International Journal of Computer Applications

Displaying 1-40 of 6558 results

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

    On everyday operations there is need to engage agents to perform some duties on their behalf, hence they are gaining acceptance as a technology and are being used. Most of the networked offices, networked homes, cyber cafes, learning institutions and other arenas where computers are interconnected on a Wi-Fi network,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Efficient Clustering Methods with Effective Pruning Techniques for Probabilistic Graphs

    In this paper, the authors provide a survey on K-NN queries, DCR query, agglomerative complete linkage clustering and extension of edit-distance-based definition graph algorithm and solving decision problems under uncertainty. This existing system give an beginning to graph agglomeration aims to divide information into clusters per their similarities, and variety...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Verification of Reversible Logic Gates using Quantum Dot Cellular Automata

    In this paper, the authors portray the designing of reversible logic gates through the use of Quantum dot Cellular Automata (QCA) which is a nanotechnology concept and also a striking substitute for transistor based technologies. This technology helps them to rise above the confines of CMOS technology. It also gives...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Integrating Knowledge Management and Business Intelligence Processes for Empowering Government Business Organizations

    Emergence of information technologies has transformed the way business marketing is done and how business enterprises are managing the resources and information. Trend of globalization has induced the fierce competitiveness among business enterprises within domestic and international markets. The major quest for the technologies is not limited to strategic value...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An RTOS based Industrial Wireless Sensor Network using Multiprocessor Support

    RTOS (Real Time Operating System) is a process which is done between hardware and application in order to provide time constraints. Each industry has their own priority among the various tasks according to their process. RTOS is used here to assign the priorities. The values obtained in plant have to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Bee Colony based Multi-Objective Load Balancing Technique for Cloud Computing Environment

    With the recent development of open cloud systems a surge in outsourcing assignments from an internal server to a cloud supplier has been seen. The cloud can facilitate its clients enormous resources hence even during heavy load conditions. Since the cloud needed to be handle multiple clients workload at same...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Query based Recommendation and Gaussian Firefly based Clustering Algorithm for Inferring User Feedback Sessions with Search Goals

    In web search based applications, queries are suggested by users to search and investigate web search engines information requirements regarding user. However the queries submitted by user sometimes might not easily understood by search engines, since queries submitted by user might be short representation and should not precisely characterize users'...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Implementation of a GUI based Offline GIFT Tool to Exchange Data between different Systems

    Multiple Choice Questions or MCQs are very important for e-learning. Many MCQ tools allow the users to generate MCQs very easily. However, in most of the cases they are not portable. That means MCQs generated for one system cannot be used for other unless a common format is used. So,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Secure SOA Framework for Multi-Cloud Storage and Computing

    Distributed computing is a swearing up and down to technology to encourage advancement of extensive scale, on-interest, adaptable figuring foundations. Anyhow without security implanted into imaginative engineering that backings distributed computing, organizations are setting themselves up for a fall. The pattern of every now and again receiving this engineering by...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS

    Data stored in the database includes personnel and sensitive data. Privacy policies in the database management system can control collection, access and disclosure of data. Policies are used to specify obligation. Obligation is certain actions or condition which has to be satisfied for accessing data. This paper is to enable...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Real Time Motion Detection using Dynamic Camera

    Video surveillance systems are a very important in the modern times. Now-a-days, security of valuable and secret assets is very important for large organization companies. Need of an efficient and reliable security system is cause due to limitation of human resources and man power. High level surveillance system for security...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Multi-Threaded Test Automation Framework for Testing Data-Centric Applications using Data Processing Algorithms

    Testing data-centric applications is always a challenging and a time consuming task. The goal of this paper is to present a test automation framework for testing data warehouse and business intelligence applications using an open source test automation tool. An Implementation methodology for multithreaded test execution is being explained that...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Cloud Commerce: A Drift from E-Commerce to Cloud

    Electronic commerce is internet based commerce, which is rapidly developing throughout the globe. The adaption of cloud computing services in electronic commerce had improved tremendously the ease and use of the E-commerce. The vendors of E-commerce are already adopting the cloud services such as Supply chain management, Platform-as-a-Service (PaaS) to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing

