International Journal of Advanced Engineering Applications (IJAEA)

Displaying 1-40 of 41 results

  • White Papers // Jun 2014

    Performance Analysis of Graphical Processing Unit (GPU) Based Wireless Multimedia Sensor Networks

    The wireless multimedia sensor senses the image and video in the vicinity by deploying number of sensors. The detection of moving and static targets is remotely sensed by as hyper spectral sensors. It often requires swift decisions that depend upon high computing performance of algorithmic analysis. Manipulating the hyper spectral...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jun 2014

    Analytic Approximate Solution for Nonlinear Damped Pendulum by Using Hybrid Artificial Neural Network and Particle Swarm Optimization Algorithm

    Damped pendulum is the most popular example in mechanics and vibration problems. This paper presents a new method in order to find a simple analytical approximate solution for nonlinear damped pendulum, by using hybrid neural networks and particle swarm optimization algorithm. The obtained analytic solution has a simple shape, and...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jun 2014

    Information Security Scheme for Data Integrity & Security on Cloud Environment

    Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Basically cloud computing is the idea of accessing files, software and computing services through the Internet instead of on personal computer. The primary benefits of cloud computing are the ability...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // May 2014

    Data Mining Using Neural Network

    Data mining is a logical process of extraction of useful information and patterns from huge data. It is also called as knowledge discovery process or knowledge mining from data. This technique is to find patterns that were previously unknown and once these patterns are found they can further be used...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // May 2014

    Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks using Timestamp Based Approach

    Sensor network history suggests that clustering is one of the most effective techniques to increase the performance of deployed wireless sensor networks. But along with the implementation of clustering in WSNs; it is necessary to resolve numerous challenges like secure and efficient data transmission, providing high-level security against variety of...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // May 2014

    A Novel Methodology for Analyzing Malicious Behavior of the Android Applications

    Smartphone have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, Trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smartphone run...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Updating the Jobs in Streaming Data Warehouse Using Scheduling Framework

    Streaming data warehouse is to propagate new data across all the relevant tables and views as quickly as possible. Update scheduling in streaming data warehouse combine the features of traditional data warehouse and data stream systems. Traditional data warehouse are refreshed during downtimes, streaming warehouses are updated as new data...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    QoS Provisioning in Vertical Handover of WIMAX / WLAN Overlay Network for Fixed and Mobile Users

    The integration of WiMAX and WLAN has been seen an important goal towards the enhancement of Fourth Generation (4G). Vertical handoff plays important role while integration of WiMAX and WLAN heterogeneous overlay systems. Vertical handoff is preformed on the basis of Quality of Service (QoS) metrics of the two heterogeneous...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Closer in Peer To Peer Systems by Using Ideal Indexing

    The Collaborative Locality-aware Overlay SERvice (CLOSER), an architecture that aims at minimizing the usage of expensive international links by exploiting traffic. The effectiveness of CLOSER is proved by ideal indexing of localization information and provides direct downloads from closest peers hence decreasing the downloading time. CLOSER also provides a privacy...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Delivering Scalable High Bandwidth Storage for High Speed Data Transfer

    A number of high-bandwidth networks have been constructed; existing, high-speed protocols cannot fully utilize the bandwidth of the high speed networks. As their fixed size application level receiving buffers suffer from buffer bottleneck. In this paper, analyze the buffer bottleneck problem and propose Rada. By periodically detecting the data arrival...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    An Efficient Data Sharing and Secure Auditing Of Cloud Storage

    Cloud computing is a model of information processing, storage, and delivery in which highly centralized physical resources are furnished to remote clients on demand. While the storage of corporate data on remote servers is not a new development, current expansion of cloud computing justifies a more careful look at its...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Robust Cross Layer Design for Cognitive MIMO Ad Hoc Network For Optimal Resource Allocation

    Cognitive Radio (CR) is an intelligent wireless communication technique in order to increase the spectrum efficiency and fairness issues. Cognitive radio has been considered as an efficient means to opportunistic spectrum sharing between primary users (licensed users) and cognitive users. Cross layer design provides cooperation between multiple layers to combine...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Decision Trees for Uncertain Categorical Data

