International Journal of Electronics and Computer Science Engineering

Displaying 41-80 of 224 results

  • White Papers // Apr 2013

    VLSI Design and Implementation of Ternary Logic Gates and Ternary SRAM Cell

    In this paper the authors present Very Large Scale Integration (VLSI) design and simulation of a ternary logic gates and CMOS ternary SRAM cell. The simple ternary inverter, positive ternary inverter and negative ternary inverter are designed in 180nm technology. The ternary NAND gate and ternary NOR gate are also...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    An Analysis and Overview of Low Power Static Random Access Memory (SRAM) Design

    Memory is an important part of computer and microprocessor based system design. It is used to store data or information in terms of binary numbers. Low power SRAM is described with focus on different techniques used for power optimization. Challenges regarding reduction of static and dynamic powers are then discussed....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Data Extraction from Environment Using GPRS Sensors

    Increase in vehicular pollution affect on environment as well on human health, so this paper contain brief introduction to vehicular pollution. To monitor this pollution Wireless Sensor Network (WSN) system is proposed. The proposed system consists of a Mobile Data-AcQuisition unit (Mobile-DAQ) and a fixed internet-enabled Pollution monitoring Server (Pollution-Server)....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Soft Core Processor for Embedded System

    A softcore processor is a Hardware Description Language (HDL) model of a specific processor Central Processing Unit (CPU) that can be customized for a given application and synthesized for an ASIC or FPGA target. In many applications, softcore processors provide several advantages over custom designed processors such as reduced cost,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Low Cost Tunable Bandstop Filter Design of Defected Ground Structure Using FR4 Substrate

    This paper presents a tunable bandstop filter design using Defected Ground Structure (DGS) where FR4 substrate is used as a low cost solution compared to others substrate such as Teflon and Rogers RT/Duroid. Thus, the performance of the tunable DGS bandstop filter using FR4 substrate is analyzed in this paper....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Analysis of Communication Receiver Performance in Presence of Noise Jamming Using VISSIM/COMM

    A typical communication system includes three key elements: a transmitter, a communication medium (or channel), and a receiver. Modeling of all three of these elements is necessary in order to evaluate the performance of a Communication System under jamming condition as well. To meet this objective, simulation software "VisSim/Comm." is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Review on Reconfigurable Low Pass Bandstop Filter Based on Technology, Method and Design

    Reconfigurable filter technology is in robustness development. Due on the tunable and reconfigurable capability will contribute a various advantages in wireless applications. This tuning selectivity consist a numerous method, for example using varactor, micromachines, and PINdiodes. In this paper, the authors discussed PIN diodes as a switching element. The design...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Novel Compact CPW-FED Printed Dipole Antenna for UHF RFID and Wireless LAN Applications

    A novel compact CPW-fed printed dipole antenna is proposed for dual-band Ultra wide band (UHF) RFID and Wireless Local Area Network (WLAN) operations. This antenna consist of two dipole elements and it covers 2.53 GHz Ultra High Frequency (UHF) RFID and 5.2 GHZ WLAN IEEE 802.11 Standards. The return loss,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Design and Simulation of CPW-FED Printed Antenna for Ultra Wide Band (UWB) and Wireless LAN (WLAN) Applications

    In this paper, design and simulation of CPW-fed printed antenna for Ultra Wide Band (UWB) and WirelessLAN applications is proposed .The antenna is integrated with the CPW-fed. Return loss, gain and directivity and current distribution for the different frequencies are explored, It is shown proposed antenna has good gain and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Design of Cross-Shaped Slot Loaded Wideband Microstrip Patch Antenna for Mobile Communication

    Microstrip antennas are becoming very widespread within the wireless and mobile communication because of their various advantages over the conventional antennas. Microstrip antennas have many advantages over the conventional antennas because of light weight and low volume, low profile planar configuration which can be easily made conformal to host surface,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Patch Antenna with Low Pass Filter Design to Supress Higher Order Harmonics in Efficient Rectenna Design

