International Journal of Electronics and Computer Science Engineering

Displaying 41-80 of 200 results

  • White Papers // Jan 2013

    Design and Analysis of C0-Axial Feed Rectangular Patch Antenna on High Impedance Surface

    Increasing the demand of wireless communication systems, the micro strip patch antennas becomes very popular because of its low cast, light weight, easy to feed and attractive radiation characteristics. In spite of various advantages it also suffers with some draw backs such as narrow band width, low gain and surface...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Designing Low Power Circuits: A Review

    The growing market of battery-operated portable applications like laptop, mobile etc requires microelectronic devices with low power consumption. As transistor size continues to shrink and as need for more complex chips increases, power management of the chip is one of the key challenges in VLSI industry. The manufacturers are looking...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Band Width of Micro Strip Antenna Improved by Using Parasitic Array

    Microstrip patch antennas are widely used in various applications because of low profile, light-weight, low cost and easily integration with RF devices. It is widely used mobile, missile, satellite etc. However, microstrip antennas have many disadvantages. One of them is the excitation of surface waves that occur in the substrate...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Microstrip Antenna for X and Ku Band

    A design of microstrip patch antenna gap coupled with two parasitic elements on its non-radiating edges and a single parasitic element on its radiating edge for the operation in X band and Ku band is proposed here. The parasitic elements are partially shorted. This design is giving an impedance bandwidth...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Simulation of Full Duplex Data Transmission in Rof System Using Optisystem

    Wireless coverage of the end-user domain; be it outdoors or indoors, is poised to become an essential part of broadband communication networks. In order to offer integrated broadband services (combining voice, data, video, multimedia services, and new value added services), systems will need to offer higher data transmission capacities. The...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    A Survey of Advanced Microwave Frequency Measurement Techniques

    Microwaves are radio waves with wavelengths ranging from as long as one meter to as short as one millimeter, or equivalently, with frequencies between 300 MHz and 300 GHz. The science of photonics includes the generation, emission, modulation, signal processing, switching, transmission, amplification, detection and sensing of light. Microwave photonics...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    An Overview of Technical Aspect for WiFi Networks Technology

    Generally the wireless networks have been widely developed Compared with wired network and the wireless communication removes the restriction of wired connections, as well as support to ubiquitous access to the Internet. One of successful wireless networks architecture is WiFi (Wireless Fidelity) which is based on a serial standard of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Development of a Secured Security System for an Automobile Using GSM Technology and Electronic Circuit

    This paper focuses on the design and development of a security system for an automobile using GSM technology and electronic circuit which is being used to prevent or control the theft of a vehicle. The case of car hijacking has become so rampant that it has become a threat to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Routing Optimization Performance on Ad-Hoc Network: Distributed Approach Using 4G Devices

    Information and Communication technology try to reach the realistic world in the virtual system via using the 4G communication devices in real time applications. While adopting the 4G communication devices in the exiting environment, various Quality of Services issue occurs to meet the realistic system. QoS issues include the device...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Malware Detection and Removal Techniques

    Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wide Band Slotted Microstrip Antenna for Wireless Communications

    The proposed antenna design approach is based on a single-layer, rectangular patch (Length=80mm and Width=60mm) with inverted U-slot, horizontal and vertical edge slots on the patch with coaxial probe feed. The proposed antenna is modeled using IE3D ElectroMagnetic (EM) simulation packages namely IE3D from Zeland. The proposed antenna shows the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design Consideration of Microstrip Patch Antenna

    The study of microstrip patch antennas has made great progress in these days. This is mostly due to their versatility in terms of possible geometries that makes them applicable for many different situations. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects like low cost, lighter...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Rhombic Split Ring Resonator (R-SRR) Structure on Rectangular Patch Antenna Design

    This paper focusing on the effect of the complementary Rhombic Split Ring Resonator (R-SRR) structure of gain, return loss and the radiation pattern the rectangular patch antenna design. The basic rectangular patch antenna design had been simulated in CST Microwave Studio simulation software. Then, the single unit of the R-SRR...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Hazards and the Security with Respect to the Physical Layer in Common Networks

    The entire online revolution is because of the growth of networking technologies. The authors use computer networks to carry out bank transactions, to manage the power grid, to control the transport infrastructure, to fight crime, to buy and sell goods and services and so on. A network is a combination...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Analysis of Grid Based Distributed Data Mining System for Service Oriented Frameworks

    Distribution of data and computation allows for solving larger problems and execute applications that are distributed in nature. A grid is a distributed computing infrastructure that enables to manage large amount of data and run business applications supporting consumers and end users. The grid can play a significant role in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Effect of Black Hole Active Attack on Reactive Routing Protocol AODV in MANET Using Network Simulator

