International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Displaying 1-40 of 408 results

  • White Papers // May 2015

    A Novel Effiecient Technique for Data Security Using Vedic Mathematics

    The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA algorithm is an old and simple...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // May 2015

    Cloud based Hybrid Model for Authorized De-duplication

    Cloud computing provides a more cost effective environment to outsource storage computation. Many enterprises need to store and operate huge amount of data. Cloud provides many features such as application server, web application but the authors' focus is only on the data storage. How to manage such a huge data...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // May 2015

    To Design Energy Efficient Protocol by Finding Best Neighbour for ZigBee Protocol

    ZigBee is a worldwide standard of wireless personal area network targeted to low-power, cost-effective, reliable and scalable products and applications. Different from the other personal area network standards such as Bluetooth, UWB, and wireless USB, ZigBee provides the low power wireless mesh networking and supports up to thousands of devices...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2015

    Data Logger Module for Data Acquistion System

    A data logger or data recorder is an electronic device that records data either with an inherent instruments or sensors or through external instruments and sensors. One of the essential advantages of utilizing data loggers is the ability to automatically gather data on 24-hour basis permits and to capture a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2015

    Improved Minimum Migration Time VM Selection Policy for Cloud Data Center

    Cloud computing is an elevated acceleration and impressive technology in contemporary sketch. In this paper, the authors' algorithm works on modification minimum migration time Virtual Machine (VM) selection policy to help minimize overall execution time for every host machine. Entire result shows less execution time mean. These phenomena help to...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2015

    VLSI Designing of High Speed Parallel Multiplier -Accumulator Based on Radix4 Booths Multiplier

    In this paper, the authors propose a new architecture of Multiplier-and-ACcumulator (MAC) for high speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Ripple Carry Adder (RCA), the performance was improved. Since, the accumulator that has the largest delay in MAC was merged into RCA, the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2015

    Distribution Transformer Overload Protection Tripping Circuit

    Distribution transformer is an essential link in the distribution system. Failure of distribution transformers causes capital loss and loss of revenue to the nation. With the increasing loads, voltages and short circuit duty of the distribution substation feeders, distribution over current protection has become more important today than it was...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2015

    Effective Risk Detection and Summary Risk Communication for Android Apps

    The popularity and advanced functionality of mobile devices has made them attractive targets for malicious and intrusive applications (apps). Although strong security measures are in place for most mobile systems, the area where these systems often fail is the reliance on the user to make decisions that impact the security...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Dynamically Generated CAPTCHA: Selection of Random Number Generated CAPTCHA for Enhancing Security

    In current scenario, most of the people having their login account on the internet sites and these sites are easily registered or accessed by human users. Sometimes, few unauthenticated software programs try to enter these sites and makes access on these sites and also keep on trying to hack the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A Proposed Scheme for Software Project Scheduling and Allocation with Event Based Scheduler Using Ant Colony Optimization

    In software engineering field, developing software tools is challenging and important. In software project humans are important. Human resources are mainly needed. In software project, planning is important. Since software project is much related to human resource, the human resource allocation is the important problem. A software project planning tool...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Survey on Mobile Automation Testing Tools

    Mobiles are now using for computing rather than for just calling, Automation has become the integral part of software development speedy life cycle. Manual testing is time consuming and tricky for complex application. This paper enlighten on some mobile automation testing tools and current trends in mobile automation on different...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A Survey Of Task Scheduling Algorithm In Cloud Computing

    Cloud computing is an emerging area in IT industry. Cloud computing is dynamic on demand network access to shared pool of configurable resources like networks, servers, storage, applications and services. Cloud users use this service and develop application. Now-a-days, number of users' increases to the usage of cloud. At a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    NON GPS Navigation Using Simultaneous Localization and Mapping in UAV