    Security during data transmission in cloud computing using TBDSA (Token Based Data Security Algorithm) along with its implementation is presented in this paper. The auto-generated token based certificate activation approach with SSL (Secure Socket Layer) provides the appropriate collaboration between the cloud client and the cloud service provider, so that...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on MAC Protocols for Data Collection in Wireless Sensor Networks

    Data collection is the most basic task in wireless sensor networks. A wireless sensor network consists of large numbers of nodes which collects data and then forwards collected data to sink. An important area of research in WSN is energy conservation. Medium Access Control (MAC) protocols plays vital role in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Relative Performance Analysis of Different CMOS Full Adder Circuits

    Different adder circuits are elementary blocks in many contemporary integrated circuits, which are not only employed to perform addition operations, but also other arithmetic operations such as subtraction, multiplication and division. Full adder is the basic building block of any adder circuit. Area, speed and power are the three main...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Applications of Data Mining in Correlating Stock Data and Building Recommender Systems

    Data mining is the process of discovering hidden patterns, trends and knowledge from large data stores which can't generally be found by simple analysis of databases. Data mining uncovers unknown patterns, and new rules from large databases between objects that are potentially useful in making crucial business decisions. It applies...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Learning based Clustering for the Automatic Annotations from Web Databases

    Rapid increase of use of internet provides knowledge extraction from the web databases and HTML pages associated with it. Although there are various techniques implemented for the access of the annotations of the search results from the web databases. Here in this paper, by identifying the problems with the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Proposed Data Mining Framework for Higher Education System

    Educational data mining is concerned with the development methods for exploring the unique types of data that come from the educational context. Furthermore, educational data mining is an emerging discipline that concerned with the developing methods for exploring the unique types of data that come from the educational context. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Windows and Linux Random Number Generation Process: A Comparative Analysis

    Random number generation plays a critical role in cryptography and cryptanalysis. It is essential for many cryptographic tasks such as keys generation, initialization vectors, and cryptographic nonce. In this paper, the authors explore and analyze the structure and functions of Random Number Generator (RNG) in Windows and Linux operating systems....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Review of Error Rate and Computation Time of Clustering Algorithms on Social Networking Sites

    Data mining is a method of finding useful patters from large volumes of data. It is an extension of traditional data analysis and statistical approaches. Data clustering is a task of grouping a set of items or objects into subsets (called clusters). It is an algorithm to discover the similarity...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Enhancing Proxy Server Cache Management using Log Analysis and Recommendations

    Now-a-days, web based applications are growing rapidly due to this the network performance is affected significantly. Thus a performance improvement technique is required by which the application speed is maintained and delivers the high performance web pages. Thus pre-fetching techniques are applied. There are various kinds of pre-fetching techniques are...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    NASLA: Novel Auto Scaling Approach based on Learning Automata for Web Application in Cloud Computing Environment

    Considering the growing interest in using cloud services, the accessibility and the effective management of the required resources, irrespective of the time and place, seems to be of great importance both to the service providers and users. One of the best ways for increasing utilization and improving the performance of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automated Check-Post on Cloud using BigData Analysis with Web Service Security

    In this real world each and every check post perform the same operation. But the operation must be done manually. This operation includes various parameters. The manual operation of the check post requires the man power in order to perform the operations such as opening the gate, closing the gate,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Techniques for Low Power and Area Optimized VLSI Testing using Novel Scan Flip-Flop

    Power consumption of any circuit is high during test mode than its normal mode of functioning. Different techniques are proposed to reduce the test power. This paper presents the consolidated research work carried to reduce the test power. Usually the power dissipation is due to the sequential and combinational elements...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey

    Data integration has become the vital necessities of today's interconnected world. Information is scattered everywhere and to retain the strategic advantage, it becomes mandatory for organizations to obtain as much information as possible. Hence combining the scattered data sources to obtain information becomes the only solution. Data integration is posed...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Implementation of an Algorithm to Enhance Cloud Security

    Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Fast Edge Detection Architecture using Different Levels of Parallelism on a FPGA