    Decision tree is a widely used data classification technique work with data whose values are known and precise. The authors extended such classifiers to handle data with uncertain information, which originates from measurement/quantization errors, data staleness, multiple repeated measurements, etc. Data uncertainty is common in emerging applications such as sensor...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Efficient Energy Aware Data Gathering With Mobi-Sink Using Dynamic Trajectory Selection

    A wireless sensor network is a network composed of a large number of nodes that sense, collect, transmit and deliver data to where it is needed. It involves a set of isolated urban areas covered by sensor nodes monitoring environmental parameters. Mobile sinks are mounted upon urban vehicles with fixed...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Adaptive Countermeasure to Prevent DoS Attacks Using an Adaptive Discerning Certification Method

    DoS attacks aim to reduce scarce resources by generating illegitimate requests from one or many hosts. It made damage to the system. To avoid this, propose a new concept Adaptive Selective Verification Certification (ASV) method to avoid DoS attack, which is a distributed adaptive mechanism for thwarting attacker's efforts to...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Wavelet Optical Neural Network Based Short-Term Wind Power Prediction

    In this paper, the authors propose a Wavelet Support Vector Machine (WSVM)-based model for short-term Wind Power Prediction (WPP). A new wavelet kernel is proposed to improve the generalization ability of the Support Vector Machine (SVM). The proposed kernel has such a general characteristic that some commonly used kernels are...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    An Enhanced Model for Privacy Preserving Data Publication

    The success of data mining not only relies on the availability of high quality data but also in preserving person specific and sensitive information from the threat of identity disclosure. Recent papers on the available anonymization techniques like bucketization and generalization has proved that they do not prevent membership disclosure...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Visualization Of Clusters Using Scalable COVAT Algorithm

    In data mining, clustering is the process of discovering the group of data. Many clustering algorithms are developed to address the visualization process. Visual display of clustering method is categorized into three: visual displays of clusters, visual displays to find clusters, and visual display to assess tendency. VAT algorithm forms...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Secure and Data Aggregation in Wireless Sensor Networks

    Data aggregation is implemented in wireless sensor networks to reduce data redundancy and to summarize relevant and necessary information without requiring all pieces of the data. The benefit of data aggregation can be maximized by implementing it at every data aggregator on the path to the base station. However, data...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Efficient Energy Consumption in Wireless Sensor Networks

    Wireless sensor network is a wireless network containing number of nodes that cooperatively monitors an environment. Each network contains a node containing sensor, memory and communicating device. The sensor senses the environment and sends those data to the base station or sink node. These networks are widely used in military...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Implementation of Wireless Communication in SCADA System of a Distribution Transformer using Microcontroller and PC

    In this paper, the authors protect the distribution transformer or any other power transformer from burning due to the overload, over temperature and input high voltage. Most of the transformers are burning mainly because of these three reasons; hence by incorporating different monitoring and control circuits, utilization of the transformer...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Adaptive Control of DC Motor Using Neural Networks

    In this paper, an Adaptive Neural Network Sliding Mode Controller (ANNSMC) design approach is proposed. Sliding mode control method is studied for controlling DC motor because of its robustness against model uncertainties and external disturbances, and also its ability in controlling nonlinear and MIMO systems. the main drawback of SMC...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Supervisory Control and Data Acquisition With Distributed Embedded System for Building Automation

    The most essential automation is saving human life, saving their belongings, protecting their properties and making arrangements in a systematic way for automation. The land cost is very high, so individual houses are very uncommon in cities. So peoples prefer sharing based apartment culture. The highest advantages of apartment culture...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Outsourced Proximity Based Search on Metric Data Assets

    Cloud computing has ripped notably over the last few decades, and is likely to continue to hike as businesses bull's eye is on beneficial cost ratio and the understanding of cloud computing, including its scalability, improves. While cloud computing is benign for many businesses of all sizes, it is not...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Scalable Mining of Network Communities Using Network's Spectral Signature

    Network communities can be inferred from the hitting and exiting times of local mixing states. Such times can be computed based on the large-deviation theory in the case of the potential functions corresponding to networks being explicit. However, network potential functions are all implicit and hard to find out. For...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Eco-Friendly Beam Grids Using Prevailing Wireless Communiqu

    Precise quantities of drizzle are important in weather casting, hydrology (e.g. flood warning), gardening, eco-friendly dogma and endure foretelling. The zap acquaintances that custom a Wireless Communiqu