    In this paper, the authors given the solution for the task of autonomous navigation of a UAV through a completely unknown environment by using solely a single camera and inertial sensors onboard. Many existing solutions suffer from the problem of drift from the dependency on a clean GPS signal. The...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    RACI Scrum Model for Controlling of Change User Requirement in Software Projects

    Requirement's evolution is mandatory for any software project. Users can propose requirements changes at any stage of SDLC. Although changes in requirements may affect on cost, schedule and quality of a software project; but change should be allowed when it is inevitable to meet the customer expectations. Traditional software development...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A Study on Smart Video Security for Banks Using Mobile Remote Control

    Real-time moving object detection is critical for a number of embedded applications because threats such as security surveillance and visual tracking are involved in the detection. Moving object detection is the fundamental step in automated video analysis. It often acts as an initial step for further processing such as classification...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Multi-Annotating Approach for Searching Web Databases

    An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. Basically every search engines shows the web content and web links related to the authors' input query...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    System Stability of Synchronous Machine with Small Signal Representation including Rotor Circuit Dynamics

    In an interconnected power system, continuously growing in size and extending over vast geographical regions it becomes very difficult to maintain synchronism between various parts of power system. In this paper, the focus is made on small signal performance of a synchronous machine connected to a large system through transmission...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Review of Technology Acceptance Model Usage in Predicting E-Commerce Adoption

    Technology Acceptance Model (TAM) has been used widely in e-commerce adoption studies. A review of TAM can assist scholars to identify common themes, strengths and weaknesses, leading to redesigning and enhancing the model for more effectiveness. TAM has been used widely in most e-commerce adoption studies owing to its ease...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A DFT Technique for MCM (Multi Chip Module) Testing

    Aggressive technology scaling has been the mainstay of integrated circuit design for the past 30 years. This is posing serious challenges to integrated circuit testing and its long term reliability. A major source of failures and test escapes in the integrated circuits can be attributed to timing only parametric failures....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Is Brand Everything? Issues and Challenges of Branding in Global Market

    Today is an era of globalization. The globalized markets for homogeneous products and services have emerged. Marketers now realize that there is a global need to standardize the products, packaging and communication to attain a least-common denominator positioning that would be successful across nations. However, the problem faced by the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Examination Constituent Structural Design - Construction Systems Using a Service Oriented for Extreme Programming

    Service-oriented architecture for enterprise computing in typical definitions service-oriented architecture appears as a single message and a consistent roadmap for building flexible software system. The natural language metaphors are relatively useless for either fostering communication among technical and non-technical project members or in developing architecture. Service-Oriented Architecture concepts to address...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Comparative Performance Analysis of Mobile Ad Hoc Networking Protocols for Different Mobility Models

    Mobile Ad-hoc NETwork (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Prevention Against DDOS in MANET Using IDS

    A MANET is a type of ad hoc network that can change locations and configure itself on the fly. Since, the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Software Effort Estimation: A Comparison Based Perspective

    For any industry to stay competitive, managing balance between quality and cost of software is important. Estimating software development effort remains a complex problem and one which continues to attract considerable research attention. Number of researchers had made their efforts to produce different modeling techniques in last few decades. This...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Novel Approach for Cooperative Caching in Distributed Environment

    In the present systems that implement cooperative caching the web based associations and their processes are typical. With the usual download model, a user downloads contents directly from a Content Providers (CP) server over a Communication Service Providers (CSP) network. Downloading content through Content Service Providers (CSP) network involves a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    A Review on the Role of Encryption in Mobile Database Security

    Data-driven applications are realized due to the powerful lightweight computing devices such as Smart phones, Laptops, Tablets and low cost mobile connectivity. Today more and more businesses move toward employees' mobility. While the employee moves, along with them the mobile device as well as the database stored in the mobile...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Robust Biometrics Based on Palmprint

