IJERT - International Journal of Engineering Research and Technology

Displaying 1-40 of 48 results

  • White Papers // May 2012

    Research Challenges of Cognitive Radio

    A cognitive radio is an adaptive, multi-dimensionally aware, autonomous radio system that learns from its experiences to reason, plan, and decide future actions to meet user needs. Due to the technological advancement in last few decades, the people have a magnificent communication setup now-a-days. Cognitive radio is considered to be...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Elliptic Curve Cryptography (ECC) for Security in Wireless Sensor Network

    This paper discusses different issues of Wireless Sensor Network (WSN) and the relevance of the Elliptic curve y cryptography. Security in WSN is a greater challenge in WSN due to the processing limitations of sensor nodes and nature of wireless links. Extensive use of WSNs is giving rise to different...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Current Mode Sense Amplifier for SRAM Memory

    The sense amplifier is one of the most important components of semiconductor memories used to sense stored date. This plays an important role to reduce the overall sensing delay and voltage. Earlier voltage mode sense amplifiers are used to sense the date it sense the voltage difference at bit and...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Design, Development and Implementation of an Automated IVR System With Feature Based TTS Using Open Source Tools

    The paper describes the concept of Interactive Voice Response System with feature based Text to Speech System using Open Source Software &Tools. The text to speech system converts the input text into the desired speech, the system is using for, to reading the user input text, speak aloud in various...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Wireless Infrared Communications :A Survey

    Wireless infrared communications refers to the use of free-space propagation of light waves in the near infrared band as a transmission medium for communication. The communication can be between one portable communication device and another or between a portable device and a main device, called an access point or base...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    The Concept of Cloud Computing and Issues Regarding Its Privacy and Security

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on-demand provisioning mechanism relying on...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Performance Characteristics of OLSR and AODV Protocols in Wireless Mesh Network

    A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Cryptographic of High Security Hash Functions

    Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. This paper aims to overview the cryptographic hash...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Qos Parameter Analysis on Centralized Mode & Dense Mode Multicasting Protocols in a Network

    There are three fundamental types of IPv4 addresses: unicast, broadcast, and multicast. A unicast address is designed to transmit a packet to a single destination. A broadcast address is used to send a datagram to an entire sub network. A multicast address is designed to enable the delivery of datagram...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Deployment of Neural Network on Multi-Core Architecture

    Traditional computational methods are highly structured and linear, properties which they drive from the digital nature of computers. These methods are highly effective at solving certain classes of problems: physics simulations, mathematical models, or the analysis of proteins. Classical computational methods are not effective at solving other problems, such as...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Smart and Intelligent GSM Based Automatic Meter Reading System

    This paper presents the development of a fully Automated Energy Meter which is having capabilities like remote monitoring and controlling of energy meter. Automatic Meter Reading system (AMR) continuously monitors the energy meter and sends data on request of service provider through SMS. It saves huge human labour. The data...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Optimization of Generalized Discrete Fourier Transform for CDMA

    Generalized Discrete Fourier Transform (GDFT) with non-linear phase is a complex valued, constant modulus orthogonal function set. GDFT can be effectively used in several engineering applications, including Discrete Multi-Tone (DMT), Orthogonal Frequency Division Multiplexing (OFDM) and Code Division Multiple Access (CDMA) communication systems. The constant modulus transforms like Discrete Fourier...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Wireless Communication Using Adaptive Smart Antenna System

    This paper presents wireless communication and it's simulation results using adaptive smart antenna system based on direction of arrival estimation and null steering. Direction Of Arrival (DOA) estimation is based on the PM algorithm for identifying the directions of the desired signals and the null steering beamformer adaptively adapts the...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Comparative Study of Fault Management Algorithms in Wireless Sensor Networks

    Wireless sensor network is an uprising low cost sensor network for sensing, integrating and processing data collected by sensors. It provides a wide area of research as they can be used in various applications (e.g. home, military, security etc.,). Wireless sensor networks are the networks which are inherently prone to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Channel Estimation and Performance Evaluation of STBC With Channel Coding