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Broadcast in Low Duty-Cycle Wireless Sensor Networks with Reliable Link

    In Wireless Sensor Networks (WSN) broadcasting is one of the most fundamental services. Each node has the feature they can alternate between active and dormant states, so as to conserve energy and extend the network lifetime. When the node turn into dormant state broadcast problems occur. Packet may drops due...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Detecting and Resolving Identity Crimes by Using Secure Mechanism

    Identity crime is used to detect duplicity in credit card. The synthetic identity fraud is the use of credible but untrue identities that is easy to create but more tricky to apply on real time. Identity crime is done in the combination of both synthetic and real identity theft. Detection...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Resilient of Data Mining-Based Fraud Detection by Using Secure Mechanism

    Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Hierarchical Energy Aware Dynamic Rate MAC Protocol for Maximizing the Life Time of Wireless Sensor Networks

    In this paper, the authors deals with the problem for transmission of elastic and inelastic data transmission in the Wireless Sensor Networks (WSN). The proposed Energy Aware Dynamic Rate Medium Access Control (EADRMAC) model, the Cluster Head node (CH) in the cluster calculates the channel capacity i.e. number of on-going...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Adaptive Energy-Efficient Clustering for Multichannel MAC Protocol

    Ad hoc networking is a concept in computer communications, which means that user's wants to communicate with each other form a temporary network, without centralized administration. The entire node participating in the network acts both as host and a router and must therefore is willing to forward packets for other...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Stand Alone Hybrid Wind-Solar Power Generation System Using GSM

    Hybrid wind-solar power generation is an unpolluted energy. MPPT algorithm is used for hybrid power generation. This MPPT algorithm gives more efficiency of power generation in wind-solar energy, but this MPPT algorithm does not give the constant voltage and current. Because exact sun angle is not located in solar panel....

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    An Artificial Neural Network Approach for Tropical Cyclone Heat Potential

    The neural network is traditionally used to refer to a network or circuit of biological neurons. The modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or nodes. Thus the term may refer to either biological neural networks, made up of real...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Decision of an Optimum Cutting Condition by Neural Network

    In most machining companies, operators decide the cutting conditions, a pair of spindle Speed (S) and table Feed (F), by experience and subjective judgment. This paper is to develop the cutting condition decision system which utilizes shop data and predicts tool life by neural network and eventually leads to the...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Hop-by-Hop Authentication Using Heuristicranking Method in In-Network Communication

    In a wireless sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports and some drop the packets in the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Controlling Wireless Stepper Motor Based on FPGA Implementation Using PID Controller

    Stepper motor is a brushless DC electric motor that divides a full rotation into a number of equal steps. This paper proposes a wireless stepper motor controller designed using Verilog Hardware Description Language (VHDL) and is implemented on Spartan 3E Field Programmable Gate Array (FPGA). The proposed controller uses the...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Performance Analysis of Various Network Topologies Used in Optical Back Bone Network

    Service providers are constantly rebuilding and reconstructing their networks to secure long term business success in the global telecom market. Designing today's transport network is complex and technology decision have a huge impact on both short and long term service providers in INDIA is Bharat Sanchar Nigam Ltd; they use...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    GSM/GPRS Based Wireless Vehicle Security

    A vehicle security system using SMS comprises of a micro controller based control unit. A cellular modem (GSM/CDMA/GPRS) in connection with the said micro-controller sends a pre defined SMS to one or more concerned person upon receipt of said information by the micro controller. Namely \"SIM 300\" GSM module is...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    GSM/GPRS Based Economical Wireless Home Security System

    Now-a-days, home security system is needed for occupants' convenience and safety. In this paper, the authors implement the design of low cost, low power consumption, and GSM/GPRS (Global System for Mobile communication /General Packet Radio Service) based economical wireless home security system. The system is a wireless home network which...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Rapid Firing Scheme for Ultrasonic Sensors Used in Mobile Robots

    A common technique in robotics for proximity detection is Time-Of-Flight measurement (TOF).This is often accomplished using the ultrasonic ranging module and an appropriate transducer. The basic principal of operation for sonar ranging is the same no matter what system is being used. The sensing is initiated by first creating a...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jun 2013

