International Journal of Computer Technology and Electronics Engineering

Displaying 1-40 of 108 results

  • White Papers // Oct 2014

    Impact of Mobility Management on Heterogeneous Wireless Network

    Most of the real life networks are heterogeneous which always combine the best features of two or more networks. An integration of available wireless networks viz: cellular and Wireless Local Area Network (WLAN) on expandable and flexible platform is called as radio resource management for heterogeneous networks. Along with resource...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2014

    An Improved Method of Using Throughput in Optimization of Data Transmission Network

    In this paper the authors focus on the amount of processed data in communication network, transmitting power control and the number of terminals that should be admitted in to Code Division Multiple Access (CDMA) system in order to maximize the base station throughput for a wireless data transmission network. Also...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2014

    Energy-Awareness at Data Centers: An Overview of Management and Architecture Framework Techniques

    All over the world, cloud computing provides utility-oriented IT services to users. It enables hosting of pervasive applications from consumer, scientific, and business domains. It is considered as an innovative and challenging technology that promises to modify the way IT and storage resources will be accessed in the future. However,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2014

    Legacy Applications Migration Process to Cloud - an approach Framework

    Only thing which is constant in information technology is change, so to keep pace with the ever evolving current technology paradigm and enhance the life span of existing application, which are developed over a period of time, is inevitable to migrate legacy application to current technology, in today's paradigm it...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2013

    Improving Web Search Results Using Semantic Clustering

    In this paper, the authors consider the problem of search engine that are not capable of retrieving appropriate result on query given. Most of the users are not able to give the appropriate query to get what exactly they wanted to retrieve. So the search engine retrieves a massive list...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Cloud Computing : A New Era in IT industry

    Cloud computing evolves itself as a key technology for handling and sharing massive data on demand service. It constitutes basic computing paradigm that illustrates more elastic and low cost infrastructure to it, which access large number of data as compare to other paradigm in computing. Cloud computing gains to new...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Advance Multideployment and Multisnapshotting on IAAS Cloud Environments

    As era of modern computing cloud computing evolving day by day to easily get VM images from datacenter. As virtualization is new technology to work with desktop computer one of the challenge is to deploy large number of VM simultaneously and then collect their snapshot then allow them resume suspend...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Application of Biometry for Bank Security System

    Biometric identification is an emerging technology that can solve security problems in the people networked society. A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palm print based verification system by integrating hand geometry features. Unlike other bimodal biometric...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    C/C++ Cloud Compiler Using MainFrame

    In this paper, the authors report the successful use of web-based interface to C++ compilers using mainframe. There are several benefits that make networked software desirable. A web-based application can be used remotely throughout any network connection. Any operating system can be used to access it, making it platform independent....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Retrieval of Structure and Content Information from XML Document

    Most of the time data over internet is not found in structured and it's also not flexible to store and parse it using databases. XML is used to represent huge amount of data without any absolute schema and structure. To retrieve information from XML document two techniques are used keyword...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Priority Maintainance in Online Scheduler Heterogenous Processor in Real Time System

    The problem related to different components in the scheduler is investigated. A random sample task is analyzed from the set of related task in the queue and a deadline is preset based on the sample task. With this deadline the task in the group is executed assuming that the entire...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Priority Based I2C Bus Controller

    I2C controllers have been an integral part of many SoCs in the industry and also have been logically implemented individually. But many of they perform the function of serial to parallel conversion or vice-versa. So in this paper the authors present another function which an I2C controller can play an...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Review of Local Multipoint Distribution System

    Local Multipoint Distribution System (LMDS) is a fixed wireless technology that operates in the 28 GHz band and offers line-of-sight coverage over distances up to 3-5 kilometers. It can deliver data and telephony services to 80,000 customers from a single node. Data transfer rates for LMDS can reach 1.5 Gbps...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2012

    Compare Vedic Multipliers with Conventional Hierarchical Array of Array Multiplier

    Multiplication is an important function in arithmetic operations. A CPU (Central Processing Unit) devotes a considerable amount of processing time in performing arithmetic operations. Multiplication requires substantially more hardware resources and processing time than addition and subtraction. Digital Signal Processors (DSPs) are the technology that is omnipresent in engineering discipline....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2012

