International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Displaying 1-40 of 403 results

  • White Papers // Mar 2015

    VLSI Designing of High Speed Parallel Multiplier -Accumulator Based on Radix4 Booths Multiplier

    In this paper, the authors propose a new architecture of Multiplier-and-ACcumulator (MAC) for high speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Ripple Carry Adder (RCA), the performance was improved. Since, the accumulator that has the largest delay in MAC was merged into RCA, the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2015

    Distribution Transformer Overload Protection Tripping Circuit

    Distribution transformer is an essential link in the distribution system. Failure of distribution transformers causes capital loss and loss of revenue to the nation. With the increasing loads, voltages and short circuit duty of the distribution substation feeders, distribution over current protection has become more important today than it was...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Feb 2015

    Effective Risk Detection and Summary Risk Communication for Android Apps

    The popularity and advanced functionality of mobile devices has made them attractive targets for malicious and intrusive applications (apps). Although strong security measures are in place for most mobile systems, the area where these systems often fail is the reliance on the user to make decisions that impact the security...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Dynamically Generated CAPTCHA: Selection of Random Number Generated CAPTCHA for Enhancing Security

    In current scenario, most of the people having their login account on the internet sites and these sites are easily registered or accessed by human users. Sometimes, few unauthenticated software programs try to enter these sites and makes access on these sites and also keep on trying to hack the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A Proposed Scheme for Software Project Scheduling and Allocation with Event Based Scheduler Using Ant Colony Optimization

    In software engineering field, developing software tools is challenging and important. In software project humans are important. Human resources are mainly needed. In software project, planning is important. Since software project is much related to human resource, the human resource allocation is the important problem. A software project planning tool...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Survey on Mobile Automation Testing Tools

    Mobiles are now using for computing rather than for just calling, Automation has become the integral part of software development speedy life cycle. Manual testing is time consuming and tricky for complex application. This paper enlighten on some mobile automation testing tools and current trends in mobile automation on different...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A Survey Of Task Scheduling Algorithm In Cloud Computing

    Cloud computing is an emerging area in IT industry. Cloud computing is dynamic on demand network access to shared pool of configurable resources like networks, servers, storage, applications and services. Cloud users use this service and develop application. Now-a-days, number of users' increases to the usage of cloud. At a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    NON GPS Navigation Using Simultaneous Localization and Mapping in UAV

    In this paper, the authors given the solution for the task of autonomous navigation of a UAV through a completely unknown environment by using solely a single camera and inertial sensors onboard. Many existing solutions suffer from the problem of drift from the dependency on a clean GPS signal. The...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    RACI Scrum Model for Controlling of Change User Requirement in Software Projects

    Requirement's evolution is mandatory for any software project. Users can propose requirements changes at any stage of SDLC. Although changes in requirements may affect on cost, schedule and quality of a software project; but change should be allowed when it is inevitable to meet the customer expectations. Traditional software development...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A Study on Smart Video Security for Banks Using Mobile Remote Control

    Real-time moving object detection is critical for a number of embedded applications because threats such as security surveillance and visual tracking are involved in the detection. Moving object detection is the fundamental step in automated video analysis. It often acts as an initial step for further processing such as classification...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    System Stability of Synchronous Machine with Small Signal Representation including Rotor Circuit Dynamics

    In an interconnected power system, continuously growing in size and extending over vast geographical regions it becomes very difficult to maintain synchronism between various parts of power system. In this paper, the focus is made on small signal performance of a synchronous machine connected to a large system through transmission...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Review of Technology Acceptance Model Usage in Predicting E-Commerce Adoption

    Technology Acceptance Model (TAM) has been used widely in e-commerce adoption studies. A review of TAM can assist scholars to identify common themes, strengths and weaknesses, leading to redesigning and enhancing the model for more effectiveness. TAM has been used widely in most e-commerce adoption studies owing to its ease...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    A DFT Technique for MCM (Multi Chip Module) Testing

    Aggressive technology scaling has been the mainstay of integrated circuit design for the past 30 years. This is posing serious challenges to integrated circuit testing and its long term reliability. A major source of failures and test escapes in the integrated circuits can be attributed to timing only parametric failures....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Multi-Annotating Approach for Searching Web Databases

