• Send Your paper at :
  • ijirtm@gmail.com
  • editor@ijirtm.com

Impact Factor - 5.445
Impact Factor - 5.68



IJIRTM: Volume-3, Issue-6, 2019

Paper Title : Performance Analysis for Attacks in Wireless Sensor Network
Author Name : Ms.Yamini Bante, Mr. Jitendra Mishra
Keywords : Wireless Sensor Network, Attacks, Mitigating, Throughput, Success Ratio, Quality of Services.
Abstract :

Wireless networks are extremely vulnerable to a plethora of security threats, including eavesdropping, jamming, and spoofing, to name a few. Recently, a number of next-generation cross-layer attacks have been unveiled, which leverage small changes on one network layer to stealthily and significantly compromise another target layer. In this paper we present the comparative experimental study for the various attack in wireless network using the previous method and the proposed method, the efficiency of networks are measured in the terms of throughput and success ratio parameter, our simulated results shows improvements in results than the previous method.

Download IJIRTM-0306201901
Paper Title : Quality Assessment of Compressed Images
Author Name : Ms.Neha Dhurve, Mr. Jitendra Mishra
Keywords : Image compression, Image quality assessment, Compression ratio, PSNR.
Abstract :

The digital image compression is vital research field in the area of communication and storage. The size of multimedia data acquired more space and more bandwidth during transmission and storage. In the process of size reduction and utilization of bandwidth used various image compression techniques. Some compression technique based on lossy technique and some compression technique based on lossless technique. In this paper we present the comparative experimental study for the image compression and assess the image quality on various parameters such as the peak signal noise ration, compression ratio etc, Our proposed method simulated with the input image on matlab and gives better results than the previous approach.

Download IJIRTM-0306201902
Paper Title : Modulation Recognition in Cognitive Radio Networks using Genetic Approach
Author Name : Ms.Raksha Rai, Mr. Jitendra Mishra
Keywords : Cognitive radio networks (CRN), Primary users (PUs), Secondary users (SUs), Neural network, Genetic algorithm (GA).
Abstract :

The spectrum or the whitespaces that are not being used by licensed or primary users (PUs) can be sensed and operated by the unlicensed or the secondary users (SUs) in the cognitive radio networks (CRN) in such a way that there is no impact on the activities of the primary users. One mechanism for topology management is referred to as clustering. This organizes the nodes in logical sets so that the performance of the network is enhanced. In this paper for obtaining optimal radio configurations and performance improvements, the genetic algorithm comprising selection, crossover and mutation is embedded in the CR. In order to optimize the allocation of spectrum for greater efficacy and fairness.

Download IJIRTM-0306201903
Paper Title : Improvement of Compressive Strength of Pervious Concrete by Using Fine Aggregate, Sugarcane Bagasse Ash and Rice Husk Ash
Author Name : Mr.Laxman Shyam Pawar, Prof.Barun Kumar
Keywords : sugarcane bagasses ash, rice husk ash compressive strength, aggregate sizes W/C ratio, density.
Abstract :

The main aim of our project is to improve the strength characteristics of pervious concrete. But it can be noted that with increase in strength. Hence, the improvement of strength should not affect the strength property because it is the property which serves its purpose. In this investigation work the compressive strength of pervious concrete is increased by a compressive strength of pervious concrete is increased by 13.92% for 28 days when 12% RHA was replaced in the place of cement s were added to standard pervious concrete Pervious concrete is a special type of concrete, which consists of cement, coarse aggregates, water and if required and other cementations materials. As there are no fine aggregates used in the concrete matrix, the void content is more which allows the water to flow through its body. So the pervious concrete is also called as Permeable concrete.

