Call for Comming Issue

Volume 1, Issue 6 December 2013

S.No. Title Page No.
Evaluate Dynamic Source Routing Protocol Performance in Wireless Mobile Ad Hoc Network
Umang Rastogi, Ritu Sharma
Abstract : A collection of wireless mobile nodes dynamically forming a temporary network without the use of any pre-existing network infrastructure or centralized administration is called Adhoc Network. Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth. I my reasearch paper I have analyzed a routing protocol called Dynamic Source Routing (DSR). At the ed of my Research paper result of its unique design, the protocol adapts quickly to routing changes when node movement is frequent, yet requires little or no overhead during periods in which nodes move less frequently. By graphical form a detailed analysis of DSR’s behaviour in a variety of situations, this paper generalizes the lessons learned from DSR so that they can be applied to the many other new routing protocols that have adopted the basic DSR framework. In the DSR protocol, a backup route will be initiated to transfer data (in route cache) when the initial route is broken. However, a backup route affects the overall network performance such as end-to-end delay, etc. In this paper, I showed the simulation results of the dynamic source routing protocol based on it’s throughput, pause time, packet received, drop packet ratio, end to end delay, packet delivery fraction, and routing overhead. This results shows that dynamic source routing protocol is an efficient protocol to be used in Ad Hoc network and its performance is good when its pause time is increases.
Face Recognition: Identifying Facial Expressions Using Back Propagation
Manisha Agrawal, Tarun Goyal and Harvendra Kumar
Abstract: Face recognition is a biometric which uses computer software to determine the identity of the individual. In order to recognize a person, one commonly looks at faces, which differentiate one person to another. Face recognition records the spatial geometry of unique features of the face. Face recognition has always been a very challenging task for the researches. Facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a person’s claimed identity. This paper presents basic algorithm for face recognition and identifying facial expressions using back-propagation of neural network.
Word Sense Disambiguation Using Hindi WordNet and Lesk Approach
Manisha Gupta, Seema Yadav, Shraddha Sharma and Dr. Surendra Yadav
Abstract: Word Sense Disambiguation (WSD) is a vital area which is very useful in today’s world. WSD is the process of automatically clarifying the meaning of a word in its context. There are many words which has multiple meanings. So there is a need for disambiguate these words with the correct sense. In this paper we use Hindi Language which is the first language of the Indian Populations. We will disambiguate the Hindi words. In this paper we use Hindi WordNet for multiple senses of a word and Lesk Approach to disambiguate the correct sense of the word. So in this paper we take the so-called Lesk Approach. In our case, definitions of the senses of the words to be disambiguated, as well as of the ten surrounding nouns, verbs, adjectives, are derived and enriched using the Hindi WordNet Lexical Database. In this we use modifies Lesk Approach.
Application of Multivariate Logit Analysis to Contraceptive Adoption Decisions among Undergraduates of Kwara State Polytechnic
Agboola O. Martins, Sadiq k. Abubakar and Sadiq B. Nasir
Abstract:Most youths, particularly undergraduate students, face serious health risks these days with too little factual information, too little guidance about sexual responsibility and may have access to contraceptives services without marking use of these services. Lack of information on the determinants of contraception adoption decisions among youths, particularly undergraduates, puts the youths, at high risk of unplanned and usually unwanted pregnancies. By overlooking or avoiding young people’s reproductive and sexual health needs, we are failing these on whom the world’s future depends. Therefore, there is a need to determine the various factors associated with the contraception adoption decisions among these undergraduate students, with a view to improving on their general welfare.
Qos Aware and Cost Based Optimization of Service Composition Using Genetic Algorithm
Mrs.K.Rajasri, R.Arundurai and K.Dileepan Ady
Abstract:In cloud computing to improve the QoS (Quality of Service) between cloud server and the client and it also to be check the possibilities to handle the SLA violation problem. In our approach how to handle SLA violation problem in cloud services and predict it. In the existing work to use the runtime adaptation tool and PREVENT framework to reach the SLA violations. In this paper, we are using the PREVENT (prediction and prevention) framework. To use this framework to prevent and how to handle the SLA violation problem. This approach to improve QoS (Quality of Service) for user and cloud server and it also reduces maximum cost for the user to access this service. To use different algorithm to improve the QoS. This approach it also to reduce the time to access and eliminate lagging of data, it is also provide priority based service to the user. In this approach display the result of SLA violation and QoS depending on the different algorithm to show the result for high or low.
Rajeeb Sankar Bal, Amiya Kumar Rath
Abstract:MEMS (Micro Electro Mechanical Systems) technology is enabling the development of low-cost, autonomous wireless sensor nodes with energy consumption of various components. In wireless sensor network, the deployments of small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible as per battery powered. Hence, energy efficiency is a key design issue that improves the life span of the network. A homogeneous sensor network consists of identical sensor nodes, while a heterogeneous sensor network consists of two or more types of sensor nodes (organized into hierarchical clusters). We proposed several network layer protocols to improve the effective lifetime of a network with a limited energy supply. We classified sensor network as per clustering. The simulation results of energy consumption prove that the performance of the heterogeneous sensor networks and the homogeneous sensor networks.





©  2010 All Rights Reserved to IPASJ