    Mobile Positioning Techniques in GSM Cellular Networks: A Comparative Performance Analysis

    Locating the position of a mobile user with a high degree of accuracy is a research interest that holds the key to a breakthrough in many service challenges faced by operators in the wireless communication world. The benefits of a success in this field ranges from value added services and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2012

    Design and Performance Analysis of Mobility Management for Multi Gateway Based Wireless Mesh Networks

    In order to reduce the overall network traffic incurred by mobility management and packet delivery herewith the authors propose efficient mobility management schemes based on pointer forwarding for wireless mesh networks (WMNs). In the proposed schemes, based on the user's specific mobility and service patterns the optimal threshold of the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2012

    Efficient Design of 4-Bit Array Multiplier Using GDI Low Power Cell

    Multiplier is the most commonly used circuit in the digital devices. Multiplication is one of the basic functions used in digital signal processing. Most high performance DSP systems rely on hardware multiplication to achieve high data throughput. There are various types of multipliers available depending upon the application in which...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2012

    Cluster Analysis in Datamining

    The term cluster analysis encompasses a number of different algorithms and methods for grouping objects of similar kind into respective categories. A general question facing researchers in many areas of inquiry is how to organize observed data into meaningful structures, that is, to develop taxonomies. In another word cluster analysis...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2012

    Design and Implementation for 8 Bit Double Harvard Core Processor for Small Scale Systems

    From the architecture point of view, the microprocessor chips can be classified into two categories: Complex Instruction Set Computers (CISC) and Reduce Instruction Set Computers (RISC). In either case, the objective is to improve system performance. The debates between these two architectures made this research area very interesting, challenging, and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2012

    Adiabatic Positive Feedback Charge Recovery Logic for Low Power CMOS Design

    In this paper, the authors present a new adiabatic circuit technique called Positive Feedback Adiabatic Logic (PFAL). Power reduction is achieved by recovering the energy in the recovery phase of the supply clock. Energy dissipation comparison with other logic circuits is performed. This paper is to provide new low power...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Performance Analysis of Distributed Dynamic Channel Assignment With Power Control (DDCA/PC) in Mobile Cellular Networks

    This paper presents the derivation of an analytical close form expression for the calculation of the call blocking probability for Distributed Dynamic Channel Allocation Scheme under Power Control (DDCA - PC). The call blocking probability of this scheme was measured and compared with that of Fixed Channel Allocation (FCA) and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Performance Evaluation of Multi-Threaded System Vs. Chip-Multi-Processor System

    The purpose of this paper is to analyze and compare the performance of multi-threaded system and chip-multi-processor system. Currently, various types of multi-core and multi-threaded processors are popularly used in all the domains. Even mobile devices have two or more cores to improve the performance. While those two technologies are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Energy Aware Threshold Based Efficient Clustering (EATEC) for Wireless Sensor Networks

    This paper presents a new protocol called Energy Aware Threshold based Efficient Clustering (EATEC) which aims to reduce energy consumption within the wireless network. Efficiency of a wireless network depends on mainly of energy consumption. In cluster based protocols, changing of cluster and cluster head also consume more energy. So,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    A Survey on Gossip-Based Energy Conservation for Wireless Ad Hoc Network Routing

    This paper presents a survey of Gossip based Sleep Protocol (GSP) and extensions of GSP for energy conservation for wireless ad hoc networks and sensor networks. In GSP, each node randomly goes to sleep for some time with gossip sleep probability p. When the value of p is small enough,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Cloud Computing: A New Aspect of Technology

    Cloud Computing is the most discussed topic now a days. This concept decreases the overhead to install software, hardware and resources, which is time and space consuming task. Cloud Computing (CC) is pay-as-you-go concept who allows users to access the resources as they pay for it. A decade is passing...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Impact of Agile Methodology on Software Development Process

    Agile methodology that utilizes iterative development and prototyping are widely used in variety of industry projects as a light weight development method which can satisfy to the changes of requirements. Short iterations are used that are required for efficient product delivery. Traditional software development processes are not much efficient to...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    PAPR Reduction in OFDM System Using Tone Reservation Technique