    On the Tradition of Mobile Phones and Biometrics for Salvaging Delimited Web Amenity

    A claim that tolerates a peripatetic receiver to be used as a biometric-seizure stratagem is shown. The main influence of the authors' impact is that this detention, and far along gratitude, can be accomplished during a customary web session, using the same manner that is used in a Personal Computer(PC),...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Updating the Jobs in Streaming Data Warehouse Using Scheduling Framework

    Streaming data warehouse is to propagate new data across all the relevant tables and views as quickly as possible. Update scheduling in streaming data warehouse combine the features of traditional data warehouse and data stream systems. Traditional data warehouse are refreshed during downtimes, streaming warehouses are updated as new data...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jun 2014

    Performance Analysis of Graphical Processing Unit (GPU) Based Wireless Multimedia Sensor Networks

    The wireless multimedia sensor senses the image and video in the vicinity by deploying number of sensors. The detection of moving and static targets is remotely sensed by as hyper spectral sensors. It often requires swift decisions that depend upon high computing performance of algorithmic analysis. Manipulating the hyper spectral...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // May 2014

    Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks using Timestamp Based Approach

    Sensor network history suggests that clustering is one of the most effective techniques to increase the performance of deployed wireless sensor networks. But along with the implementation of clustering in WSNs; it is necessary to resolve numerous challenges like secure and efficient data transmission, providing high-level security against variety of...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // May 2014

    A Novel Methodology for Analyzing Malicious Behavior of the Android Applications

    Smartphone have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, Trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smartphone run...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jun 2014

    Information Security Scheme for Data Integrity & Security on Cloud Environment

    Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Basically cloud computing is the idea of accessing files, software and computing services through the Internet instead of on personal computer. The primary benefits of cloud computing are the ability...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // May 2014

    Data Mining Using Neural Network

    Data mining is a logical process of extraction of useful information and patterns from huge data. It is also called as knowledge discovery process or knowledge mining from data. This technique is to find patterns that were previously unknown and once these patterns are found they can further be used...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    QoS Provisioning in Vertical Handover of WIMAX / WLAN Overlay Network for Fixed and Mobile Users

    The integration of WiMAX and WLAN has been seen an important goal towards the enhancement of Fourth Generation (4G). Vertical handoff plays important role while integration of WiMAX and WLAN heterogeneous overlay systems. Vertical handoff is preformed on the basis of Quality of Service (QoS) metrics of the two heterogeneous...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Closer in Peer To Peer Systems by Using Ideal Indexing

    The Collaborative Locality-aware Overlay SERvice (CLOSER), an architecture that aims at minimizing the usage of expensive international links by exploiting traffic. The effectiveness of CLOSER is proved by ideal indexing of localization information and provides direct downloads from closest peers hence decreasing the downloading time. CLOSER also provides a privacy...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Delivering Scalable High Bandwidth Storage for High Speed Data Transfer

    A number of high-bandwidth networks have been constructed; existing, high-speed protocols cannot fully utilize the bandwidth of the high speed networks. As their fixed size application level receiving buffers suffer from buffer bottleneck. In this paper, analyze the buffer bottleneck problem and propose Rada. By periodically detecting the data arrival...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    An Efficient Data Sharing and Secure Auditing Of Cloud Storage

    Cloud computing is a model of information processing, storage, and delivery in which highly centralized physical resources are furnished to remote clients on demand. While the storage of corporate data on remote servers is not a new development, current expansion of cloud computing justifies a more careful look at its...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Robust Cross Layer Design for Cognitive MIMO Ad Hoc Network For Optimal Resource Allocation

    Cognitive Radio (CR) is an intelligent wireless communication technique in order to increase the spectrum efficiency and fairness issues. Cognitive radio has been considered as an efficient means to opportunistic spectrum sharing between primary users (licensed users) and cognitive users. Cross layer design provides cooperation between multiple layers to combine...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Decision Trees for Uncertain Categorical Data

    Decision tree is a widely used data classification technique work with data whose values are known and precise. The authors extended such classifiers to handle data with uncertain information, which originates from measurement/quantization errors, data staleness, multiple repeated measurements, etc. Data uncertainty is common in emerging applications such as sensor...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Efficient Energy Aware Data Gathering With Mobi-Sink Using Dynamic Trajectory Selection

