International Journal for Advance Research in Engineering and Technology (IJARET)

Displaying 1-40 of 172 results

  • White Papers // Aug 2015

    Energy Efficient and Reliable Data Transfer Routing in Wireless Body Area Sensor Networks

    Wireless Body Area Network (WBAN), is a network designed by low-power devices that are located on, in or around the human body and are used to monitor physiological signals and motion for medical, personal entertainment and other applications and purposes in wireless body area network, sensor nodes are typically powered...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2015

    Reliable and Secure Data Transmission in Wireless Sensor Networks

    Wireless sensor networks can be utilized in a broad variety of applications ranging from battlefield surveillance in military, through remote patient monitoring in medicine to forest fire detection in environmental applications. Majority of WSN applications require at least some level of security. In order to achieve the needed level, secure...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2015

    Design and Evaluation of Performance of Cryptography Technique based on DES

    Cryptography is an emerging technology which uses the characteristics of human vision to decrypt encrypted images. It does not require cryptography knowledge and complex computation. It also ensures that hackers cannot perceive any clues about a secret image from individual cover images for security concerns. There are many challenges, which...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2015

    Energy Efficient Hierarchical Clustering Algorithm for Heterogeneous Wireless Sensor Networks

    Wireless sensor networks are the networks consist of small, battery powered sensor nodes with limited procuring storage and radio capability. In hierarchal routing, cluster heads are responsible for transmitting data to the base station by receiving data from normal nodes. But in stable election protocol, heterogeneous architecture is used. In...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2015

    Component Based Software Engineering Using UML Diagrams

    The growing interest in Component Based Software Engineering (CBSE) is reflected in the number of workshops and conferences with CBSE tracks. CBSE refers to using software modules that were developed on a previous software project as part of a new software development project. CBSE is a worthwhile goal since it...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2015

    Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature

    Mobile Ad hoc NETworks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2015

    An Energy Efficient Routing Algorithm for WSN Using PSO Approach

    Wireless sensor networks have become increasingly popular due to their wide range of applications. Energy consumption is one of the main constraints of the wireless sensor node and this limitation combined with a typical deployment of large number of nodes has added many challenges to the design and management of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2015

    Improving Mapreduce Performance by Speculative Execution Strategy Considering Data Locality and Data Skew

    In this paper, the authors present the study of MapReduce performance in Hadoop architecture, the job assigned to the Hadoop is divided in to tasks among the node of the cluster. But some of the nodes may be running slowly in the cluster to result in slow processing of the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2015

    Improving Security in MANET using Modified Elgamal Algorithm

    The advances in mobile computing and wireless communications, Mobile Ad hoc NETworks (MANETs) are becoming more attractive for use in military applications. Supporting security-sensitive applications in hostile environments has become an important research area for MANETs since MANETs introduce various security risks due to their open communication medium, node mobility,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2015

    Authentication using RFID and PCCP Application for Mobile Devices

    In the contemporary world, where in the people have explored the universe of computing, there have been rising concerns about the security of the data under usage. It is far more imperative to protect this data from the so called, 'Nefarious people'. This paper aims at satiating the growing needs...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2015

    Image Encryption and Decryption Using Randomization Technique

    Now-a-days, the internet is widely used for transferring images from one person to another but the security of these images is always over looked. Security issues have be taken into consideration, because hackers may find and utilize the weak link over communication network to steal information that they want. In...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2015

    A Survey on Hierarchical Routing Protocols for Wireless Sensor Networks

    During the creation of network topology in wireless sensor network, the process of creation of routes is usually influenced by energy considerations. Because the energy consumption of a wireless link is proportional to square or even higher order of the distance between the sender and the receiver, multi-hop routing is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2015

    Future of Wireless Communication-Light Fidelity (Li-Fi)

    Now-a-days, many people are using internet to accomplish their tasks through wired or wireless networks. With the fast increase in technology the dependencies of humans on mobile, laptop and internet is also increasing. There are Wi-Fi hotspots at homes, hotels, airports and even cities due to which the Wi-Fi network...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2015

