International Journal of Computer Technology and Electronics Engineering

Displaying 41-80 of 108 results

  • White Papers // Jun 2012

    Comparison and Evaluation for Grouping of Null Data in Database Based on K-Means and Genetic Algorithm

    With the rapid rise of possibilities to collect and to store large amounts of data electronically tools for the data analysis also have gained increasingly in importance. This magnitude of data can contain a lot of potentially important knowledge which, however, must be firstly extracted from data within the scope...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis of Maximal Ratio Combining Performance in CDMA20001x Mobile Radio Network

    Recently, wireless communication systems support not only voice communication but also other high-speed data and multimedia services. These services require high data rates with low delay and Bit Error Rate (BER). But, it is difficult to support these requirements with wireless systems due to some constraints in the system design....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Performance Evaluation of Gateway Discovery Approaches in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

    The connection of ad hoc network to the internet is established using gateways. To start the internet connection in MANET, first process is that the gateway is to be discovered by the mobile nodes. As the internet is the global service the user are to be satisfied by the integration...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis of Image Watermarking by DWT and Performance Under Attacks

    The Most popular method for copyright protection is Image watermarking by Discrete Wavelet Transform (DWT) which performs 2 Level Decomposition of original (cover) image and watermark image is embedded in Lowest Level (LL) sub band of cover image. Inverse Discrete Wavelet Transform (IDWT) is used to recover original image from...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Textual Requirement Analysis for UML Diagram Extraction

    Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it is created which is termed as requirements model. The automatic generation of UML diagram from natural language requirements is highly challenging. Unified Modeling Language (UML) models are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Evaluating the Performance of Routing Protocols in Wireless Sensor Networks

    Sensor nodes in Wireless Sensor Networks are connected via wireless links. The function of these nodes are sensing the events when placed in the environment and sending those sensed data to the base station..Many routing, power management, and data dissemination protocols have been used for WSN. The nature of WSN...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detection Approaches Inside the Cloud

    In a malicious cloud system, handling of incident, challenges and risks, is an integral part of security management. In this paper, the authors discuss various detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery, etc.). On side of existing processes and methods...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Agent Oriented Schemes for Trustworthy Semantic Web Services

    Today, the authors use internet for every E-commerce related activity. As it is pointed by various researchers that E-commerce should be trustworthy and autonomous in their work .There are various applications they cannot trust unless and until they have some past experiences or some knowledge about it. In this paper,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Rough Set Based Classification Rule Mining

    Decision tree technology has proven to be a valuable way of capturing human decision making within a computer. As j48 select those attribute as splitting attributes which have different values whether it classify dataset properly or not. There is another drawback of j48 which repeat sub tree many times and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Record-Level Information Extraction from a Web Page Based on Visual Features

    Web databases contain a huge amount of structured data which are easily obtained via their query interfaces only. Query results are presented in dynamically generated web pages, usually in the form of data records, for human use. Decisive for web data integration applications is the problem of automatically extracting data...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Comparison of K-Means and Backpropagation Data Mining Algorithms

    Data mining has got more and more mature as a field of basic research in computer science and got more and more widely applied in several other fields. Data mining has been recognized by many researchers as a key research topic in data handling. Data mining is the important approach...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Modified S2 and Pattern Search Methods to Find Optimal Cluster Centroid for Multi-Variable Functions

    Identification of useful clusters in large datasets has attracted considerable interest in clustering process. Since data in the World Wide Web (WWW) is increasing exponentially that affects on clustering accuracy and decision making, change in the concept between every cluster occurs named concept drift. To detect the difference of cluster...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Implementation of Module Based Partial Reconfigurable Multiplier

    A reconfigurable structure allows the user to provide a large number of resources that can be used in different ways by different applications. This paper presents the design methodology of reconfigurable array multipliers. An 8-bit reconfigurable multiplier can execute one 8-bit and two 4-bit multiplications depending upon three control signals....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Hardware Implementation of Discrete Fourier Transform and Its Inverse Using Floating Point Numbers

