International Journal of Advances in Engineering & Technology (IJAET)

Displaying 1-40 of 221 results

  • White Papers // Mar 2014

    Collaborative Computer Aid Diagnosis Framework in Cloud Environment Based on Multi Agents Systems

    In this paper, the authors address solutions for the problems of the low accurate decision, low availability especially in maintains procedures and the scalability in online Computer Aided Diagnosis (CAD). Most CADs became available online and provide a high importance medical services which develop the health of the human beings....

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    A Review Report for Next Generation of Cmos Technology as Spintronics: Fundamentals, Applications and Future

    As the scaling continues to reduce the physical feature size and to increase the functional throughput, two most outstanding limitations and major challenges among others, are power dissipation and variability as identified by ITRS. This paper presents the expose, in those collective phenomena, spintronics using appropriate order parameters of magnetic...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Analysis and Measurement of Wi-Fi Signals in Indoor Environment

    The measurement and analysis of radio waves propagation play significant part in the plan and function of WLAN applications. This paper provides an overall coverage of the Wi-Fi in the indoor environment. In this paper radio waves propagation for indoor environments will be considered using the Wireless LAN 802.11b/g at...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Intrusion Detection in Computer Network Using Genetic Algorithm Approach: A Survey

    The intrusion detection problem is becoming a challenging task due to the proliferation of heterogeneous computer networks since the increased connectivity of computer systems gives greater access to outsiders and makes it easier for intruders to avoid identification. Intrusion detection systems are used to detect unauthorized access to a computer...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    A Study on Efficiency of Resource Allocation (guaranteeing QoS) in GSM/GPRS Networks

    General Packet Radio Service (GPRS), initiated in 1994, is an ETSI standard for packet data transmission using the core GSM (Global System for Mobile Communications) radio access network. GPRS shares the GSM frequency bands with telephone and circuit-switched data traffic, and makes use of many properties of the physical layer...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Papr Performance of OFDM System by Using Clipping and Filtering Method

    Multicarrier schemes are supported to high data rate. Orthogonal Frequency Division Multiplexing (OFDM) and Filtered Multi-Tone (FMT) are two techniques of multicarrier schemes. OFDM is an attractive air-interface for next-generation wireless network without complex equalizer. OFDM is designed such a way that it sends data over hundreds of parallel carrier...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    A Study of Metamaterial Based Electrically Small Antenna to Enhance Gain

    This is a review paper in which electrically small metamaterial-based antennas are discussed from the industrial point of view using mobile phones as the application example and dual band microstrip antenna with metamaterial structure for dual band operation. The most interesting feature of the design is the ability of enhancing...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    An Explication of Secret Sharing Schemes With General Access Structure

    The basic idea in secret sharing is to divide the secret key into pieces, also called as 'Shares' and distribute the pieces to different persons so that certain subsets of the persons can get together to recover the key. In the outline of threshold schemes, the authors wanted k out...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Improving Traffic Performance on IMS Network

    The IP Multimedia Subsystem (IMS) enables the convergence of voice, data, and multimedia services such as Voice over IP (VoIP), Video over IP, push-to-talk, presence or instant messaging services and so. IMS is well integrated with existing voice and data networks, while adopting many of their key characteristics. SIP (Session...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Detection of Anomalies From Dataset Using Distributed Methods

    Detection of anomalies has been an ergonomic way to attention in many application and research area. This paper includes with the detection of network intrusion, malware detection, biological data, image processing etc. The related researches were based on pair wise distance among all points in dataset. This approach is based...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Locker Security System Using RFID and GSM Technology

    The main goal of this paper is to design a locker security system using RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authenticated person can recover money from locker. The authors can implement a locker security system based on RFID...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Performance Enhancement of OFDM Signals Using Selected Mapping Technique and Overview of Different Papr Reduction Schemes

    Orthogonal frequency division multiplexing has drawn explosive attention as a new type of high data rate transmission scheme for wireless communication system. OFDM allow the transmission of high data rates over broadband channel due to the spectral bandwidth efficiency, robustness to the multipath delay etc. However OFDM signal are very...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Evaluating the Performance of TCP-Reno, TCP-Newreno and TCP-Vegas on an OBS Network

    In TCP over OBS networks, packets from various IP sources assemble into a data burst at the ingress node and are transmitted to egress node cutting through the core network all-optically. The control packet always precedes the data burst by an offset time. This time gap between the control packet...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Computational Puzzles for Repudiation of Misbehaving Users in Anonym Zing Network

