Notice Board :

Call for Paper
Vol. 4 Issue 8

Submission Start Date:
August 01, 2018

Acceptence Notification Start:
August 10, 2018

Submission End:
August 15, 2018

Final MenuScript Due:
August 25, 2018

Publication Date:
August 31, 2018


                         Notice Board: Call for PaperVol. 4 Issue 8      Submission Start Date: August 01, 2018      Acceptence Notification Start: August 10, 2018      Submission End: August 15, 2018      Final MenuScript Due: August 25, 2018      Publication Date: August 31, 2018




Volume IV Issue IV

Author Name
Dr. Lalit Dubey
Year Of Publication
2018
Volume and Issue
Volume 4 Issue 4
Abstract
The comparative study in respect of measuring satisfaction level of consumer after use of branded and unbranded tea is showing an increasing trend of consumption of branded tea as compared to unbranded. Among high income groups in rural areas there is huge scope for branded tea company to capture the markets by increasing the supply of tea. The marketing agencies are advised to organise awareness programs by educating the people about the need to use the health care tea leaf to arrest hyper tension and diabetes. significant difference between the price of Tata Agni and Brooke Bond tea is , difference in mixed ingredients and promotional schemes are significantly different from each other. different is significance in relevance to Brooke Bond ,Tata Agni and unbranded tea is price of tea, packaging ,smell of tea, freshness of tea,colour,test,availability and advertise of tea.The most effective and acceptable variables to take the decision while purchasing the particular brand of te
PaperID
2018/IJRRETAS/4/2018/37624

Author Name
Ms. Neha Kale, Mr. Mohit Jain
Year Of Publication
2018
Volume and Issue
Volume 4 Issue 4
Abstract
On the Internet, the place the number about Decisions may be overwhelming, there will be necessity will filter, prioritize Also effectively convey important data so as on allay those issue of majority of the data overload, which need made an possibility issue will huge numbers Internet user. Recommenders techniques work out this issue by looking through huge volume for rapidly created majority of the data on furnish user with customize content and services. This paper investigates the separate aspects and potentials for distinctive prediction techniques clinched alongside recommendation techniques in place with serve concerning illustration a compass to Scrutinize and act in the field of recommendation techniques.
PaperID
2018/IJRRETAS/4/2018/37623

Author Name
Ms.Rekha yadav, Prof. Sumit Nigam
Year Of Publication
2018
Volume and Issue
Volume 4 Issue 4
Abstract
The main aim of the proposed work is to investigate about the data security technique. Therefore two major domains are concentrated for study cryptography and steganography. Both the techniques are much popular for securing data during different kinds of unsecured data communication scenarios. In addition of that both the techniques are low cost for implementation as well as maintenance. During investigation of this technique the steganographic techniques are not much secure due to most of the time LSB based steganography scenarios. Therefore the proposed work is intended to improve the security of traditional steganographic technique by incorporating the cryptographic technique too. Thus the proposed work introduced an ECC cryptographic technique for encrypting the message securely and then that is incorporated over the color image bit plane for 3 bits each. That process not much effect the actual color definition therefore the image quality is not changed. The implementation of the p
PaperID
2018/IJRRETAS/4/2018/37627

Author Name
Ms. Akanksha Soni, Mrs.Nisha Bhati
Year Of Publication
2018
Volume and Issue
Volume 4 Issue 4
Abstract
In this paper, we propose an enhanced forecast weighted clustering algorithm (EFWCA) which can reduce the computational overhead by electing the right candidate for the cluster head. This novel approach can handle enormous traffic and makes the network more stable. Wireless mobile ad-hoc networks (MANET) are prone to having routing issues due to their variable nature and resource constraints. Routing is an essential approach in ad-hoc networks for data transmission because every node serves as a router in the absence of a central router. Several routing schemes have been advised in order to discover route, many of which use the flooding method. The flooding method offers to discover routes through flooding of routing packets in the network. In this method routing packets are traversing throughout the network infinitely and unnecessarily consume resources such as battery power and bandwidth and cause throughput degradation. To solve the noted problem, clustering and efficient flooding m
PaperID
2018/IJRRETAS/4/2018/37625