International Journal of Computer Applications

Displaying 1-40 of 6962 results

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Intelligent Task Allocation in Multi Core Environment

    The architectural advancements in desktop computing have made embedded devices in real-time applications to adopt multi-core architectures. Constrained power availability but ever increasing performance requirements are the main reason for this migration. Failure to allocate tasks to specific cores would result in some tasks running while other tasks in other...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Proposed Approach for Efficient Energy Utilization in Cloud Data Center

    Cloud computing has transmuted the IT industry on the whole and made easy to access the resources from anywhere and at any time. These resources can be accessed as a service rather than as a product. Clients pay for the service used as per their requirement. The huge demand of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Software Bug Detection Using Data Mining

    The common software problems appear in a wide variety of applications and environments. Some software related problems arises in software project development i.e. software related problems are known as software defect in which software bug is a major problem arises in the coding implementation. There are no satisfied results found...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Performance Analysis of Magnitude Comparator Using Different Design Techniques

    Comparators are a basic design module and element in modern digital VLSI design, digital signal processors and data processing application-specific integrated circuits. This paper comprises of design of three different comparators for 2, 4 and 8-bit magnitude comparison. The above said designs are prepared using two different design approaches: weighted...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Interactive Technologies Utilization Model for University Relationship Marketing Strategies

    In this paper, the authors develop a usage model for interactive technologies for university marketing strategies, using a combination of the Task Technology Fit (TTF) model and the Information Systems Acceptance (ISA) model. Interactive technologies enables the universities to inexpensively engage their customers in one-to-one. Over the years, relationship marketing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Survey on Energy Performance Improvement with Data Aggregation Techniques for WSN

    In the recent advance in science and technology, the communication system has been marching towards quick development. Wireless sensor network is one of the important blocks for communication. The major limiting factors in wireless sensor network are power consumption requirements, life time of network, data integrity and data confidentiality. Data...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    VLSI Implementation of Low Power Area Efficient Fast Carry Select Adder

    Carry SeLect Adder (CSLA) is one of the speedy adders utilized as a part of numerous computational frameworks to perform quick number crunching operations. The carry select adder utilizes an effective plan by imparting the Common Boolean Logic (CLB) term. The modified CSLA architecture building design has created utilizing Binary...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of NoC Router Architecture Using VHDL

    Network-on-Chip (NoC) is an advance design method of communication network into System-on-Chip (SoC). It provides solution to the problems of traditional bus-based SoC. It is widely considered that NoC will take the place of traditional bus-based design and will meet the communication requirements of next SoC design. A router is...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Spam Detection in Social Media Networks: A Data Mining Approach

    The ubiquitous use of social media has generated unparalleled amounts of social data. Data maybe texts, numbers or facts that is computable by a computer. A particular data is absolutely useless until and unless converted into some useful information. It is necessary to analyze this massive amount of data and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Unsupervised Technique for Web Data Extraction: Trinity

    Search engine is a program which searches specific information from huge amount of data. So, for getting results in an effective manner and within less time this technique is used. This paper is having a technique which depends on two or more web documents which are generated from same server-side...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Task Migration Mechanism in a Homogeneous X86 64bit Multikernel Environment

    Today, the machines are multi-cores and these cores are increasing rapidly. Multi-kernel treats multi-core machine as a network of independent cores. The multi-kernel can handle the challenges of multi-core by running independently kernel instances and finally these kernel instances are cooperating to form a single operating system. The multi-kernel concept...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Stegtorrent Using De-Clustering of Data

    Now-a-days, for uploading and downloading of data using torrent people widely use internet. Existing system was less secure and time consuming. To avoid this problem, steg-torrent using de-clustering of data is implemented. For file transfer service, steg-torrent is a new network steganographic method. To achieve availability and scalability of storage...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Validation of Deduplication in Data Using Similarity Measure

    De-duplication is the process of determining all categories of information within a dataset that signify the same real-life/world entity. The data gathered from various resources may have data high quality issues in it. The concept to identify duplicates by using windowing and blocking strategy. The objective is to achieve better...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design Space Exploration of DSP Techniques for Hardware Software Co-Design: An OFDM Transmitter Case Study