    Anonymizing network provides web services to the users and also hide the client's IP address from the server. All data is wrapped with several layer of encryption. The success of this network, hackers can easily deface popular web site. If the users misbehave, blocking particular IP addresses is difficult. Nymble...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    A Review: Mobile Ad-Hoc Network Protocols and Security Issues

    The instant growth of communication takes the attention of researchers in this area. A network has categorized with connecting media. Wireless network is most popular now days due to its infrastructure independence. As the Mobile Ad-hoc network is a classification of wireless network. MANET works with radio waves without need...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Comparison of Different Classification Techniques Using Different Datasets

    Data mining involves the use of various sophisticated data analysis tools for discovering previously unknown, valid patterns and relationships in huge data set. These tools are nothing but the machine learning methods, statistical models and mathematical algorithm. Data mining consists of more than collection and managing the data, it also...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    4-Bit RCA for Low Power Applications

    In this paper, the authors present low power 4-bit Ripple Carry Adder (RCA) using 1-bit full adder. This paper is to provide low power solution for VLSI designers. All pre-layout and post-layout simulations have been performed at 45nm technology on Tanner EDA tool version 12.6. An adder is one of...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2013

    Design of 32-Bit Microcontroller Processor in SoC

    A System-on-Chip (SoC) is an Integrated Circuit (IC) that integrates all components of a computer or other electronic system into a single chip. It may contain digital, analog, mixed-signal, and often radio-frequency functions - all on a single chip substrate. This paper proposes a 32-bit RISC (reduced instruction set computer)...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Analysis of Data Rate Trade Off of UWB Communication Systems

    As UWB system transmit low power stream of short pulses in large spectrum, their energy is spread over a large amount of spectrum .This signal can penetrate in noisy radio environment and provide high quality service for various application. In this paper the probability of symbol error for M-ary PAM...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Cost Analysis of Handover Manager Based Handover Method in Leo Satellite Networks

    LEO satellite has an important role in global communication system. They have advantages like low power requirement and lower end-to-end delay, efficient frequency spectrum utilization between satellites and spot-beams over MEO and GEO satellites. So in future they can be used as a replacement of modern terrestrial wireless networks. There...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    T-Matched Dipole Tag Antenna for Uhf RFID Applications

    RFID (Radio Frequency IDentification) is an extremely important technology of automatic identification. It is being used in a wide range of applications such as Electronic Toll Collect (ETC), vehicle access, Electronic Article Surveillance (EAS), animal tagging, supply chain tracking, warehouse management, and security systems. There are 4 common bands for...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    A Survey on Energy Efficient Routing Protocols for MANET

    With the popularization of Internet and formation of wireless technologies provide significant impact on Internet and communication technologies. These technologies have support of one of famous technique known as ad hoc network. Ad hoc networks are assortment of mobile nodes connected by wireless links and also receiving attention in the...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Review on Various Security Threats & Solutions and Network Coding Based Security Approach for VANET

    Intelligent Transport Systems (ITS) are advanced applications which, without embodying intelligence as such, aim to provide innovative services relating to different modes of transport and traffic management and enable various users to be better informed and make safer, more coordinated, and 'Smarter' use of transport networks. Today ITS (Intelligent Transport...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Electrostatic Field Based Reliable Routing in Wireless Sensor Networks Using Vector Method

    Routing in Wireless Sensor Networks (WSN) is very challenging, due to several characteristics that distinguish them from existing communication and wireless ad-hoc networks. Data forwarding technique in Wireless Sensor Networks (WSN) is analogous with the motion of an electric charge in an electrostatic field. Shortest path routing does not guarantee...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Fuzzy C-Means Clustering Based Prefetching to Reduce Web Traffic

    Web caching is used to reduce the network traffic but in the present scenario of heavy usage of web, caching itself is not enough. Hence, prefetching used with caching to improve the cache performance. Web caching and prefetching are the solution of many network problems like as access latency used...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Minimization of Mobility Management Cost in Leo Satellite Using Translation of Coordinates

    Though Low Earth Orbit (LEO) satellites have some distinct characteristics such as low propagation delay, low power requirements and more efficient spectrum allocation due to frequency reuse between satellite and spot beams but the higher relative speed than terrestrial mobile networks but it decreases the quality of service as a...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    A Modified Ground Plane Dual Band Compact Planar Antenna for Wimax Applications