    Wireless power transmission technology has become one of the most growing, high impact technology that will change the world in recent years. For wireless microwave power transmission rectenna is most important, rectenna means rectifier and antenna which is used for harvesting of microwave power or, converting ac current power to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Autonomic Data Replication in Cloud Environment

    Cloud computing is an emerging practice that offers more flexibility in infrastructure and reduces cost than the authors' traditional computing models. Cloud providers offer everything from access to raw storage capacity resources to complete application services. The services that are provided by the cloud can be accessed from anywhere and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    The BER Vs SNR Performance of FRFT-OFDM Systems Using Convolution Code

    Traditional Fast Fourier Transform algorithm makes the implementation of the multicarrier system feasible and attractive with respect to single-carrier systems. However, when the channel is doubly selective (i.e. time-frequency selective), this traditional methodology fails. Since the channel frequency response is rapidly time-varying as a result the optimal transmission/reception methodology not...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Coverage in Wireless Sensor Networks: A Survey

    Wireless sensor network is an emerging field which is accomplishing much importance because of its vast contribution in varieties of applications. Wireless sensor networks are used to monitor a given field of interest for changes in the environment. Coverage is one of the main active research interests in WSN. In...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Bandwidth and Gain Enhanced with H-Slotted Microstrip Patch for Wireless Communication

    This paper describes the enhancement of rectangular patch for GSM band of frequency 5.3 GHz. First the authors have designed a rectangular microstrip patch antenna. After that measurement results in terms of S11 and radiation pattern are given. Microstrip design equation are introduced and validated by simulated and experimental results....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Survey on Video on Demand Over Mobile Ad-Hoc Networks

    Video on demand is one of the most required technology used by the mobile users. But this technology still suffers with many problems because of low speed transmission and network load. In this paper, the authors have defined an intermediate router between the server and the client. The router is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Fuzzy Logic Controlled Cluster Head Selection for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), cluster based methods are well known with special advantage of scalability and efficient communication. In this case, the entire network is divided into clusters and in each cluster a cluster head node is selected, normally based on maximum residual energy. But there are other parameters...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Survey on Password Security Systems

    Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Prognosis of Different Cellular Generations

    Technological advancement in mobile telephony from 1G to 3G, 4G and 5G has a very axiomatic fact that made an entire world a global village. The cellular system employs a different design approach and technology that most commercial radio and television system use. In the cellular system, the service area...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Designing Parallel Bus Using Universal Asynchronous Receiver Transmitter

    This is designed to the core of a UART interface module, which includes both receive and transmit modules, and the command parser. This paper will be a viable solution to design parallel buses with the help of UART. In the test bench, there is a RFM (Register File Model) to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    The Roadmap for Cyber Crime Investigation

    As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called \"Cyber forensics.\" Cyber penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    A Dual Channel Technique for Content Protection in IPTV

    With the introduction of IPTV (Internet Protocol TeleVision), traditional wire-line content providers and service providers are entering a new era of delivering broadcast and Video On Demand (VOD) services to their customers. The Content Protection has becoming an extremely important issue as the use of IPTV services are increasing over...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Comparative Study of Proactive Routing Protocols for MANETs

    Mobile ad hoc network is an infrastructure-less self-configuring network of nodes. Each node of this type of network can move independently in any direction and will change its links to other devices frequently. To communicate to one node to another one each node can act as both host as well...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    In today's world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design and Analysis of C0-Axial Feed Rectangular Patch Antenna on High Impedance Surface

    Increasing the demand of wireless communication systems, the micro strip patch antennas becomes very popular because of its low cast, light weight, easy to feed and attractive radiation characteristics. In spite of various advantages it also suffers with some draw backs such as narrow band width, low gain and surface...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Band Width of Micro Strip Antenna Improved by Using Parasitic Array

    Microstrip patch antennas are widely used in various applications because of low profile, light-weight, low cost and easily integration with RF devices. It is widely used mobile, missile, satellite etc. However, microstrip antennas have many disadvantages. One of them is the excitation of surface waves that occur in the substrate...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Designing Low Power Circuits: A Review