Download IJIRTM-0306201904
Paper Title : The Design and Implementation of Single Stage Zero Voltage Switching Converter with Boost Type Active Clamp
Author Name : Mr.Md. Firoz Alam, Prof.Prabodh Khampariya
Keywords : Alternating current, Direct current, Power system, Power voltage.
Abstract :

An ac to dc converter is an integral part of any power supply unit used in electronic equipment which from a major part of load on the utility. Generally, to convert line frequency ac to dc, a line frequency diode bridge rectifier is used. The efficiency of these converters can be improved by reducing the losses using soft switching techniques such as Zero Voltage Switching ‟ZVS”, Zero Voltage Transition “ZVT” and Zero Current Switching “ZCS”. The present work intends to study circuit techniques to improve the efficiency of the PFC stage by lowering the conduction losses and/or the switching losses. Operation of a ZVT converter has been discussed, in which the switching losses are minimized by using an additional auxiliary circuit incorporated in the conventional PWM boost converter. Finally, ZVT technique has been implemented in a single-phase active power factor correction circuit based on an ac-dc boost converter topology and operating in a continuous inductor current mode with peak current control method. A 160 W, 90 kHz ZVT PWM boost PFC converter has been simulated and simulation results are validated with reference results.

Download IJIRTM-0306201905
Paper Title : Literature Survey on Single Stage Zero Voltage Switching Converter with Boost Type Active Clamp
Author Name : Mr.Md. Firoz Alam, Prof.Prabodh Khampariya
Keywords : Generation, distribution, AC, DC, Current.
Abstract :

An ac to dc converter is an integral part of any power supply unit used in electronic equipment which forms a major part of load on the utility. Generally, to convert line frequency ac to dc, a line frequency diode bridge rectifier is used. The ripple in the dc output voltage is reduced by a large capacitor used at the rectifier output, which makes the current rich in low order harmonics and the input power factor poor. Because of the problems associated with low power factor and harmonics. Power factor correction schemes have been implemented mainly for heavy industrial loads like induction motors, induction heating furnaces etc., which forms a major part of lagging power factor load. Hence, power factor correction is becoming an important aspect even for low power application electronic equipments. There are two types of PFC’s. 1 Passive PFC, 2 Active PFC. Any DC-DC converters can be used for power factor correction, if a suitable control method is used to shape its input current or if it has inherent PFC properties. The DC-DC converters can operate in Continuous Inductor Current Mode – CICM or Discontinuous Inductor Current Mode - DICM. In CICM, different control techniques are used to control the inductor current. Some of them are Peak current control , Average current control, Hysteresis control, Borderline control Power electronics is the technology associated with efficient conversion, control and conditioning of electric power by static means from its available input form into the desired electrical output form. The goal of power electronics is to control the flow of energy from an electrical source to an electrical load with high efficiency, high availability, and high reliability using small size, light weight and low cost devices.

Download IJIRTM-0306201906
Paper Title : An Analysis on Apodization Factor with Length in Optical and Drop Multiplexer
Author Name : Mr.Shailendra Nath Pathak, Prof.Devendra Patle
Keywords : Fibrebragg grating, Multiplexers, Wavelength-division multiplexing, Optical add–drop electronic device.
Abstract :

This Paper explores the design of new optical add drop multiplexers (OADMs), which are critical devices enabling the realization of metropolitan WDM ring networks. Three types of OADMs are investigated corresponding to different network requirements, namely fixed, reconfigurable and bidirectional OADMs. The devices use a multi-port optical circulator (OC) and one fibrebragg grating (FBGs). The simulation of the reflectance of the uniform and apodized fiber bragg grating (FBG) are presented. Various apodization technique is useful to reduce side lobes of reflection spectrum of fibrebragg grating. We design a Matlab Graphical User Interface (GUI) window to check apodization effect on crosstalk performance of OADM. From this window we can select various input waveform (from 1548 nm to 1552 nm ) of different amplitude, can change FBG wave-length for drop channel also can add new information from add channel.