    OFDM (Orthogonal Frequency Division Multiplexing) is spectrally efficient modulation technique used for higher data rate transmission. Basically OFDM system is very effective technique in its way, but main disadvantage is Peak to Average Power Ratio. This ratio must be reduce to perform efficient communication. Different technique can be used to...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Fault-Tolerant and Non Adaptive Wormhole Routing Algorithm for Multi Mesh Network

    In the world of parallel computing there are several network which consist of multiple processors connected to each other following different topology. A network topology defines how nodes are interconnected by channels. Among the different network a well-known name is Direct Network where each node is connected to every other...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Brute Force Methodology of Hardware/Software Co-Design

    Design of embedded systems is becoming increasingly difficult due to the tight constraints on area usage, size, power consumption and performance. In addition to these one more constraint faced in embedded system design is tight time to-market deadlines. Hence, the hardware / software co-design methodology is often used to design...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Performance Analysis of Routing Protocols Based on IPV4 and IPV6 for MANET

    Ad hoc network is a collection of wireless mobile nodes where wireless radio interface connects each device in a MANET to move freely, independently and randomly. Routing protocols in mobile ad hoc network helps to communicate source node with destination node by sending and receiving packets. Many authors have compared...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Service Demand Handler and Catalogue Manager for Clouds

    With growing usage of Internet and Cloud enabled services on devices like PC, Tablet & Mobile, business demands of agility, scalability and flexibility are well met with basic cloud enabled services using private clouds as an entry point. However, to enable faster, better & cheaper usage of IT resources, business...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    A New Compact Printed Antenna for Wireless Communication

    In wireless communications, there are several types of microstrip antennas, the most common of which is microstrip printed antenna. Printed antennas are also relatively inexpensive to manufacture and design because of simple 2D physical geometry. A single feed single layer compact rectangular microstrip antenna is proposed in this paper. Two...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis and Performance Evaluation of Technique to Increase the Call Capacity of WLAN

    WLANs have created the revolution in the field of communication. They replaced wired network by flexible wireless network. VoIP over IEEE 802.11 WLAN is one of the most growing technologies. WLANs were initially designed to transfer the non real time data. But today it is also used for the transfer...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Effect of TO & CFO on OFDM and SIR Analysis and Interference Cancellation in MIMO OFDM Systems

    OFDM is a multicarrier modulation technique in which a high rate bit-stream is split into N parallel bit-streams of lower rate and each of these are modulated using one of N orthogonal sub-carriers. In a basic communication system, the data is modulated onto a single carrier frequency. OFDM is a...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    A Pattern Based Approach to Secure Web Applications From XSS Attacks

    As web applications must be available 24/7 and offer data access to customers, employees, suppliers, and others, they are frequently the weak link in enterprise security. So web applications are popular attack targets due to the lack of coordination and lack of security awareness on part of the developers. When...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    PPLWAP: An Efficient Approach to Improve Web Service Framework for Large Scale Database

    With the explosive growth of information available on the web, the requirement of various intelligent web services have been observed, hence need to develop an algorithm to help the users to access relevant information on the Web. With the accessing of millions of web pages for business and personal transactions,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Rule Based Reduction Using Dominant Rule Determination

    Fuzzy logic has quickly become one of the most successful in today's technologies. In this paper, the authors propose the dominant rule determination method to compress the fuzzy rules. This method compresses fuzzy system, with large number of rules into a smaller fuzzy system by removing the redundant rules in...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    An Embedded Electric Meter Based on ARM9 and Zigbee Technology

    The authors design an embedded electric meter based on zigbee data acquisition system in view of the complicated cables and accident potential in the process of data acquisition of electric meter. Combined wireless zigbee communication technology with data acquisition system, they build wireless data acquisition system based on ARM9 processor...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Low Power CORDIC Core with High Throughput

    CORDIC (COrdinate Rotation for DIgital Computers) an economical replacement for the use of Multipliers, is a fast and efficient algorithm that can be used for any type of digital signal processing architectures (Microprocessor). The latest trends in VLSI technology enhance different ways of implementing the CORDIC architecture. This paper focuses...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    A New Low Power Technology for Power Reduction in SRAM's using Column Decoupling Combined with Virtual Grounding