    In this paper, the authors describe the exploration of design parameters for widely used Digital Signal Processing (DSP) algorithms and techniques. In this paper, some of the DSP algorithms and techniques are considered and executed them on soft-core processors like general purpose processors, digital signal processing processers and also on...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Process Mining by Using Event Logs

    Process mining techniques have usual notable attention within the literature for their ability to help within the re-design of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of process models from event logs. Now...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Framework for Social Network Data Mining

    Social networks have become a vital component in personal life. People are addicted to social network features, updating their profile page and collaborating virtually with other members have become daily routines. Social networks contain massive collection of data. Web data mining is a new trend in the current research body....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving Current Hadoop MapReduce Workflow and Performance

    In this paper, the authors propose an improvement and implementation of enhanced Hadoop MapReduce workflow that develop the performance of the current Hadoop MapReduce. This architecture speeds up the process of manipulating big data by enhancing different parameters in the processing jobs. Big data needs to be divided into many...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Low Power VLSI Implementation of STTRAM Based TCAM for High Speed Switching Circuits

    Ternary Content-Addressable Memory (TCAM) is often used in high speed search intensive applications such as ATM switch, IP filters. Hence, currently ZTCAM, is introduced which emulates the TCAM functionality with SRAM. It has some drawbacks such as low scalability, low storage density, slow access time and high cost. But, this...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Domain and Language Construct Based Mapping to Convert Natural Language Query to SQL

    DataBase Management Systems (DBMSs) have been widely used for storing and retrieving data. However, databases are often hard to use since their interface is quite rigid in co-operating with users. End user is required to issue SQL query to retrieve information from the database. Thus, a user cannot interact directly...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    High Performance Computing and Big Data Analytics - Paradigms and Challenges

    The advent of technology has led to rise in data being captured, stored and analyzed. The requirement of improving the computational models along with managing the voluminous data is a primary concern. The transition of the high performance computing from catering to traditional problems to the newer domains like finance,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Algorithm to Monitor Suspicious Activity on Social Networking Sites Using Data Mining Techniques

    In today's world, social networks have become a platform to express opinions or feelings related to current events or any other topics. But, sometimes provocative posts related to renowned people, religion, sexuality, countries or any other sensitive topics create havoc in the society. Such posts must be administered and removed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Regression Modeling Technique on Data Mining

    A regression algorithm estimates the value of the target (response) as a function of the predictors for each case in the build data. These relationships between predictors and target are summarized in a model, which can then be applied to a different data set in which the target values are...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving the Performance of Read Operations in Distributed File System Using Global Cache Mechanism and Anticipated Parallel Processing

    Distributed File System (DFS) is the main storage component of a Distributed System (DS). DFS provides scalable storage to the DS and it is also the main component of any cloud storage system. Improving the performance of read operations in a DFS is very important as many web-based applications deployed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Recommender System Based on Learner Knowledge and Opining Using Data Mining Techniques in Synchronous E-Learning Environment

    Learners are often getting uncertainty by the flow of information and have trouble in selecting the material to learn that satisfies their requirements and interests. It is the fact that the learners, learning interest and behavior changes over the time and subject to subject. It is very important, thus, to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Accessing the Data Efficiently Using Prediction of Dynamic Data Algorithm

    The Internet carries an extensive range of information resources and services throughout the world. Without Internet finding a particular thing, or get details of those things is not possible. In this paper, the system focuses on accessing the data efficiently through offline or online. In addition of this paper, the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    FPGA Implementation of a Modified Turbo Encoder

    Turbo Convolutional Codes (TCC) are excellent error correcting codes, however TCC decoding based on A-Posteriori Probability (APP) algorithm is computationally complex and the complexity is not significantly reduced even if puncturing mechanism is used. To overcome the above disadvantage, turbo codes need to be concatenated with other coding techniques such...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Predicting Examination Results Using Association Rule Mining

    Higher education has changed a lot in the last decade. The use of various innovative techniques and technologies, especially ICT in teaching learning process is increasing day-by-day. Number of information systems has been developed and successfully implemented to support educational processes. These systems typically capture almost every data regarding a...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Bisecting K-Means for Clustering Web Log data