    Mobile ad-hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. MANET has potential applications in very unpredictable and dynamic environments. Due to security vulnerabilities of the routing protocols, wireless...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Impact of Link Breaks on AODV and AOMDV in MANET: A Performance Analysis

    MANETs are ad hoc multi hop networks, formed of mobile battery chargeable devices and commonly used in emergency situations. With its dynamic topology and limited energy level they often come across with link breaks. This paper analyzes how energy consumption of the mobile devices and density of mobile nodes affects...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Data Security in Communications: A Study of Cryptography and Steganography Techniques

    Long distance communication using electronic media is prone to unwanted interception just rather more than the communication over traditional channels was. While the traditional communication systems were insecure, it was rather more difficult to intercept communication without the communicating parties realizing that someone has seen the written message, due to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    PGBR Protocol for Cloud Routing Implementation in NS-3

    The current internet infrastructure is fronting a number of boundaries that is not suitable to meet the growing number of services and users. In particular, one aspect that requires enhancement is routing, where original routing concepts were designed for static traffic patterns with minimal variations and supporting mainly low through...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Fingerprint Pattern Recognition Using Back Propagation Algorithms

    Humans have used body characteristics such as face, voice, gait, etc. for thousands of years to recognize each other. A biometric fingerprint recognition system has most reliable for robust recognition in world. In this paper, Fingerprint recognition is one of the accurate biometric recognition system and identification of Human fingerprint...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Design of DDR3 SDRAM controller

    DDR3 SDRAM memory controller is the interface between DDR3 memory and the user. The design consists of front end and back end modules. The memory controller manages the flow of data going to and from the main memory. The front end provides interface to the user side and it consists...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Scalability of LBS in Mobile GIS Using Web Services

    GIS becomes an active research area in the field of GIS. Information collection is one of the most important fact in application directions of mobile GIS. Spatial Data Infrastructures (SDI) providing geospatial web services as well as mobile GIS. In this paper was to investigate the possibility of designing and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Performance Analysis of TORA & DSR Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Need of Securing Migrating Crawling Agent, Remote Platform and the Data Collection

    Using migrating (mobile) crawling agents, the process of selection and filtration of web documents can be done at web servers rather than search engine side, which reduces network load caused by the web crawlers. The mobile code from search engine side transfers and executes on web servers, an environment controlled...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Design and Analysis of Isolation Improvement and Compact Size of SPDT Switch with Switchable Open Stub Resonator for Wireless Communication

    Two new designs of switchable microstrip line open stub resonator are proposed for isolation improvement of SPDT discrete PIN diode switch which is targeted for wireless communication such as WiMAX and LTE application at 3.5 GHz band. Despite of isolation improvement, the second design of the resonator can reduce overall...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Nov 2012

    Countering Count-to-Infinity in High Speed Networks

    Routing tables of all the routers needs frequent updates due topology changes resulting because of link failures or link metric modifications. Each of those updates may cause transient routing loops. These loops pose significant stability problems in Wireless Networks. Distributed routing algorithms capable of avoiding such transient loops in network...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Nov 2012

    A New Hardware Architecture for Parallel Shortest Path Searching Processor Based-on FPGA Technology

    In this paper, a new FPGA-based parallel processor for shortest path searching for OSPF networks is designed and implemented. The processor design is based on parallel searching algorithm that overcomes the long time execution of the conventional Dijkstra algorithm which is used originally in OSPF network protocol. Multiple shortest links...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Usage of Data Mining for Analyzing Customer Mindset

    As this is the era of information technology, no filed remains untouched by computer science. The technology has become an integral part of the business process. By implementing different data mining techniques and algorithms on the feedback collected from the customer, the authors can analyzed the data. With help of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Auto Disinfectant Cleaner using AVR Microcontroller

    The trend of microcontroller in industrial as well as domestic application is increasing now-a-days. The use of microcontroller is increasing due to the following advantages/features of controller such as processor reset, device clocking, central processor, RAM, I/O pins and Instruction cycle timers. There are two types of microcontroller available. They...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Securing VOIP Networks Via Transport Protocols Layer

    Voice over Internet Protocol (VoIP), is a technology that allows the people to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. VoIP services have compelling technical advantages over circuit switching. VoIP networks are based more on an open architecture than that of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Ant Colony Based Routing in Wireless Sensor Networks

    Wireless sensor networks comprises of small sensor nodes communicating with each other in a network topology which keeps on varying. The wireless sensor nodes also known as motes have limited energy resources along with constraints on its computational and storage capabilities. Due to these restrictions coupled with its dynamic topology,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Analysis and Security Measures of Malware in Mobile Device