    In this paper, the authors are going to modify the column decoupled SRAM for the purpose of more reduced leakages than the existing type of designs as well as the new design which is combined of virtual grounding with column decoupling logic is compared with the existing technologies & the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Fault-Tolerant and Non Adaptive Wormhole Routing Algorithm for Multi Mesh Network

    In the world of parallel computing there are several network which consist of multiple processors connected to each other following different topology. A network topology defines how nodes are interconnected by channels. Among the different network a well-known name is Direct Network where each node is connected to every other...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Brute Force Methodology of Hardware/Software Co-Design

    Design of embedded systems is becoming increasingly difficult due to the tight constraints on area usage, size, power consumption and performance. In addition to these one more constraint faced in embedded system design is tight time to-market deadlines. Hence, the hardware / software co-design methodology is often used to design...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Performance Analysis of Routing Protocols Based on IPV4 and IPV6 for MANET

    Ad hoc network is a collection of wireless mobile nodes where wireless radio interface connects each device in a MANET to move freely, independently and randomly. Routing protocols in mobile ad hoc network helps to communicate source node with destination node by sending and receiving packets. Many authors have compared...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Service Demand Handler and Catalogue Manager for Clouds

    With growing usage of Internet and Cloud enabled services on devices like PC, Tablet & Mobile, business demands of agility, scalability and flexibility are well met with basic cloud enabled services using private clouds as an entry point. However, to enable faster, better & cheaper usage of IT resources, business...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    A New Compact Printed Antenna for Wireless Communication

    In wireless communications, there are several types of microstrip antennas, the most common of which is microstrip printed antenna. Printed antennas are also relatively inexpensive to manufacture and design because of simple 2D physical geometry. A single feed single layer compact rectangular microstrip antenna is proposed in this paper. Two...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Cloud Computing : A New Era in IT industry

    Cloud computing evolves itself as a key technology for handling and sharing massive data on demand service. It constitutes basic computing paradigm that illustrates more elastic and low cost infrastructure to it, which access large number of data as compare to other paradigm in computing. Cloud computing gains to new...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Advance Multideployment and Multisnapshotting on IAAS Cloud Environments

    As era of modern computing cloud computing evolving day by day to easily get VM images from datacenter. As virtualization is new technology to work with desktop computer one of the challenge is to deploy large number of VM simultaneously and then collect their snapshot then allow them resume suspend...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Application of Biometry for Bank Security System

    Biometric identification is an emerging technology that can solve security problems in the people networked society. A new approach for the personal identification using hand images is presented. This paper attempts to improve the performance of palm print based verification system by integrating hand geometry features. Unlike other bimodal biometric...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    C/C++ Cloud Compiler Using MainFrame

    In this paper, the authors report the successful use of web-based interface to C++ compilers using mainframe. There are several benefits that make networked software desirable. A web-based application can be used remotely throughout any network connection. Any operating system can be used to access it, making it platform independent....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Retrieval of Structure and Content Information from XML Document

    Most of the time data over internet is not found in structured and it's also not flexible to store and parse it using databases. XML is used to represent huge amount of data without any absolute schema and structure. To retrieve information from XML document two techniques are used keyword...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Positioning Webpage Using Rank

    World Wide Web (WWW) is a vast resource of hyperlinked and heterogeneous information including text, image, audio, video, and metadata. It is estimated that WWW has expanded by about 2000% since its evolution and is doubling in size every six to ten months. With the rapid growth of information sources...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2013

    Improving Web Search Results Using Semantic Clustering

    In this paper, the authors consider the problem of search engine that are not capable of retrieving appropriate result on query given. Most of the users are not able to give the appropriate query to get what exactly they wanted to retrieve. So the search engine retrieves a massive list...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Priority Maintainance in Online Scheduler Heterogenous Processor in Real Time System

    The problem related to different components in the scheduler is investigated. A random sample task is analyzed from the set of related task in the queue and a deadline is preset based on the sample task. With this deadline the task in the group is executed assuming that the entire...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2014