    In this paper, the authors present an overview of the fundamentals of personal authentication based on hand geometry measurements and palm print features. Researchers have used some complex methods or algorithms like Quadratic Spline function of Wavelet transform (QSW),Voronoi diagram, Gaussian Mixture Model (GMM), Radial Basis Function neural networks (RBF),...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Verify & Decrypt Multi-Keyword Ranked Search Over Encrypted Data on Cloud Server

    Cloud computing is defined as a computing machine or group of machine which as a servers, holds all the applications and document necessary all at one place so that any user can access it from anywhere whoever has a access to that server without actually using the users physical machine....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Effective Execution of Enterprise Resource Planning (ERP)

    Enterprise Resource Planning (ERP) scheme is made up of a number of programs employed in unifying the various business activities in an organization or firm. Since these programs deliver the answers to the demands of a firm, they may be may be considered as necessities. Effective execution of these schemes...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Distribution Load Flow Using Artificial Neural Networks

    Many methods have been developed for transmission and distribution load flows. Most of these methods are useful for off line applications. Much preference was given to transmission system load flows than distribution systems. But, with the changes in the operating structures of distribution systems and penetration of distributed generations in...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Glossing the Information From Distributed Databases

    Internet provides huge amount of useful information which is align into a format for users. Here the authors observe the difficulty for extraction of relevant data from different sources. Relevant data transform into structured format. Structured format contains only necessary information. The motivation behind in the system provides the compressed...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Dynamic Generation for System Over Database

    Relation knowledge-base systems are becoming increasingly pleasing to all in the scientific community to support the effecting on one another discovery of greatly sized volumes of facts. In this scenario, users use a question connection (representatively, a web-based client) to question under discussion a number, order, group, line of SQL...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Lucid Gumption Maturation with Query Constellation and Data Retrieval

    In this paper, the authors proposed a study of information retrieval performance refinement in deep web mining. The information explosion on the Internet has placed high demands on search engines. Yet people are far from being satisfied with the performance of the existing search engines, which often return thousands of...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    An Artificial Intelligence Based Multi-Leader Election Scheme for Eliminating Intrusion and Routing Attack in MANET

    A Mobile Ad-hoc NETwork (MANET) is an independent system of mobile stations connected by wireless connection of network. Mobile host does not guarantee any fixed infrastructure and with the advance in technology for network crime is new threat to the centralized network management. Thus leader among the network node is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    Improved Protection in Image Steganography using Neural Network and Discrete Cosine Transform

    The important concern of modern communication is to establish secret communication and is achieved by steganography. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the all time goal is to conceal the very existence of the embedded data. Many techniques...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    On Coverage Determination and Exploiting Node Redundancy in Wireless Sensor Networks

    As selecting an appropriate number of nodes before wireless sensor network deployment is important and it is difficult and inefficient to be done by simulation, a method for achieving that is requisite. This paper proposes simple mathematical equations to determine a suitable number of nodes for wireless sensor network monitoring...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    An Approach for Geographical Routing in MANET

    Geographic routing is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. In geographic routing, nodes need to maintain...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Heuristic to Achive Maximum Lifetime and Target Coverage in Wireless Sensor Network

    Network lifetime plays an integral role in setting up an efficient wireless sensor network. This proposed method was able to achieve the theoretical upper bound. The objective of proposed system is contained as twofold. The first one is to deploy sensor nodes at optimal locations such that to achieve the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Study of Projection based Multiplicative Data Perturbation for Privacy Preserving Data Mining

    Random projections are a powerful method of dimensionality reduction that are noted for their simplicity and strong error guarantees. In this research paper, the authors study a randomized multiplicative data perturbation technique for privacy preserving data mining. It is motivated by the work presented earlier that point out some security...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Study on Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage

    Data is the heart of any organization; hence it is necessary to protect it. For doing so, it is the needed to implement a good backup and recovery plan. But the redundant nature of the backup data makes the storage a concern; hence it is necessary to avoid the redundant...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2014