    An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. Basically every search engines shows the web content and web links related to the authors' input query...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2015

    Is Brand Everything? Issues and Challenges of Branding in Global Market

    Today is an era of globalization. The globalized markets for homogeneous products and services have emerged. Marketers now realize that there is a global need to standardize the products, packaging and communication to attain a least-common denominator positioning that would be successful across nations. However, the problem faced by the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Examination Constituent Structural Design - Construction Systems Using a Service Oriented for Extreme Programming

    Service-oriented architecture for enterprise computing in typical definitions service-oriented architecture appears as a single message and a consistent roadmap for building flexible software system. The natural language metaphors are relatively useless for either fostering communication among technical and non-technical project members or in developing architecture. Service-Oriented Architecture concepts to address...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Comparative Performance Analysis of Mobile Ad Hoc Networking Protocols for Different Mobility Models

    Mobile Ad-hoc NETwork (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Prevention Against DDOS in MANET Using IDS

    A MANET is a type of ad hoc network that can change locations and configure itself on the fly. Since, the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Software Effort Estimation: A Comparison Based Perspective

    For any industry to stay competitive, managing balance between quality and cost of software is important. Estimating software development effort remains a complex problem and one which continues to attract considerable research attention. Number of researchers had made their efforts to produce different modeling techniques in last few decades. This...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Novel Approach for Cooperative Caching in Distributed Environment

    In the present systems that implement cooperative caching the web based associations and their processes are typical. With the usual download model, a user downloads contents directly from a Content Providers (CP) server over a Communication Service Providers (CSP) network. Downloading content through Content Service Providers (CSP) network involves a...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    A Review on the Role of Encryption in Mobile Database Security

    Data-driven applications are realized due to the powerful lightweight computing devices such as Smart phones, Laptops, Tablets and low cost mobile connectivity. Today more and more businesses move toward employees' mobility. While the employee moves, along with them the mobile device as well as the database stored in the mobile...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Robust Biometrics Based on Palmprint

    In this paper, the authors present an overview of the fundamentals of personal authentication based on hand geometry measurements and palm print features. Researchers have used some complex methods or algorithms like Quadratic Spline function of Wavelet transform (QSW),Voronoi diagram, Gaussian Mixture Model (GMM), Radial Basis Function neural networks (RBF),...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Verify & Decrypt Multi-Keyword Ranked Search Over Encrypted Data on Cloud Server

    Cloud computing is defined as a computing machine or group of machine which as a servers, holds all the applications and document necessary all at one place so that any user can access it from anywhere whoever has a access to that server without actually using the users physical machine....

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Effective Execution of Enterprise Resource Planning (ERP)

    Enterprise Resource Planning (ERP) scheme is made up of a number of programs employed in unifying the various business activities in an organization or firm. Since these programs deliver the answers to the demands of a firm, they may be may be considered as necessities. Effective execution of these schemes...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Distribution Load Flow Using Artificial Neural Networks

    Many methods have been developed for transmission and distribution load flows. Most of these methods are useful for off line applications. Much preference was given to transmission system load flows than distribution systems. But, with the changes in the operating structures of distribution systems and penetration of distributed generations in...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Lucid Gumption Maturation with Query Constellation and Data Retrieval

    In this paper, the authors proposed a study of information retrieval performance refinement in deep web mining. The information explosion on the Internet has placed high demands on search engines. Yet people are far from being satisfied with the performance of the existing search engines, which often return thousands of...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Glossing the Information From Distributed Databases

    Internet provides huge amount of useful information which is align into a format for users. Here the authors observe the difficulty for extraction of relevant data from different sources. Relevant data transform into structured format. Structured format contains only necessary information. The motivation behind in the system provides the compressed...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Dec 2014

    Dynamic Generation for System Over Database

    Relation knowledge-base systems are becoming increasingly pleasing to all in the scientific community to support the effecting on one another discovery of greatly sized volumes of facts. In this scenario, users use a question connection (representatively, a web-based client) to question under discussion a number, order, group, line of SQL...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    Ontology for CAD/CAM Integration