    An Improved Method of Using Throughput in Optimization of Data Transmission Network

    In this paper the authors focus on the amount of processed data in communication network, transmitting power control and the number of terminals that should be admitted in to Code Division Multiple Access (CDMA) system in order to maximize the base station throughput for a wireless data transmission network. Also...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2014

    Energy-Awareness at Data Centers: An Overview of Management and Architecture Framework Techniques

    All over the world, cloud computing provides utility-oriented IT services to users. It enables hosting of pervasive applications from consumer, scientific, and business domains. It is considered as an innovative and challenging technology that promises to modify the way IT and storage resources will be accessed in the future. However,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2014

    Legacy Applications Migration Process to Cloud - an approach Framework

    Only thing which is constant in information technology is change, so to keep pace with the ever evolving current technology paradigm and enhance the life span of existing application, which are developed over a period of time, is inevitable to migrate legacy application to current technology, in today's paradigm it...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Web Data Extraction using Ontology and SWRL

    Ontology is used for formal semantics and it is look like a backbone of every semantic web applications. In this system a technique is proposed for ontology design using semantic web rule language. By this technique, existing web applications design methods may easily be upgraded for semantic web applications. The...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Data Logger System: A Survey

    Knowledge of temperature and relative humidity course during a certain time is needed in scientific, medical and industrial applications. For retrieval of this information from various devices such as manual readings, chart recorders or data loggers can be used. A data logger is an electronic device that combines analog and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Environmental Data Acquisition Using (ENC28J60)

    In an industry there are many locations in which the people need exact amount of environmental parameters such as temperature, humidity, CO2 gas etc. Ethernet is a local area technology, which is used for reliable and efficient transfer and access of information across the devices connected to the network. Once...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Priority Based I2C Bus Controller

    I2C controllers have been an integral part of many SoCs in the industry and also have been logically implemented individually. But many of they perform the function of serial to parallel conversion or vice-versa. So in this paper the authors present another function which an I2C controller can play an...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2013

    Review of Local Multipoint Distribution System

    Local Multipoint Distribution System (LMDS) is a fixed wireless technology that operates in the 28 GHz band and offers line-of-sight coverage over distances up to 3-5 kilometers. It can deliver data and telephony services to 80,000 customers from a single node. Data transfer rates for LMDS can reach 1.5 Gbps...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2014

    Impact of Mobility Management on Heterogeneous Wireless Network

    Most of the real life networks are heterogeneous which always combine the best features of two or more networks. An integration of available wireless networks viz: cellular and Wireless Local Area Network (WLAN) on expandable and flexible platform is called as radio resource management for heterogeneous networks. Along with resource...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    A Layered Approach for Intrusion Detection Using Meta-Modeling With Classification Techniques

    Extensive growth of the internet and increasing availability of tools and tricks for intruding and attacking networks, have prompted intrusion detection to become a critical component of network administration. It is an important attribute of defensive measure protecting computer system and network traffic from abuses. Here, the authors are focusing...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Nov 2011

    Performance Analysis of Ad-Hoc Network Under Node Failure

    In this paper, an attempt has been made to analyze and compare the performance of the reactive as well as proactive ad-hoc routing protocols using OPNET modeler with respect to increasing number of failed nodes in the network. In this paper, a comparison of reactive routing protocols i.e. Ad Hoc...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    VHDL Modeling of Wi-Fi MAC Layer for Receiver

    In this paper, the authors use IEEE 802.11 standard for Wi-Fi MAC receiver module, for the wireless communication in radio frequency range. Wi-Fi wireless fidelity for LAN is designed for local area networks, which are private, local (short range), but where competing cable systems run at very high speeds. Wi-Fi...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis and Performance Evaluation of Technique to Increase the Call Capacity of WLAN

    WLANs have created the revolution in the field of communication. They replaced wired network by flexible wireless network. VoIP over IEEE 802.11 WLAN is one of the most growing technologies. WLANs were initially designed to transfer the non real time data. But today it is also used for the transfer...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Effect of TO & CFO on OFDM and SIR Analysis and Interference Cancellation in MIMO OFDM Systems