    A wireless sensor network is a network composed of a large number of nodes that sense, collect, transmit and deliver data to where it is needed. It involves a set of isolated urban areas covered by sensor nodes monitoring environmental parameters. Mobile sinks are mounted upon urban vehicles with fixed...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Adaptive Countermeasure to Prevent DoS Attacks Using an Adaptive Discerning Certification Method

    DoS attacks aim to reduce scarce resources by generating illegitimate requests from one or many hosts. It made damage to the system. To avoid this, propose a new concept Adaptive Selective Verification Certification (ASV) method to avoid DoS attack, which is a distributed adaptive mechanism for thwarting attacker's efforts to...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Wavelet Optical Neural Network Based Short-Term Wind Power Prediction

    In this paper, the authors propose a Wavelet Support Vector Machine (WSVM)-based model for short-term Wind Power Prediction (WPP). A new wavelet kernel is proposed to improve the generalization ability of the Support Vector Machine (SVM). The proposed kernel has such a general characteristic that some commonly used kernels are...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    An Enhanced Model for Privacy Preserving Data Publication

    The success of data mining not only relies on the availability of high quality data but also in preserving person specific and sensitive information from the threat of identity disclosure. Recent papers on the available anonymization techniques like bucketization and generalization has proved that they do not prevent membership disclosure...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Visualization Of Clusters Using Scalable COVAT Algorithm

    In data mining, clustering is the process of discovering the group of data. Many clustering algorithms are developed to address the visualization process. Visual display of clustering method is categorized into three: visual displays of clusters, visual displays to find clusters, and visual display to assess tendency. VAT algorithm forms...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Secure and Data Aggregation in Wireless Sensor Networks

    Data aggregation is implemented in wireless sensor networks to reduce data redundancy and to summarize relevant and necessary information without requiring all pieces of the data. The benefit of data aggregation can be maximized by implementing it at every data aggregator on the path to the base station. However, data...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Efficient Energy Consumption in Wireless Sensor Networks

    Wireless sensor network is a wireless network containing number of nodes that cooperatively monitors an environment. Each network contains a node containing sensor, memory and communicating device. The sensor senses the environment and sends those data to the base station or sink node. These networks are widely used in military...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Implementation of Wireless Communication in SCADA System of a Distribution Transformer using Microcontroller and PC

    In this paper, the authors protect the distribution transformer or any other power transformer from burning due to the overload, over temperature and input high voltage. Most of the transformers are burning mainly because of these three reasons; hence by incorporating different monitoring and control circuits, utilization of the transformer...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Adaptive Control of DC Motor Using Neural Networks

    In this paper, an Adaptive Neural Network Sliding Mode Controller (ANNSMC) design approach is proposed. Sliding mode control method is studied for controlling DC motor because of its robustness against model uncertainties and external disturbances, and also its ability in controlling nonlinear and MIMO systems. the main drawback of SMC...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Supervisory Control and Data Acquisition With Distributed Embedded System for Building Automation

    The most essential automation is saving human life, saving their belongings, protecting their properties and making arrangements in a systematic way for automation. The land cost is very high, so individual houses are very uncommon in cities. So peoples prefer sharing based apartment culture. The highest advantages of apartment culture...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Outsourced Proximity Based Search on Metric Data Assets

    Cloud computing has ripped notably over the last few decades, and is likely to continue to hike as businesses bull's eye is on beneficial cost ratio and the understanding of cloud computing, including its scalability, improves. While cloud computing is benign for many businesses of all sizes, it is not...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Scalable Mining of Network Communities Using Network's Spectral Signature

    Network communities can be inferred from the hitting and exiting times of local mixing states. Such times can be computed based on the large-deviation theory in the case of the potential functions corresponding to networks being explicit. However, network potential functions are all implicit and hard to find out. For...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Eco-Friendly Beam Grids Using Prevailing Wireless Communiqu

    Precise quantities of drizzle are important in weather casting, hydrology (e.g. flood warning), gardening, eco-friendly dogma and endure foretelling. The zap acquaintances that custom a Wireless Communiqu

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Broadcast in Low Duty-Cycle Wireless Sensor Networks with Reliable Link