    Web usage mining is the area of web mining which deals with extraction of useful knowledge from web log information produced by web servers. One of the most important tasks of Web Usage Mining (WUM) is web user clustering which forms groups of users exhibiting similar interests or similar browsing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Synchronous CR-OLAP Tool for Efficient Parallel Computing

    Real Time OLAP (OnLine Analytical Processing), or RTOLAP, is the capability to quickly retrieve, aggregate, analyze and present multidimensional data for cubes whenever there are changes to the data in the relational data sources, without having to run heavy processing on the cube. A big advantage of real time OLAP...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Fuzzy Goal Programming Approach to Solve Linear Multilevel Programming Problems using Genetic Algorithm

    In this paper, the authors introduce a priority based Fuzzy Goal Programming (FGP) method for modelling and solving MultiLevel Programming Problem (MLPP) through Genetic Algorithm (GA). In model formulation, the individual best solution of objectives of each of the Decision Makers (DMs) is determined by using the GA method for...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Efficient Data Dissemination Techniques in VANETs: A Review

    Vehicular Ad hoc NETworks (VANETs) being a sub class of MANET is a challenging field of wireless communication. It is a sensible way of using infrastructure fewer networks augmented with Intelligent Transportation System (ITS). It is an emerging trend now-a-days for vehicles to be equipped with an embedded on-board computing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Review on Fault Tolerance Techniques in Cloud Computing

    With the immense growth of internet and its users, cloud computing, with its incredible possibilities in ease, quality of service and on-interest administrations has turned into a guaranteeing figuring stage for both business and non-business computation customers. It is an adoptable technology as it provides integration of software and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

    On everyday operations there is need to engage agents to perform some duties on their behalf, hence they are gaining acceptance as a technology and are being used. Most of the networked offices, networked homes, cyber cafes, learning institutions and other arenas where computers are interconnected on a Wi-Fi network,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Efficient Clustering Methods with Effective Pruning Techniques for Probabilistic Graphs

    In this paper, the authors provide a survey on K-NN queries, DCR query, agglomerative complete linkage clustering and extension of edit-distance-based definition graph algorithm and solving decision problems under uncertainty. This existing system give an beginning to graph agglomeration aims to divide information into clusters per their similarities, and variety...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Verification of Reversible Logic Gates using Quantum Dot Cellular Automata

    In this paper, the authors portray the designing of reversible logic gates through the use of Quantum dot Cellular Automata (QCA) which is a nanotechnology concept and also a striking substitute for transistor based technologies. This technology helps them to rise above the confines of CMOS technology. It also gives...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Integrating Knowledge Management and Business Intelligence Processes for Empowering Government Business Organizations

    Emergence of information technologies has transformed the way business marketing is done and how business enterprises are managing the resources and information. Trend of globalization has induced the fierce competitiveness among business enterprises within domestic and international markets. The major quest for the technologies is not limited to strategic value...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An RTOS based Industrial Wireless Sensor Network using Multiprocessor Support

    RTOS (Real Time Operating System) is a process which is done between hardware and application in order to provide time constraints. Each industry has their own priority among the various tasks according to their process. RTOS is used here to assign the priorities. The values obtained in plant have to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Bee Colony based Multi-Objective Load Balancing Technique for Cloud Computing Environment

    With the recent development of open cloud systems a surge in outsourcing assignments from an internal server to a cloud supplier has been seen. The cloud can facilitate its clients enormous resources hence even during heavy load conditions. Since the cloud needed to be handle multiple clients workload at same...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Query based Recommendation and Gaussian Firefly based Clustering Algorithm for Inferring User Feedback Sessions with Search Goals

    In web search based applications, queries are suggested by users to search and investigate web search engines information requirements regarding user. However the queries submitted by user sometimes might not easily understood by search engines, since queries submitted by user might be short representation and should not precisely characterize users'...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Teaching Parallel Programming for Time-Efficient Computer Applications

    Academic research and engineering challenge both require High Performance Computing (HPC), which can be achieved through parallel programming. The existing curricula of most universities do not properly address the major transition from single-core to multi-core systems and sequential to parallel programming. They focus on applying Application Program Interface (API) libraries...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Comparative Study of Apriori Algorithms for Parallel Mining of Frequent Itemsets