    CAD/CAM integration has been an open ended problem for the factory automation. Many approaches have been followed to make the full integration, such as Computer Aided Process Planning (CAPP), and Form Feature (FF) approaches. Among other approaches those two approaches made the biggest impact however, they became shorter than the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Conceptual Study on an Approach to E-Recruitment and Its Technological Challenges

    The widespread adoption of the Internet and other technologies has played a large role in shaping the current state of the recruiting industry. Today acquiring and retaining the employees is the biggest challenge. The use of Internet has dramatically changed the face of HR recruitment and the ways organizations think...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    Data Alteration Detection: A PC to USB Pen Drive Perspective

    Protecting sensitive information from unauthorized user is a major concern of every organization. As an organization's employees need to access such information in order to carry out their daily work. Some time the critical data can carry by employee to work from home. There are several ways to carry the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    Review Paper on High Speed Parallel Multiplier -Accumulator (MAC) Based on Radix-4 Modified Booth Algorithm

    In this paper, the authors propose a high speed and area-efficient merged Multiply ACcumulate (MAC) units. To realize the area-efficient and high speed MAC unit proposed in this paper, first they examine the critical delays and hardware complexities of conventional MAC architectures to derive at a unit with low critical...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    An Artificial Intelligence Based Multi-Leader Election Scheme for Eliminating Intrusion and Routing Attack in MANET

    A Mobile Ad-hoc NETwork (MANET) is an independent system of mobile stations connected by wireless connection of network. Mobile host does not guarantee any fixed infrastructure and with the advance in technology for network crime is new threat to the centralized network management. Thus leader among the network node is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    Improved Protection in Image Steganography using Neural Network and Discrete Cosine Transform

    The important concern of modern communication is to establish secret communication and is achieved by steganography. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the all time goal is to conceal the very existence of the embedded data. Many techniques...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    On Coverage Determination and Exploiting Node Redundancy in Wireless Sensor Networks

    As selecting an appropriate number of nodes before wireless sensor network deployment is important and it is difficult and inefficient to be done by simulation, a method for achieving that is requisite. This paper proposes simple mathematical equations to determine a suitable number of nodes for wireless sensor network monitoring...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    An Approach for Geographical Routing in MANET

    Geographic routing is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. In geographic routing, nodes need to maintain...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Heuristic to Achive Maximum Lifetime and Target Coverage in Wireless Sensor Network

    Network lifetime plays an integral role in setting up an efficient wireless sensor network. This proposed method was able to achieve the theoretical upper bound. The objective of proposed system is contained as twofold. The first one is to deploy sensor nodes at optimal locations such that to achieve the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Study of Projection based Multiplicative Data Perturbation for Privacy Preserving Data Mining

    Random projections are a powerful method of dimensionality reduction that are noted for their simplicity and strong error guarantees. In this research paper, the authors study a randomized multiplicative data perturbation technique for privacy preserving data mining. It is motivated by the work presented earlier that point out some security...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    A Study on Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage

    Data is the heart of any organization; hence it is necessary to protect it. For doing so, it is the needed to implement a good backup and recovery plan. But the redundant nature of the backup data makes the storage a concern; hence it is necessary to avoid the redundant...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Nov 2014

    Design and Fabrication of an Electrically Small Meander Line Antenna System for Wireless Communication

    Antenna integration and miniaturization are two major challenges. The authors propose an Electrically Small Antenna (ESA) that is based on the meander line antenna structure that operates in the 2.4-2.7GHz ISM band. The proposed antenna has measured center frequency of 2.52GHz with 240MHz bandwidth. The proposed antenna is designed for...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Analysis of IDS for Cloud Computing

    This paper is on approach for obtaining optimal number of features to build an efficient model for Intrusion Detection System (IDS). Most Intrusion Detection Systems (IDSs) are designed to handle specific types of attacks. It is evident that no single technique can guarantee protection against future attacks. To handle large...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Jan 2013

    An Efficient Profit-Based Job Scheduling Strategy for Service Providers in Cloud Computing Systems