    Google Glass: Project Glass

    Google glass is the futuristic gadgets which lead users to interaction with world through android operating system. Wearable computer in the Optical Head Mounted Display (OHMD) has been developing by Google. It can have both the two features virtual reality and augmented reality. It is useful technology for hand free...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2015

    Data Logger Module for Data Acquistion System

    A data logger or data recorder is an electronic device that records data either with an inherent instruments or sensors or through external instruments and sensors. One of the essential advantages of utilizing data loggers is the ability to automatically gather data on 24-hour basis permits and to capture a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2015

    Improved Minimum Migration Time VM Selection Policy for Cloud Data Center

    Cloud computing is an elevated acceleration and impressive technology in contemporary sketch. In this paper, the authors' algorithm works on modification minimum migration time Virtual Machine (VM) selection policy to help minimize overall execution time for every host machine. Entire result shows less execution time mean. These phenomena help to...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // May 2015

    A Novel Effiecient Technique for Data Security Using Vedic Mathematics

    The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA algorithm is an old and simple...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // May 2015

    Cloud based Hybrid Model for Authorized De-duplication

    Cloud computing provides a more cost effective environment to outsource storage computation. Many enterprises need to store and operate huge amount of data. Cloud provides many features such as application server, web application but the authors' focus is only on the data storage. How to manage such a huge data...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // May 2015

    To Design Energy Efficient Protocol by Finding Best Neighbour for ZigBee Protocol

    ZigBee is a worldwide standard of wireless personal area network targeted to low-power, cost-effective, reliable and scalable products and applications. Different from the other personal area network standards such as Bluetooth, UWB, and wireless USB, ZigBee provides the low power wireless mesh networking and supports up to thousands of devices...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Performance Analysis of MIMO Network Coding With SISO Physical-Layer Network Coding

    In this paper, a two-step communication protocol combined with MIMO (Multiple Input Multiple Output) and network coding is proposed. A three nodes network with two transceiver antennas on relay node is taken. In transmitting phase ZF (Zero-Forcing) and MMSE (Minimum Mean SquarE) detecting techniques are used. In relay node forwarding...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Sep 2012

    A Framework for Video Application in the Embedded System Through Rearrangement of Cache Memory Hierarchy

    Now-a-days embedded systems is extremely used for running period of time video applications and it's additionally growing quite ever before. So the challenge for to run transmission applications on the embedded design increased; as a result of the embedded system has terribly restricted resources. The Cache memory is getting used...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2013

    Encryption and Decryption of Locations Using Linear Algebra and ASCII Values

    In cryptography, encryption is the process of encoding some information in a manner that hackers or eavesdroppers cannot read it. It is becomes readable only with a decryption code. The use of encryption/decryption is as old as the art of communication. Various secret or important messages have to be sent...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Detecting Sinkhole Attack in Wireless Sensor Network

    Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Key Management in Wireless Sensor Network a Survey

    Key management has become a challenging issue in the design and deployment of secure wireless sensor networks. Key management is a fundamental cryptographic primitive upon which other security primitives are built. Basically, key management includes two aspects: key distribution and key revocation. Key distribution refers to the task of distributing...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Real Time Temperature Control System Using PID Controller and Supervisory Control and Data Acquisition System (SCADA)

    Well designed conventional PID controllers using Ziegler-Nichols method are having large overshoot and settling time. Significant research work has been carried out to improve the performance of closed loop response with PID controller so that it can be used for real time temperature control system using SCADA (HC- 900 Honeywell...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    A Review of Data Mining Based Intrusion Detection Techniques

    Traditional Data Mining techniques operate on structured data such as corporate databases; this has been an active area of research for many years. Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. Intrusion detection is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    A Systematic Way of Soft-Computing Implementation for Wireless Sensor Network Optimization Using Bacteria Foraging Optimization Algorithm: A Review

    The popularity of Wireless Sensor Networks (WSN) has increased tremendously in recent time due to growth in Micro-Electro-Mechanical Systems (MEMS) technology. WSN has the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    A Review on Routing Protocols in Wireless Mesh Networks

