Improvisation of Ad-hoc On Demand Distance Vector (AODV) routing protocol using SUMO on OMNeT++

1Aniruddh Pandey, 2Sapan Gupta 1Research Scholar, Suresh Gyan Vihar University, Jaipur 2Asst Prof, Suresh Gyan Vihar University, Jaipur Abstract: In AODV, the network is silent until a connection is needed. At that point the network node that needs a connection broadcasts a request for connection. Other AODV nodes forward this message, and record the node

Big data security and privacy issues in SMEs

1Reena Singh 1Department of CSE, Suresh Gyan Vihar University Jaipur Raj. India Abstract: In all economies, especially in developing and transition economies, there is now a consensus among state policy makers, development economists as well as international development partners that small and medium enterprises (SMEs) are a potent driving force for their industrial growth and

Improved Security of Neural Cryptography Using Don’t-Trust-My-Partner and Error Prediction

Robert Kozma University of memphis Abstract:-Neural cryptography deals with the problem of key exchange using the mutual learning concept between two neural networks. The two networks will exchange their outputs (in bits) so that the key between the two communicating parties is eventually represented in the final learned weights and the two networks are said

Rotation attack analysis of Non Blind Multiplicative Watermarking using 2D-DWT

1Rohit Chhabra, 2R R Sinha 1Rohitengineer14@gmail.com, 2drsinhacs@gmail.com, Associate Professor, Department of Computer Engineering, Suresh Gyan vihar university, Jaipur,Rajasthan India Abstract: This paper deals with the digital ownership management with the help of Digital watermarking. For inserting any ownership information in any form inside the image or any media like audio video etc, we need a

Implementation of Neural Network Model For Cancer Detection Based On Back Propagation With The Help of Python Based Hardware Description Language

1Pankaj kumar Sharma, 2Mr. Ravishanker Sharma 1Mtech. Research scholar(VLSI),Suresh Gyan vihar university,jaipur(Raj)India 2Associate Professor(CS dept). Suresh Gyan vihar university,jaipur(Raj)India Abstract—conventionally the design method of Artificial Neural Networks using VHDL and implement in FPGA is done. VHDL is a programming language that has been designed and optimized for describing the behavior of digital systems. Back propagation

Design & Development Of Low Bit Rate Efficient secure Video Transmission Using Zigbee

1Pooja Mishra, 2Gajanand Sharma 1Research Scholar, Dept.of Computer Science & IT ,SGVU,jaipur 2Research Scholar, Dept.of Computer Science & IT ,SGVU,jaipur Abstract: This paper is concerned with a technique ZigBee, which is open global wireless protocol based on IEEE 802.15.4 standard. ZigBee operates in the 2.4 GHz frequency band similar to Wi-Fi and Bluetooth, but it

REVIEW PAPER ON IMPROVING OVER NOVEL FRAMWORK FOR SECURE THE LIVE VIDEO STREAMING OVER P2P NETWORK

1Rahul Soni, 2Gajanand Sharma 1Research Scholar, SGVU 2Assistant Professor, SGVU Abstract: The key problem that arises due Video editing is widely used not only in professional movie making, but also in many other areas such as home videos, educational videos, and marketing videos. With the popularization of video cameras, even more potential applications are developing.

Hybrid Approach to Search Engine Optimization (SEO) Techniques

1Abhishek Dixit,2Mukesh Agarwal 1.Assistant Professor, Department of Computer Science & Engineering, JECRC, Jaipur, India 2.Associate Professor, Department of Computer Science & Engineering, JECRC, Jaipur, India Abstract: This paper shows some important techniques of Search Engine Optimization (SEO). This paper covers the history of SEO, White Hat SEO, Black Hat SEO, on page SEO, Off Page

Enhancing Security of Steganographic System using TDEA

1Manoj Kumar Ramaiya, 2Dinesh Goyal, 3Naveen Hemrajani 1Research Scholar, Computer Engineering, SGVU, Jaipur 2Principal, School of Engineering, SGVU, Jaipur 3Head Computer Engineering, JECRC University, Jaipur Abstract: The security of data over unsafe communication network has always been a primary concern in the attention of researchers. With the rapidly growing practise of the internet in all