    In the cloud computing environment, one of the major activities is Job Scheduling. With the concepts of the existing profit based scheduling mechanism, the authors have designed an enhanced model which gives better profits to the cloud service providers. Cloud users deploy the jobs requests on the cloud. A set...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Performance Analysis of Group Mobility Handover in Wimax Networks With and Without Group Leader Concept

    Cheaper establishment, wider coverage area and high data rates, makes WiMAX (Worldwide interoperability for Microwave ACcess) to be one of the most developing technology for offering wireless last-mile connection. Group mobility scenarios are widely seen in military environment, emergency and rescue activities. Group mobility refers to the scenarios that multiple...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    A Dual Mechanism for Defeating DDoS Attacks in Cloud Computing Model

    Cloud Computing model, a large scale distributed computing infrastructure is built in order to meet the demand for power and memory storage, increasing vigorously due to scientific research and industrialization. It is a recently proposed model providing access to the distributed resources consistently. Maintaining the security, confidentiality and integrity of...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    A Radical Approach to Secure LAN Network Using Novel Hardening Techniques

    Computer networks and Internet has grown vastly in past decade. Computer networks allow access to information and services in an organized as well as controlled manner. Security is needed to make their data immune to any kind of data breach. In industries, the network and its security are vital issues,...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Energy Efficient Relay Based Multi-Hop Clustering Protocol for Wireless Sensor Networks

    The quest for better protocol design that can minimize communication cost and energy usage in WSN has fuelled various researches into employing different kinds of communication modes that promise a better utilization of network resources. When sensor nodes are organized in a hierarchy or multi-level cluster structure using multi-hop communication...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Smart Home Design Using Wireless Sensor Network and Biometric Technologies

    This paper proposes a new design for the smart home using the wireless sensor network and the biometric technologies. The proposed system employs the biometric in the authentication for home entrance which enhances home security as well as easiness of home entering process. The proposed smart home Wireless Biometric Smart...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Adaptive Power Saving Dynamic Radio Resource Allocation in OFDMA Based Cellular Relay Networks

    In this paper, the authors are analyzing the performance of adaptive power saving resource allocation with frequency reuse method for Orthogonal Frequency Division Multiple Access (OFDMA) based cellular relay networks. An optimization problem is to minimize the total transmitted power for the network and the other constraints such as relay...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    A Synchronization Algorithm of Mobile Database for Cloud Computing

    The existing synchronization solutions of mobile database are not independent from the database server because they use database dependent information such as metadata or use specific functions of database server such as trigger and time stamp. These constraints are critical weak point in cloud environment because various applications are running...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Performance Evaluation of AODV With Reference to Varying Number of Nodes

    The mobile ad hoc network is a dynamic network in which the mobile nodes dynamically form a temporary network without any centralized administration. A number of routing protocols are available and they are categorized mainly into table-driven and on-demand routing protocols. AODV routing protocol, which follow on-demand routing approach is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Email Filter for Spam Mail: A Review

    E-mail is probably the most convenient method of transferring messages electronically from one person to another, emerging from and going to any part of the world. Important features of E-mail such as its speed, reliability, efficient storage options and a large number of added facilities make it highly popular among...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    An Efficient Data Storage Security Algorithm Using RSA Algorithm

    This paper gives a brief introduction about cloud computing by giving its definition, characteristics of cloud computing, components, types, categorization of cloud services which described Platform as a Service, Infrastructure as a Service and Software as a Service. By having a look at this paper, an individual surely will have...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    QoS Taxonomy Towards Wireless Body Area Network Solutions

    To improve the health care facilities for the people a tiny, automated, and intelligent medical device and technology namely Wireless Body Area Network (WBAN) evolved. The derivation of this technology is Wireless Sensor Network (WSN) consists of sensors, actuators, radio systems, and transmission systems which should be situated in, on,...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    ISCSI-The Future of the Storage Network

    ISCSI is proposed as a possible solution to building future storage systems. However, using iSCSI raises numerous questions about its implications on system performance. This lack of understanding of system I/O behavior in modern and future systems inhibits providing solutions at the architectural and system levels. The authors' main goals...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Privacy Preserving K-Means Clustering on Horizontally Distributed Data