    This paper presents the design of a small planar antenna with triangular patch for WiMax application. A conventional ground plane has been modified to reduce the size and increasing the bandwidth as well as to cover the WiMax band. The triangular-shaped patch is placed on top of the substrate and...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Circuit Partitioning in VLSI Design: An Ant Colony Optimization Approach

    Circuit Partitioning is an important task in VLSI design and its applications. This paper discusses a new approach for Partitioning in VLSI design which is based on the Swarm Intelligence. Swarm Intelligence is a new technique of Artificial Intelligence which is totally inspired by real world insects. Ant Colony Optimization...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Analysis of MAC to MAC Video Streaming Over Mobile Wimax 802.16e

    In this paper efficient transmission of video streaming across PHY (PHYsical) and MAC (Medium Access Control) layer of Mobile WiMAX (Worldwide Interoperability for Microwave Access) IEEE 802.16e using HARQ (Hybrid Automatic Repeat ReQuest) technique is proposed. HARQ utilizes both FEC (Forward Error Correction) and ARQ (Automatic Repeat ReQuest) technique which...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Query Processing by Using Virtual Query Engine Tool

    Virtual Query Engine (VQE) is a simple tool that can used to browse any database such as Oracle, SQL server, and access etc so user does not have to use different tools for different database. A Virtual Query Engine(VQE) is a UDA middleware format that transparently brings local and or...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2013

    Comparative Study on Data Encryption Standard Using Differential Cryptanalysis and Linear Cryptanalysis

    The process of studying methods of encryption to obtain information from encrypted data without knowing the secret key is called cryptanalysis. It is usually a deep analysis and attacking of an encryption method to find the secret key. In this paper, the authors present an approach for the comparative study...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Dec 2012

    Cloud Based Model for E-Learning in Higher Education

    The nature of the Internet was constantly changing from a place used to read web pages to an environment that allows end-users to run software applications. The need for education is increasing constantly and the development and the improvement of the e-learning solutions is necessary. Also, the e-learning systems need...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    Simulation of Secure AODV in Gray Hole Attack for Mobile Ad-Hoc Network

    A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways and interface with a fixed network. Its nodes are equipped with wireless transmitters/receivers using antennas which may be omni directional (broadcast), highly-directional (point-to-point), or some combination thereof. At a given time,...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    A Maximum Power Point Tracking Method Based on Artificial Neural Network for a PV System

    Solar photovoltaic system characteristics depends on environmental factors, therefore a maximum power point tracking MPPT technique is needed to keep the working point of the system as close as possible to the MPP. In this paper, the authors present a PV generator composed by four PV panel Kaneka GSA211 (60Watt)...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    Cryptography Scheme of an Optical Switching System Using Pico/femto Second Soliton Pulse

    The authors propose a system of Microring ResonatoRs (MRRs) incorporating with an add/drop filter system. Optical soliton can be simulated and used to generate entangled photon, applicable in single and multiple optical switching. Chaotic signals can be generated via the MRRs system. Therefore continuous spatial and temporal signals are generated...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    Improved AODV Based on Link Quality Metrics

    The wireless interfaces in Mobile Ad-hoc NETworks (MANET) have limited transmission range; communication traffic is relayed over several intermediate nodes to ensure a communication link between two nodes. Since the destination is reached using multiple hops from the source, routing plays an important role in Ad hoc network reliability. Since...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    A Modified Swifter Start Algorithm for Evaluating High Bandwidth Delay Product Networks

    It is well known that the TCP congestion control algorithm has been remarkably successful in improving the current TCP/IP function better and efficiently. However, it can perform poorly in networks with high Bandwidth Delay Product (BDP) paths. This paper presents modification to the Swifter Start congestion control algorithm, that may...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    Implementation of Browser Based IDE to Code in the Cloud

    Cloud computing is one of the latest computing paradigms and many companies are turning towards making it an integral component of their computing strategy. Cloud computing provides a way of taking applications online and all these applications and their associated data can be accessed with just an Internet connection and...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    Hamming Distance Based Compression Techniques With Security

    The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Nov 2012

    Statistical Techniques in Anomaly Intrusion Detection System

    In this paper, the authors analyze an anomaly based Intrusion Detection System (IDS) for outlier detection in hardware profile using statistical techniques: Chi-square distribution, Gaussian mixture distribution and Principal component analysis. Anomaly detection based methods can detect new intrusions but they suffer from false alarms. Host based Intrusion Detection Systems...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Optimization of Resonance Frequency of Circular Patch Antenna at 5 Ghz Using Particle Swarm Optimization

