International Journal of Electronics and Computer Science Engineering

Displaying 161-200 of 218 results

  • White Papers // Aug 2012

    Comparative Study of Different Routing Protocols in MANET Based on Simulation Using Ns-2

    A mobile ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Optimizing Routing in Delay-Tolerant Network (DTNS)

    The authors try to formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property that no...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Review on Advancements in Biometrics

    Biometrics is an automated method of recognizing a person based on physiological or behavioral characteristics. Biometric recognition technology relies upon the physiological characteristic of an individual, offering positive identification that is difficult to counterfeit. Examples of physiological biometric features include height, weight, body odor, the shape of the hands, vein...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design, Analysis and Implementation of a New Topology of Multi Phase Synchronous Buck Converter Under Current Mode Control

    This paper presents a new PWM Multi phase DC-DC converter under current mode control with an auxiliary circuit which provides zero voltage switching in order to meet the power supply requirements of the processors of modern electronic equipments like laptops, mobiles, and PDAs etc which require more than 70 A...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Fingerprint Recognition System

    The popular Biometric used to authenticate a person is fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper, the authors projected Fingerprint Recognition using Minutia Score Matching...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Speech Recognition by Wireless Robot

    This paper presents a brief survey on automatic speech recognition and discusses the major themes and advances made in the past. After years of research and development the accuracy of automatic speech recognition remains one of the important research challenges. The design of speech Recognition system requires careful attentions the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Aperture Coupled Stacked Patch Antenna for Dual-Band

    Microstrip Antennas (MAS) are very useful antenna where low profile antennas are required. They are most popular due to their small size, low cost, light weight. The first aperture coupled microstrip antenna was introduced in 1985 by D M Pozar. Aperture coupled antenna is a particular antenna with high gain...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Automatic Test Case Generation in Object Oriented Programming

    This paper presents a new methodology to select test cases from regression test suites. The selection strategy is based on analyzing the dynamic behavior of the applications that written in any programming language. Methods based on dynamic analysis are more safe and efficient. The authors design a technique that combine...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Enhancements Performance in TCP-LP: Low-Priority Service Via End Point Conditional Randomized Protocols

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources Without constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable to the Internet environment. However, the random search strategies adopted by these...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient of Finding and Tracking Inconsistencies in Software Design Models

    Software models typically contain many inconsistencies and consistency checkers help engineers find them. Even if engineers are willing to tolerate inconsistencies, they are better off knowing about their existence to avoid follow on errors and unnecessary rework. However, current approaches do not detect or track inconsistencies fast enough. This paper...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Wireless Sensor Networks - Architectures, Protocols, Simulators and Applications: A Survey

    Wireless Sensor Networks (WSNs) have emerged as a new research technology in the distributed computing environment and plays a very important role in the pervasive computing to support various applications. It has a great potential to be utilized in battlefields and in different commercial applications like traffic surveillance, habitat monitoring,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Direct User Data Authentication in Cloud

    Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Secure QR-Pay System With Ciphering Techniques in Mobile Devices

    Mobile payment is very important and critical solution for mobile commerce. A user-friendly mobile payment solution is strongly needed to support mobile users to conduct secure and reliable payment transactions using mobile devices. This paper presents an innovative mobile payment system based on 2-Dimentional (2D) barcodes called QR-codes for mobile...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient Method for Extracting Features From Blurred Fingerprints Using Modified Gabor Filter

    Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes. Fingerprint is one of the most...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    EDFA-WDM Optical Network Analysis

    Optical network that apply Wavelength Division Multiplexing (WDM) is currently widely used in existing telecommunications infrastructures and is expected to play a significant role in next generation networks and the future internet supporting a large variety of services having very different requirements in terms of bandwidth, latency, reliability and other...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Analytical Approach for Performance of Wireless Sensor Networks