    The growing market of battery-operated portable applications like laptop, mobile etc requires microelectronic devices with low power consumption. As transistor size continues to shrink and as need for more complex chips increases, power management of the chip is one of the key challenges in VLSI industry. The manufacturers are looking...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Microstrip Antenna for X and Ku Band

    A design of microstrip patch antenna gap coupled with two parasitic elements on its non-radiating edges and a single parasitic element on its radiating edge for the operation in X band and Ku band is proposed here. The parasitic elements are partially shorted. This design is giving an impedance bandwidth...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Simulation of Full Duplex Data Transmission in Rof System Using Optisystem

    Wireless coverage of the end-user domain; be it outdoors or indoors, is poised to become an essential part of broadband communication networks. In order to offer integrated broadband services (combining voice, data, video, multimedia services, and new value added services), systems will need to offer higher data transmission capacities. The...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    A Survey of Advanced Microwave Frequency Measurement Techniques

    Microwaves are radio waves with wavelengths ranging from as long as one meter to as short as one millimeter, or equivalently, with frequencies between 300 MHz and 300 GHz. The science of photonics includes the generation, emission, modulation, signal processing, switching, transmission, amplification, detection and sensing of light. Microwave photonics...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    An Overview of Technical Aspect for WiFi Networks Technology

    Generally the wireless networks have been widely developed Compared with wired network and the wireless communication removes the restriction of wired connections, as well as support to ubiquitous access to the Internet. One of successful wireless networks architecture is WiFi (Wireless Fidelity) which is based on a serial standard of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Development of a Secured Security System for an Automobile Using GSM Technology and Electronic Circuit

    This paper focuses on the design and development of a security system for an automobile using GSM technology and electronic circuit which is being used to prevent or control the theft of a vehicle. The case of car hijacking has become so rampant that it has become a threat to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Routing Optimization Performance on Ad-Hoc Network: Distributed Approach Using 4G Devices

    Information and Communication technology try to reach the realistic world in the virtual system via using the 4G communication devices in real time applications. While adopting the 4G communication devices in the exiting environment, various Quality of Services issue occurs to meet the realistic system. QoS issues include the device...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Malware Detection and Removal Techniques

    Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wide Band Slotted Microstrip Antenna for Wireless Communications

    The proposed antenna design approach is based on a single-layer, rectangular patch (Length=80mm and Width=60mm) with inverted U-slot, horizontal and vertical edge slots on the patch with coaxial probe feed. The proposed antenna is modeled using IE3D ElectroMagnetic (EM) simulation packages namely IE3D from Zeland. The proposed antenna shows the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design Consideration of Microstrip Patch Antenna

    The study of microstrip patch antennas has made great progress in these days. This is mostly due to their versatility in terms of possible geometries that makes them applicable for many different situations. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects like low cost, lighter...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Rhombic Split Ring Resonator (R-SRR) Structure on Rectangular Patch Antenna Design

    This paper focusing on the effect of the complementary Rhombic Split Ring Resonator (R-SRR) structure of gain, return loss and the radiation pattern the rectangular patch antenna design. The basic rectangular patch antenna design had been simulated in CST Microwave Studio simulation software. Then, the single unit of the R-SRR...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Hazards and the Security with Respect to the Physical Layer in Common Networks

    The entire online revolution is because of the growth of networking technologies. The authors use computer networks to carry out bank transactions, to manage the power grid, to control the transport infrastructure, to fight crime, to buy and sell goods and services and so on. A network is a combination...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Analysis of Grid Based Distributed Data Mining System for Service Oriented Frameworks

    Distribution of data and computation allows for solving larger problems and execute applications that are distributed in nature. A grid is a distributed computing infrastructure that enables to manage large amount of data and run business applications supporting consumers and end users. The grid can play a significant role in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Impact of Link Breaks on AODV and AOMDV in MANET: A Performance Analysis

    MANETs are ad hoc multi hop networks, formed of mobile battery chargeable devices and commonly used in emergency situations. With its dynamic topology and limited energy level they often come across with link breaks. This paper analyzes how energy consumption of the mobile devices and density of mobile nodes affects...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Data Dissemination in VANET Based Upon a Tree Topology