    In this paper, the authors concentrate on the FPGA implementation of Discrete Fourier Transforms (DFT) and Inverse Discrete Fourier Transform (IDFT) based on floating point numbers. Floating point representation of the numbers support much wider range of values and achieve greater range at the expense of precision. Firstly general purpose...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Performance Evaluation of Equalizers and Different Diversity Techniques Using OFDM

    In this paper, the authors analyzed the performance of different diversity techniques, which can be easily applied with Orthogonal Frequency Division Multiplexing (OFDM) systems with different equalizing methods. Orthogonal frequency division multiplexing is well known to be a useful technique for high rate data transmission over a frequency selective fading...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Explore the Performance of the ARM Processor Using Protocol Trainer

    Recently, the evolution of embedded systems has shown a strong trend towards application specific, single chip solutions. The ARM processor core is a leading RISC processor architecture in the embedded domain. The ARM family of processor supports a unique feature of code size reduction. In this paper it is illustrated...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Mar 2012

    Random Accessibility of Text Searching Using Compression in Information Retrieval

    Increase in demand for quicker dissemination of information, from contents stored in a variety of forms requires speedy search and timely retrieval. The values of documents are measured according to the information it contains but they are proved useless until the stored information is brought out for use by the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Mar 2012

    Effective Content Based Data Retrieval Algorithm for Data Mining

    Data mining techniques are used in a many research areas, including mathematics, cybernetics, genetics and marketing. Web mining, a type of data mining used in Customer Relationship Management (CRM), takes advantage of the huge amount of information gathered by a web site to look for patterns in user behavior. Data...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    A New Congestion Control Algorithm for High Speed Networks

    Now-a-days, more and more applications require fast transfer of massive data over networks, and the emergence of high-speed networks provide an ideal solution to this challenge. Due to the limitations of the conservative congestion control algorithm, the standard TCP is no longer appropriate for high-speed networks to efficiently utilize the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Analysis of Query Dependent Summarization Using Clustering Techniques

    Web is playing a vital role as a resource of information. One can upload, download, access the data from web for decision making to get data query independent technique is already developed. But to have the proper data one has to go for query dependent summarization. As many documents are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Efficient Remote Storage for Mobile Device

    To provide the file storage space on remote server and to access the file from mobile device when ever required is one of the challenging task. The ability to access remote file storage from mobile devices enables a number of new use cases for storing and sharing data. The authors...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Increase Bandwidth for Circular Microstrip Patch Antenna

    In this paper a design and performance of a circularly microstrip patch antenna, for the application in Wireless Local Area Network (WLAN), are reported here. The antenna is a proximity coupled microstrip patch antenna where the radiating patch is loaded by a V-slot. This miniaturized microstrip antenna has wide bandwidth...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Review Study of Routing Protocols and Versatile Challenges of MANET

    MANET is collection of mobile devices form a self-creating, self-organizing and self-administering wireless networks or MANET is the collection of multi-hops mobiles (wireless) nodes. These are communicate with each other without any centralized control or established infrastructure. Infrastructure less environment and frequently changing topology are used. As wireless links are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Fuzzy Decision Tree based Effective IMine Indexing

    Database management system is a set of programs that allows storing, modify, and obtain information from a database. With the huge increase in the amount of information, it is very difficult to manage these databases. Hence there is a need for an effective indexing technique. The advantage of using index...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Improving AODV Routing Protocol With Priority and Power Efficiency in Mobile Ad Hoc WiMAX Network

    These days' ad hoc networks have found many applications. Multiple ad hoc routing protocols have been proposed, of which on-demand routing protocols are very popular because they are easy to realize and have no power and priority concept for data communication in routing. In Mobile Ad hoc NETworks (MANETs), routing...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Effect of Turbo Coding on OFDM Transmission to Improve BER

    A model of Turbo code based on OFDM (Orthogonal Frequency Division Multiplexing) is proposed in this paper. Orthogonal Frequency Division Multiplexing (OFDM) has become a popular modulation method in high speed wireless communications. By partitioning a wideband fading channel into flat narrowband channels, OFDM is able to mitigate the detrimental...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Performance Improvement of Wireless Mobile by DSR