    Wireless Sensor Networks (WSN) have been noticed and researched in recent years. WSNs have inherent and unique characteristics compared with traditional networks. It consists of light-weight, low power and small size Sensor Nodes (SNs). They have ability to monitor, calculate and communicate wirelessly. Sensor nodes should send their collected data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    3 Factor Securities Based on RFID,GSM and Face Recognition for Visitor Identification

    Now-a-day's everything is moving from Manual to automatic so it is necessary to developed automatic security system involving more than one electronic device to make it more reliable. In the coming future ubiquitous society, RFID tags will be affixed to every person. This technology is anticipated to be a key...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Implementing Watermarking Concept Along With Data Compression in Multimedia Transmission

    This paper presents a technical review for enhancing security and reliability in the transmission of information. In this paper Watermarking technique along with Data Compression is being described to improve the quality, security and efficiency in the transmission of information. In this paper, the authors provide a measure to remove...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Relevant Pages in Semantic Web Search Engines Using Ontology

    In general, search engines are the most popular means of searching any kind of information from the Internet. Generally, keywords are given to the search engine and the Web database returns the documents containing specified keywords. In many situations, irrelevant results are given as results to the user query since...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparison of Tacit Encryption Algorithm With Various Encryption Algorithms

    A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. A cryptographic algorithm is considered to be computationally secured if it cannot be broken with standard resources, either current or future and apart from the algorithm...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    HDL Implementation of Low Density Parity Check (LDPC) Decoder

    Low-Density Parity-Check (LDPC) codes are one of the most promising error-correcting codes approaching Shannon capacity and have been adopted in many applications. These codes offer huge advantages in terms of coding gain, throughput and power dissipation. Error correction algorithms are often implemented in hardware for fast processing to meet the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Integrating Steganography Using Genetic Algorithm and Visual Cryptography for Robust Encryption in Computer Forensics

    The proposed system highlights a novel approach for creating a secure steganographic method using genetic algorithm and visual cryptography for robust encryption in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    FPGA Based Sigma - Delta Analogue to Digital Converter Design

    In this paper the authors report design and development of modified Sigma-Delta ADC realized in FPGA paradigm. The wide gain of this ADC makes it a potential candidate in data converter applications in wide ranging domains such as communication systems, instrumentation, precision measurement devices and many others wherein the high...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparison of Dijkstra's Shortest Path Algorithm With Genetic Algorithm for Static and Dynamic Routing Network

    In this paper, the authors calculate the Shortest path between Source and Destination node for Static and Dynamic Routing Networks. First, they applied Dijkstra's Algorithm (DA) and then Genetic Algorithm (GA) to find the Shortest Path. Both the Algorithms provide the same solution. The results affirmed the potential of Genetic...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Evolutionary Standards in Image Compression Along With Comparative Analysis of Their Performance

    Image compression has developed as full fledged field from past many years because of rapidly growing entertainment market and unparalleled increase in the use of internet services for storage transmission and processing of multimedia data. Data compression techniques are primarily divided into two categories, lossless and lossy. The lossy technique...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Analysis of Video Frame Transmission on DVB-H 4K Mode System for Different Code Rates

    DVB-H (Digital Video Broadcasting for Handheld terminals) is a digital transmission standard developed by the international DVB-Project. It was standardized in 2004 and enables small battery powered handheld devices to receive IP data services such as low definition TV services. The DVB-H standard is derived from the DVB-T standard which...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Reversible Data Hiding Techniques

    Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2012

    VLSI Design of a 16-Bit Pipelined RISC Processor

    In this paper, the authors have described the design of a 16-bit pipelined RISC processor for applications in real-time embedded systems. The processor executes most of the instructions in single machine cycle making it ideal for use in high speed systems. The processor has been designed to be implemented on...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2012

    A Compact Printed Antenna for WiMAX Application

    A single feed compact microstrip antenna is proposed in this paper. Two L slits are introduced at right side of the patch. For the proposed antenna resonant frequencies are obtained at 3.48 GHz, 4.34 GHz and 5.65 GHz with bandwidth of 19 MHz, return loss - 20.2 dB, 42.6 MHz,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2012