    New mobile technologies are growing rapidly. Smart phones and iPhones has added new dimensions in the field of mobile technology. It is used not only for conversation but also to carry data. The various features of Smartphone are Wi-Fi, touch-screen, SMS, digital camera, games, various apps, GPS system, mobile browsing,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Oilwell Monitoring and Control Based on Wireless Sensor Networks Using ARM

    The existing Oil-Pumping Unit (OPU) system has a high power consuming process. It has the incapability of OPU's structural health monitoring. A sensor network based intelligent control is proposed for power economy and efficient oil-well health monitoring using wireless sensor network. The proposed system consists of three-level sensors: First Level...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Encryption and Signature Scheme Implementation for Data Integrity Using Recoverable Concealed Data Aggregation

    Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Wi-Fi Based Multinode M.S Level Sensor in UAV's Using MEMS

    Communication networks and strategies for cooperative UAV swarms have received significant attention. The main problem in controlling autonomous vehicles needs some knowledge of its altitude angles. These angles can be measured in different ways, for instance, using a conventional inertial navigation system. A novel approach to deal these problems by...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Optimized and Secured Educlouds by Implementing Virtualization

    Cloud computing is an emerging technology that access remote servers through Internet to maintain data and applications. It incorporates the advantages of grid and utility computing. Academia has not remained unaware of this trend, and several educational solutions (LMS) based on cloud technologies are already in place, especially for Software...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

    This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but their paper is mainly focused on two types of DoS...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Energy Efficient Reactive Routing Using Energy Evaluation Model With CBR and VBR Traffic Model

    A Mobile Ad hoc NETworks (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize in to arbitrary and temporary network topologies, allowing people and devices to seamlessly communicate without any pre-existing communication architecture. One of the main issues in MANET routing protocols is development of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Group Mobility Model Based Proactive and Reactive Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a dynamic network Topology without the aid of any existing network infrastructure or centralized administration. Each node participating in the network acts as a host and as a router, means they have to forward packets and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Reactive and Proactive Routing Protocol Energy Efficiency Performance Analysis in Wireless Adhoc Networks

    MANET (Mobile Ad hoc NETwork) is a self organizing and self configuring network without the need of any centralized base station. It is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. MANETs are infrastructure less and can be set up anytime, anywhere. In...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Exploration of Data Mining Techniques in Fraud Detection: Credit Card

    Data mining has been increasing as one of the chief key features of many security initiatives. Often, used as a means for detection of fraud, assessing risk as well. Data mining involves the use of data analysis tools to discover unknown, valid patterns as well as relationships in large data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient Framework for QoS Based Multicasting for Large Scale Multimedia Content Distribution

    Multicasting is the process of sending the information to multiple destinations. This technology is highly efficient for delivering the large scale multimedia content where the end receivers have identical needs and similar set of system components. But in reality, the end users have heterogeneous set of requirements for different service...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design of a Narrow-Band Photonic Crystal Based Omni-Directional Mirror for Optical Fiber Communication

    Photonic Crystals (PCs) may be considered as a new class of optical materials. These materials are based on the interaction between an optical field and materials exhibiting periodicity on the scale of wave length. The main feature of photonic crystals is that they can prohibit the propagation of electromagnetic waves...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Intrusion Detection Systems for the Availability Attacks in Ad-Hoc Networks

    Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. So many approaches are proposed for Ad-Hoc Networks for dealing with various attacks. Trust based mechanism coupled with Ad Hoc Networks...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2012

    VLSI Design of a 16-Bit Pipelined RISC Processor

    In this paper, the authors have described the design of a 16-bit pipelined RISC processor for applications in real-time embedded systems. The processor executes most of the instructions in single machine cycle making it ideal for use in high speed systems. The processor has been designed to be implemented on...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Review on Media Independent Handover Services for Heterogeneous Wireless Communication Networks

    A seamless vertical handover between heterogeneous networks without interruption to the on-going services is very important in next generation wireless networks which aim at the provision of uninterrupted network connections anywhere and at any time. This paper provides a review on the vertical handover mechanism focusing mainly on the services...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Analytical Approach for Performance of Wireless Sensor Networks

    Wireless Sensor Networks (WSN) have been noticed and researched in recent years. WSNs have inherent and unique characteristics compared with traditional networks. It consists of light-weight, low power and small size Sensor Nodes (SNs). They have ability to monitor, calculate and communicate wirelessly. Sensor nodes should send their collected data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Stacked Wideband Microstrip-Line-Fed Wide Slot Microstrip Patch Antenna