    To achieve this one has to concentrate on the routing protocol. Transmission Control Protocol (TCP) is the dominating end-to-end transport layer protocol which provides secure and reliable data transfer together with some other protocols in the protocol stack Recent works in transport protocols for ad-hoc networks have investigated the impact...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Mobile Agent for Distributed Intrusion Detection System in Distributed System

    Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Novel Probabilistic Approach for Detecting Attack on Routing Protocols in Wireless Sensor Network

    The proposed system come up with an idea for detecting various types of routing attacks in wireless sensor network considering AODV protocol. Considering the previous research work, system identifies the probability of the routing attack over the dynamic topology of wireless sensor network where it has assumed a faster propagation...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

    Now-a-days digital watermarking is very popular field for the researchers because it provide the better solutions for authentication and copyright protection problems of digital object. Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of information under a digital object (image, video, audio) for...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    New Framework for Web Access Prediction

    Basically the web mining is the task related to the database to collect the information related to the web page access in the form of web session for the future analysis. The web mining enables the prediction of page access and the analysis of user navigation behavior. In recent years,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Positioning Webpage Using Rank

    World Wide Web (WWW) is a vast resource of hyperlinked and heterogeneous information including text, image, audio, video, and metadata. It is estimated that WWW has expanded by about 2000% since its evolution and is doubling in size every six to ten months. With the rapid growth of information sources...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Web Data Extraction using Ontology and SWRL

    Ontology is used for formal semantics and it is look like a backbone of every semantic web applications. In this system a technique is proposed for ontology design using semantic web rule language. By this technique, existing web applications design methods may easily be upgraded for semantic web applications. The...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Environmental Data Acquisition Using (ENC28J60)

    In an industry there are many locations in which the people need exact amount of environmental parameters such as temperature, humidity, CO2 gas etc. Ethernet is a local area technology, which is used for reliable and efficient transfer and access of information across the devices connected to the network. Once...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Data Mining Approaches for Network Intrusion Detection System

    Data mining has been gaining popularity in knowledge discovery field, particularity with the increasing availability of digital documents in various languages from all around the world. Network intrusion detection is the process of monitoring the events occurring in a computing system or network and analyzing them for signs of intrusions....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Data Logger System: A Survey

    Knowledge of temperature and relative humidity course during a certain time is needed in scientific, medical and industrial applications. For retrieval of this information from various devices such as manual readings, chart recorders or data loggers can be used. A data logger is an electronic device that combines analog and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2011

    Fingerprint-Based Identification System: - A Survey

    Fingerprint authentication is possibly the most sophisticated method of all biometric techniques and has been thoroughly verified through various applications. Even features such as persons gait, face or signature may change with passage of time and may be fabricated or imitated. However, a fingerprint is completely unique to an individual...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2011

    Enhancement of OFDM System Performance With MIMO Technique

    This paper shows that the performance of MIMO-OFDM system can be improved by using the efficient coding scheme. In this paper Optimum adaptive algorithms are applied to multicarrier system with Space-Time Block Coding (STBC) scheme over Rayleigh fading channels. This method has been employed in MIMO-OFDM system in order to...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2011

    A Brief Overview on Data Mining Survey

    This paper provides an introduction to the basic concept of data mining. Which gives overview of Data mining is used to extract meaningful information and to develop significant relationships among variables stored in large data set/data warehouse. In the case study reported in this paper, a data mining approach is...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Efficient Remote Storage for Mobile Device

    To provide the file storage space on remote server and to access the file from mobile device when ever required is one of the challenging task. The ability to access remote file storage from mobile devices enables a number of new use cases for storing and sharing data. The authors...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Review Study of Routing Protocols and Versatile Challenges of MANET

    MANET is collection of mobile devices form a self-creating, self-organizing and self-administering wireless networks or MANET is the collection of multi-hops mobiles (wireless) nodes. These are communicate with each other without any centralized control or established infrastructure. Infrastructure less environment and frequently changing topology are used. As wireless links are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Increase Bandwidth for Circular Microstrip Patch Antenna