Download IJIRTM-0306201907
Paper Title : A Review on Reducing Bullwhip Effect in Supply Chain Management Dependent on Many Suppliers Through Forecasting
Author Name : Mr.Yogendra Singh Chouhan, Prof.Sanjeev Singh Chauhan
Keywords : supply chain management, bullwhip effect, demand fluctuations, accurate forecasting, manufacturing, and materials demand.
Abstract :

In this study the review on the investigation of the causes of Bullwhip effect (BWE) associated with supply chain management is presented. It refers to a trend of large and larger swing in inventory in response to changes in customer demand swings in demand due to changes in customer demand throughout the whole process from supplier to customer. Supply chain management consists from raw material suppliers to customers. There are several stages in this chain. In this paper presents a details classified study of the overall research studied on the effect of both the operational and behavioral factors on bullwhip effect, one of which is customer demand forecasting. In this study, impact of forecasting methods on the bullwhip effect and mean square error has been considered Step taken by the various industries in order to tackle the bullwhip effect is also discussed in this paper. Finally the various scopes for further researches and instructions of the present and newer companies are also provided in this paper.

Download IJIRTM-0306201908
Paper Title : Clustering in Data Mining Using Piecewise Vector Quantization Approach
Author Name : Mr.Rochak Mahato, Prof.Gagan Sharma
Keywords : Data Mining (DM), Knowledge, classification, Learning Analytics (LA), Water Treatment database, F-measure.
Abstract :

Huge volume of detailed personal data is regularly collected and sharing of these data is proved to be beneficial for data mining application. Such data include shopping habits, criminal records, medical history, credit records etc .On one hand such data is an important asset to business organization and governments for decision making by analyzing it .On the other hand privacy regulations and other privacy concerns may prevent data owners from sharing information for data analysis. In order to share data while preserving privacy data owner must come up with a solution which achieves the dual goal of privacy preservation as well as accurate clustering result. Trying to give solution for this we implemented vector quantization approach piecewise on the datasets which segmentize each row of datasets and quantization approach is performed on each segment using K means which later are again united to form a transformed data set. Some experimental results are presented which tries to finds the optimum value of segment size and quantization parameter which gives optimum in the tradeoff between clustering utility and data privacy in the input dataset.

Download IJIRTM-0306201909
Paper Title : Improvement in Performance of Efficient Routing Techniques in Wireless Sensor Network
Author Name : Mr.Afroz Alam, Ms.Deepmala Sharma, Mr. Jitendra Mishra
Keywords : Energy efficiency, Wireless sensor Networks, Routing, Life time, Throughput, End to end delay, Packet delivery ratio.
Abstract :

A wireless sensor network (WSN) consists of tiny, low-powered sensors communicating with each other possibly through multi-hop wireless links and collaborating to accomplish a common tasks. As a bridge between physical and virtual in- formation worlds, WSN collects data from it surrounding environment and communicate it to the digital world, such as computers. The effectiveness of a wireless sensor network relies on the underlying routing protocol. In this paper we analyze the performance of reactive routing protocol, the simulation shows that the new method gives better results than the old approach.

Download IJIRTM-0306201910
Paper Title : Efficient Modeling of Intrusion Detection using Evolutionary Approach
Author Name : Ms.Pooja Kushwah, Prof.Praveen Kataria
Keywords : Data mining, Classification, Genetic approach, Intrusion detection.
Abstract :

With the high usage of Internet in our day today life, security of network has become the key foundation to all web applications, like online auctions, online retail sales, etc. Detection of Intrusion, attempts to detect the attacks of computer by examining different information records observed in network processes. This can be considered as one of the significant ways to effectively deal with the problems in network security. In this paper we present the comparative experimental study for the intrusion detection and our simulation stats that our proposed method gives better results than the previous techniques.

Download IJIRTM-0306201911
Paper Title : Performance analysis of DCT Based Image Compression Techniques
Author Name : Ms.Sana Azam, Prof.Praveen Kataria
Keywords : DCT (discrete cosine transform), DWT (discrete wavelet transform), MSE (mean square error), PSNR (peak signal to noise ratio).
Abstract :

With the increasing growth of technology and the entrance into the digital age, we have to handle a vast amount of information every time which often presents difficulties. So, the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical use. Wavelets provide a mathematical way of encoding information in such a way that it is layered according to level of detail. In this paper we used the image compression techniques for the general images, the 2D discrete wavelet transform (DWT) has been applied and the detail matrices from the information matrix of the image have been estimated. The reconstructed image is synthesized using the estimated detail matrices and information matrix provided by the Wavelet transform. The quality of the compressed images has been evaluated using some factors like Compression Ratio (CR), Peak Signal to Noise Ratio (PSNR), etc.