    Now-a-days as the people can see that wireless systems are gaining importance in day to day life. These networks have become an essential part of common man's life. The most widely used wireless networks are wireless LAN's, cell phone networks, and other data transfer applications. The main limitations of these...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Analyzing Performance Of AODV Routing Protocol In Mobile Adhoc Networks: A Survey

    Mobile ad-hoc network is a collection of mobile nodes that communicate via wireless links and communication is carried out without any centralized control or fixed infrastructure. Routing is the important issue in ad-hoc networks. A number of routing protocols have been implemented. This paper is a survey of evaluating performance...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Hospital Information Service on Android Mobile Devices

    The purpose of this project is to give the details of the Hospitals on Maps and give name, address, image and phone call of each hospital. The existing information system did not give the hospitals accurate location and their details. So, the solution to this problem is, to give the...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Partitioning Based Web Content Mining

    Today the Web has become the largest information source for people. Most information retrieval systems on the Web consider web pages as the smallest and undividable units, but a web page as a whole may not be appropriate to represent a single semantic. A web content structure analysis based on...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Investigations on Receiver Sensitivity of SOA Based Optical Communication System Using RZ Super Gaussian Pulse

    In this paper, investigations are made on performance improvement of the optimized SOA preamplifier based system. The effects of order and pulse width RZ super Gaussian pulse are analyzed in terms of receiver sensitivity of optimized preamplifier. It was found that the system is more sensitive when 95ps (Full Width...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network

    Mobile Adhoc NETwork (MANET) is a collection of wireless nodes that dynamically create a wireless network among them without using any infrastructure. Nodes are free to move, independent of each other which makes routing much difficult. The routing protocols in MANET should be more dynamic so that they quickly respond...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Review on Security and Privacy in Cloud Infrastructures

    Cloud Computing is one of the powerful technology to be established within network for the benefits and profits of the enterprises and government too. This review paper describes categories of cloud architectures (cloud service delivery models), security and privacy concerns with challenges. It seeks to contribute a better understanding of...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Optimization of Natural Frequency of Vertical Storage Tower Using FEA

    A vertical storage tower is typically used to store liquids or fine powders. To maximize the storage capacity, these columns are usually very tall typically over 27 meters. They are typically susceptible to wind loads, as the bending caused is much greater at these heights. The design problem is that,...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Implementation of an Autonomic Active Queue Management in Mobile Ad Hoc Network (MANETs)

    In order to provide better quality of service to the multimedia applications in Mobile Ad Hoc NETwork (MANETs), where its resource is limited and changed dynamically, in this paper the authors introduce an Active Queue management mechanism with autonomic attributes, named Autonomic Active Queue Management (AAQM). With the rapid development...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Testing Aspect Oriented Software Using UML Activity Diagrams

    Aspect Oriented Programming (AOP) is an extension to Object Oriented Programming (OOP). Aspect oriented programming supports the separation of crosscutting concerns. AOP is a software engineering paradigm that gives new types of constructs such as advice, join points, point cut and aspect in order to improve the separation of concerns....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Minimum Energy Based Efficient Routing Protocol Over MANETs

    Minimum energy (Energy Efficient) routing protocols are very essential for wireless ad hoc networks which usually consist of mobile battery operated computing devices and many such protocols and schemes have been proposed so far. However, few efforts have been spent on issues associated with such protocols such as routing overhead...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Implementation of Wireless Smart Sensor Platform for Industrial Application

    Today, Wireless Sensor Networks (WSN) are potentially one of the most important technologies of the 21st century. The utilization of wireless sensor based control systems have been augmented to a very great extent due to reduced cost, better power management, ease in maintenance, effortless application in remote and hazardous areas....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Hierarchical Routing Technique for Prolonging the Lifetime of Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) usually consists of a large number of nodes called sensor node that bring themselves together to form a wireless network. However, the major fact that sensor nodes run out of energy quickly has been an issue and many power efficient routing protocols have been proposed to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    A Software Reuse in Small Scale Industry: A Survey