    The microstrip antenna is small in size, simpler and less expensive to manufacture. They are more compatible than reflector antennas with printed-circuit technology. The microstrip patch antenna is a type of antenna that is thin, and has easy manufacturability, which provides a great advantage over traditional antennas. The Particle Swarm...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Design of Energy Aware Air Pollution Monitoring System Using WSN

    Wireless Sensor Network is a fast evolving technology having a number of potential applications in various domains of daily-life, such as structural and environmental monitoring, medicine, military surveillance, condition based maintenance etc. A WSN is composed of a large number of sensor nodes that are usually deployed either inside a...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Web Information Recuperation From Strewn Text Resource Systems

    The Internet has become a vast information source in recent years and can be considered as the world's largest digital library. To help ordinary users find desired data in this library, many search engines have been created. Each search engine has a corresponding database that defines the set of documents...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Design and Simulation of a Dual Band Gap Coupled Annular Ring Microstrip Antenna

    The bandwidth enhancement technique using coplanar parasitic element is presented in this paper. This paper presents the analysis of gap coupled annular ring microstrip antenna. The proposed antenna is designed to operate at 6.2 GHz. Details of the proposed antenna and measured results are presented and discussed. The various parameters...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Strategies & Methodologies for Low Power VLSI Designs: A Review

    Low power has emerged as a principal theme in today's world of electronics industries. Power dissipation has become an important consideration as performance and area for VLSI Chip design. With shrinking technology reducing power consumption and over all power management on chip are the key challenges below 100nm due to...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    A Review on Placement of Wavelength Converters in WDM P-Cycle Network

    The p-cycles can be described as preconfigured closed protection paths in a mesh network. Like rings, the protection path is preconnected in advance of any failure and protection capacity is very fast and simple. And like mesh p-cycle offers the high capacity efficiency. The use of wavelength converter in p-cycle...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Comparative Analysis and Study of Different QoS Parameters of Wireless Ad-Hoc Network

    A wireless ad-hoc network is a collection of two or more wireless nodes equipped with wireless communications and networking capability. They communicate with each other without the need of centralized administration, in which all nodes potentially contribute to routing process. In Ad-hoc scenario, any node can move anytime so these...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Design of Wireless Sensor Node and Time Contoured Control Scheme for a Composting Process

    This paper presents the design of wireless sensor node and a time contoured control scheme for a composting process. The electronic system is designed using Texas Instruments ultra low powered MSP430 micro-controller chip and Cypress semiconductors CYWM6935, 2.4 GHz wireless module. The software makes appropriate use of low power modes...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2011

    Embedded Intelligent Sensor for Conveyer Belt-Fuzzy System Application

    A conveyor belt includes at least one rip detection sensor, one position detection sensor and a speed measurement sensor. In this paper, a complete sensor solution for the industrial conveyer belt is given. in this the intelligent sensors are used having one master intelligent sensor and number of slave sensors...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Coverage Based Test Suite Augmentation Techniques-A Survey

    Regression testing is the activity of retesting a program so as to ensure that no new errors have been introduced into the previously tested code. However, this activity does not involve rerunning the entire test suite but selecting only a few test cases that exercise the changes. Suppose there is...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2011

    Energy Management for Wireless Sensor Network Nodes

    Wireless sensor networks consist of small, autonomous devices with wireless networking capabilities. In order to further increase the applicability in real world applications, minimizing energy consumption is one of the most critical issues. Therefore, accurate energy model is required for the evaluation of wireless sensor networks. In this paper, the...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2011

    Location Based Services Using Android Mobile Operating System

    The motivation for every location based information system is: "To assist with the exact information, at right place in real time with personalized setup and location sensitiveness". In this paper, the authors are dealing with palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes....