    In Wireless Sensor Networks (WSN) broadcasting is one of the most fundamental services. Each node has the feature they can alternate between active and dormant states, so as to conserve energy and extend the network lifetime. When the node turn into dormant state broadcast problems occur. Packet may drops due...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Detecting and Resolving Identity Crimes by Using Secure Mechanism

    Identity crime is used to detect duplicity in credit card. The synthetic identity fraud is the use of credible but untrue identities that is easy to create but more tricky to apply on real time. Identity crime is done in the combination of both synthetic and real identity theft. Detection...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Resilient of Data Mining-Based Fraud Detection by Using Secure Mechanism

    Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jun 2014

    Analytic Approximate Solution for Nonlinear Damped Pendulum by Using Hybrid Artificial Neural Network and Particle Swarm Optimization Algorithm

    Damped pendulum is the most popular example in mechanics and vibration problems. This paper presents a new method in order to find a simple analytical approximate solution for nonlinear damped pendulum, by using hybrid neural networks and particle swarm optimization algorithm. The obtained analytic solution has a simple shape, and...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Hierarchical Energy Aware Dynamic Rate MAC Protocol for Maximizing the Life Time of Wireless Sensor Networks

    In this paper, the authors deals with the problem for transmission of elastic and inelastic data transmission in the Wireless Sensor Networks (WSN). The proposed Energy Aware Dynamic Rate Medium Access Control (EADRMAC) model, the Cluster Head node (CH) in the cluster calculates the channel capacity i.e. number of on-going...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Adaptive Energy-Efficient Clustering for Multichannel MAC Protocol

    Ad hoc networking is a concept in computer communications, which means that user's wants to communicate with each other form a temporary network, without centralized administration. The entire node participating in the network acts both as host and a router and must therefore is willing to forward packets for other...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Stand Alone Hybrid Wind-Solar Power Generation System Using GSM

    Hybrid wind-solar power generation is an unpolluted energy. MPPT algorithm is used for hybrid power generation. This MPPT algorithm gives more efficiency of power generation in wind-solar energy, but this MPPT algorithm does not give the constant voltage and current. Because exact sun angle is not located in solar panel....

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    An Artificial Neural Network Approach for Tropical Cyclone Heat Potential

    The neural network is traditionally used to refer to a network or circuit of biological neurons. The modern usage of the term often refers to artificial neural networks, which are composed of artificial neurons or nodes. Thus the term may refer to either biological neural networks, made up of real...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Decision of an Optimum Cutting Condition by Neural Network

    In most machining companies, operators decide the cutting conditions, a pair of spindle Speed (S) and table Feed (F), by experience and subjective judgment. This paper is to develop the cutting condition decision system which utilizes shop data and predicts tool life by neural network and eventually leads to the...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Controlling Wireless Stepper Motor Based on FPGA Implementation Using PID Controller

    Stepper motor is a brushless DC electric motor that divides a full rotation into a number of equal steps. This paper proposes a wireless stepper motor controller designed using Verilog Hardware Description Language (VHDL) and is implemented on Spartan 3E Field Programmable Gate Array (FPGA). The proposed controller uses the...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Performance Analysis of Various Network Topologies Used in Optical Back Bone Network

    Service providers are constantly rebuilding and reconstructing their networks to secure long term business success in the global telecom market. Designing today's transport network is complex and technology decision have a huge impact on both short and long term service providers in INDIA is Bharat Sanchar Nigam Ltd; they use...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    Hop-by-Hop Authentication Using Heuristicranking Method in In-Network Communication

    In a wireless sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports and some drop the packets in the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    GSM/GPRS Based Wireless Vehicle Security

    A vehicle security system using SMS comprises of a micro controller based control unit. A cellular modem (GSM/CDMA/GPRS) in connection with the said micro-controller sends a pre defined SMS to one or more concerned person upon receipt of said information by the micro controller. Namely \"SIM 300\" GSM module is...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)

  • White Papers // Jan 2014

    GSM/GPRS Based Economical Wireless Home Security System

    Now-a-days, home security system is needed for occupants' convenience and safety. In this paper, the authors implement the design of low cost, low power consumption, and GSM/GPRS (Global System for Mobile communication /General Packet Radio Service) based economical wireless home security system. The system is a wireless home network which...

    Provided By International Journal of Advanced Engineering Applications (IJAEA)