    Implementing edge detection techniques on a FPGA has recently become more popular since it benefits high speed which is desired for real-time applications. This paper presents a fast FPGA-based architecture for first order derivative edge detection methods. Fast pipeline-based architectures are presented which are able to perform edge detection using...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Fraud Detection Techniques in Ecommerce

    E-commerce becomes popular for online shopping, banking, financial institution and government. Fraudulent activity exits in many areas of businesses and the people daily life. Such activities are most prevalent in telecommunication, credit card fraud detection, network intrusion, finance and insurance and scientific applications, billions of dollars are loss every day...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Community Kernels Detection in OSN using SVM Clustering and Classification

    Security is an important issue in online social networking web sites. Here in OSN users can post their messages publicly on wall. In OSN a person may be attached to a community and can post any message on their friend's wall, hence it is necessary to check the validity of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    VHDL Realization of Hybrid Control Strategy for a Nonlinear System

    The process industries are automated to keeping in tune with the changing requirements. It creates the need of a well-defined philosophy to cater to the extent of sophistication. The scheme projects a mechanism to adapt to the evolving scenario and orient a strategy to accomplish the desired objective. A conical...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Frequent Patterns Analysis using Apriory: A Survey

    In applications such as location-based services, natural habitat monitoring, web data integration, and biometric applications, the values of the underlying data are inherently noisy or imprecise. Consider a location-based application that provides querying facilities on geographical objects (e.g., airports, vehicles, and people) extracted from satellite images. Due to the errors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Efficient Storage Management over Cloud using Data Compression without Losing Searching Capacity

    Now-a-days, due to social media, people may communicate with each other, share their thoughts and moments of life in form of texts, images or videos. The authors are uploading their private data in terms of photos, videos, and documents on internet websites like Facebook, WhatsApp, Google+ and YouTube etc. In...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Novel Design of SET-CMOS Half Subtractor and Full Subtractor

    Single electron transistor have high integration density, ultra-low power dissipation, ultra-small size, unique coulomb blockade oscillation characteristics which makes an attractive technology for future low power VLSI/ULSI systems. The single electron transistor have extremely poor driving capabilities so that direct application to practical circuits is a yet almost impossible, to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Study of SQL of Injections Techniques and their Prevention Methods

    Rapid evolution of technology and increasing necessity of storing data and securing it as well gave rise to various techniques to secure it along with the new innovative malicious techniques to have a hazardous impact on the organization by wrecking the database and manipulating data. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An Energy-Saving Routing Algorithm for Wireless Body Sensor Network using Data Compression Technique

    A Wireless Sensor Network (WSN) is used to monitor the environmental condition. There consist of N number of sensor nodes which are connected to each other and they are clustered in to different groups. There have a Cluster Head (CH) which is used to manage the Cluster Members (CMs). when...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering

    In the modern era, Wireless Sensor Network (WSN) has seen new horizons among the research community. It has largest range of applications in most of the fields. Its beauty lies in its application area and it can be deployed anywhere. WSN has low cost, low power sensor nodes, can be...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Secure Private Cloud Server Implementation for Data Storage

    Cloud computing has recently reached popularity in computer networking world which provide centralized data storage service, remote accessibility and many more cloud is very new, safe, and advanced technology it provides remote access service and centralized data storage service to the cloud consumers and its domain client in cloud. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Concern Towards Data Security in Cloud Computing

    Cloud computing is one of the emerging innovative trend of IT technology today. This trend has got remarkable advancement in computing world. Although cloud is boon to computing world but its adoption in IT sector is lack behind due to many issues. In this paper, the authors focus on most...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Teaching Parallel Programming for Time-Efficient Computer Applications

    Academic research and engineering challenge both require High Performance Computing (HPC), which can be achieved through parallel programming. The existing curricula of most universities do not properly address the major transition from single-core to multi-core systems and sequential to parallel programming. They focus on applying Application Program Interface (API) libraries...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Comparative Study of Apriori Algorithms for Parallel Mining of Frequent Itemsets

    Apriori algorithms are used on very large data sets with high dimensionality. Therefore parallel computing can be applied for mining of association rules. The process of association rule mining consists of finding frequent item sets and generating rules from the frequent item sets. Finding frequent itemsets is more expensive in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Correlation-Based Attribute Selection Using Genetic Algorithm