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2011

    Design and Analysis of a Fault Tolerant Microprocessor Based on Triple Modular Redundancy Using VHDL

    There are numerous real time & operation critical systems in which the failure of the system is unacceptable at any stage of processing. The examples of such systems are like ATM machines, satellites, spacecraft etc. In this paper a fault tolerant microprocessor is developed by using checker units with a...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Mar 2011

    Performance Improvement of DS-CDMA Wireless Communication Network With Convolutionally Encoded OQPSK Modulation Scheme

    This paper considers the bit error probability analysis of Direct-Sequence Code-Division Multiple Access (DS-CDMA) system. A statistical characterization of the decision variable at transmitter and receiver is obtained. System is simulated with OQPSK modulation scheme which when compared with conventional Binary Phase Shift Keying (BPSK) gives improved performance in terms...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2011

    Iris Recognition System Using a Canny Edge Detection and a Circular Hough Transform

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. In this paper, the authors describe the novel techniques they developed to create an Iris Recognition...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Analog Integrated Circuit Design and Testing Using the Field Programmable Analog Array Technology

    Due to their reliability, performance and rapid prototyping, programmable logic devices overcome the use of ASICs in the digital system design. However, the similar solution for analog signals was not so easy to find. But the evolutionary trend in Very Large Scale Integrated (VLSI) circuits technologies fuelled by fierce industrial...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Machine Learning Approach for Anomaly Detection in Wireless Sensor Data

    Wireless sensor nodes can experience faults during deployment either due to its hardware malfunctioning or software failure or even harsh environmental factors and battery failure. This results into presence of anomalies in their time-series collected data. So, these anomalies demand for reliable detection strategies to support in long term and/or...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Feed Forward Back Propagation Neural Network Method for Arabic Vowel Recognition Based on Wavelet Linear Prediction Coding

    A novel vowel feature extraction method via hybrid wavelet and Linear Prediction Coding (LPC) is presented here. The proposed Arabic vowels recognition system is composed of very promising techniques; Wavelet Transform (WT) with Linear Prediction Coding (LPC) for feature extraction and Feed Forward BackPropagation Neural Network (FFBPNN) for classification. Trying...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Simulation and Analysis Studies for a Modified Algorithm to Improve TCP in Long Delay Bandwidth Product Networks

    It is well known that TCP has formed the backbone of the Internet stability and has been well tuned over years. Today, the situation has changed, that is because the inter-networking environment become more complex than ever, resulting in changes in TCP congestion control are produced and still in progress....

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Multi-Protocol Gateway for Embedded Systems

    The embedded systems are highly optimized to perform limited duties of particular needs. They can be control, Process, medical, signal, and image processing applications. The challenges faced by embedded systems are security, real-time, scalability, high availability and also performance based interoperability as more and more different devices are added to...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Efficient Implementations of Discrete Wavelet Transforms Using FPGAs

    Recently, the Wavelet Transform has gained a lot of popularity in the field of signal and image processing. This is due to its capability of providing both time and frequency information simultaneously, hence giving a time-frequency representation of the signal. The traditional Fourier Transform can only provide spectral information about...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Implementation of Pattern Recognition Techniques and Overview of Its Applications in Various Areas of Artificial Intelligence

    A pattern is an entity, vaguely defined, that could be given a name, e.g., fingerprint image, handwritten word, human face, speech signal, DNA sequence. Pattern recognition is the study of how machines can observe the environment, learn to distinguish patterns of interest from their background, and make sound and reasonable...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Compact Omni-Directional Patch Antenna for S-Band Frequency Spectra

    This paper presents a novel design of a microstrip patch antenna with compact nature and the study of various antenna parameters to suit the applications such as WiMax operating in the frequency range of 3.3 - 3.5 GHz and in other applications like fixed satellite services, maritime mobile services etc....

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Reducing to Fault Errors in Communication Channels Systems

    In this paper, the authors introduce error-control techniques for improving the error-rate performance that is delivered to an application in situations where the inherent error rate of a digital transmission system is unacceptable. The acceptability of a given level of bit error rate depends on the particular application. For examples,...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Software Agent's Decision Making Approach Based on Game Theory

    This paper highlights the use of software agent which is capable of perceiving its environment and performs its own operations without any other explicit instruction. The main objective of this paper is to investigate the possibility how to make the decision making capability of an Expert system more accurate and...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    A Software Reverse Engineering Methodology for Legacy Modernization

    This paper identified that Legacy Systems have embedded within them, a large investment which ranges from low level code items or objects through to higher level business objects; made by the systems developers and/or owners. Most organizations would at one time or the other be confronted with the problem of...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Performance Comparison of Two On-Demands Routing Protocols for Mobile Ad-Hoc Networks