    Design and Implementation of a Knowledge Reterival Scheme from Big Data for Aviation Industry

    In this paper, the authors describe a middle layer architecture that defined to perform the query analysis and the assessment of the big data. The paper implemented on dynamic generated data section instead of whole database. The concept of big data actually concerns with a bulk of data presented in...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    Designing and Performance Evaluation of Text Data Hiding Technique Using Sequential Encoding and Decoding Technique

    Hidden data detection in cover images by using steganography is termed as image steg-analysis of image. Lots of new image steganographic algorithms become content-adaptive, in order to improve security and processing speed. Great challenges are possessed by advanced content-adaptive steganographic techniques to steg-analyzers. These challenges are especially possessed to the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    E-Data Conversion and Migration Using Data Optimization Techniques

    Organizations receive lot of e-data from across different vendors. All these data are of different format and different contents. This makes it difficult for the organizations to organize, compare, save, update and modify these data. In order to overcome this problem and for the validation purpose of the organizations, the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    A Review: The Various Distortions Techniques in MANET caused due to Link Failure

    MANET is a mobile ad hoc network where a short-lived network is formed among the MANET nodes. MANET nodes communicate and interchange messages with other nodes either in an infrastructure or infrastructure-less network. Due to lack of fixed infrastructure, MANET is prone to varied attacks. The mobile ad hoc networks...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    A Vernal Approach for the Detection of DOS Attacks in Mobile Ad Hoc Networks

    In the MANET, different types of attacks are possible. These attacks are categorized as: active attacks and passive attacks. The most common attack in MANET is black hole attack. In the wireless networks, radio communication is the medium of choice. A wireless network is any type of network that uses...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    A Review on the Awareness of DoS Attacks in MANET

    Due to its dynamic topology, resource constraints, no centralized infrastructure and limited security, it is vulnerable to various attacks and black hole attack is one of them. Mobile ad hoc networks is an infrastructure less network which is self-configuring and it consists of independent mobile devices that can communicate via...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jan 2015

    Big Data Analytics Through R Programming

    Big data analytics is the subject that deals with applying various analytical techniques on the big data to know more about that data. Data was already been stored by mostly all organizations but was never put to use. But, this trend of data analysis has brought a huge advantage to...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jan 2015

    Optimized Binary Floating Multiplier Using Bypassing Technique

    Floating point multiplication is used in many Digital Signal Processing (DSP) applications; this multiplication is costly in terms of area, delay and power consumption. Reduction in these parameters will greatly improve the performance of multiplier and this in turn will improve the performance of DSP systems. In this paper, a...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Dec 2014

    Design of a Low Power 2T SRAM Cell Using Transmission Gate

    The power consumption and speed of SRAMs are important issues that have lead to multiple designs with the purpose of minimizing the power consumption. The less power a circuit consumes, more effective is the performance of a device. Use of transmission gates in place of pass transistors in 4T SRAM...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Dec 2014

    Design and Implementation of 256 Bit CMOS Memory Cell at 45nm Using Cadence Virtuoso

    SRAM is used as an interface among the CPU and since it consumes very less power it exchange DRAM from system. Low power SRAM is very important as it uses less power and also the area is very less. In many IC SRAM is embedded for some better performance. This...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Nov 2014

    Centralized Hierarchical Routing to Minimize Propagation Delay in Wireless Sensor Networks

    WSN is a collection of wireless nodes with limited energy capabilities that may be mobile or stationary and are located randomly on a dynamically changing environment. The routing strategies selection is an important issue for the efficient delivery of the packets to their destination. Moreover, in such networks, the applied...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2014

    Heterogeneous Node Recovery from a Failure in Wireless Sensor Actor Networks

    The effectiveness of wireless sensor-actor networks deployed in search and rescue, battlefield reconnaissance, surveillance and other applications depends on inter-node interaction. In WSAN, sensors probe their information from the physical world and forward their data to actor nodes then actors collaboratively respond to achieve predefined application mission. The network can...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2014

    Review Paper on Security Measures for a System

    Security systems are constantly being a threat to ethical hackers; In today's scenario, it is very crucial task to manage the security for various system components. This paper gives a deep insight towards every aspect of system consider system software, system hardware & system database. Apart from the core security...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2014