Download IJIRTM-0306201912
Paper Title : Reactive Routing Protocol in Mobile Ad Hoc Networks: Survey and Discussions
Author Name : Ms.Nidhi Verma, Prof.Prakash Mishra
Keywords : Mobile ad-hoc networks, Quality of Services(Qos), Dynamic Source Routing(DSR), Ad-Hoc on Demand Distance Vector (AODV).
Abstract :

Mobile ad-hoc network (MANET) is an infrastructure-less, self-organizing and autonomous network with the advantage of being low-cost and having on-demand setup. Its inbuilt unique characteristics like self-organization, frequent topology change, the high mobility of nodes, and resource scarceness make Quality of Service (QoS) routing is an exigent task. In this paper we present a survey on reliability protocols in WSNs. In this paper we discuss about the comparative literature study for the various types of routing protocol and their performances in mobile ad-hoc network.

Download IJIRTM-0306201913
Paper Title : Performance Analysis of Reactive Routing Protocol in Mobile Ad Hoc Networks
Author Name : Ms.Nidhi Verma, Prof.Prakash Mishra
Keywords : Dynamic Source Routing(DSR), Ad-Hoc on Demand Distance Vector (AODV), Throughput, Packet Delivery Ratio.
Abstract :

On-demand routing protocols for Mobile Ad-hoc networks registers unexpected performance behavior when multiple data streams are sent to common destination. Wireless mobile networks without fixed infrastructure consist of mobile hosts that move randomly in and out of each other communication range resulting in frequent connection breaks and topology varies stochastically. Traditional table-driven routing protocols cannot perform in such environment resulting in development of on-demand routing protocols for ad hoc networks. The two prominent on-demand routing protocols are AODV (Ad hoc on-demand distance vector) and DSR(Dynamic Source Routing). In this work the simulation result shows that throughput and packet delivery ratio of AODV protocol is better than the DSR protocol, End to end delay is also less of AODV protocol than the comparison from the DSR protocol.

Download IJIRTM-0306201914
Paper Title : A Review on Vehicle Node in Wireless Communication
Author Name : Ms.Chandni Ahirwal, Mr. Jitendra Mishra
Keywords : Wireless communication, Mobile ad-hoc network, Vehicular ad-hoc network, Wireless local area network.
Abstract :

The field of wireless communications has been in existence since the first humans learned to communicate. The area of wireless communications will continue to grow for many reasons. People are becoming accustomed to immediate access to information wherever their locations and technological improvements have made providing universal telecommunications access feasible. Wireless communication changed the human life in drastic manner in the form of mobile ad-hoc network and vehicular ad-hoc network, in this paper we review the wireless communication for the vehicular ad-hoc network, and discuss the various issues and challenges for the current wireless communication system.

Download IJIRTM-0306201915
Paper Title : Performance Analysis of Vehicle Node in Wireless Communication
Author Name : Ms.Chandni Ahirwal, Mr. Jitendra Mishra
Keywords : Wireless communication, Mobile ad-hoc network, Vehicular ad-hoc network, Precision, Recall.
Abstract :

Wireless communications and networking is a rapidly emerging technology in recent years due to the ease of use and transportation of light weight mobile devices. Nowadays, sensor-based technologies are playing a vital role in the automation industries. Depending upon the applications, appropriate sensor network-based infrastructure can be used to execute various applications in different domains such as health care, transportation, education to name a few. In this paper we discuss the performance of vehicular ad-hoc network in wireless communication; our proposed method gives better results than the existing approach, our simulation done with the network simulator.

Download IJIRTM-0306201916