    Software Engineering is the very integrated part of the industry from mid nineties. Small scale enterprises are a very important in the gears of the world economy. Software industry becomes significant economical activity from the last few decades. According to Fayad et al. 99.2% of software development companies are small...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    An Intrusion Detection Using Hybrid Technique in Cluster Based Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are playing a fundamental role in emerging pervasive platforms that have potential to host a wide range of next generation civil and military applications. Wireless Sensor Network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Implementation of Generic Context Middleware for Context-Aware Applications

    Context-awareness enables generation of context by analyzing situation of users and environments so that applications can autonomously react to contexts without user's explicit commands. There is growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomously...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    XML Twig Pattern Matching Algorithms and Query Processing

    XML has emerged as the wire-language of the internet. XML can be used to structure the data and also provide meaning for data. An effective document structure helps convert data into useful information that can be processed quickly and efficiently. The XML data is exchanged and generated in B2B1 applications....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Design and Analysis of Bit Error Rate Perfornance of Simulink Based DSSS-OFDM Model for Wireless Communication

    Because of the rapid growth of Digital Communication in recent years, the need for high speed data transmission is increased. Orthogonal Frequency Division Multiplexing (OFDM) technique is suitable for high speed communication because of its resistance to ISI (Inter Symbol Interference) and it utilizes the bandwidth efficiently. DSSS-OFDM is a...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Applicability of Backpropagation Neural Network for Recruitment Data Mining

    One of the biggest issues in the industries and institutions is the selection of the right candidate for their organization. Recruitment is the big issue for any organization and this process consume the more time, efforts and investment of any organization. During each phase o f the recruitment process, candidates...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Extracting Data Through Webmining

    This Paper comprises of upcoming evolutionary field of "Web Mining". This paper describes the extraction of useful information from internet. This paper present a clear view of what is Web Mining and How is it done. In this paper, the authors encompass various Pros and Cons of Web Mining and...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Semantic Keyword Search on XML

    In this paper Semantic Keyword search on xml using CR (Coherency Ranking) is presented. Keyword search is a user friendly mechanism for retrieving XML data in web and scientific applications. An intuitively compelling but vaguely defined goal is to identify matches to query keywords that are relevant to the user....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Topology Vs Position Based Routing Protocols in Mobile Ad Hoc Networks: A Survey

    Mobile Ad hoc networks perform multi-hop communication in an environment without a dedicated fixed infrastructure, with mobile nodes and changing network topology. In the last 15 years, the wireless networking community designed hundreds of new routing protocols targeting the various scenarios of this design space. The objective of this paper...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    A Reliable Service Oriented System Based on the Present SMS Technology

    This paper is oriented towards developing a reliable service oriented system based on the present SMS technology. The authors have integrated three different applications independent of each other. All these three applications make use of common SMS send/receive messaging library. They have implemented three modules they are Appointment Management System...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Design FIR Filter With Signed Power of Two Terms Using MATLAB

    The design of digital filter, using signed power of two terms is implemented. The filter are designed without multipliers. The design is based on the remez exchange algorithm for the design of low pass and filters. Linear phase FIR filter with coefficients consisting of minimum number of signed power of...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Adoptable Key Management Technique for Multicast and Broadcast Services

    The popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. Another major issue is that to provide dynamic rekeying for all the users that join and leave the group. For the rekeying of the group key all members of the group should...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Proposal of Security Schemes for Protecting Services in Cloud Computing

    Ever since the term "Cloud computing" was coined a few years back, there are numerous reasons that adopted by businesses and offer abstracted Internet services. Due to varied degree of security features and management schemes within the cloud entities security in the cloud is challenging. Security issues ranging from system...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Research Challenges of Cognitive Radio