    Providing Inferential Capability to Natural Language Database Interface

    Not everybody is able to write SQL (Structured Query Language) queries as they may not be aware of the structure of the database. So there is a need for non-expert users to query relational databases in their natural language. The idea of using natural language instead of SQL, has promoted...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Hackers and Intruders: Motives and Difference

    This paper presents the motives of hackers and intruders, and also there difference between them and also intentions with their way of thinking, planning and performing attacks for their personal gain and as well as others grow up. This shows the security of computer networks and information systems can't protect...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Image Hiding in Video Sequence Based on MSE

    This paper propose a new method of hiding image in selected video sequence. The proposed algorithm is a hybrid image-hiding scheme based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). In this algorithm, the secret image is not embedded directly on the wavelet coefficients but rather than on...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Survey on Upcoming ZigBee Technology in Future Communication System

    The IEEE 802.15.4 is a new standard defined for LR-WPAN which provides a low cost and very less complicated solution. The expected applications are home/office automation, industrial sensors and control, distributed sensor networks and environment monitoring. ZigBee is one of the newest technologies enabling Wireless Personal Area Networks (WPAN). ZigBee...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Pursue Shortest Mobility Model With Delay and Retransmission Attempts in MANET

    Mobile ad-hoc Network is consisting a network, i.e., without any physically connection in which mobile nodes moving around the network area. These mobile nodes communicate with each other without any established or fixed infrastructure. Several routing protocols have been proposed by the researcher in MANET. Mobility models are an crucial...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Color Extended Visual Cryptography Using Error Diffusion for High Visual Quality Shares

    For providing meaningful shares with high visual quality color visual cryptography is not sufficient. This paper introduces a color visual cryptography encryption method that produces meaningful color shares with high visual quality via Visual Information Pixel (VIP) synchronization and error diffusion. VIPs synchronize the positions of pixels that carry visual...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Effects and Estimation Techniques of Symbol Time Offset and Carrier Frequency Offset in OFDM System: Simulation and Analysis

    Orthogonal frequency division multiplexing system is multichannel system that provides high rate and high quality wireless communication services, but system performance is degraded by two factors, one is the Symbol Timing Offset (STO) and other is the Carrier Frequency Offset (CFO) caused by Doppler frequency shift. Several approaches have been...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Current Trends in Cloud Computing :A Survey of Cloud Computing Systems

    Cloud computing that has become an increasingly important trend, is a virtualization technology that uses the internet and central remote servers to offer the sharing of resources that include infrastructures, software, applications and business processes to the market environment to fulfill the elastic demand. In today's competitive environment, the service...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Web Content Extraction to Facilitate Web Mining

    Internet continuously strives to become the prime source of knowledge and Information, used in almost every sphere of life. As the volume and complexity of the Information shared on WEB is increasing, various forms of representation of this data has been emerged. In order to deal with different forms of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Efficient Routing Using Geographical Information and Directional Spreading in VANET

    Transmit Data Packet in Vanet using flooding from source to destination. When the packet transmit using nearest node and they use their nearest node cache table in next hop actually generate a lot of redundancy with the area coverage. One node use the network channel and create a cause of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Optical Wavelength Converters Based on Cross Gain Modulation and Cross Phase Modulation in SOA

    All optical wavelength converters are expected to become key components in the future broadband net works. Their most important use will be for avoidance of wavelength blocking in optical cross connects in Wavelength Division Multiplexed (WDM) networks. Thereby the converters increase the flexibility and the capacity of the network for...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Design and Simulation of CPW-FED Printed Antenna for Ultra Wide Band (UWB) and Wireless LAN (WLAN) Applications