    Secured Hash Algorithm-1: Review Paper

    The Secure Hash Algorithm (SHA) is basically based on the concept of hash function. The basic idea of a hash function is that it takes a variable length message as input and produces a fixed length message as output which can also be called as hash or message-digest. This paper...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2014

    Wireless Body Area Networks: A Survey

    Advancement in wireless technology born a new generation of WSN which is appropriate for networking on the human body or in the human body. For data transfer among sensor nodes a point to point topology or multi-hop topology is used in these networks. In wireless body area network, only few...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2014

    Dispensation of Video over Wireless Network with Low Energy Consumption & Improved QOS

    Broad casting a real time video where large number of users wants to the same content then mobile to mobile cooperation can be used to reduced network utilization and improve energy efficiency. But in order to do that video transmission requires end-to-end delay bounds, but due to nature of wireless...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Driven Scheduling Algorithm Design for Security in Heterogeneous Distributed Systems

    The security sensitive applications such electronic transactions processing systems are widely used but it require the high quality of security to guarantee confidentiality data integrity and authentication have adopted the heterogeneous distributed systems as their platforms. This is primarily due to the fact that single parallel architecture-based systems may not...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Improving Security in MANET Using Digital Signature Standard Scheme

    The wireless and dynamic nature of Mobile Ad hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. A main challenge is to judge whether...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Implementing Rabin Cryptosystem in iMANET and Comparison with RSA Cryptosystem

    An approach to providing wireless connectivity is through the formation of a mobile ad hoc network. A Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. This type of network does not require the existence of a typical...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Load Rebalancing for File System in Public Cloud

    Distributed file systems are the pillars of cloud computing applications. They are based on the MapReduce framework which follows the divide and conquer approach of problem solving. In a cloud computing environment a big and complex file is processed by dividing it into chunks and distributed among the nodes over...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Performance Analysis of Scheduling Algorithms Under Scalable Green Cloud

    The development of computing systems has always been focused on the performance improvements driven by demands of applications. The energy consumption of computing systems has limited the performance growth because of energy consumption and carbon dioxide emissions. Therefore the aim of computing systems has been moved from performance improvements to...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    An Overview to Integer Factorization and RSA in Cryptography

    Cryptography is the practice and study of techniques for secure communication. Two parties who want to communicate with each other in secure way, uses cryptography to provide confidentiality to the data. Data encryption and decryption is done through use of key. If same key is used to encrypt and decrypt...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Securing MANET Using Diffie Hellman Digital Signature Scheme

    A Mobile Ad hoc NETwork (MANET) is a temporary network formed by the collection of mobile nodes. The network formed does not require any physical infrastructure. There is no central authority to control the services and configurations of the network. How to secure a MANET is an active field of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Enhancement in Priority Queuing Using NS2

    During the last few years, users all over the world have become accustomed to the availability of broadband access. This has enhanced the use of a wide variety both of established and recent multimedia applications. The Quality of Service (QoS) investigations in wired and wireless networks have been conducted mostly...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Resourceful Utilization of Latency in Virtual Machine Allocation in Cloud Computing

    Brokering in cloud computing is important in management of requests in cloud computing. Broker as one of the important module which deals with the management of requests from users end. Most of the existing techniques allot the incoming requests as per the nature of requests but the latency of the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    Past Service Performance Based Resource Scheduling in Cloud Computing

    Now-a-days, many applications are developed on a cloud environment. However, in order to make them scalable and fully elastic, the authors need to adopt new design patterns in queue management. The Event-Driven Architecture (EDA) is probably the most important architectural pattern used in the cloud for making applications scale. In...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2014

    A Study of Wireless Channel and Channel Capacity Estimation

    In this paper, the authors study about wireless channel model, WiMAX technology, multi-user switched diversity in WiMAX, challenges in multi-user switched diversity and the factors influencing system bandwidth capacity in IEEE 802.16e networks. The opportunity for WiMAX to serve those people who want to switch to broadband service is huge...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2013