    Privacy Preserving Data mining (PPDM) is the combination of information security technology and knowledge discovery technology. The aim of Privacy preserving data mining is the extraction of relevant knowledge from large amount of digital data while protecting at the same time sensitive information. Here the proposed method for k-Means Clustering...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Enhanced OpenID Protocol in Identity Management

    Identity management is the process by which user identities are defined and managed in enterprise environment. Identity Management (IdM) describes the management of individual identifiers, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Association Rule Based Data Mining Approach to HTTP Botnet Detection

    Botnet is most dangerous and widespread among all threats in today's cyber world. It is basically group of compromised computers connected via internet, mostly the vulnerable hosts, are remotely accessed and controlled by botmaster to deliver various network threats and malicious activities. Which includes, spamming, click fraud, ID theft, backdoor...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Enhanced Max-Min Task Scheduling Algorithm in Cloud Computing

    Cloud Computing is the use of computing resources (Hardware and Software) that are delivered as a service over a network (typically the internet). It supplies a high performance computing based on protocols which allow shared computation and storage over long distances. In cloud computing, there are many tasks requires to...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Systematic Inspection of Scheduling Policies and Algorithms in Grid Computing

    Resource supervision and scheduling is an intricate problem in grid. Load scheduling is the method of improving the performance of grid environment through a redistribution of load among the computers. A grid based distributed system can solve the problem by allowing multiple independent jobs to run over a network of...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Communication and Self Location of Wireless Sensor Network or Nodes Using Wireless System: A Survey

    A wireless ad-hoc network is a decentralized type of wireless network. A WSN is dynamically self-organized and self-configured, with the nodes in the network automatically Wireless sensor nodes are low power, battery operated devices with limited computation and transmission. A Medium Access Control (MAC) protocol is required to coordinate the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Ant Colony Optimization for Improving Network Lifetime in Wireless Sensor Networks

    Wireless sensor networks is very important field in today's technology and one may concern about the life time of sensors as they have no facility to change the battery of those sensors inside the field. Wireless Sensor Networks are prone to node failure due to power loss. In order to...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Bandwidth Enhancement in Multipatch Microstrip Antenna Array

    Microstrip antennas are used in a wide range of applications, but due to its narrow impedance bandwidth restriction occurs. Microstrip patch antenna is very well known form of printed antenna. Microstrip patch antennas are getting popular in wireless application due to their low profile structure, simple geometry and low fabrication...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Detection of Noise in Degraded Images by Efficient Noise Detection Algorithm: A Survey

    Noise can be unavoidable in communication networks, and its presence can have disastrous effects upon the data being sent. The main approach is to detect different type of noise in corrupted images. There are two steps in this process that has the ability to handle the real time applications due...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Apr 2013

    Implementing Distributed Combined Authentication and Intrusion Detectionin High Security MANET

    In Mobile Ad Hoc NETwork (MANET), Multimodal Biometric technology plays an essential role in giving security between user-to-device authentications Multimodal biometrics are deployed to work with Intrusion Detection Systems (IDS) to alleviate the shortcomings of unimodal biometric systems. Since each device in the network has specific measurement and estimation limitations,...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Cryptography as an Instrument to Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired", an increasing number of people need to understand the basics of security in a networked world. This paper was written with the basic computer user and information systems...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Asymmetrical U-Slotted Rectangular Microstrip Patch Antenna

    The Microstrip antennas are low profile, mechanically robust, inexpensive to manufacture, compatible with MMIC designs and relatively light and compact. They are quite versatile in terms of resonant frequencies, polarization, pattern and impedance. However, the major drawback is its narrow bandwidth and gain. As it is well known that the...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Network Security Enhancement in Hadoop Clusters

    The Apache Hadoop Distributed File System allows companies to store and manage petabytes of data which is collected from disparate data sources and is far more efficient than relational database management systems. A huge number of companies have begun using the open-source technology to aggregate and analyze large volumes of...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    A Survey on VoIP Security Attacks and Their Proposed Solutions

