrusion Detection Technique using Rough Set Theory Model
Author Name : Mr.Vivek Kirar, Prof.Narendra Parmar
Keywords : Rough set theory, tree based classifier, signature-based IDS, anomaly-based IDS.
Abstract :

Intrusion detection System is a defense measure that supervises activities of the computer network and reports the malicious activities to the network administrator. Intruders do many attempts to gain access to the network and try to harm the organization’s data. Thus the security is the most important aspect for any type of organization. Due to these reasons, intrusion detection has been an important research issue. Rough sets are the sets defined through these upper and lower approximations. Rough set theory has turned into an important and sophisticated device in the determination of a wide range of various issues such as showing uncertainty or general knowledge, knowledge discovery, estimation of the quality and availability of information with respect to the existence of a note of date patterns, evaluation and identification of date dependency with the hybrid approach used improve accuracy and f-measure.

Download IJIRTM-0304201911
12
Paper Title : Congestion Control in Wireless Sensor Networks: Survey & Discussions
Author Name : Mr.Priyanshu Rai, Prof.Ashish Nema, Mr. Jitendra Mishra
Keywords : Mobile sink, Mobility management, Energy efficiency, Wireless sensor Networks, Routing, Life time.
Abstract :

Wireless sensor networks are composed of a large number of sensor nodes distributed randomly in a particular area, which can be used for sensing data, information transmission, event monitoring and so on. However, most nodes in the network are powered by batteries and can only provide limited lifetime. Once the node is depleted of energy, it immediately enters a state of death. The energy conservation in WSNs represents a big challenge that must be taken into account during design any protocol for these networks. Since the nodes in the network are provided with limited power batteries and the depletion of nodes’ energy will limit the lifetime of the whole network, therefore, it is necessary to consider the energy consumption of the sensor nodes during any protocol design for WSNs. In this paper we discuss about the congestion control and their effects in sensor networks.

Download IJIRTM-0304201912
13
Paper Title : An Experimental Investigation on Bituminous Mixes Using Low Density polyethylene Fiber
Author Name : Mr.Sonu Kumar, Prof.Barun Kumar
Keywords : Plastic waste, low density polyethylene, Aggregate, Bitumen flexible pavements.
Abstract :

Generally a bituminous mix is a mixture of fine aggregate, coarse aggregate, filler and binder. A Hot Mix Asphalt (HMA) is a bituminous mixture where all constituents are mixed, placed and compacted at high temperature (HT). Waste plastic is a serious to environment. This threat has needed to find appropriate solutions for effective waste plastic management. Rapid growth of infrastructure in road construction needs natural and industries resources. In few year escalation of prizes of natural and industries resources, so that required reuse of waste material in road construction. Now-a-days disposal of different wastes produced from different Industries is a great serious problem. In recent years, applications of industrial wastes have been considered in road construction with great interest in many industrialized and developing countries. Reuse of this material is a very simple but powerful concept. In this paper we use Low Density polyethylene (LDPE) in road infrastructure. The Waste plastic of size 3 mm to 7 mm was used to coat stone aggregates so as to make them as polymer coated aggregate before they were mixed in hot mix plant (HMP). The bitumen polyethylene coated aggregate mix, then, it was used in road infrastructure. There is a need to explore the feasibility of use of waste plastic in road infrastructure. This paper deals with study on the various test performed on Course, fine aggregates, bitumen and methodology of using waste plastic in bituminous mixes.

Download IJIRTM-0304201913
14
Paper Title : Experimental Study on Partial Replacement with Wooden Ash, Quarry Dust and Copper Slag Ash with Concrete
Author Name : Mr.Priya Ranjan Kumar, Prof.Pankaj Mishra
Keywords : Quarry Dust, Copper Slag, Wood Ash, Compressive Strength, Split Tensile Strength, Flexural Strength, Workability.
Abstract :

The scope of this evaluation is to achieve the industry deliberating the feasible use of quarry dust, and to seek out any gaps in present situation. The time period viable use means the usage of quarry dust to their maximum potential to conform up to the demands of this, all of sudden maintaining herbal assets and locating solutions for limit the environmental consequences connected each with quarry dirt advent and its disposal. The utilization of quarry dirt in bond and cement gives capacity herbal further monetary factors of interest for each related industry, especially in zones wherever a considerable amount of quarry dust consists. In this evaluation, the test paintings is completed by means of the use of cement, exceptional aggregate, coarse combination, quarry dust. The examples were casted for M25 grade of concrete by using supplanting the cement 0%, five%, 10%, 15% and 20% by means of quarry dirt and examined for workability with the aid of slump check, compressive energy, flexure power and cut up tensile take a look at on the age of seven, 14, and 28 days. It is seen that the energy effects represents that concrete casted with in M 25 grade of concrete at 7 days are decreases with alternative of five%, 15% and 20% at 10% have increments, and 14, 28 days have decreased with replacement of 5%, 15% to 20% and growth at 10%, when the share of the quarry dirt growth from 0% to 15.

Download IJIRTM-0304201914
15
Paper Title : Energy Efficient Routing Techniques in Wireless Sensor Network: A Review
Author Name : Mr.Afroz Alam, Ms.Deepmala Sharma, Mr. Jitendra Mishra
Keywords : Mobile sink, Mobility management, Energy efficiency, Wireless sensor Networks, Routing, Life time.
Abstract :

Wireless sensor networks (WSNs) have captivated substantial attention from both industrial and academic research in the last few years. The major factor behind the research efforts in that field is their vast range of applications which include surveillance systems, military operations, health care, environment event monitoring, and human safety. However, sensor nodes are low potential and energy constrained devices; therefore, energy-efficient routing protocol is the foremost concern. In this paper we discuss about the congestion control and their effects in sensor networks.

Download IJIRTM-0304201915