    In this paper, design and simulation of CPW-fed printed antenna for Ultra Wide Band (UWB) and WirelessLAN applications is proposed .The antenna is integrated with the CPW-fed. Return loss, gain and directivity and current distribution for the different frequencies are explored, It is shown proposed antenna has good gain and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Securing VOIP Networks Via Transport Protocols Layer

    Voice over Internet Protocol (VoIP), is a technology that allows the people to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. VoIP services have compelling technical advantages over circuit switching. VoIP networks are based more on an open architecture than that of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Ant Colony Based Routing in Wireless Sensor Networks

    Wireless sensor networks comprises of small sensor nodes communicating with each other in a network topology which keeps on varying. The wireless sensor nodes also known as motes have limited energy resources along with constraints on its computational and storage capabilities. Due to these restrictions coupled with its dynamic topology,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Enhancements Performance in TCP-LP: Low-Priority Service Via End Point Conditional Randomized Protocols

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources Without constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable to the Internet environment. However, the random search strategies adopted by these...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Optimizing Routing in Delay-Tolerant Network (DTNS)

    The authors try to formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property that no...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Review on Advancements in Biometrics

    Biometrics is an automated method of recognizing a person based on physiological or behavioral characteristics. Biometric recognition technology relies upon the physiological characteristic of an individual, offering positive identification that is difficult to counterfeit. Examples of physiological biometric features include height, weight, body odor, the shape of the hands, vein...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design, Analysis and Implementation of a New Topology of Multi Phase Synchronous Buck Converter Under Current Mode Control

    This paper presents a new PWM Multi phase DC-DC converter under current mode control with an auxiliary circuit which provides zero voltage switching in order to meet the power supply requirements of the processors of modern electronic equipments like laptops, mobiles, and PDAs etc which require more than 70 A...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Fingerprint Recognition System

    The popular Biometric used to authenticate a person is fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper, the authors projected Fingerprint Recognition using Minutia Score Matching...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Speech Recognition by Wireless Robot

    This paper presents a brief survey on automatic speech recognition and discusses the major themes and advances made in the past. After years of research and development the accuracy of automatic speech recognition remains one of the important research challenges. The design of speech Recognition system requires careful attentions the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Aperture Coupled Stacked Patch Antenna for Dual-Band

    Microstrip Antennas (MAS) are very useful antenna where low profile antennas are required. They are most popular due to their small size, low cost, light weight. The first aperture coupled microstrip antenna was introduced in 1985 by D M Pozar. Aperture coupled antenna is a particular antenna with high gain...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Automatic Test Case Generation in Object Oriented Programming

    This paper presents a new methodology to select test cases from regression test suites. The selection strategy is based on analyzing the dynamic behavior of the applications that written in any programming language. Methods based on dynamic analysis are more safe and efficient. The authors design a technique that combine...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2012

    Providing Inferential Capability to Natural Language Database Interface

    Not everybody is able to write SQL (Structured Query Language) queries as they may not be aware of the structure of the database. So there is a need for non-expert users to query relational databases in their natural language. The idea of using natural language instead of SQL, has promoted...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    ESRWF: Extreme State-Rank based Workload Factoring for Integrated Cloud Computing Model

    Despite all the hypes, the designers of workload factoring solutions have consistently debated on the tradeoffs between factoring of workload and their resulting performance. When computational resources are provided to the existing system; one of the main challenges that the computing community is face dazzling workload of application requests and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparative Analysis of LEON 3 and NIOS II Processor Development Environment: Case Study Rijindael's Encryption Algorithm

    Embedded system design is becoming complex day-by-day, combined with reduced time-to-market deadlines. Due to the constraints and complexity in the design of embedded systems, it incorporates hardware/software co-design methodology. An embedded system is a combination of hardware and software parts integrated together on a common platform. A soft-core processor which...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Area Optimized FPGA Implementation of Adaptive Beamformer