    Wireless communication between vehicles, known as Vehicular Ad hoc NETwork (VANET), allows providing drivers with information like safety, efficiency, speed limit, any obstacle on road, road condition, traffic condition, commercial advertisement etc for convenience purpose. In vehicular technology a variety of sensors, radars and onboard computing systems which helped vehicles...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Analysis of TCP in Mobile Adhoc Networks

    The most popular transport layer protocol TCP on the Internet offers reliable byte stream service. In this, packets are cumulatively ACKnowledged (ACK) as they arrive in sequence and out of sequence packets will cause generation of duplicate ACKs. TCP was basically developed for implementing on wired networks where it has...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Campus Access Control System RFID Based

    Radio Frequency IDentification (RFID) technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this paper is to show the business value of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Hackers and Intruders: Motives and Difference

    This paper presents the motives of hackers and intruders, and also there difference between them and also intentions with their way of thinking, planning and performing attacks for their personal gain and as well as others grow up. This shows the security of computer networks and information systems can't protect...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Exploring a Root-Cause Methodology to Prevent Emerging Internet Threat

    A "Botnet" consists of a network of compromised computers controlled by an attacker often called botmaster. Recently, botnets have become the root cause of many Internet attacks. To be well-prepared for future attacks, it is not only study how to detect and defend against the botnets that have appeared in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Analysis of Reconfigurable SRAM Cell for Low Power Applications

    The majority of space taken in an integrated circuit is the memory. SRAM design consists of key considerations, such as increased speed, low power and reduced layout area. A cell which is functional at the nominal supply voltage, can fail at a lower voltage. From a system perspective this leads...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Image Hiding in Video Sequence Based on MSE

    This paper propose a new method of hiding image in selected video sequence. The proposed algorithm is a hybrid image-hiding scheme based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). In this algorithm, the secret image is not embedded directly on the wavelet coefficients but rather than on...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Detection of Node Replication Attacks in Mobile Sensor Networks

    The advanced sensor network architectures could be used for a variety of applications including intruder detection, border monitoring, and military patrols. In potentially hostile environments, the security of unattended mobile nodes is extremely critical. Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Modified Discrete Binary PSO Based Sensor Placement for Coverage in WSN Networks

    The main idea of this paper is to solve coverage problem in distributed Wireless Sensor Network (WSN) by increasing sensor nodes coverage. This paper proposes a modified discrete binary particle swarm optimization algorithm for Wireless Sensor Network (WSN) nodes placement so that the maximum coverage is obtained.PSO is a real...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Building Cognitive Radio System Using Matlab

    Cognitive radio is an emerging and fascinating technology for the opportunistic use of under-utilized spectrum that promises to change the future technological trends forever if employed properly. This work focuses on the practical implementation of a cognitive radio network. The electromagnetic radio spectrum is a licensed resource which is carefully...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2012

    A Compact Printed Antenna for WiMAX Application

    A single feed compact microstrip antenna is proposed in this paper. Two L slits are introduced at right side of the patch. For the proposed antenna resonant frequencies are obtained at 3.48 GHz, 4.34 GHz and 5.65 GHz with bandwidth of 19 MHz, return loss - 20.2 dB, 42.6 MHz,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Improvement of EduCloud Using a Refined Virtualization Technique

    Clouds provide an inexpensive remote access to hardware and storage resources. It has become a widely used term in the industry. Academics have not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for Software as a Service (SAAS) cloud. Extending...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Modified Energy Saving DSR Protocol for MANET

    MANETs are infrastructure less and can be set up anytime anywhere. One of the main design constraints in Mobile Ad Hoc NETworks (MANETs) is that they are power constrained. Hence, every effort is to be channeled towards reducing power. More precisely, network lifetime is a key design metric in MANETs....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Proposed Classification Approach for Software Component Reuse

    Component technologies in today's software engineering are based on the 'Buy, don't build' philosophy. In the current economic situation the life cycle of a software product is shortening, so new versions should be presented more often. This cannot be achieved unless great portions of the old version are reused in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Performance of Flat Routing Protocols in MANET