    In this paper a design and performance of a circularly microstrip patch antenna, for the application in Wireless Local Area Network (WLAN), are reported here. The antenna is a proximity coupled microstrip patch antenna where the radiating patch is loaded by a V-slot. This miniaturized microstrip antenna has wide bandwidth...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    A New Congestion Control Algorithm for High Speed Networks

    Now-a-days, more and more applications require fast transfer of massive data over networks, and the emergence of high-speed networks provide an ideal solution to this challenge. Due to the limitations of the conservative congestion control algorithm, the standard TCP is no longer appropriate for high-speed networks to efficiently utilize the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Dec 2011

    An Improved Approach for IRIS Authentication System by Using Daugman's Rubber Sheet Model, Segmentation, Normalization and RSA Security Algorithm

    This paper combines different modules to improve the performance of an iris reorganization system. Iris is emerging as one of the important methods of biometrics-based identification systems. This iris system consisted of major components: image preprocessing, segmentation, edge detection, normalization, pattern matching and encryption decryption, as project basically explains the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2012

    Cluster Analysis in Datamining

    The term cluster analysis encompasses a number of different algorithms and methods for grouping objects of similar kind into respective categories. A general question facing researchers in many areas of inquiry is how to organize observed data into meaningful structures, that is, to develop taxonomies. In another word cluster analysis...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2012

    Design and Implementation for 8 Bit Double Harvard Core Processor for Small Scale Systems

    From the architecture point of view, the microprocessor chips can be classified into two categories: Complex Instruction Set Computers (CISC) and Reduce Instruction Set Computers (RISC). In either case, the objective is to improve system performance. The debates between these two architectures made this research area very interesting, challenging, and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Rule Based Reduction Using Dominant Rule Determination

    Fuzzy logic has quickly become one of the most successful in today's technologies. In this paper, the authors propose the dominant rule determination method to compress the fuzzy rules. This method compresses fuzzy system, with large number of rules into a smaller fuzzy system by removing the redundant rules in...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    An Embedded Electric Meter Based on ARM9 and Zigbee Technology

    The authors design an embedded electric meter based on zigbee data acquisition system in view of the complicated cables and accident potential in the process of data acquisition of electric meter. Combined wireless zigbee communication technology with data acquisition system, they build wireless data acquisition system based on ARM9 processor...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Low Power CORDIC Core with High Throughput

    CORDIC (COrdinate Rotation for DIgital Computers) an economical replacement for the use of Multipliers, is a fast and efficient algorithm that can be used for any type of digital signal processing architectures (Microprocessor). The latest trends in VLSI technology enhance different ways of implementing the CORDIC architecture. This paper focuses...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    A New Low Power Technology for Power Reduction in SRAM's using Column Decoupling Combined with Virtual Grounding

    In this paper, the authors are going to modify the column decoupled SRAM for the purpose of more reduced leakages than the existing type of designs as well as the new design which is combined of virtual grounding with column decoupling logic is compared with the existing technologies & the...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Comparison and Evaluation for Grouping of Null Data in Database Based on K-Means and Genetic Algorithm

    With the rapid rise of possibilities to collect and to store large amounts of data electronically tools for the data analysis also have gained increasingly in importance. This magnitude of data can contain a lot of potentially important knowledge which, however, must be firstly extracted from data within the scope...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Rough Set Based Classification Rule Mining

    Decision tree technology has proven to be a valuable way of capturing human decision making within a computer. As j48 select those attribute as splitting attributes which have different values whether it classify dataset properly or not. There is another drawback of j48 which repeat sub tree many times and...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Record-Level Information Extraction from a Web Page Based on Visual Features

    Web databases contain a huge amount of structured data which are easily obtained via their query interfaces only. Query results are presented in dynamically generated web pages, usually in the form of data records, for human use. Decisive for web data integration applications is the problem of automatically extracting data...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Comparison of K-Means and Backpropagation Data Mining Algorithms

    Data mining has got more and more mature as a field of basic research in computer science and got more and more widely applied in several other fields. Data mining has been recognized by many researchers as a key research topic in data handling. Data mining is the important approach...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Apr 2012