    Microstrip antennas have many advantages over the conventional antennas because of light weight and low volume, low profile planar configuration which can be easily made conformal to host surface, low fabrication cost, capable of dual and triple frequency operations, mechanically robust when mounted on rigid surfaces rectangular microstrip antenna exhibits...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient Method for Extracting Features From Blurred Fingerprints Using Modified Gabor Filter

    Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes. Fingerprint is one of the most...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    EDFA-WDM Optical Network Analysis

    Optical network that apply Wavelength Division Multiplexing (WDM) is currently widely used in existing telecommunications infrastructures and is expected to play a significant role in next generation networks and the future internet supporting a large variety of services having very different requirements in terms of bandwidth, latency, reliability and other...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Secure QR-Pay System With Ciphering Techniques in Mobile Devices

    Mobile payment is very important and critical solution for mobile commerce. A user-friendly mobile payment solution is strongly needed to support mobile users to conduct secure and reliable payment transactions using mobile devices. This paper presents an innovative mobile payment system based on 2-Dimentional (2D) barcodes called QR-codes for mobile...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient of Finding and Tracking Inconsistencies in Software Design Models

    Software models typically contain many inconsistencies and consistency checkers help engineers find them. Even if engineers are willing to tolerate inconsistencies, they are better off knowing about their existence to avoid follow on errors and unnecessary rework. However, current approaches do not detect or track inconsistencies fast enough. This paper...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Wireless Sensor Networks - Architectures, Protocols, Simulators and Applications: A Survey

    Wireless Sensor Networks (WSNs) have emerged as a new research technology in the distributed computing environment and plays a very important role in the pervasive computing to support various applications. It has a great potential to be utilized in battlefields and in different commercial applications like traffic surveillance, habitat monitoring,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Direct User Data Authentication in Cloud

    Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Secure and Stability Practical Outsourcing in Cloud Computing

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Improvement of EduCloud Using a Refined Virtualization Technique

    Clouds provide an inexpensive remote access to hardware and storage resources. It has become a widely used term in the industry. Academics have not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for Software as a Service (SAAS) cloud. Extending...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Modified Energy Saving DSR Protocol for MANET

    MANETs are infrastructure less and can be set up anytime anywhere. One of the main design constraints in Mobile Ad Hoc NETworks (MANETs) is that they are power constrained. Hence, every effort is to be channeled towards reducing power. More precisely, network lifetime is a key design metric in MANETs....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Proposed Classification Approach for Software Component Reuse

    Component technologies in today's software engineering are based on the 'Buy, don't build' philosophy. In the current economic situation the life cycle of a software product is shortening, so new versions should be presented more often. This cannot be achieved unless great portions of the old version are reused in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Performance of Flat Routing Protocols in MANET

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers connected by wireless links. Self configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    A Hexagonal Multiband Fractal Antenna Using for Wireless Applications

    In this paper, a multiband Fractal antenna having the shape of hexagonal is proposed. This hexagonal antenna is used for different wireless applications. Three iterations of the hexagonal fractal multiband antenna are examined. With this structure it is possible to configure the multiband frequency at various bands and return loss...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    MicroBlaze Based Multi-Processor Implementation of Regrouping Particle Swarm Optimization Algorithm

    Particle Swarm Optimization (PSO) algorithms have been proposed to solve many engineering problems that require finding an optimal point of operation. PSO is not only susceptible to premature convergence, but also shows a highly problem dependant performance. Due to its apparently lower problem-dependency and more resistant to premature convergence, Regrouping...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Enhanced Throughput AES Encryption

    This paper presents the authors' experience in implementing the Advanced Encryption Standard (AES) algorithm. They have used 128 bit block size and 128 bit cipher key for the implementation. The AES also known as Rijndael algorithm is used to ensure security of transmission channels. Xilinx design tool 13.3 and Xilinx...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Effect of Amplifiers on Performance of Ringo Networks

    In high speed networks, meeting the targeted performance is largely dependent on the total number and the placement of the optical amplifiers. An efficient design not only cuts down the network cost by minimizing the required number of amplifiers, but also effectively reduces the undesirable fiber nonlinearities and the end-to-end...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    An Unsupervised Approach for Mining Multiple Web Databases

    Well Trained Record matching methods such as SVM, OSVM, PEBL, and Christen offers better performances when mining and filtering duplicate query results from multiple web databases. They require huge training data sets for pre-learning. Unsupervised Duplicate Detection (UDD) a query-dependent record matching method that requires no pre training was developed...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Design of Microstrip Patch Antenna With Hexaferrite Cavity in X-Band