    Spatially propagating signals encounter the presence of interfering signals and noise signals. Quadratic Rotation Decomposition (QRD) based Recursive Least Squares (RLS) algorithm can be used in variety of communication applications and its low complexity implementation can be of interest. In this paper the authors have presented an application of QRD...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    FPGA Based Sigma - Delta Analogue to Digital Converter Design

    In this paper the authors report design and development of modified Sigma-Delta ADC realized in FPGA paradigm. The wide gain of this ADC makes it a potential candidate in data converter applications in wide ranging domains such as communication systems, instrumentation, precision measurement devices and many others wherein the high...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Reversible Data Hiding Techniques

    Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Web Data Identification and Extraction

    Now-a-days, with the rapid growth of the web, a large volume of data and information are published in numerous web pages. As web sites are getting more complicated, the construction of web information extraction systems becomes more difficult and time-consuming. In this paper proposes a new method to perform the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Analysis of Grid Based Distributed Data Mining System for Service Oriented Frameworks

    Distribution of data and computation allows for solving larger problems and execute applications that are distributed in nature. A grid is a distributed computing infrastructure that enables to manage large amount of data and run business applications supporting consumers and end users. The grid can play a significant role in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Assessing Learners Behavior by Monitoring Online Tests through Data Visualization

    In this paper the authors present an approach and a system to let tutors monitor several important aspects related to online tests, such as learner behavior and test quality. The approach includes the logging of important data related to learner interaction with the system during the execution of online tests...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Design of DDR3 SDRAM controller

    DDR3 SDRAM memory controller is the interface between DDR3 memory and the user. The design consists of front end and back end modules. The memory controller manages the flow of data going to and from the main memory. The front end provides interface to the user side and it consists...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Data Security in Communications: A Study of Cryptography and Steganography Techniques

    Long distance communication using electronic media is prone to unwanted interception just rather more than the communication over traditional channels was. While the traditional communication systems were insecure, it was rather more difficult to intercept communication without the communicating parties realizing that someone has seen the written message, due to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Nov 2012

    A New Hardware Architecture for Parallel Shortest Path Searching Processor Based-on FPGA Technology

    In this paper, a new FPGA-based parallel processor for shortest path searching for OSPF networks is designed and implemented. The processor design is based on parallel searching algorithm that overcomes the long time execution of the conventional Dijkstra algorithm which is used originally in OSPF network protocol. Multiple shortest links...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Designing Low Power Circuits: A Review

    The growing market of battery-operated portable applications like laptop, mobile etc requires microelectronic devices with low power consumption. As transistor size continues to shrink and as need for more complex chips increases, power management of the chip is one of the key challenges in VLSI industry. The manufacturers are looking...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Auto Disinfectant Cleaner using AVR Microcontroller

    The trend of microcontroller in industrial as well as domestic application is increasing now-a-days. The use of microcontroller is increasing due to the following advantages/features of controller such as processor reset, device clocking, central processor, RAM, I/O pins and Instruction cycle timers. There are two types of microcontroller available. They...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Usage of Data Mining for Analyzing Customer Mindset

    As this is the era of information technology, no filed remains untouched by computer science. The technology has become an integral part of the business process. By implementing different data mining techniques and algorithms on the feedback collected from the customer, the authors can analyzed the data. With help of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    VLSI Design and Implementation of Ternary Logic Gates and Ternary SRAM Cell

    In this paper the authors present Very Large Scale Integration (VLSI) design and simulation of a ternary logic gates and CMOS ternary SRAM cell. The simple ternary inverter, positive ternary inverter and negative ternary inverter are designed in 180nm technology. The ternary NAND gate and ternary NOR gate are also...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    An Analysis and Overview of Low Power Static Random Access Memory (SRAM) Design

    Memory is an important part of computer and microprocessor based system design. It is used to store data or information in terms of binary numbers. Low power SRAM is described with focus on different techniques used for power optimization. Challenges regarding reduction of static and dynamic powers are then discussed....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jul 2013

    FPGA Implementation of Double Precision Floating Point Multiplier using Xilinx Coregen Tool