    Apriori algorithms are used on very large data sets with high dimensionality. Therefore parallel computing can be applied for mining of association rules. The process of association rule mining consists of finding frequent item sets and generating rules from the frequent item sets. Finding frequent itemsets is more expensive in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Correlation-Based Attribute Selection Using Genetic Algorithm

    Integration of data sources to build a Data Warehouse (DW), refers to the task of developing a common schema as well as data transformation solutions for a number of data sources with related content. The large number and size of modern data sources make the integration process cumbersome. In such...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    A Novel Methodology for Benchmarking the Hypervisors over Heterogeneous Workloads - Multi Vari Approach

    This paper is to implement the Multivari approach along with Design Of Experiment (DOE) framework to effectively benchmark the hypervisors over heterogeneous workloads. Multivari approach determines the interaction effect very easily for many factors at a time by keeping panel parameter constant. This experiment has given a very interesting way...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Mining Access Patterns Using Clustering

    Web usage mining is an application of data mining techniques to discover usage patterns from web data, in order to understand and better serve the needs of web based application. The aim of this paper is to discuss about a system proposed which would perform clustering of user sessions extracted...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Algorithms to Optimally Use Hardware Forwarding Resources in a Router Domain

    Routers and forwarders in a router domain would likely have different amount of hardware Resources. The least capable switch should not hold the performance of the Router network domain to ransom. This write up lists some smart choices the forwarders and routers in the Router domain can make to most...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Extension of MAC Protocol for Mobility Detection and Efficient Data Transmission

    In this paper, the authors introduce an extension of MAC protocol for mobility detection of nodes and efficient data transmission in mobile, multihop wireless sensor network. Here for mobility detection, receiving power of the node is consider by the transmitting node. If gradual degradation in communication link does due to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Mining Web Access Patterns using Root-set of Suffix Trees

    With the rapidly growing uses of World Wide Web (WWW) for various important and sensitive purposes it becomes a sensible necessity to find out the interesting web access patterns from the web access sequences tracked by users frequently. Web access sequential patterns can be used to achieve business intelligence for...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2011

    Design of Homogeneous Multi-Core based Vehicular Embedded Controller

    Increasing use of Electronic gadget in vehicular system need researchers' attention to provide optimize solution for the system; in various aspects like power consumption, size, cost, complexity etc. There are many economic and technical arguments for the reduction of the number of Electronic Control Units (ECUs). One can be number...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    A Study of Information Systems in Human Resource Management (HRM)

    In today's organizations human resource is considered as one of the key resources of business organizations. The transaction processing layer of MIS in human resource function deals with routine activities like attendance recording and payroll calculations. The operational level activities also include maintaining the employee records which is used as...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    The Impact of Information System Success Factors, Human Resource Staff Satisfaction, and E-Human Resource Use on Organizational Benefit

    Organizations have limited resources for investment making it imperative that resources utilized provide some benefit for the organization. Electronic Human Resource Management (E-HRM) systems have been shown to have notable benefits for the organization including cost saving capabilities. However, when implemented in practice E-HRM systems consistently fail to produce desired...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Customer Retention Using Data Mining Techniques

    Customer retention represents a modern approach for quality in enterprises and organizations and serves the development of a truly customer-focused management and culture. Customer retention measures offer a meaningful and objective feedback about client's preferences and expectations. This paper presents an original methodological approach of customer satisfaction and retention evaluation,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    A Review on Data Mining From Past to the Future

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due to the importance of extracting knowledge/information from the large data repositories, data mining has...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Design of Reversible Programmable Gate Array Based on New Reversible Logic Modules

    Reversible logic synthesis techniques will definitely be a necessary part of the long-term future of computing. The paper introduces the design of a new Reversible Logic Module (RLM) with three versions I, II, and III. It is universal in two arguments. A proposed design of Reversible Programmable Gate Array (RPGA)...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    MIPS Integrated Architectural Memory Design Synthesis for Low Power Embedded Devices

    Recently high performance and low power consumption custom memory design system is the crucial innovation for wireless embedded devices. In this paper, the authors have implemented MIPS based memory architectural design and analyze its simulation efficiency. Low power and high performance embedded devices such as mobile, Wi-Fi devices implemented with...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Implementing an Application of Data Acquisition System Using NIOS-II Soft Core Processor