    Enhancing Security of Multibiometric Cryptosystem Using RSA

    Single biometric cryptosystems were developed to obtain security and privacy. They are seriously affected by various attacks. Binding of multiple biometric cryptosystems (e.g., Fingerprint, Iris and face) together is termed as multi-biometric cryptosystem. Now-a-days Multi-biometric systems are mostly used in many large-scale biometric applications (e.g., FBI-IAFIS) multi-biometrics have several advantages...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2013

    Secure 2-Way Authentication for SIP

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols to control media communication sessions. It is a text-based application control protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP) and is a strong signaling protocol on the internet for...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2013

    Implementation of Reverse Caesar Cipher Algorithm for Cloud Computing

    Cloud computing is a large pool of easily and accessible virtualized resources, such as hardware, development platforms and services. Cloud computing is a new era of the modern world. Reasons for development of cloud computing are different people and different purpose depends upon the demand. The cloud computing flexibility is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2013

    A Review of Security of Data Using Cryptographic Algorithms in Cloud Computing

    Cloud computing is the dramatic advancement of the computer technology. During the last many decades, the network and the computer technology changes, due to which it allows the humans to share the large amount of information. Cloud computing is necessary for all that information. Cloud computing is necessary for easily...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2013

    Graphical User Authentication Using Transformation (Rotation and Resizing)

    User authentication is one of the most important elements in the field of data security. It is well known that there are basically two pillar son whom Graphical User Authentication (GUA) build is around: usability and security Text Based Password Authentication (TBPA) has several problems. In this paper, the authors...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Secure Network ID and Attack Measure Count in Virtual Systems

    In past few years, cloud computing security service is most important issue that has attracted a lot of research and development effort. Mostly, attackers can explore vulnerabilities of a cloud services and compromise virtual machines to deploy further large-scale Denial-of-Service (DoS) attacks usually involve early stage actions such as multi-step...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Implementation of Genetic Algorithm on Intrusion Detection System to Enhance Result

    An Intruder is a hacker or cracker which always tries to get access to secure, system Intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks are self-propagating, as in the case of worms, Trojan Horses and...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    An Improved XenApp MultiFarm Architecture

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various virtualization products that allow users to connect to their corporate applications from...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    Enhancement in Genetic Algorithm to Prevent Brute Force Attack

    The network is much vulnerable to different type of security attacks. The attacker can sniff information from the network and trigger the attack. Among all the different type of attacks brute force attacks is most common type of attack. Genetic algorithm is much vulnerable against brute force attack. In this...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    Local Reconstruction Codes in Cloud

    Cloud computing intended for providing software and hardware facilities are provided to users as a service over the internet through a web browser. Economic gains are the foremost driver for the cloud. User need not worry about the internal details of the storage and physical infrastructure. But, privacy and security...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Service Allocation in Cloud Environment: A Migration Approach

    A cloud environment is one of the most shareable environments where multiple clients are connected to the common environment to access the services and the products. A cloud environment can be public or the private cloud. In such environment, all the resources are available on an integrated environment where multiple...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    Node Selection in P2P Content Sharing Service in Mobile Cellular Networks with Reduction Bandwidth

    The peer-to-peer service has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Comparing to traditional server-client technology on the internet, the P2P technology has capabilities to realize highly scalable, extensible and efficient distributed applications....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2013

    Intrusion Detection Using Multitier Web Application Analyzer

    Web services and applications have smoothened the way of users for the faster data access. To meet the user's requirements for faster data retrieval, the web applications have moved towards multitier design wherein the back-end server contains the data base and application interface or web server acts as the front...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2013

    A Review of Scheduling Algorithms in Grid Computing

    Grid computing is aggregate power of distributed resources. Grid computing is basically used to coordinate and share the information. Grid computing is the form of distributed computing. In the grid computing the scheduling is used. In the grid computing the task scheduling is used, the main goal of grid task...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2013

    Email Filtering Based On Text Analysis and File Extension Using Improved Bayesian Algorithm