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers connected by wireless links. Self configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    A Hexagonal Multiband Fractal Antenna Using for Wireless Applications

    In this paper, a multiband Fractal antenna having the shape of hexagonal is proposed. This hexagonal antenna is used for different wireless applications. Three iterations of the hexagonal fractal multiband antenna are examined. With this structure it is possible to configure the multiband frequency at various bands and return loss...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    MicroBlaze Based Multi-Processor Implementation of Regrouping Particle Swarm Optimization Algorithm

    Particle Swarm Optimization (PSO) algorithms have been proposed to solve many engineering problems that require finding an optimal point of operation. PSO is not only susceptible to premature convergence, but also shows a highly problem dependant performance. Due to its apparently lower problem-dependency and more resistant to premature convergence, Regrouping...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Enhanced Throughput AES Encryption

    This paper presents the authors' experience in implementing the Advanced Encryption Standard (AES) algorithm. They have used 128 bit block size and 128 bit cipher key for the implementation. The AES also known as Rijndael algorithm is used to ensure security of transmission channels. Xilinx design tool 13.3 and Xilinx...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Effect of Amplifiers on Performance of Ringo Networks

    In high speed networks, meeting the targeted performance is largely dependent on the total number and the placement of the optical amplifiers. An efficient design not only cuts down the network cost by minimizing the required number of amplifiers, but also effectively reduces the undesirable fiber nonlinearities and the end-to-end...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    An Unsupervised Approach for Mining Multiple Web Databases

    Well Trained Record matching methods such as SVM, OSVM, PEBL, and Christen offers better performances when mining and filtering duplicate query results from multiple web databases. They require huge training data sets for pre-learning. Unsupervised Duplicate Detection (UDD) a query-dependent record matching method that requires no pre training was developed...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Design of Microstrip Patch Antenna With Hexaferrite Cavity in X-Band

    In this paper, a microstrip patch mounted on high impedance substrate with hexaferrite cavity is proposed. The proposed antenna design is simulated on Electro-Magnetic (EM) simulation software using FR-4 substrate with dielectric constant of 4.4 and thickness of 1.60mm. A microstrip fed low profile broadband dielectric resonator antenna is proposed...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    IFDMA-Promising Technique for 3G/4G

    In this paper, the authors discuss about a very promising technique for 3G/4G, IFDMA. The performance of IFDMA signal in terms of impact of PAPR and its power spectral density. The interleaved frequency division multiple accesses is based on multicarrier and single carrier modulation and compression, repetition and subsequent user...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Blocking Performance Enhancement Using Congestion Control in Optical Burst Switching Networks

    Issue of congestion in Optical Burst Switching Networks is the main issue now days. Congestion occurs when the reception time is less than transmission time during the transfer of data. In this paper, the authors had used modified erlang's loss formulae to control the congestion in Optical Burst Switching Networks....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Designing of Wireless Sensor Network Nodes to Detect Vibrational Changes for Structural Health Monitoring Application

    The Structural Health Monitoring (SHM) for building applications using wireless sensor networks is gaining a lot of interest now a day. The low power consumption, low cost and extendable network is a great challenge for designing and monitoring the building applications. Zigbee based on IEEE 802.15.4 characteristics are best suitable...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design and Modification of Circular Monopole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz. The antenna is designed on FR4 substrate and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparative Study of Different Routing Protocols in MANET Based on Simulation Using Ns-2

    A mobile ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Analysis of Single Path AODV Vs Multipath AOMDV on Link Break Using NS-2

    The rapid development in communication technology has given rise to strong research interest on Wireless Networks. In recent years many researchers have focused on designing routing schemes which would successfully operate on the real time environment of Mobile Adhoc NETwork (MANET). MANET is a collection of mobile devices and is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    ZigBee Based Remote Sensing and Controlling With Communication Re-Link Algorithm