    Modified S2 and Pattern Search Methods to Find Optimal Cluster Centroid for Multi-Variable Functions

    Identification of useful clusters in large datasets has attracted considerable interest in clustering process. Since data in the World Wide Web (WWW) is increasing exponentially that affects on clustering accuracy and decision making, change in the concept between every cluster occurs named concept drift. To detect the difference of cluster...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Feb 2012

    Fuzzy Decision Tree based Effective IMine Indexing

    Database management system is a set of programs that allows storing, modify, and obtain information from a database. With the huge increase in the amount of information, it is very difficult to manage these databases. Hence there is a need for an effective indexing technique. The advantage of using index...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Performance Evaluation of the PHY & MAC for WLAN Systems and Efficiency Improvement by Application of Convolution Codes

    This Paper describes the performance Evaluation of PHYsical layer (PHY) in WLAN System. A MATLAB simulation is carried out on WLAN baseband processor/transceiver. Orthogonal Frequency Division Multiplexing (OFDM) is applied in this project according to the IEEE 802.11 a standard, which allows Transmission of data rates from 6Mbps up to...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    A Review and Comparative Study of Block Based Symmetric Transformation Algorithm for Image Encryption

    This paper is to provide knowledge of safety of images which is traveling over internet. Moreover, an image-based data requires more effort during encryption and decryption. In this paper, the authors present some advantages and disadvantages of existing algorithm for encryption and decryption of an image with the same objective....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Object-Oriented Metrics and Models in Software Quality Engineering

    Coupling Between Objects (CBO) is a count of the number of other classes to which a class is coupled. It is measured by counting the number of distinct non-inheritance related class on which a class depends. Excessive coupling is unfavorable to modular design and prevents reuse. The more independent a...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    An Integrated Encryption Scheme Used in Bluetooth Communication Mechanism

    To improve the security level of data Transmission in Bluetooth communication, An Integrated Encryption Scheme algorithm based on IDEA, RSA and MD5 is proposed. The currently hybrid encryption algorithm uses DES and RSA Algorithm, DES use for Encryption of Data and RSA use for Encryption of Key. Hybrid encryption algorithm...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Balance Key Algorithm for Uniform Coverage in Heterogeneous Wireless Sensor Network

    The deployment of Wireless Sensor Network is becoming more common in a wide range of environments. Many applications that make use of Wireless Sensor Networks require secure communication. The author design and implement a protocol set which is known as LBDP (Location Based Direct Protocol) and LBIP (Location Based Indirect...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    An Improved Version of Binomial Heap to Upgrade Network Optimization

    Applications of network optimization algorithms can be found in computer networks where routers must be able to find optimal routes over an often vast and dynamic network topology. Obviously it is paramount that these computations be executed as quickly as possible or else network performance will be suboptimal. To implement...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Implementation of Intelligent Polling System Using GSM Mobile

    An E-voting, Electronic voting systems, also known as Personal Response Systems (PRS), Audience Response Systems (ARS) or Classroom Communication Systems (CCS) use handsets as transmitter if the person is within the range of receiver or uses GSM Mobile Equipment (ME) to reply from anywhere. To minimize the disadvantages of generic...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Dynamic Memory Scheduling Using FPGA

    The new portable embedded applications such as media processors, where computation complexity is astronomical. Data transfers & huge number of memory accesses creates borderline for computational speed of signal processing. Memory access scheduling is important for media processor to use memory bandwidth more effectively. The paper targets to handle dynamic...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Performance Optimization in Ad-hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes which communicate over radio. Mobile ad hoc networks are infrastructure-free, pervasive, ubiquitous and without any centralized authority. These kind of networks are very flexible, thus they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Nov 2011

    Hyper Secure Cryptographic Algorithm to Improve Avalanche Effect for Data Security

    Encryption is the main aspect of cryptography for the secure transformation, which is the focus of this paper. Because it is important to note that while cryptography is necessary for secure transformation of information, it is not by itself sufficient. In this paper, the authors are showing a new encryption...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Oct 2011

