International Journal of Electronics Communication and Computer Engineering

Displaying 1-40 of 271 results

  • White Papers // May 2014

    The Critical Factors Influencing the Adoptions of Data Warehouse

    Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management. A lot has been done in this field regarding design and development of data warehouses and a lot still needs to be done but one area which needs special attention from research...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Efficient Data Mining in SAMS through Association Rule

    The authors propose a protocol for secure mining of association rules in distributed databases. Previous techniques all people deals with different database, now-a-day's people also deals with the distributed database. They can develop a kind of application in which the people can access the distributed data which is already store...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Bilinear Interpolation Image Scaling Processor for VLSI

    The authors introduce image scaling processor using VLSI technique. It consists of bilinear interpolation, clamp filter and a sharpening spatial filter. Bilinear interpolation algorithm is popular due to its computational efficiency and image quality. But resultant image consist of blurring edges and aliasing artifacts after scaling. To reduce the blurring...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Model of Integration of Material Flow Control System with MES/ERP System via Cloud Computing

    In this paper, the authors deal with a model of application gateway for integration of material flow control system with ERP/MES systems, which are provided by cloud computing and software as service delivery model. The developed gateway interface is supposed to cover fundamental requirements of production systems for customization and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Intelligent Garbage Location Monitoring using Remote Server and Sensor Networks

    Solid waste management is a serious global issue in the current world. An efficient waste management is a pre requisition for maintain a safe and green environment as there are increasing all kinds of waste disposal. In this paper, a new approach is developed for a systematic development in managing...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Area Efficient Turbo Encoder for Wireless Applications on FPGA

    Error control is the major insistence in today's wireless communication systems. In this era parallel concatenated convolution codes known as turbo codes plays a crucial role. These codes have been chosen as error control approach for various wireless applications such as UMTS (Universal Mobile Telecommunication System), DVB (Digital Video Broadcasting)...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Current Cloud Computing Review and Cost Optimization by DERSP

    Cloud computing promises to deliver cost saving through the \"Pay as you use\" paradigm. The focus is on adding computing resources when needed and releasing them when the need is serviced. Since cloud computing relies on providing computing power through multiple interconnected computers, there is a paradigm shift from one...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Design and Implementation of Enhanced Secured Cloud Computing

    Cloud computing plays a major role in providing different resources in the form of web services like tax calculation web service, e-banking web service etc., for smooth running of the users daily lives. The authors can rely on cloud computing if these useful web services are really secure enough to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    3D Virtual Glove for Data Logging and Pick and Place Robot

    Traditional interaction devices such as mouse and keyboard do not adapt very well to 3D environments, since they were not ergonomically designed for it. The user may be standing or in movement and these devices were projected to work on desks. To solve such problems it has been designed a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Model of Infrastructure as a Service (IaaS) Layer for Cloud Computing and Mission Critical Applications

    In this paper, the authors deal with creation of model for cloud computing with Infrastructure-as-a-Service (IaaS). IaaS is based on a common network infrastructure with physical servers, which can be installed in various locations of the cloud. The virtualization software, called \"Hypervisor\", creates a group of available virtual resources through...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Efficient Architecture for the Convolution Encoder and Viterbi Decoder for FPGA Implementation

    Error Correcting Codes (ECC) are one of the fundamental building blocks of an efficient communication system and utilization of proper encoding technique guarantees the error free communication in noisy environment although there are many types of ECC available the convolution codes are specifically preferred where the large constrain length are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    A New Method for Optimization of Deadlock resolution of Distributed Database with Formal Model

    A distributed system is a network of sites that send messages to each other, they exchange information. One of the most important applications of distributed systems is enabling resource sharing between systems. In such environments, if a sequence of procedures to control resource allocation is not possible to create a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    Neutralizing the Impact of Account or Service Traffic Hijacking in Cloud Computing

    Cloud computing is a booming computing model in the IT industry. Machines involved in cloud computing provide efficient computing power. Though massive adoption of this technology is seen across the globe, yet security issues are preventing its deep penetration. In a recent survey, 69 percent of North American IT professionals...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2014