    Wireless mesh networks have the potential to deliver Internet broadband access, wireless local area network coverage and network connectivity for stationary or mobile hosts at low costs both for network operators and customers. Routing is fundamental characteristics of wireless mesh network. The strengths and weakness of routing protocol are reflected...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    A Fuzzy Mixture Two Warehouse Inventory Model With Linear Demand

    This paper deals with fuzzy based two warehouse inventory model with linear demand. Deterioration rates in both warehouses are considered to be different due to change in environment. Shortages are not allowed. In the real life and global market situations some parameters like ordering cost, holding costs and deteriorating cost...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Cross Bread Role Based Access Control for Extended Security at Azure in Cloud Computing

    Cloud computing provides a computer user access to Information Technology (IT) services i.e. applications, servers, data storage without requiring an understanding of the technology or even ownership of the infrastructure. Privacy and Security are big issues in Cloud Computing. The cloud environment is a large open distributed system. It is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Simulative Investigations of AODV Routing Protocol With Different Propagation Models With CBR Traffic

    Mobile ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In the authors' study, they examine and...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Metamorphosis in VOIP Cloud Computing Services Used in VOIP

    Computing is undergoing a seismic shift from client/server to the cloud, a shift similar in importance and impact to the transition from mainframe to client/server. The emergence of cloud computing as one of the dominant technology trends in coming decades, is virtualization platform that provides a services to different technology...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    Digital Watermarking and Fingerprinting: A Good Idea for Security

    In recent years, the distribution of works of art, including pictures, music, video and textual documents, has become easier. With the widespread and increasing use of the Internet, digital forms of these media are easily accessible. Digital documents are easy to copy and distribute. There are a number of methods...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2013

    An Invention of Quantum Cryptography Over the Classical Cryptography for Enhancing Security

    Quantum cryptography is based on the use of subatomic particles (photons) and their intrinsic quantum properties (photon polarization) to develop an unbreakable system. It is not possible to measure the quantum state of any system without affecting the system. This property provides secure transmission of key between sender and receiver....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Sep 2012

    Improvement in the Arrangement of Overlay Multicast Networks in Terms of Financially

    Multicast means that distributing info to many hosts & it's an economical method for transmittal info and prepares relationship in pc networks. This paper is AN overlay multicast protocol that is predicated on economy science and utilizes potential skills of users for rising multicasting performance. The protocol incorporates a data...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Sep 2012

    An Integrated Secure System for Mobile Ad-Hoc Networks

    Ad hoc networks area unit a replacement wireless networking paradigm for mobile hosts. In contrast to ancient mobile wireless networks, unintentional networks don't suppose any fastened infrastructure. Instead, hosts suppose every other to stay the network connected. The military science and alternative security-sensitive operations area unit still the most applications...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Sep 2012

    A Method for Preserving Secret Information in the Data Mining Through Cryptography

    Data mining will extract vital information from massive knowledge collections - however generally these collections square measure split among numerous parties. Real knowledge is just too valuable and therefore troublesome to get. Thus the authors have a tendency to should offer Privacy for that knowledge. Privacy considerations could stop the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    A Protocol for Mobile Ad Hoc Network

    Location-based routing for scalability. Many existing routing protocols proposed within the MANET working group of IETF, are designed to scale in networks of a few hundred nodes. They rely on state concerning all links in the network or links on a route between a source and a destination. This may...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Application of Graph Theory in Communication Networks

    The use of mathematics is quite visible in every area of computer science i.e. in artificial intelligence, software development environments and tools, software architecture and design, multiprocessing, automatic control, distributed and concurrent algorithms etc. Mathematics helps in the design, implementation and analysis of algorithms for scientific and engineering applications. It...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    A Survey on QOS and Energy Efficient Routing Protocols in WSN

    Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. This paper surveys...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    A Method of the Parameter Estimation for the Oceanic Internal Wave Based on the Developed Intelligent Software

    There was geometric distortion in MODIS remote sensing images. For the problem the geometric correction method was used based on ENVI that the each pixel in the remote sensing image of MODIS was loaded the information of latitude and longitude. The developed intelligent software by Multimedia Tool Book was for...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    A New Approach for Congestion Control in Wireless Network and Analize It for TCP

    This paper proposes a congestion control mechanism of various versions of TCP in Wireless Network and techniques for provides performance improvement in terms of throughput and window size variations. When multiple synchronized servers send data to a same receiver in parallel, for many important Data center applications and Research. So...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Design of the Circuit in a Portable Tracing Instrument Based on GPS Technology

    For the problem that the blind, the old man and the children are often lost, a portable positioning instrument had been designed. The instrument is based on the technology of the GPS and GSM/GPRS, circuit design. The instrument is for tracing and tracking of the blind, the old man and...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Designing of a Symmetric Key Algorithm

    As increment of the use of information and network, the intruders (outsiders) who are not authenticated, they also trying to access the data and if they got success in that situation they can do anything with the information. This information can be very important for the organization to which it...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Cloud Computing Security Issues

    Cloud Computing is the latest paradigm that involves delivering hosted services over the Internet, based on pay-as-you-go approach. Cloud computing provides number of benefits out of which economic benefit is main benefit. With the lots of benefits some challenges are there to be solved and out of which security is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Comparative Analysis of Issues Related to Centralized and Distributed Warehouse Architectures

    Data mining normally collects the data from large databases at central warehouse and applies mining techniques on collected data and discovers patterns and generates useful information which is used for further decision making process. Data mining has a lot of importance because of its vast applicability. It is being used...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Simulation of Genetic Algorithm Processor

    Genetic Algorithms (GA) is an optimization technique for searching very large spaces that models the role of the genetic material in living organisms. A small population of individual exemplars can effectively search a large space because they contain schemata, useful substructures that can be potentially combined to make fitter individuals....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Oct 2012

    Power Aware Energy Efficient Routing Protocol

    Ad hoc network are defined as the category of wireless networks that utilize multi hop radio relaying and are capable of operating without the support of any fixed infrastructure. In ad hoc network each node is characterized by a well defined quantity of energy. The source of this energy is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2012

    A-Slotted Rectengular Microstrip Patch Antenna

    Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. In this paper, bandwidth of microstrip antenna is increased by introducing a slot of a shape and using stacked configuration. The antenna is fed by...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2012

    Securing Cloud Servers Against Flooding Based DDoS Attacks

    Cloud computing is still a juvenile and most dynamic field characterized by a buzzing IT industry. Virtually every industry and even some parts of the public sector are taking on cloud computing today, either as a provider or as a consumer. Despite being young it has not been kept untouched...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2012

    Design of an Optimized Virtual Server for Efficient Management of Cloud Load in Multiple Cloud Environments

    Today cloud computing has become an emerging and dynamic style of computing over internet. It has many advantages and has so far held its promise to eradicate the need of setting up of costly IT-based computing infrastructures. However it also has some crucial issues such as load management, security and...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2012

    An Energy-Aware Technique to Improve the Lifetime of Cell Phone Based WSNs Using ISA100.11a

    Ubiquitous nature of Cell phone and the recent advances in wireless communication technologies have made the concept of Cell Phone based wireless sensor networks. This cell phone based wireless sensor networks supervise some of the surroundings distinctiveness, such as noise, trembling, temperature, and strain. Sensor nodes can be deployed over...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2012

    A Proposed Framework for Visualized Security Threats in WSNs

    A Wireless Sensor Networks (WSNs) is an infrastructure less network where each mobile node is connected by a dynamic link. In this network each node or sensor follows the "Save and forward" strategy for moving the information because each node asks for the further connection to its neighboring nodes. So,...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)