    VoIP is a communication protocol which is being widely used and voice calls are transmitted over an IP network such as internet instead of Public Switched Telephone Networks (PSTN). VoIP converts voice into digital signal that travels over the internet and the audio output device makes the digital to audio...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Security Threats and Defense Approaches in Wireless Sensor Networks: An Overview

    Wireless sensor network is emerging technology with their limited energy, computation, and communication capabilities. In contrast of traditional network, wireless sensor networks are deployed in accessible areas, presenting a risk of physical attacks. Sensor networks interact closely with the physical environment because of these reasons current security approaches are inadequate...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Energy Consumption Between Gateways of Ad Hoc and Other Networks

    Wireless Sensor Networks (WSNs) consist of small nodes with computation, sensing, and wireless communications capabilities. Power management and data spreading protocols have been particularly intended for WSNs where energy awareness is an essential intended issue. Some protocols can be classified into QoS-based, query based, multipath-based, negotiation-based, and coherent-based depending on...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Wireless Ad-Hoc Network Routing Protocols: Performance Evaluation

    Recently it is observed that there is an exponential increase in the use of advanced wireless mobile computing technology centered round the IP protocol suite. MANETs (Mobile Ad-Hoc NETworks) support robust and efficient operation by incorporating routing functionality into mobile nodes. These networks have a dynamic rapidly changing topology that...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Cloud Computing: An Economic Solution to Higher Education

    In the information age it seems mandatory to use the services of Information Technology (IT) in all the activities of higher education. The computing resources of present are powerful, capable and aid in improving quality of work. A dilemma is faced as technology in terms of hardware and software is...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    A Modified Leach Algorithm to Enhancing the Performance With Improved Energy Efficiency for Wireless Sensor Network

    Networking together hundreds or thousands of cheap micro sensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. These wireless networks require robust routing protocols that are energy efficient and provide low latency. In LEACH protocol, time is divided into many...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Border Gateway Protocol (BGP): A Simulation Based Overview

    Border Gateway Protocol (BGP) is the prevalent wide-area routing protocol. This paper describes the BGP in different perspective from routing aspects, message and packets formats, route path attributes to its implementations in different network simulation scenarios. The Internet is composed of Autonomous System (ASs) that uses BGP to implement inter-AS...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Mining Frequent Patterns and Prediction of User Behavior in Mobile Commerce

    Mobile commerce has received a lot of interests from both the industry and academy. Among them, one of the active topic areas is the mining and prediction of users such as their movements and purchase transactions. In this paper, the authors propose a novel framework, called Mobile Commerce Explorer for...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Design Issues for Routing Protocols in WSNs Based on Classification

    Wireless Sensor Network (WSN) has emerged as a useful supplement to the modern wireless communication networks. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. In WSN, the sensor nodes have a limited transmission range,...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Advanced Cryptanalytic Algorithm for Data Security

    Information security is the process of protecting information. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic and military matters. Often Information must be stored or transferred from one place to another without being exposed to an opponent...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Optical Interleave Division Multiple Access (OIDMA) System-A Review

    In Interleave Division Multiple Access (IDMA), users are assigned with specific inter-leavers instead of PN-sequences as in case of Code Division Multiple Access (CDMA) systems to differentiate amongst users. The scheme considered is a special case of CDMA in which bandwidth expansion is entirely performed by low-rate coding. An inter-leaver-based...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    A Review of Collaboration of Multi-Cloud - An Effective Use of Cloud Computing

    Cloud computing is an emerging trend which can transform information technology and the way it is used. Cloud service provider basically provides Software, Platform and infrastructure as service to the user on pay-per-use basis. Cloud nowadays is gaining huge attention due to its characteristics as it can be modeled as...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)

  • White Papers // Mar 2013

    Survey on Data Mining Based Intrusion Detection Systems

    Current era is of networking and communication; people are interested in keeping large data on networks, there exists an extensive growth in use of Internet in social networking, healthcare, e-commerce, bank transactions, and many other services. On the other hand, computers in the network are under attacks and vulnerable to...

    Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)