    In this paper, a microstrip patch mounted on high impedance substrate with hexaferrite cavity is proposed. The proposed antenna design is simulated on Electro-Magnetic (EM) simulation software using FR-4 substrate with dielectric constant of 4.4 and thickness of 1.60mm. A microstrip fed low profile broadband dielectric resonator antenna is proposed...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    IFDMA-Promising Technique for 3G/4G

    In this paper, the authors discuss about a very promising technique for 3G/4G, IFDMA. The performance of IFDMA signal in terms of impact of PAPR and its power spectral density. The interleaved frequency division multiple accesses is based on multicarrier and single carrier modulation and compression, repetition and subsequent user...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Blocking Performance Enhancement Using Congestion Control in Optical Burst Switching Networks

    Issue of congestion in Optical Burst Switching Networks is the main issue now days. Congestion occurs when the reception time is less than transmission time during the transfer of data. In this paper, the authors had used modified erlang's loss formulae to control the congestion in Optical Burst Switching Networks....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Designing of Wireless Sensor Network Nodes to Detect Vibrational Changes for Structural Health Monitoring Application

    The Structural Health Monitoring (SHM) for building applications using wireless sensor networks is gaining a lot of interest now a day. The low power consumption, low cost and extendable network is a great challenge for designing and monitoring the building applications. Zigbee based on IEEE 802.15.4 characteristics are best suitable...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Comparative Study and Evaluation of Multipath AODV

    Ad hoc network is a temporary network and these networks nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. The design follows the idea that each node...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Performance Analysis of Different MANET Specific TCP Variants

    Transmission Control Protocol(TCP) is implemented in the transport layer of a MANET, which enjoys the advantage of reliable data transmission over the Internet. However, due to certain unique characteristics of a MANET, modification of classical TCP has been done so as to improve its performance in such an environment. Accordingly,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    BER Performance of ZF and MMSE Equalizers for V-Blast MIMO Wireless Communication

    Multiple-Input - Multiple-Output (MIMO) wireless systems use multiple antenna elements at transmit and receive to offer improved capacity and data rate over single antenna topologies in multipath channels. In such systems, the antenna properties as well as the multipath channel characteristics play a key role in determining communication performance. This...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Reactive and Proactive Routing Protocol Energy Efficiency Performance Analysis in Wireless Adhoc Networks

    MANET (Mobile Ad hoc NETwork) is a self organizing and self configuring network without the need of any centralized base station. It is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. MANETs are infrastructure less and can be set up anytime, anywhere. In...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

    This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but their paper is mainly focused on two types of DoS...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Energy Efficient Reactive Routing Using Energy Evaluation Model With CBR and VBR Traffic Model

    A Mobile Ad hoc NETworks (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize in to arbitrary and temporary network topologies, allowing people and devices to seamlessly communicate without any pre-existing communication architecture. One of the main issues in MANET routing protocols is development of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Group Mobility Model Based Proactive and Reactive Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a dynamic network Topology without the aid of any existing network infrastructure or centralized administration. Each node participating in the network acts as a host and as a router, means they have to forward packets and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Wi-Fi Based Multinode M.S Level Sensor in UAV's Using MEMS

    Communication networks and strategies for cooperative UAV swarms have received significant attention. The main problem in controlling autonomous vehicles needs some knowledge of its altitude angles. These angles can be measured in different ways, for instance, using a conventional inertial navigation system. A novel approach to deal these problems by...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Optimized and Secured Educlouds by Implementing Virtualization

    Cloud computing is an emerging technology that access remote servers through Internet to maintain data and applications. It incorporates the advantages of grid and utility computing. Academia has not remained unaware of this trend, and several educational solutions (LMS) based on cloud technologies are already in place, especially for Software...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Encryption and Signature Scheme Implementation for Data Integrity Using Recoverable Concealed Data Aggregation

    Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Analysis and Security Measures of Malware in Mobile Device

    New mobile technologies are growing rapidly. Smart phones and iPhones has added new dimensions in the field of mobile technology. It is used not only for conversation but also to carry data. The various features of Smartphone are Wi-Fi, touch-screen, SMS, digital camera, games, various apps, GPS system, mobile browsing,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Oilwell Monitoring and Control Based on Wireless Sensor Networks Using ARM

    The existing Oil-Pumping Unit (OPU) system has a high power consuming process. It has the incapability of OPU's structural health monitoring. A sensor network based intelligent control is proposed for power economy and efficient oil-well health monitoring using wireless sensor network. The proposed system consists of three-level sensors: First Level...

    Provided By International Journal of Electronics and Computer Science Engineering