    In this paper, the authors represent an application of data acquisition system. Its design is based on NIOS II soft core processor. The design is proposed to create and manage the interconnected systems of analog signal to digital embedded platform. NIOS II is a versatile embedded processor that presents high...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Convolutional Encoder Design using 16 Bit Vedic Multiplier on High Speed Revolution

    In mathematics, multiplication is the most commonly used operation. This paper explores the design approach of a convolution encoder using vedic multiplier which leads to improve delay and faster speed. Here, the efficiency of Urdhva Triyagbhyam Vedic method for multiplication which strikes a difference in the actual process of multiplication...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Efficient Coded OFDM Modem Using FPGA

    Coded OFDM is the multicarrier modulation technique based on encoding the digital data. Due to the increasing demand of transmitting data wirelessly in military, telecommunication industries and in satellite communication engineers had developed different technologies for transmitting the data accurately and also suitable for higher rate transmission which includes the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Simulation of Convolutional Encoder and Viterbi Decoder Using Verilog

    In this paper, the authors are implementing the convolutional encoder and viterbi decoder with code rate 2/3 using verilog. This paper is to implement the RTL level model of convolutional encoder and viterbi decoder, with the testing results of behavior model. They tried to achieve a low silicon cost. The...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Modified Booth Multiplier Using Wallace Structure and Efficient Carry Select Adder

    The multiplier forms the core of systems such as FIR filters, digital signal processors and microprocessors etc. This paper presents a model of two different 16X16 bit multipliers. First is Radix-4 multiplier with SQRT CSLA and second one is Radix -4 multiplier with modified SQRT CSLA. Modified booth algorithm is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Testable Sequential Circuits Using Conservative Toffoli Gate

    Testing of sequential circuits can be done by two test vectors (all 1's and all 0's) if the circuits were based on the conservative logic. The circuit is made to be tested by designing the circuit with the help of Reversible logic gates. Toffoli gate is used as reversible gate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Certain Investigations on Power Performance in Nanoscale CMOS Digital Circuits with Low Leakage Design Techniques

    In this paper, it is attempted to analyze the power performances of few CMOS digital circuits such as full adder, multiplexer and SRAM cell with the inclusion and redesign of Ultra Low Leakage (ULL) techniques. The basic principle behind this ULL is based on a pair of source-connected N-MOS and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Comparative Analysis of Metastability with D Flip Flop in CMOS Circuits

    The appropriate choice of flip-flop topologies is of essential importance in the design of integrated circuits for CMOS VLSI high-performance and high-speed circuits. The understanding of the suitability of the flip-flops and select the best topology for a given application is important to meet the need of the design to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    True Single Phase Clocking Flip-Flop Design using Multi Threshold CMOS Technique

    In this paper, the authors enumerate the design of low power and high speed double edge triggered True Single Phase Clocking (TSPC) D- flip-flop. The TSPC CMOS flip-flop uses only one clock signal that is never inverted and it eliminates the clock skew. The originally developed TSPC flip-flop are very...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Design of RS and D-Flip-Flop Using AlGaAs/Gaas MODFET Technology

    Technology scaling of a transistor feature size has provided a remarkable innovation in silicon industry for the past few decades. This paper enumerates high speed design of RS & D- flip-flop using AlGaAs/GaAs MODFET. The proposed flip flop is having less number of transistors than existing designs. Simulation results show...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Analysis of Conventional CMOS and FinFET Based 6-T XOR-XNOR Circuit at 45nm Technology

    As technology has scaled down, the implications of leakage current and power analysis for memory design have increased. To minimize the short channel effect double-gate FinFET can be used in place of conventional MOSFET circuits due to the self-alignment of the two gates. Design for XOR and XNOR circuits is...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A High Speed Explicit Pulsed Dual Edge Triggered D Flip Flop

    Flip flops and latches form part of clock distribution network, timing elements, memory etc. in digital systems. This paper presents an efficient explicit pulsed static dual edge triggered flip flop with an improved performance. The proposed design overcomes the drawbacks of the dynamic logic family and uses explicit clock pulse...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Low Power Error Detector Design by using Low Power Flip Flops Logic