    A cognitive radio is an adaptive, multi-dimensionally aware, autonomous radio system that learns from its experiences to reason, plan, and decide future actions to meet user needs. Due to the technological advancement in last few decades, the people have a magnificent communication setup now-a-days. Cognitive radio is considered to be...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Elliptic Curve Cryptography (ECC) for Security in Wireless Sensor Network

    This paper discusses different issues of Wireless Sensor Network (WSN) and the relevance of the Elliptic curve y cryptography. Security in WSN is a greater challenge in WSN due to the processing limitations of sensor nodes and nature of wireless links. Extensive use of WSNs is giving rise to different...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Current Mode Sense Amplifier for SRAM Memory

    The sense amplifier is one of the most important components of semiconductor memories used to sense stored date. This plays an important role to reduce the overall sensing delay and voltage. Earlier voltage mode sense amplifiers are used to sense the date it sense the voltage difference at bit and...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Design, Development and Implementation of an Automated IVR System With Feature Based TTS Using Open Source Tools

    The paper describes the concept of Interactive Voice Response System with feature based Text to Speech System using Open Source Software &Tools. The text to speech system converts the input text into the desired speech, the system is using for, to reading the user input text, speak aloud in various...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Wireless Infrared Communications :A Survey

    Wireless infrared communications refers to the use of free-space propagation of light waves in the near infrared band as a transmission medium for communication. The communication can be between one portable communication device and another or between a portable device and a main device, called an access point or base...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    The Concept of Cloud Computing and Issues Regarding Its Privacy and Security

    The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on-demand provisioning mechanism relying on...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Performance Characteristics of OLSR and AODV Protocols in Wireless Mesh Network

    A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Cryptographic of High Security Hash Functions

    Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. This paper aims to overview the cryptographic hash...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Qos Parameter Analysis on Centralized Mode & Dense Mode Multicasting Protocols in a Network

    There are three fundamental types of IPv4 addresses: unicast, broadcast, and multicast. A unicast address is designed to transmit a packet to a single destination. A broadcast address is used to send a datagram to an entire sub network. A multicast address is designed to enable the delivery of datagram...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Deployment of Neural Network on Multi-Core Architecture

    Traditional computational methods are highly structured and linear, properties which they drive from the digital nature of computers. These methods are highly effective at solving certain classes of problems: physics simulations, mathematical models, or the analysis of proteins. Classical computational methods are not effective at solving other problems, such as...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Smart and Intelligent GSM Based Automatic Meter Reading System

    This paper presents the development of a fully Automated Energy Meter which is having capabilities like remote monitoring and controlling of energy meter. Automatic Meter Reading system (AMR) continuously monitors the energy meter and sends data on request of service provider through SMS. It saves huge human labour. The data...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Optimization of Generalized Discrete Fourier Transform for CDMA

    Generalized Discrete Fourier Transform (GDFT) with non-linear phase is a complex valued, constant modulus orthogonal function set. GDFT can be effectively used in several engineering applications, including Discrete Multi-Tone (DMT), Orthogonal Frequency Division Multiplexing (OFDM) and Code Division Multiple Access (CDMA) communication systems. The constant modulus transforms like Discrete Fourier...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Wireless Communication Using Adaptive Smart Antenna System

    This paper presents wireless communication and it's simulation results using adaptive smart antenna system based on direction of arrival estimation and null steering. Direction Of Arrival (DOA) estimation is based on the PM algorithm for identifying the directions of the desired signals and the null steering beamformer adaptively adapts the...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Comparative Study of Fault Management Algorithms in Wireless Sensor Networks

    Wireless sensor network is an uprising low cost sensor network for sensing, integrating and processing data collected by sensors. It provides a wide area of research as they can be used in various applications (e.g. home, military, security etc.,). Wireless sensor networks are the networks which are inherently prone to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Channel Estimation and Performance Evaluation of STBC With Channel Coding

