IJEMS VOL.2 ISSUE 3 by Allied Journals

Allied Journals, Mar 31, 2015
The aim of this paper is investigate the performance of various path loss models in differen... more The aim of this paper is investigate the performance of various path loss models in different environments for determination of the signal strength with respect to various frequency ranges and distance for wireless network. There are five path loss models, namely Free Space, Log-distance, Log-normal, Okumura/Hata, IEEE802.16d models. These models have been reviewed with different receiver antenna heights in urban, suburban and rural environments. Free space path loss model is used as reference value for produced the estimated results value. Then compare all estimated results of reviewed models with the reference model values. Hata model demonstrated good performance in terms of received signal strength or indirectly, reduction in path-loss. Log-normal model based on the shadowing effect while calculating the values of path-loss. IEEE802.16d model and log-normal model are similar. And it is a standard model used for the measurements of path-loss in sub-urban area. However, Hata model could be preferred due to better performance in terms of less path loss as compared with the results of reference model at lower receiver antenna heights for urban and open area environments.

Allied Journals, Mar 31, 2015
The study investigated the impact of the nanoparticle size which has been suggested to be an impo... more The study investigated the impact of the nanoparticle size which has been suggested to be an important factor the results were found to be in concord with the experimental observations. The values of the thermal conductivity for different nanofluid combinations were calculated using the expression developed in this study and they agreed with published experimental data. From the study, it was observed that Brownian motion is significant only when the volume fraction is less than 1 % in case of TiO2&ZnO and 4 % in case of Al2O3. The combination of the base fluid and nanoparticles to from nanoclusters is expected provide better heat transfer solution than the conventional fluids , Hence it is concluded that adding nanosized materials to base fluids enhances thermal properties and makes them more suitable to heat exchanger applications as well as for many industrial applications also .

Allied Journals, Mar 31, 2015
Mobile Ad hoc Network is an autonomous system of mobile nodes that utilize multi-hop radio relayi... more Mobile Ad hoc Network is an autonomous system of mobile nodes that utilize multi-hop radio relaying and are capable of operating with any support from fixed centralized infrastructure. Since nodes in such networks can leave or enter
any time development of a routing protocol that can respond
quickly to underlying dynamic topology and utilizing the
available bandwidth efficiently is a research challenge. There
have been many research works comparing the performance of
routing protocols under varying conditions and constraints. The
majority of the research is focused towards coping up with the
node mobility, network density, energy reduction, routing and
control overhead minimization and increasing the throughput.
Most of them are unaware of MAC Protocols, which affect the
relative performance of routing protocols considered in different network scenarios. As routing and MAC protocol runs in coordination, the choice of MAC is an important criterion. This paper investigates effect of MAC protocols on the relative
performance of AdHoc routing under various scenarios. Two
routing protocols are simulated in NS2 with two different MAC
protocol and the results show that the performance of routing
protocols of ad hoc networks will suffer when run over different
MAC Layer protocols.

Allied Journals, Mar 31, 2015
shoppers printed with watermarked pictures will mix along to notice the watermark from the printe... more shoppers printed with watermarked pictures will mix along to notice the watermark from the printed image. Detector will compare the photographs to urge the common watermarked pixels from the image. a replacement theme is planned that uses the options of separate circular function remodel Discrete Cosine Transform (DCT) for the entering of the watermark coefficients and uses a pseudo-random sequence for choice of the DCT coefficients to embed the watermark. These coefficients are dissimilar in numerous watermarked pictures thus there's no probability of collusion of the watermarked pictures to notice the watermark illegitimately. The theme is healthier than the other watermarking algorithms like LSB based mostly watermarking. it's conjointly higher than
the DCT mid-band theme wherever the coefficients to enter the
watermark are perpetually fastened, and also the watermark is
embedded by merely exchanging the coefficients in keeping with the watermark bits. Having all the properties of DCT
watermarking this algorithmic rule enhances the strength of the
watermark by involving the constant averaging construct. The
prospect of a successful attack on the watermark by associate
assaulter is extremely less attributable to use of this averaging
technique.The main advantage of the theme is that the image is
disorganized before embedding of the watermark and
descrambled once embedding. This ends up in spreading of the
watermarking data throughout the watermarked image and it's
terribly tough to notice it. The correlation results show that the
watermark is extremely strong. Since no presence of watermark
are often detected.
Allied Journals, Mar 31, 2015
In the present days, due to increasing the demand of flexible manufacturing we study more on the ... more In the present days, due to increasing the demand of flexible manufacturing we study more on the incremental forming process. The incremental forming process is mostly use in all manufacturing plant to reduce the cost and improve the quality of the product by making of different prototype. In this work we find the main parameter which influences the train rate in square cup shape. This parameter find by applying different combination between parameters. These results will be
as same as experimental result.

