Detection of Route Request Flooding Attack in Wireless AD-HOC Network through Historical RecordsAbstract: Mobile ad-hoc networks getting more and more popular now as a research and user utilities. Ad-hoc framework is effective but it is surrounded with security related issues. There are a lot of challenges and problems are faced like continuously changed topology and change in resource constrains may form performance and security gap between the MANET arrangement. The flooding attack causes denying of service and resources by flooding of data and control packets. In this paper, an approach is designed to detect the routing packets flooding attack via managing the historical records and limiting the flooding value.
Authors: Meeta Dave, Binod Kumar Mishra, Sumit Jain

File Name: 40400-15-104.pdf
Download Abstract |
Download Full Paper Comparative Performance Analysis of QC-MCSC Heuristic with Existing Heuristics over Energy Latency Density Design Space for Wireless Sensor NetworkAbstract: Wireless Sensor Network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions. In most of the cases, replenishment of batteries might be impossible. That’s why lifetime of WSN shows a very strong dependency on battery lifetime. So an important issue in sensor networks is power scarcity, which depends on battery size and weight limitations of WSN node. Energy-aware algorithms are designed for extending the lifetime of wireless sensor network. For appropriate data acquisition in WSN, coverage of all targets and connectivity with the base station, both are required. Also for the reliability purpose higher order of coverage and connectivity is required.
Authors: Sunita Gupta, Dr.K.C.Roy, Dr. Dinesh Goyal

File Name: 40300-15-011.pdf
Download Abstract |
Download Full Paper A Review of Security Issues in Wireless Mesh NetworkAbstract: Wireless mesh network (WMN) is a new wireless networking paradigm. Wireless mesh networks are a promising technology for offering ubiquitous Internet connectivity. Unlike traditional wireless networks, WMNs do not rely on any fixed infrastructure. One main challenge in design of these networks is their weakness to security attacks. In this paper, we investigate the major security issues for WMNs. We identify the new challenges and opportunities posed by this new networking environment and explore approaches to secure its communication.
Authors: Deepshikha Yadav

File Name: 40400-15-012.pdf
Download Abstract |
Download Full Paper Formability analysis of Single Stage Drawing of Cylindrical Cup Using Altair HyperWorksAbstract: HyperForm is the module of Altair Hyperworks used for formability analysis and prediction various defects like wrinkles, spring-back and thinning occurred in sheet metal drawing process. A sheet metal drawing process is widely used in industry for producing seamless cup formed parts in automobile, aircraft and household applications. During the product design and tool design designer are still adapts trial and error method to decide blank shape, blank size, draw tool and process parameters. Computer aided engineering (CAE) plays very significant role in the decision making of various parameters of sheet metal forming processes and it helps to designer during product design as well tool design stage to decide optimum and accurate process parameters.
Authors: Pravinkumar Moon, Sandeep Patil

File Name: 40400-15-105.pdf
Download Abstract |
Download Full Paper Multi-scale single-channel linear tracking method for segmentation of retinal blood vessels (MSLTA)Abstract: Described in the text of a vascular retinal image segmentation and extraction of network algorithms, known as multi-scale single-channel linear tracking (MSLTA). Retinal fundus imaging is widely used for eye examinations. The acquired images provide a unique view on the eye vasculature. The analysis of the vasculature has a high importance especially for detecting cardiovascular diseases.
Authors: Sumit Tomar

File Name: 40400-15-110.pdf
Download Abstract |
Download Full Paper An Amend Implementation of Brain Tumor Detection Using Segmentation Based On Artificial IntelligenceAbstract: Implementation of a segmentation process of the MRI data with Artificial Intelligence is resented in this study to detect various tissues like white matter, gray matter, csf and tumor. The advantage of hierarchical self organizing map and clustering algorithms are used to classify the image layer by layer. The lowest level weight vector is achieved by the abstraction level. We have also achieved a higher value of tumor pixels by this approach.
Authors: Kailash Sinha, Shweta Raghuwanshi

File Name: 40400-15-111.pdf
Download Abstract |
Download Full Paper Artifact Removal from EEG using Kurtosis Based Blind Source Extraction and Spatially Constrained Independent Component Analysis followed by Wavelet DenoisingAbstract: this paper presents a novel technique for removing the artifacts from the Electro-Encephalo-Gram (EEG) signals. EEG signals are influenced by different characteristics, like line interference, EOG (Electro-Oculogram) and ECG (Electrocardiogram). The elimination of artifact from scalp EEGs is of substantial significance for both the automated and visual examination of underlying brainwave actions. These noise sources increase the difficulty in analyzing the EEG and obtaining clinical information related to pathology.
Authors: Vandana Roy, Megha Gupta

File Name: 40400-15-112.pdf
Download Abstract |
Download Full Paper Segmentation of Brain MRI Images for Tumor extraction by combining C-means clustering and Watershed algorithm with Genetic AlgorithmAbstract: Tumor segmentation from MRI data is an important but time consuming manual task performed by medical experts. The research which addresses the diseases of the brain in the field of the vision by computer is one of the challenges in recent times in medicine. Magnetic Resonance Imaging (MRI) is one of the best technologies currently being used for diagnosing brain tumor.
Authors: Kailash Sinha

File Name: 40400-15-115.pdf
Download Abstract |
Download Full Paper Optimization of Stable Election Protocol through Genetic Algorithm & Particle Swarm Optimization in clustered wireless sensor networkAbstract: Authors: Khushboo Pawar

File Name: 40400-15-113.pdf
Download Abstract |
Download Full Paper Comparative Study of Various Power Control algorithms in WCDMAAbstract: Power control is an essential radio resource management method in CDMA cellular communication systems, where co-channel and adjacent-channel interferences are the primary capacity limiting factors. Power control intends to control the transmission power levels in such a way that required quality of service for the users is guaranteed with lowest possible transmission powers. This paper presents a comparative study between the power control algorithms.
Authors: Sandeep Solanki, Sumit Tomar, Siddhant Soni

File Name: 40400-15-210.pdf
Download Abstract |
Download Full Paper Truck Trailer Backer Upper Parking with Genetic AlgorithmAbstract: This paper presents an approach to solve trucktrailer backer upper problem using Genetic algorithm. The results are compared with fuzzy-logic approach.
Authors: Lalit Shrivastava, Shubham Singhal

File Name: 40400-15-211.pdf
Download Abstract |
Download Full Paper D.C. Motor Control by Genetic AlgorithmAbstract: The aim of this paper is to design a position controller of a DC motor by selection of a PID parameters using genetic algorithm. The model of a DC motor is considered as a third order system. PID parameters are obtained using genetic algorithm. Result is compared with conventional Ziegler Nichols Method.
Authors: Tushar Chouhan, Arkaja Agrawal

File Name: 40400-15-212.pdf
Download Abstract |
Download Full Paper Efficient BIST architecture for combinational and sequential faulty circuitsAbstract: Very Large Scale Integration (VLSI) has made an extraordinary effect on the development of integrated circuit technology. It has not only decreased the dimension and the price but also improved the complexness of the circuits. There are, however, prospective issues which may slow down the efficient use and development of upcoming VLSI technology.
Authors: Ankita Tripathi

File Name: 40400-15-212.pdf
Download Abstract |
Download Full Paper