    Electronic mail (E-mail) is an electronic message system that transmits messages across computer network. Electronic mail is the easiest and most efficient communication tool for disseminating both wanted and unwanted information. There are many efforts under way to stop the increase of spam that plague almost every user on the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2013

    Implementation of Data Cleaning/Scrubbing in Data Ware House for Efficient Data Quality

    In this paper, the authors explain about the optimized data present in data warehouse. A data warehouse can have data with several impurities such as duplicate data, incomplete data, unflustered data etc. In this paper, they have combined 3 approaches to resolve these impurities. These approaches include duplicate data detection...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2013

    Transaction Based Prioritization Strategies for Email Applications

    Web applications change the state based on incoming events. The various events pose a challenge to test the functioning of e-mail applications because there are a large number of possible event sequences that users can invoke through a user interface. Many models have been developed for testing the e-mail applications,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2014

    Energy Recycling for Large Chip Design Using Low Power Switching Converters

    In this paper, the authors aim is to develop a low-skew in multi-giga hertz clocks circuit operating with large digital chips. A capacitance can be charged from the supply and then discharged to ground. In large digital chips amount of wastage in capacitor is high due to number of connections....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    A Genetic Algorithm to Discover Fuzzy Decision Rules for Continuous and Categorical Attributes Dataset

    Data mining refers to extracting knowledge from large amount of datasets. Classification is one of the important and most researched tasks of data mining. To cope better with real world system uncertainty and vagueness, a fuzzy classification system is used to find optimal set of rules used for decision making...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jan 2015

    Big Data Analytics Through R Programming

    Big data analytics is the subject that deals with applying various analytical techniques on the big data to know more about that data. Data was already been stored by mostly all organizations but was never put to use. But, this trend of data analysis has brought a huge advantage to...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    Designing and Performance Evaluation of Text Data Hiding Technique Using Sequential Encoding and Decoding Technique

    Hidden data detection in cover images by using steganography is termed as image steg-analysis of image. Lots of new image steganographic algorithms become content-adaptive, in order to improve security and processing speed. Great challenges are possessed by advanced content-adaptive steganographic techniques to steg-analyzers. These challenges are especially possessed to the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2015

    E-Data Conversion and Migration Using Data Optimization Techniques

    Organizations receive lot of e-data from across different vendors. All these data are of different format and different contents. This makes it difficult for the organizations to organize, compare, save, update and modify these data. In order to overcome this problem and for the validation purpose of the organizations, the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    A High Performance Bus Invert Encoding and Decoding Technique Using Reversible Logic

    Low power VLSI circuit design is one of the most important issues in present day technology. One of the ways of reducing power is to reduce the number of transitions on the bus. The main focus here is to present a method for reducing the power consumption of compressed-code systems...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Booth's Algorithm Design Using Field Programmable Gate Array

    Now-a-days, digital device is very important to all people in this world. The high speed operation and less space and energy required had made the digital devices more preferred. This paper is to design digital system which performed fixed point Booth multiplier algorithm where the design system would be developed...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Hubness in High-Dimensional Data Clustering

    Learning from high-dimensional data is usually quite a challenging task, as captured by the well-known phrase curse of dimensionality. Clustering depends critically on density and distance (similarity), but these concepts become increasingly more difficult to define as dimensionality increases. Most distance based methods become impaired due to the distance concentration...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Deploying R Programming Language for Big Data Analytics

    The new trend of deploying techniques which use abundant amount of data is leading to a growing interest in the concept of 'Big data'. Since, the arrival of such big data quests start right away during data acquisition, it becomes essential to know how to store what is kept with...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Dec 2014

    Design of a Low Power 2T SRAM Cell Using Transmission Gate

    The power consumption and speed of SRAMs are important issues that have lead to multiple designs with the purpose of minimizing the power consumption. The less power a circuit consumes, more effective is the performance of a device. Use of transmission gates in place of pass transistors in 4T SRAM...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Dec 2014

    Design and Implementation of 256 Bit CMOS Memory Cell at 45nm Using Cadence Virtuoso