    Now-a-days as the people can see that wireless systems are gaining importance in day to day life. These networks have become an essential part of common man's life. The most widely used wireless networks are wireless LAN's, cell phone networks, and other data transfer applications. The main limitations of these...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Analyzing Performance Of AODV Routing Protocol In Mobile Adhoc Networks: A Survey

    Mobile ad-hoc network is a collection of mobile nodes that communicate via wireless links and communication is carried out without any centralized control or fixed infrastructure. Routing is the important issue in ad-hoc networks. A number of routing protocols have been implemented. This paper is a survey of evaluating performance...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Hospital Information Service on Android Mobile Devices

    The purpose of this project is to give the details of the Hospitals on Maps and give name, address, image and phone call of each hospital. The existing information system did not give the hospitals accurate location and their details. So, the solution to this problem is, to give the...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Partitioning Based Web Content Mining

    Today the Web has become the largest information source for people. Most information retrieval systems on the Web consider web pages as the smallest and undividable units, but a web page as a whole may not be appropriate to represent a single semantic. A web content structure analysis based on...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Investigations on Receiver Sensitivity of SOA Based Optical Communication System Using RZ Super Gaussian Pulse

    In this paper, investigations are made on performance improvement of the optimized SOA preamplifier based system. The effects of order and pulse width RZ super Gaussian pulse are analyzed in terms of receiver sensitivity of optimized preamplifier. It was found that the system is more sensitive when 95ps (Full Width...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network

    Mobile Adhoc NETwork (MANET) is a collection of wireless nodes that dynamically create a wireless network among them without using any infrastructure. Nodes are free to move, independent of each other which makes routing much difficult. The routing protocols in MANET should be more dynamic so that they quickly respond...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Review on Security and Privacy in Cloud Infrastructures

    Cloud Computing is one of the powerful technology to be established within network for the benefits and profits of the enterprises and government too. This review paper describes categories of cloud architectures (cloud service delivery models), security and privacy concerns with challenges. It seeks to contribute a better understanding of...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Optimization of Natural Frequency of Vertical Storage Tower Using FEA

    A vertical storage tower is typically used to store liquids or fine powders. To maximize the storage capacity, these columns are usually very tall typically over 27 meters. They are typically susceptible to wind loads, as the bending caused is much greater at these heights. The design problem is that,...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Implementation of an Autonomic Active Queue Management in Mobile Ad Hoc Network (MANETs)

    In order to provide better quality of service to the multimedia applications in Mobile Ad Hoc NETwork (MANETs), where its resource is limited and changed dynamically, in this paper the authors introduce an Active Queue management mechanism with autonomic attributes, named Autonomic Active Queue Management (AAQM). With the rapid development...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Testing Aspect Oriented Software Using UML Activity Diagrams

    Aspect Oriented Programming (AOP) is an extension to Object Oriented Programming (OOP). Aspect oriented programming supports the separation of crosscutting concerns. AOP is a software engineering paradigm that gives new types of constructs such as advice, join points, point cut and aspect in order to improve the separation of concerns....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Minimum Energy Based Efficient Routing Protocol Over MANETs

    Minimum energy (Energy Efficient) routing protocols are very essential for wireless ad hoc networks which usually consist of mobile battery operated computing devices and many such protocols and schemes have been proposed so far. However, few efforts have been spent on issues associated with such protocols such as routing overhead...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Implementation of Wireless Smart Sensor Platform for Industrial Application

    Today, Wireless Sensor Networks (WSN) are potentially one of the most important technologies of the 21st century. The utilization of wireless sensor based control systems have been augmented to a very great extent due to reduced cost, better power management, ease in maintenance, effortless application in remote and hazardous areas....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Hierarchical Routing Technique for Prolonging the Lifetime of Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) usually consists of a large number of nodes called sensor node that bring themselves together to form a wireless network. However, the major fact that sensor nodes run out of energy quickly has been an issue and many power efficient routing protocols have been proposed to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    A Software Reuse in Small Scale Industry: A Survey