    Integration of data sources to build a Data Warehouse (DW), refers to the task of developing a common schema as well as data transformation solutions for a number of data sources with related content. The large number and size of modern data sources make the integration process cumbersome. In such...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    A Novel Methodology for Benchmarking the Hypervisors over Heterogeneous Workloads - Multi Vari Approach

    This paper is to implement the Multivari approach along with Design Of Experiment (DOE) framework to effectively benchmark the hypervisors over heterogeneous workloads. Multivari approach determines the interaction effect very easily for many factors at a time by keeping panel parameter constant. This experiment has given a very interesting way...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Mining Access Patterns Using Clustering

    Web usage mining is an application of data mining techniques to discover usage patterns from web data, in order to understand and better serve the needs of web based application. The aim of this paper is to discuss about a system proposed which would perform clustering of user sessions extracted...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Algorithms to Optimally Use Hardware Forwarding Resources in a Router Domain

    Routers and forwarders in a router domain would likely have different amount of hardware Resources. The least capable switch should not hold the performance of the Router network domain to ransom. This write up lists some smart choices the forwarders and routers in the Router domain can make to most...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Extension of MAC Protocol for Mobility Detection and Efficient Data Transmission

    In this paper, the authors introduce an extension of MAC protocol for mobility detection of nodes and efficient data transmission in mobile, multihop wireless sensor network. Here for mobility detection, receiving power of the node is consider by the transmitting node. If gradual degradation in communication link does due to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Mining Web Access Patterns using Root-set of Suffix Trees

    With the rapidly growing uses of World Wide Web (WWW) for various important and sensitive purposes it becomes a sensible necessity to find out the interesting web access patterns from the web access sequences tracked by users frequently. Web access sequential patterns can be used to achieve business intelligence for...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2011

    Design of Homogeneous Multi-Core based Vehicular Embedded Controller

    Increasing use of Electronic gadget in vehicular system need researchers' attention to provide optimize solution for the system; in various aspects like power consumption, size, cost, complexity etc. There are many economic and technical arguments for the reduction of the number of Electronic Control Units (ECUs). One can be number...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    A Study of Information Systems in Human Resource Management (HRM)

    In today's organizations human resource is considered as one of the key resources of business organizations. The transaction processing layer of MIS in human resource function deals with routine activities like attendance recording and payroll calculations. The operational level activities also include maintaining the employee records which is used as...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    The Impact of Information System Success Factors, Human Resource Staff Satisfaction, and E-Human Resource Use on Organizational Benefit

    Organizations have limited resources for investment making it imperative that resources utilized provide some benefit for the organization. Electronic Human Resource Management (E-HRM) systems have been shown to have notable benefits for the organization including cost saving capabilities. However, when implemented in practice E-HRM systems consistently fail to produce desired...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Customer Retention Using Data Mining Techniques

    Customer retention represents a modern approach for quality in enterprises and organizations and serves the development of a truly customer-focused management and culture. Customer retention measures offer a meaningful and objective feedback about client's preferences and expectations. This paper presents an original methodological approach of customer satisfaction and retention evaluation,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2011

    A Review on Data Mining From Past to the Future

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due to the importance of extracting knowledge/information from the large data repositories, data mining has...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Design of Reversible Programmable Gate Array Based on New Reversible Logic Modules

    Reversible logic synthesis techniques will definitely be a necessary part of the long-term future of computing. The paper introduces the design of a new Reversible Logic Module (RLM) with three versions I, II, and III. It is universal in two arguments. A proposed design of Reversible Programmable Gate Array (RPGA)...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    MIPS Integrated Architectural Memory Design Synthesis for Low Power Embedded Devices

    Recently high performance and low power consumption custom memory design system is the crucial innovation for wireless embedded devices. In this paper, the authors have implemented MIPS based memory architectural design and analyze its simulation efficiency. Low power and high performance embedded devices such as mobile, Wi-Fi devices implemented with...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Implementing an Application of Data Acquisition System Using NIOS-II Soft Core Processor