    Low-power design is becoming a crucial design objective for the chip design engineer due to the growing demand on portable application and the increasing difficulties in cooling and heat removal. In the integrated circuits power consumption is one of the challenges like area and speed. In this paper, a novel...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Modeling of Schmitt Trigger-Based Sub-Threshold 8T SRAM for Low Power Applications

    In this paper, the authors present the design of schmitt trigger-based 8T SRAM Architecture for low power sub-threshold (or) near-threshold CMOS SRAM for power constrained applications. Power consumption, power dissipation and leakage power are the main factors in the IC design. Memory unit is the primary block in design of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Low Power High Speed 64 Bit SRAM Architecture Using SCCMOS and Drowsy Cache Concept

    With the development of technology with each passing days, the demand for low power, high speed and high density memory for portable devices is increasing proportionally. The power consumption and battery life has become the major concerns for VLSI industry. But as the technology scales down it gives rise to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Energy Efficiency Enhancement for 45nm 1MB SRAM Array Structures

    Energy efficiency is a supreme design concern in many ultralow-power applications. In such applications, high density Static Random-Access Memory (SRAM) plays a significant role. This paper explores and analyzes 1Mb SRAM array structures for energy efficiency improvement by adopting circuit modifications and inclusion of charge sharing circuits. The analysis shows...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A SRAM Memory Cell Design in FPGA

    In this paper, the authors design a memory cell in Field Programmable Gate Array (FPGA) that consumes lesser power with reduced delay constraint. In the existing system, the FPGA is based on 10T Static Random Access Memory (SRAM) cell configuration in which power consumption is relatively high. The proposed paper...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Big Data: Tools and Technologies in Big Data

    Big data can be defined as data which requires latest technologies other than the traditional tools and techniques to handle it, due to its unstructured nature. Huge volume, various varieties and high velocity create lots of other challenges and issues regarding its management and processing. Big data is growing at...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review on Big Data Integration

    Big data technologies are becoming a current talk and a new "Buzz-word" both in science and in industry. Today data have grown from terabytes to petabytes and now it is in zeta bytes. Increased amount of information increases the challenges in managing and manipulating data. Data integration is a main...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Research in Big Data and Analytics: An Overview

    Big data analytics has been gaining much focus of attention lately as researchers from industry and academia are trying to effectively extract and employ all possible knowledge from the overwhelming amount of data generated and received. Traditional data analytic methods stumble in dealing with the wide variety of data that...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Big Data - Privacy and Management

    Big data is a term that refers to massive amounts of digital information. With big data dimensions increasing exponentially, the privacy and security issues surrounding it also magnify. Therefore, traditional security mechanisms tailored to secure small-scale, static data are insufficient. Along with the security concerns, data management also becomes an...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Mining Frequent Patterns with Optimized Candidate Representation on Graphics Processor

    Frequent itemset mining algorithms mine subsets of items that appear frequently in a collection of sets. FIM is a key investigation in numerous data mining applications, and the FIM tools are among the most computationally demanding in data mining. In this paper, the authors present a new approach to represent...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Feature Selection Using Clustering Approach for Big Data

    Feature selection has been a productive field of research and development in data mining, machine learning and statistical pattern recognition, and is widely applied to many fields such as, image retrieval, genomic analysis and text categorization. Feature selection includes selecting the most useful features from the given data set. The...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Reduction of Leakage Power in Half-Subtractor Using AVL Technique Based on 45nm CMOS Technology

    The analytical paper of arithmetic circuits plays an important role in designing of any VLSI system. Subtractor is one of them. Half subtractor is being designed using Adaptive Voltage Level (AVL) techniques. This design consumed less power as compare to conventional design. The authors can reduce the value of total...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    CMOS Design of Area and Power Efficient Multiplexer using Tree Topology

    In this paper, a design of 16:1 tree type multiplexer has been presented using GDI and PTL technique. The proposed design consists of 31 NMOS and 15 PMOS. The proposed multiplexer is designed and simulated using DSCH 3.1 and MICROWIND 3.1 on 180nm technology. Performance comparison of proposed multiplexer with...

    Provided By International Journal of Computer Applications