    OFDM is a multicarrier modulation technique in which a high rate bit-stream is split into N parallel bit-streams of lower rate and each of these are modulated using one of N orthogonal sub-carriers. In a basic communication system, the data is modulated onto a single carrier frequency. OFDM is a...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    A Pattern Based Approach to Secure Web Applications From XSS Attacks

    As web applications must be available 24/7 and offer data access to customers, employees, suppliers, and others, they are frequently the weak link in enterprise security. So web applications are popular attack targets due to the lack of coordination and lack of security awareness on part of the developers. When...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    PPLWAP: An Efficient Approach to Improve Web Service Framework for Large Scale Database

    With the explosive growth of information available on the web, the requirement of various intelligent web services have been observed, hence need to develop an algorithm to help the users to access relevant information on the Web. With the accessing of millions of web pages for business and personal transactions,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Explore the Performance of the ARM Processor Using Protocol Trainer

    Recently, the evolution of embedded systems has shown a strong trend towards application specific, single chip solutions. The ARM processor core is a leading RISC processor architecture in the embedded domain. The ARM family of processor supports a unique feature of code size reduction. In this paper it is illustrated...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detection Approaches Inside the Cloud

    In a malicious cloud system, handling of incident, challenges and risks, is an integral part of security management. In this paper, the authors discuss various detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery, etc.). On side of existing processes and methods...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Agent Oriented Schemes for Trustworthy Semantic Web Services

    Today, the authors use internet for every E-commerce related activity. As it is pointed by various researchers that E-commerce should be trustworthy and autonomous in their work .There are various applications they cannot trust unless and until they have some past experiences or some knowledge about it. In this paper,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Performance Analysis of Distributed Dynamic Channel Assignment With Power Control (DDCA/PC) in Mobile Cellular Networks

    This paper presents the derivation of an analytical close form expression for the calculation of the call blocking probability for Distributed Dynamic Channel Allocation Scheme under Power Control (DDCA - PC). The call blocking probability of this scheme was measured and compared with that of Fixed Channel Allocation (FCA) and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Novel Probabilistic Approach for Detecting Attack on Routing Protocols in Wireless Sensor Network

    The proposed system come up with an idea for detecting various types of routing attacks in wireless sensor network considering AODV protocol. Considering the previous research work, system identifies the probability of the routing attack over the dynamic topology of wireless sensor network where it has assumed a faster propagation...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

    Now-a-days digital watermarking is very popular field for the researchers because it provide the better solutions for authentication and copyright protection problems of digital object. Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of information under a digital object (image, video, audio) for...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Mobile Agent for Distributed Intrusion Detection System in Distributed System

    Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Performance Evaluation of Equalizers and Different Diversity Techniques Using OFDM

    In this paper, the authors analyzed the performance of different diversity techniques, which can be easily applied with Orthogonal Frequency Division Multiplexing (OFDM) systems with different equalizing methods. Orthogonal frequency division multiplexing is well known to be a useful technique for high rate data transmission over a frequency selective fading...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Improving AODV Routing Protocol With Priority and Power Efficiency in Mobile Ad Hoc WiMAX Network

    These days' ad hoc networks have found many applications. Multiple ad hoc routing protocols have been proposed, of which on-demand routing protocols are very popular because they are easy to realize and have no power and priority concept for data communication in routing. In Mobile Ad hoc NETworks (MANETs), routing...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Effect of Turbo Coding on OFDM Transmission to Improve BER

    A model of Turbo code based on OFDM (Orthogonal Frequency Division Multiplexing) is proposed in this paper. Orthogonal Frequency Division Multiplexing (OFDM) has become a popular modulation method in high speed wireless communications. By partitioning a wideband fading channel into flat narrowband channels, OFDM is able to mitigate the detrimental...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Performance Improvement of Wireless Mobile by DSR

    To achieve this one has to concentrate on the routing protocol. Transmission Control Protocol (TCP) is the dominating end-to-end transport layer protocol which provides secure and reliable data transfer together with some other protocols in the protocol stack Recent works in transport protocols for ad-hoc networks have investigated the impact...

    Provided By International Journal of Computer Technology and Electronics Engineering