    In this paper, the authors represent an application of data acquisition system. Its design is based on NIOS II soft core processor. The design is proposed to create and manage the interconnected systems of analog signal to digital embedded platform. NIOS II is a versatile embedded processor that presents high...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Convolutional Encoder Design using 16 Bit Vedic Multiplier on High Speed Revolution

    In mathematics, multiplication is the most commonly used operation. This paper explores the design approach of a convolution encoder using vedic multiplier which leads to improve delay and faster speed. Here, the efficiency of Urdhva Triyagbhyam Vedic method for multiplication which strikes a difference in the actual process of multiplication...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Efficient Coded OFDM Modem Using FPGA

    Coded OFDM is the multicarrier modulation technique based on encoding the digital data. Due to the increasing demand of transmitting data wirelessly in military, telecommunication industries and in satellite communication engineers had developed different technologies for transmitting the data accurately and also suitable for higher rate transmission which includes the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2014

    Simulation of Convolutional Encoder and Viterbi Decoder Using Verilog

    In this paper, the authors are implementing the convolutional encoder and viterbi decoder with code rate 2/3 using verilog. This paper is to implement the RTL level model of convolutional encoder and viterbi decoder, with the testing results of behavior model. They tried to achieve a low silicon cost. The...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Modified Booth Multiplier Using Wallace Structure and Efficient Carry Select Adder

    The multiplier forms the core of systems such as FIR filters, digital signal processors and microprocessors etc. This paper presents a model of two different 16X16 bit multipliers. First is Radix-4 multiplier with SQRT CSLA and second one is Radix -4 multiplier with modified SQRT CSLA. Modified booth algorithm is...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Testable Sequential Circuits Using Conservative Toffoli Gate

    Testing of sequential circuits can be done by two test vectors (all 1's and all 0's) if the circuits were based on the conservative logic. The circuit is made to be tested by designing the circuit with the help of Reversible logic gates. Toffoli gate is used as reversible gate...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Certain Investigations on Power Performance in Nanoscale CMOS Digital Circuits with Low Leakage Design Techniques

    In this paper, it is attempted to analyze the power performances of few CMOS digital circuits such as full adder, multiplexer and SRAM cell with the inclusion and redesign of Ultra Low Leakage (ULL) techniques. The basic principle behind this ULL is based on a pair of source-connected N-MOS and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Comparative Analysis of Metastability with D Flip Flop in CMOS Circuits

    The appropriate choice of flip-flop topologies is of essential importance in the design of integrated circuits for CMOS VLSI high-performance and high-speed circuits. The understanding of the suitability of the flip-flops and select the best topology for a given application is important to meet the need of the design to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    True Single Phase Clocking Flip-Flop Design using Multi Threshold CMOS Technique

    In this paper, the authors enumerate the design of low power and high speed double edge triggered True Single Phase Clocking (TSPC) D- flip-flop. The TSPC CMOS flip-flop uses only one clock signal that is never inverted and it eliminates the clock skew. The originally developed TSPC flip-flop are very...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Design of RS and D-Flip-Flop Using AlGaAs/Gaas MODFET Technology

    Technology scaling of a transistor feature size has provided a remarkable innovation in silicon industry for the past few decades. This paper enumerates high speed design of RS & D- flip-flop using AlGaAs/GaAs MODFET. The proposed flip flop is having less number of transistors than existing designs. Simulation results show...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2013

    Analysis of Conventional CMOS and FinFET Based 6-T XOR-XNOR Circuit at 45nm Technology

    As technology has scaled down, the implications of leakage current and power analysis for memory design have increased. To minimize the short channel effect double-gate FinFET can be used in place of conventional MOSFET circuits due to the self-alignment of the two gates. Design for XOR and XNOR circuits is...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A High Speed Explicit Pulsed Dual Edge Triggered D Flip Flop

    Flip flops and latches form part of clock distribution network, timing elements, memory etc. in digital systems. This paper presents an efficient explicit pulsed static dual edge triggered flip flop with an improved performance. The proposed design overcomes the drawbacks of the dynamic logic family and uses explicit clock pulse...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Low Power Error Detector Design by using Low Power Flip Flops Logic