    Adaptive Optimised Approach for Image Denoising for SDR Implementation in Cognitive Radio

    Wireless Communication today is heading towards dynamic spectrum allocation technology i.e. Cognitive Radio (CR). Increased demand over the usable spectrum has left no alternative than CR for seamless communication. Working in the dynamic spectrum allocation era demands flexibility and re-configurability from trans-receiver radio systems. The Software Defined Radio (SDR) thus...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Performance Evaluation of Multi-Threaded System Vs. Chip-Multi-Processor System

    The purpose of this paper is to analyze and compare the performance of multi-threaded system and chip-multi-processor system. Currently, various types of multi-core and multi-threaded processors are popularly used in all the domains. Even mobile devices have two or more cores to improve the performance. While those two technologies are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Energy Aware Threshold Based Efficient Clustering (EATEC) for Wireless Sensor Networks

    This paper presents a new protocol called Energy Aware Threshold based Efficient Clustering (EATEC) which aims to reduce energy consumption within the wireless network. Efficiency of a wireless network depends on mainly of energy consumption. In cluster based protocols, changing of cluster and cluster head also consume more energy. So,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    A Survey on Gossip-Based Energy Conservation for Wireless Ad Hoc Network Routing

    This paper presents a survey of Gossip based Sleep Protocol (GSP) and extensions of GSP for energy conservation for wireless ad hoc networks and sensor networks. In GSP, each node randomly goes to sleep for some time with gossip sleep probability p. When the value of p is small enough,...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Cloud Computing: A New Aspect of Technology

    Cloud Computing is the most discussed topic now a days. This concept decreases the overhead to install software, hardware and resources, which is time and space consuming task. Cloud Computing (CC) is pay-as-you-go concept who allows users to access the resources as they pay for it. A decade is passing...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    Impact of Agile Methodology on Software Development Process

    Agile methodology that utilizes iterative development and prototyping are widely used in variety of industry projects as a light weight development method which can satisfy to the changes of requirements. Short iterations are used that are required for efficient product delivery. Traditional software development processes are not much efficient to...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Aug 2012

    PAPR Reduction in OFDM System Using Tone Reservation Technique

    OFDM (Orthogonal Frequency Division Multiplexing) is spectrally efficient modulation technique used for higher data rate transmission. Basically OFDM system is very effective technique in its way, but main disadvantage is Peak to Average Power Ratio. This ratio must be reduce to perform efficient communication. Different technique can be used to...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis of Maximal Ratio Combining Performance in CDMA20001x Mobile Radio Network

    Recently, wireless communication systems support not only voice communication but also other high-speed data and multimedia services. These services require high data rates with low delay and Bit Error Rate (BER). But, it is difficult to support these requirements with wireless systems due to some constraints in the system design....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power....

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Performance Evaluation of Gateway Discovery Approaches in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

    The connection of ad hoc network to the internet is established using gateways. To start the internet connection in MANET, first process is that the gateway is to be discovered by the mobile nodes. As the internet is the global service the user are to be satisfied by the integration...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Analysis of Image Watermarking by DWT and Performance Under Attacks

    The Most popular method for copyright protection is Image watermarking by Discrete Wavelet Transform (DWT) which performs 2 Level Decomposition of original (cover) image and watermark image is embedded in Lowest Level (LL) sub band of cover image. Inverse Discrete Wavelet Transform (IDWT) is used to recover original image from...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Textual Requirement Analysis for UML Diagram Extraction

    Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it is created which is termed as requirements model. The automatic generation of UML diagram from natural language requirements is highly challenging. Unified Modeling Language (UML) models are...

    Provided By International Journal of Computer Technology and Electronics Engineering

  • White Papers // Jun 2012

    Evaluating the Performance of Routing Protocols in Wireless Sensor Networks

    Sensor nodes in Wireless Sensor Networks are connected via wireless links. The function of these nodes are sensing the events when placed in the environment and sending those sensed data to the base station..Many routing, power management, and data dissemination protocols have been used for WSN. The nature of WSN...

    Provided By International Journal of Computer Technology and Electronics Engineering