    The efficient design and implementation of WSN (Wireless Sensor Networks) has become an emerging area of research in recent years. In this paper a wireless remote sensing and controlling system for real time dynamics has been proposed. Variation in the temperature is recorded in the GUI window and proper controlling...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Real Time Vehicle Tracking System Using GSM and GPS Technology- An Anti-Theft Tracking System

    A vehicle tracking system is an electronic device installed in a vehicle to enable the owner or a third party to track the vehicle's location. This paper proposed to design a vehicle tracking system that works using GPS and GSM technology, which would be the cheapest source of vehicle tracking...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Survey on Upcoming ZigBee Technology in Future Communication System

    The IEEE 802.15.4 is a new standard defined for LR-WPAN which provides a low cost and very less complicated solution. The expected applications are home/office automation, industrial sensors and control, distributed sensor networks and environment monitoring. ZigBee is one of the newest technologies enabling Wireless Personal Area Networks (WPAN). ZigBee...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    On Demand Secure Routing in Mobile Ad-Hoc Network Based on Fidelity

    In Mobile Ad-hoc NETwork (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. The lack of static infrastructure causes several issues in Mobile Ad hoc NETwork (MANET) environment, such as node authentication and secure routing. In this paper, the authors...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Pursue Shortest Mobility Model With Delay and Retransmission Attempts in MANET

    Mobile ad-hoc Network is consisting a network, i.e., without any physically connection in which mobile nodes moving around the network area. These mobile nodes communicate with each other without any established or fixed infrastructure. Several routing protocols have been proposed by the researcher in MANET. Mobility models are an crucial...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Color Extended Visual Cryptography Using Error Diffusion for High Visual Quality Shares

    For providing meaningful shares with high visual quality color visual cryptography is not sufficient. This paper introduces a color visual cryptography encryption method that produces meaningful color shares with high visual quality via Visual Information Pixel (VIP) synchronization and error diffusion. VIPs synchronize the positions of pixels that carry visual...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Effects and Estimation Techniques of Symbol Time Offset and Carrier Frequency Offset in OFDM System: Simulation and Analysis

    Orthogonal frequency division multiplexing system is multichannel system that provides high rate and high quality wireless communication services, but system performance is degraded by two factors, one is the Symbol Timing Offset (STO) and other is the Carrier Frequency Offset (CFO) caused by Doppler frequency shift. Several approaches have been...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Improved Data Gathering Protocol for WSN

    Wireless sensor network generally consists of large number of sensor nodes. The wireless sensor network can be defined as large number of small sensing self powered nodes which gather the information from the geographical area and communicate in wireless fashion with the goal of handing their processed data to the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Current Trends in Cloud Computing :A Survey of Cloud Computing Systems

    Cloud computing that has become an increasingly important trend, is a virtualization technology that uses the internet and central remote servers to offer the sharing of resources that include infrastructures, software, applications and business processes to the market environment to fulfill the elastic demand. In today's competitive environment, the service...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient Method for Extracting Features From Blurred Fingerprints Using Modified Gabor Filter

    Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes. Fingerprint is one of the most...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    EDFA-WDM Optical Network Analysis

    Optical network that apply Wavelength Division Multiplexing (WDM) is currently widely used in existing telecommunications infrastructures and is expected to play a significant role in next generation networks and the future internet supporting a large variety of services having very different requirements in terms of bandwidth, latency, reliability and other...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Secure QR-Pay System With Ciphering Techniques in Mobile Devices

    Mobile payment is very important and critical solution for mobile commerce. A user-friendly mobile payment solution is strongly needed to support mobile users to conduct secure and reliable payment transactions using mobile devices. This paper presents an innovative mobile payment system based on 2-Dimentional (2D) barcodes called QR-codes for mobile...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient of Finding and Tracking Inconsistencies in Software Design Models

    Software models typically contain many inconsistencies and consistency checkers help engineers find them. Even if engineers are willing to tolerate inconsistencies, they are better off knowing about their existence to avoid follow on errors and unnecessary rework. However, current approaches do not detect or track inconsistencies fast enough. This paper...

    Provided By International Journal of Electronics and Computer Science Engineering