    SRAM is used as an interface among the CPU and since it consumes very less power it exchange DRAM from system. Low power SRAM is very important as it uses less power and also the area is very less. In many IC SRAM is embedded for some better performance. This...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2015

    Improving Mapreduce Performance by Speculative Execution Strategy Considering Data Locality and Data Skew

    In this paper, the authors present the study of MapReduce performance in Hadoop architecture, the job assigned to the Hadoop is divided in to tasks among the node of the cluster. But some of the nodes may be running slowly in the cluster to result in slow processing of the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Carry-Look Ahead Approach to a Unified BCD and Binary Adder/Subtractor

    Increasing prominence of commercial, financial and internet-based applications which process decimal data, there is an increasing interest in providing hardware support for such data. In this paper, new architecture for efficient binary and Binary Coded Decimal (BCD) adder/subtractor is presented. This employs a new method of subtraction unlike the existing...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Design and Hardware Implementation of 128-Bit Vedic Multiplier

    In this paper, multiplier architecture is proposed based on algorithm of ancient Indian Vedic mathematics, high speed applications. It is based on the vertical and crosswise algorithm of ancient Indian Vedic Mathematics, Urdhva Tiryakbhyam Sutra generating all partial products and their sums in one step. The design basic block which...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Design and Comparison of Vedic Multiplier

    The need of high speed multiplier is increasing as the need of increasing high speed processors. A multiplier is one of the hardware blocks in most fast processing system. This is not only a high delay block but also a major source of power dissipation. A conventional processor requires substantially...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jan 2015

    Optimized Binary Floating Multiplier Using Bypassing Technique

    Floating point multiplication is used in many Digital Signal Processing (DSP) applications; this multiplication is costly in terms of area, delay and power consumption. Reduction in these parameters will greatly improve the performance of multiplier and this in turn will improve the performance of DSP systems. In this paper, a...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Design of CMOS Based VCO for PLL with Improved Frequency Range

    A Voltage Controlled Oscillator (VCO) is one of the most important basic building blocks in analog and digital circuits. There are many different implementations of VCOs. One of them is a ring oscillator based VCO, which is commonly used in the clock generation subsystem. The proposed VCO circuit is designed...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Design & Analysis of 24.5 GHz Ring & 135 GHz LC VCO

    In this paper, the authors describe the design and analysis of a CMOS Ring & LC Voltage Controlled Oscillators (VCO) 25GHz & 135GHz respectively in a 90nm Complementary Metal Oxide Semiconductor (CMOS). CMOS Oscillators are an integral part of Phase Locked Loops (PLL) as they serve as the heart of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2013

    Improved Error Detection Approach to Reconfigurable FPGA Device

    An FPGA-based reconfigurable system may contain boards of FPGAs which are reconfigured for different applications and must work without any faults. In order to minimize system downtime and increase availability, a fault location technique with very short detecting latency is desired. In this paper, a fast technique for run-time FPGA...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Division Algorithm Design Using Field Programmable Gate Array

    In this paper, the authors are explain about design eight bit division algorithm program by using Xilinx ISE 10.1 software for simulation algorithm circuit partitioning through hardware Field Programmable Gate Array (FPGA). The algorithms are divide 8-bit dividend by 8-bit divisor for input and get the result 16-bit for the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Design and Implementation of SDRAM Controller in FPGAs

    Memory performance has become the major bottleneck to improve the overall performance of the computer system. SDRAM controller design, located between the SDRAM and the bus master which reduces the user's effort to deal with the SDRAM command interface by providing a simple generic system interface to the bus master....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Dec 2013

    An Overview of E-Commerce: Its Scope, Benefits, Importance and Problems

    Electronic Commerce (E-Commerce) has made a great impact on society. People can now shop online in their own homes or offices without ever having to leave. This can enforce larger brick and mortar retailers to open an online store. It changes the way people look at making purchases and spending...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2013

    Review of Data Mining & Data Warehousing

    Data mining and data warehousing process involves multiple stages. Data warehousing is a method of bringing together all of a company's data from various computer systems, including those relating to customers, employees, vendors, products, inventory and financials. Data warehouse connects different databases together in order to offer a more comprehensive...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)