Allied Journals, Mar 31, 2015
This research has been conducted in Aceh Jaya district, which aims to reveal the recognition of t... more This research has been conducted in Aceh Jaya district, which aims to reveal the recognition of the positive law in the Republic of Indonesia towards Panglima Laôt as stakeholders in Aceh's local wisdom in the field of fisheries, and reveals the role of local wisdom in creating fisheries development sustained in Aceh Jaya district. The method used is a survey and study of literature by using a questionnaire and analyzed using content analysis. The results show that institutional Panglima Laôt recognition of the positive law of the Republic of Indonesia. To realize the sustainable development of fisheries, Panglima Laôt has a role to maintain and oversee the provisions of customary law and customs, coordinating every fishing effort, resolve disputes among fishermen, decide and organize ceremonies rite laôt, maintain or supervise trees in water front, and Panglima Laôt also acts as a liaison between stakeholders and between fishermen and government and Panglima Laôt also have a role in increasing the adoption of technology in the utilization of fish resources based on local wisdom in Aceh Jaya district.
Allied Journals, Mar 31, 2015
Many new start-ups have been possible in IT industry due to cloud computing’s concept of pay-per-... more Many new start-ups have been possible in IT industry due to cloud computing’s concept of pay-per-use. This has led to outsourcing of many business-critical functions to cloud, termed as Delegation of Computation. But usefulness of
this concept depends on whether the results of computation can be verified. Verifiability of computation has been achieved
previously through interactive proof systems, having high
communication cost. Methods based on cryptography have high computation cost making them unsuitable for mobile clients. This paper proposes a verifiable delegation protocol based on cryptographic primitives. It has reduced communication cost making it suitable for light-weight devices. The proof-generating function is incorporated into the delegated function to make it fool-proof.
Allied Journals, Mar 31, 2015
A simple sensitive, precise method of HPLC was developed and validated for the quantitative, and ... more A simple sensitive, precise method of HPLC was developed and validated for the quantitative, and semiquantative Phytochemical analysis of Acacia Decurrens leaf biomass. The ethanolic extract of the plant is used for the analysis is used for the identification of active constituents. Thus HPLC analysis showed the presence of Gallic acid and theophylline at the prominent peak with a RT value of 4.532 and
5.558 respectively.
Allied Journals, Mar 31, 2015
The leaf of Acacia Decurrens (mimosaceae) was reported to be an ornamental plant. The aim of the ... more The leaf of Acacia Decurrens (mimosaceae) was reported to be an ornamental plant. The aim of the current study was to characterize the bioactive constituents present in ethanolic leaf extracts of Acacia Decurrens which will be useful for its proper identification. FTIR (Fourier transform infrared spectroscopy Model-8400S spec.) is used to identify the important functional groups that are responsible for their activity. Infrared techniques provide non-destructive, fast, and low-cost analysis, and have shown promising results. Thus the study showed the presence of Alkenes and carboxylic acids.
Uploads
IJEMS VOL.2 ISSUE 3 by Allied Journals
any time development of a routing protocol that can respond
quickly to underlying dynamic topology and utilizing the
available bandwidth efficiently is a research challenge. There
have been many research works comparing the performance of
routing protocols under varying conditions and constraints. The
majority of the research is focused towards coping up with the
node mobility, network density, energy reduction, routing and
control overhead minimization and increasing the throughput.
Most of them are unaware of MAC Protocols, which affect the
relative performance of routing protocols considered in different network scenarios. As routing and MAC protocol runs in coordination, the choice of MAC is an important criterion. This paper investigates effect of MAC protocols on the relative
performance of AdHoc routing under various scenarios. Two
routing protocols are simulated in NS2 with two different MAC
protocol and the results show that the performance of routing
protocols of ad hoc networks will suffer when run over different
MAC Layer protocols.
the DCT mid-band theme wherever the coefficients to enter the
watermark are perpetually fastened, and also the watermark is
embedded by merely exchanging the coefficients in keeping with the watermark bits. Having all the properties of DCT
watermarking this algorithmic rule enhances the strength of the
watermark by involving the constant averaging construct. The
prospect of a successful attack on the watermark by associate
assaulter is extremely less attributable to use of this averaging
technique.The main advantage of the theme is that the image is
disorganized before embedding of the watermark and
descrambled once embedding. This ends up in spreading of the
watermarking data throughout the watermarked image and it's
terribly tough to notice it. The correlation results show that the
watermark is extremely strong. Since no presence of watermark
are often detected.
as same as experimental result.
this concept depends on whether the results of computation can be verified. Verifiability of computation has been achieved
previously through interactive proof systems, having high
communication cost. Methods based on cryptography have high computation cost making them unsuitable for mobile clients. This paper proposes a verifiable delegation protocol based on cryptographic primitives. It has reduced communication cost making it suitable for light-weight devices. The proof-generating function is incorporated into the delegated function to make it fool-proof.
5.558 respectively.