    Low-power design is becoming a crucial design objective for the chip design engineer due to the growing demand on portable application and the increasing difficulties in cooling and heat removal. In the integrated circuits power consumption is one of the challenges like area and speed. In this paper, a novel...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Design and Modeling of Schmitt Trigger-Based Sub-Threshold 8T SRAM for Low Power Applications

    In this paper, the authors present the design of schmitt trigger-based 8T SRAM Architecture for low power sub-threshold (or) near-threshold CMOS SRAM for power constrained applications. Power consumption, power dissipation and leakage power are the main factors in the IC design. Memory unit is the primary block in design of...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2014

    Low Power High Speed 64 Bit SRAM Architecture Using SCCMOS and Drowsy Cache Concept

    With the development of technology with each passing days, the demand for low power, high speed and high density memory for portable devices is increasing proportionally. The power consumption and battery life has become the major concerns for VLSI industry. But as the technology scales down it gives rise to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Energy Efficiency Enhancement for 45nm 1MB SRAM Array Structures

    Energy efficiency is a supreme design concern in many ultralow-power applications. In such applications, high density Static Random-Access Memory (SRAM) plays a significant role. This paper explores and analyzes 1Mb SRAM array structures for energy efficiency improvement by adopting circuit modifications and inclusion of charge sharing circuits. The analysis shows...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2013

    A SRAM Memory Cell Design in FPGA

    In this paper, the authors design a memory cell in Field Programmable Gate Array (FPGA) that consumes lesser power with reduced delay constraint. In the existing system, the FPGA is based on 10T Static Random Access Memory (SRAM) cell configuration in which power consumption is relatively high. The proposed paper...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Big Data: Tools and Technologies in Big Data

    Big data can be defined as data which requires latest technologies other than the traditional tools and techniques to handle it, due to its unstructured nature. Huge volume, various varieties and high velocity create lots of other challenges and issues regarding its management and processing. Big data is growing at...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review on Big Data Integration

    Big data technologies are becoming a current talk and a new "Buzz-word" both in science and in industry. Today data have grown from terabytes to petabytes and now it is in zeta bytes. Increased amount of information increases the challenges in managing and manipulating data. Data integration is a main...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Research in Big Data and Analytics: An Overview

    Big data analytics has been gaining much focus of attention lately as researchers from industry and academia are trying to effectively extract and employ all possible knowledge from the overwhelming amount of data generated and received. Traditional data analytic methods stumble in dealing with the wide variety of data that...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Big Data - Privacy and Management

    Big data is a term that refers to massive amounts of digital information. With big data dimensions increasing exponentially, the privacy and security issues surrounding it also magnify. Therefore, traditional security mechanisms tailored to secure small-scale, static data are insufficient. Along with the security concerns, data management also becomes an...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Mining Frequent Patterns with Optimized Candidate Representation on Graphics Processor

    Frequent itemset mining algorithms mine subsets of items that appear frequently in a collection of sets. FIM is a key investigation in numerous data mining applications, and the FIM tools are among the most computationally demanding in data mining. In this paper, the authors present a new approach to represent...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Feature Selection Using Clustering Approach for Big Data

    Feature selection has been a productive field of research and development in data mining, machine learning and statistical pattern recognition, and is widely applied to many fields such as, image retrieval, genomic analysis and text categorization. Feature selection includes selecting the most useful features from the given data set. The...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Reduction of Leakage Power in Half-Subtractor Using AVL Technique Based on 45nm CMOS Technology

    The analytical paper of arithmetic circuits plays an important role in designing of any VLSI system. Subtractor is one of them. Half subtractor is being designed using Adaptive Voltage Level (AVL) techniques. This design consumed less power as compare to conventional design. The authors can reduce the value of total...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    CMOS Design of Area and Power Efficient Multiplexer using Tree Topology

    In this paper, a design of 16:1 tree type multiplexer has been presented using GDI and PTL technique. The proposed design consists of 31 NMOS and 15 PMOS. The proposed multiplexer is designed and simulated using DSCH 3.1 and MICROWIND 3.1 on 180nm technology. Performance comparison of proposed multiplexer with...

    Provided By International Journal of Computer Applications