    Floating point arithmetic is widely used in many areas, especially scientific computation and signal processing. The main applications of floating points today are in the field of medical imaging, biometrics, motion capture and audio applications. The IEEE floating point standard defines both single precision and double precision formats. Multiplication is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2013

    Intrusion Detection Based On Clustering Algorithm

    The traditional intrusion detection systems have been used long time ago, namely anomaly-based detection and signature-based detection but have many drawbacks that limit their performance. Consequently the main goal of this paper is to use data mining techniques including classification using clustering methods to overpass these defects. This classification will...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Understanding Educational Data Mining (EDM)

    Recently Educational Data Mining (EDM) is successful in attracting a great deal of attention of researchers. It is an emerging multidisciplinary research area. Educational Data Mining (EDM) is the process of discovering useful information from raw data generated and collected from educational systems which can be used by the different...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Need of Securing Migrating Crawling Agent, Remote Platform and the Data Collection

    Using migrating (mobile) crawling agents, the process of selection and filtration of web documents can be done at web servers rather than search engine side, which reduces network load caused by the web crawlers. The mobile code from search engine side transfers and executes on web servers, an environment controlled...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Data Extraction from Environment Using GPRS Sensors

    Increase in vehicular pollution affect on environment as well on human health, so this paper contain brief introduction to vehicular pollution. To monitor this pollution Wireless Sensor Network (WSN) system is proposed. The proposed system consists of a Mobile Data-AcQuisition unit (Mobile-DAQ) and a fixed internet-enabled Pollution monitoring Server (Pollution-Server)....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Soft Core Processor for Embedded System

    A softcore processor is a Hardware Description Language (HDL) model of a specific processor Central Processing Unit (CPU) that can be customized for a given application and synthesized for an ASIC or FPGA target. In many applications, softcore processors provide several advantages over custom designed processors such as reduced cost,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2013

    Temperature-aware Virtual Machine in Para Virtualization Cloud Environment

    In this paper the authors describe the para virtualization which involves modification of a guest Operating System (OS). Today this method is only supported for open source operating systems, limiting its applicability. However, par virtualization provides higher performance than full virtualization in performance because it does not need to trap...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2013

    Analysis of High Dimensional Data & Study on Classification Mining Technique

    The supervised machine learning technique used to predict group membership for data instances to identify and characterize key signaling networks and to find new targets for drug development. These technologies present investigators with the task of extracting meaningful statistical and biological information from high-dimensional data spaces, wherein each sample is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2013

    Parallel Computing in Multicore Architecture

    Many applications are ranges from signal processing to astronomy include FFT (Fast Fouries Transform) to increase the speed of computation. The computational demands of software continue to outpace the capabilities of processor and memory technologies especially in scientific and engineering programs. The parallel FFT computation offers a new advancement to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2013

    Modified GDI Technique - A Power Efficient Method For Digital Circuit Design

    In this paper presents logic style comparisons based on different logic functions and claimed Modified Gate Diffusion Input logic (Mod-GDI) to be much more power-efficient than Gate Diffusion Input logic (GDI) and complementary CMOS logic design. However, DC and transient analysis performed on more efficient Modified Gate Diffusion Input logic...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Transaction Security for E-commerce Application

    E-commerce applications are becoming popular day-by-day as they are working like a virtual shop. Writing good E-commerce application is tedious task and complex also. The applications if made complex are very difficult to maintain. Usability is a very basic concept in the E-commerce application. User has to get the information...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2014

    Real-time Face Detection and Tracking Using Haar Classifier on SoC

    In this paper the authors intend to implement real-time face detection and tracking the head poses position from high definition video using Haar classifier through raspberry Pi BCM2835 CPU processor which is a combination of SoC with GPU based architecture. OV5647 CMOS image sensor with 5-megapixel used for obtaining high...

    Provided By International Journal of Electronics and Computer Science Engineering