    Software Engineering is the very integrated part of the industry from mid nineties. Small scale enterprises are a very important in the gears of the world economy. Software industry becomes significant economical activity from the last few decades. According to Fayad et al. 99.2% of software development companies are small...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    An Intrusion Detection Using Hybrid Technique in Cluster Based Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are playing a fundamental role in emerging pervasive platforms that have potential to host a wide range of next generation civil and military applications. Wireless Sensor Network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Implementation of Generic Context Middleware for Context-Aware Applications

    Context-awareness enables generation of context by analyzing situation of users and environments so that applications can autonomously react to contexts without user's explicit commands. There is growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomously...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    XML Twig Pattern Matching Algorithms and Query Processing

    XML has emerged as the wire-language of the internet. XML can be used to structure the data and also provide meaning for data. An effective document structure helps convert data into useful information that can be processed quickly and efficiently. The XML data is exchanged and generated in B2B1 applications....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Design and Analysis of Bit Error Rate Perfornance of Simulink Based DSSS-OFDM Model for Wireless Communication

    Because of the rapid growth of Digital Communication in recent years, the need for high speed data transmission is increased. Orthogonal Frequency Division Multiplexing (OFDM) technique is suitable for high speed communication because of its resistance to ISI (Inter Symbol Interference) and it utilizes the bandwidth efficiently. DSSS-OFDM is a...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Applicability of Backpropagation Neural Network for Recruitment Data Mining

    One of the biggest issues in the industries and institutions is the selection of the right candidate for their organization. Recruitment is the big issue for any organization and this process consume the more time, efforts and investment of any organization. During each phase o f the recruitment process, candidates...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Extracting Data Through Webmining

    This Paper comprises of upcoming evolutionary field of "Web Mining". This paper describes the extraction of useful information from internet. This paper present a clear view of what is Web Mining and How is it done. In this paper, the authors encompass various Pros and Cons of Web Mining and...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Semantic Keyword Search on XML

    In this paper Semantic Keyword search on xml using CR (Coherency Ranking) is presented. Keyword search is a user friendly mechanism for retrieving XML data in web and scientific applications. An intuitively compelling but vaguely defined goal is to identify matches to query keywords that are relevant to the user....

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Topology Vs Position Based Routing Protocols in Mobile Ad Hoc Networks: A Survey

    Mobile Ad hoc networks perform multi-hop communication in an environment without a dedicated fixed infrastructure, with mobile nodes and changing network topology. In the last 15 years, the wireless networking community designed hundreds of new routing protocols targeting the various scenarios of this design space. The objective of this paper...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    A Reliable Service Oriented System Based on the Present SMS Technology

    This paper is oriented towards developing a reliable service oriented system based on the present SMS technology. The authors have integrated three different applications independent of each other. All these three applications make use of common SMS send/receive messaging library. They have implemented three modules they are Appointment Management System...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Design FIR Filter With Signed Power of Two Terms Using MATLAB

    The design of digital filter, using signed power of two terms is implemented. The filter are designed without multipliers. The design is based on the remez exchange algorithm for the design of low pass and filters. Linear phase FIR filter with coefficients consisting of minimum number of signed power of...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Adoptable Key Management Technique for Multicast and Broadcast Services

    The popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. Another major issue is that to provide dynamic rekeying for all the users that join and leave the group. For the rekeying of the group key all members of the group should...

    Provided By IJERT - International Journal of Engineering Research and Technology

  • White Papers // May 2012

    Proposal of Security Schemes for Protecting Services in Cloud Computing

    Ever since the term "Cloud computing" was coined a few years back, there are numerous reasons that adopted by businesses and offer abstracted Internet services. Due to varied degree of security features and management schemes within the cloud entities security in the cloud is challenging. Security issues ranging from system...

    Provided By IJERT - International Journal of Engineering Research and Technology