    Mobile Ad-hoc networks are the collection of mobile nodes connected by a wireless link, where each node acts as a router. Ad-hoc networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology: thus, the need for a robust dynamic routing protocol that can...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Cross-Layer Based Qos Routing Protocol Analysis Based on Nodes for 802.16 Wimax Networks

    A cross-layer framework to favor the video-on-demand service in multi-hop WiMax mesh networks. This will guarantee that the required data rate is achieved for video streams, which is crucial for multimedia streaming applications. An efficient and light-weight multicast routing technique is also proposed to minimize the bandwidth cost of joining...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    Hybrid Transaction Management in Distributed Real-Time Database System

    Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs across some different sites, it may commit at some sites and may failure at another site, leading to an inconsistent transaction. The complexity...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Sep 2011

    A Fast Partial Image Encryption Scheme With Wavelet Transform and RC4

    Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper, a fast partial image encryption scheme using Discrete Wavelet Transform with RC4 Stream Cipher is...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Disaster Information in Optimal Route Selection

    Cognitive wireless network consisted of multiple different types of wireless interface is one of efficient wireless transmission methods for Disaster Information network, because it solves single wireless network problems like characteristics of wireless frequency or congestion form the use of same radio frequency. However, even if disaster information network consisted...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Hidden Semi-Markov Model for Detecting Application Layer DDoS Attacks

    Distributed Denials of Service attacks (DDoS) have become one of the major threats on the internet. Most defence methods are focused on detecting DDoS attack on IP & TCP layer instead of application layer. With profiling of web browsing behaviour, the sequence order of web page request can be used...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    FPGA Implementations of Advanced Encryption Standard: A Survey

    Advanced Encryption Standard (AES) is the most secure symmetric encryption technique that has gained worldwide acceptance. The AES based on the Rijndael Algorithm is an efficient cryptographic technique that includes generation of ciphers for encryption and inverse ciphers for decryption. Higher security and speed of encryption/decryption is ensured by operations...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Fault Tolerance in FPGA Through King Shifting

    A wide range of fault tolerance methods for FPGAs have been proposed. Approaches range from simple architectural redundancy to fully on-line adaptive implementations. The homogeneous structure of Field Programmable Gate Arrays (FPGAs) suggests that the defect tolerance can be achieved by shifting the configuration data inside the FPGA. All methods...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // Apr 2012

    Performance Analysis of Round Robin Scheduling Using Adaptive Approach Based on Smart Time Slice and Comparison With SRR

    The Time Sharing System is more multifaceted about the performance and calculating the average waiting time, turnaround time, response time, and context switches from the number of processes mainly depends on the CPU scheduling algorithm where the CPU is one of the most important computer resource and as round robin...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Optimized Implementation of FFT Processor for OFDM Systems

    Due to the advanced VLSI technology, Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT) have been applied to wide field of Digital Signal Processing (DSP) applications. For modern communication systems, the FFT/IFFT is very important in the OFDM. Because of FFT/IFFT is the key computational block to execute...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Energy Efficient Target Tracking in Wireless Sensor Network

    Energy Efficiency has been a main challenge in Wireless Sensor Networks (WSNs) and their applications such as battlefield surveillance, target monitoring etc. Target tracking is one of the most important of these applications. The authors understand the problem of conserving energy of sensor node in WSNs. In this paper, target...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    A Simple Tool for Self Compacting Concrete Mix Design

    SCC can be made from any of the constituents that are generally used for structural concrete. In the mix design of SCC, the relative proportions of key components are generally considered by volume rather than by mass. On the basis of these proportions, a simple tool has been designed for...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Study of Cycle Slips and Signal to Noise Ratio in Dual Frequency GPS Receiver

    The applications of Global Positioning System (GPS) are increasing rapidly in every area and the requirement for precise navigation is becoming more important. The positional accuracy of GPS is affected by many factors including clock biases and atmospheric delays; of these the ionospheric delay is significant. Inversely, GPS has also...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)

  • White Papers // May 2012

    Load Compensation of a Diesel Generator Set for an Obscure System Using DSTATCOM

    This paper deals harmonics, reactive power and unbalanced load current compensation of a Diesel Generator set for an isolated system using the control of Distribution STATic Synchronous COMpensator (DSTATCOM). Least Mean Square Based ADAptive LINear Element (ADALINE) method is used for the control of DSTATCOM. In order to extract balanced...

    Provided By International Journal of Advances in Engineering & Technology (IJAET)