    Modern Power Management System Using ARM Controller

    The introduction of electronic energy meter for electrical energy metering has resulted in various improvements in the operation of utilities apart from the increase revenue due to better recording of energy consumption. In this paper, remote power management and meter reading system is implemented using ARM7 based LPC2148 microcontroller. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Time-Cost Scheduler for Technological and Economic Challenges Related to Customized Cores and General Purpose Processors

    With the renewed interest in the customization of embedded processors for applications specific needs, it becomes imperative to understand its viability both economically and technologically thus avoiding pitfalls. Customization and scalability are two terms which are often used synonymously to denote add/subtract of additional functional units or increase/decrease of ports...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    ARM Processor Based Embedded System for Remote Data Acquisition

    The embedded systems are widely used for the data acquisition. The data acquired may be used for monitoring various activity of the system or it can be used to control the parts of the system. Accessing various signals with remote location has greater advantage for multisite operation or unmanned systems....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Data Collection Approaches on Wireless Sensor Networks: A Survey

    A Wireless Sensor Network (WSNs) consists of static nodes which are densely deployed over a sensing area. In wireless sensor environment each of the sensor nodes has data to send to a base station through a mobile agent, the major problem is to minimize the length of each data gathering...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Fusion Using Robust Estimator for Uncertain Noisy Systems Over Sensor Networks

    In this paper, the authors verify the problem of designing robust state estimator for multiple sensor networks with uncertain model and noisy measurements. Multi sensor data fusion by measurement fusion and state vector fusion structure using the Kalman filter were introduced. The standard Kalman filter requires an accurate system model....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    16-Bit RISC Processor Design for Convolution Application

    In this paper, the authors propose a 16-bit non-pipelined RISC processor, which is used for signal processing applications. The processor consists of the blocks, namely, program counter, clock control unit, ALU, IDU and registers. Advantageous architectural modifications have been made in the incremented circuit used in program counter and carry...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Web Mining Using PageRank Algorithm

    Data mining is extracting and automatic discovering the web based information has been used as web mining. It is one of the most universal and a dominant application on the Internet and it becomes increasing in size and search tools that combine the results of multiple search engines are becoming...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Advanced Trust Based Approach for Increasing Security in Cloud Computing

    Cloud computing has become one of the fastest growing fields in computer science. As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Challenges and Opportunities of Big Data Analytics in Business Applications

    Big data analytics is to discover a hidden data from the massive and messy data. Analytics is a sophisticated technique to extract actionable knowledge and insight from the data. Big data is not just about size. The amount of data available is growing faster than the authors' ability to deal...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Survey on Security Issues and Strategies of Cloud Computing

    Cloud computing has brought new changes and opportunities in IT Industry. The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing and visualization technology. Cloud computing security has become a hot topic in industry and academic research. This paper is a detailed view...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Prior Authentication Approach to Enhance Security in CloudComputing

    Now-a-days cloud computing is an upcoming technology. Cloud allows users to access and share resources such as software, platform and infrastructure by means of virtualization. Even though it offers many advantages, several large organizations like banks, financial organizations and few government agencies are still considering it to be unsafe place....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    A Modern Approach to Cyber Security Analysis Using Vulnerability Assessment and Penetration Testing

    Internet has opened unlimited avenues of opportunity by enabling organizations to conduct business and share information on a global basis. However, it has also brought new levels of security concerns and cyber threats. It exposes valuable corporate information, mission critical business applications and consumer's private information to more risk than...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Security Threats on Vehicular Ad Hoc Networks (VANET): A Review Paper

    The constant growth of automotive market and the increasing demand for the car safety, also driven by regulatory (governmental) domain, the potential of car-to-car connectivity is immense. Emerging Vehicular Ad-hoc NETworks (VANET) has the potential to improve the safety and efficiency of future highways. While during with wireless communication security...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    The Theoretical Approach to Cloud Computing

    The importance of cloud computing is increasing and it is receiving a growing attention in the scientific and industrial communities. Cloud computing enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Security Through Steganography and Cryptography in VOIP

    Current practice of data hiding technique exists, uses image, audio, video, or protocol headers as medium for hiding the people information. The real-time text hiding is to hide the secret text into a cover speech in real-time communication systems such as Voice Over Internet Protocol (VOIP). VOIP the new and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Improving Modern Web Application Defenses Using HTML5

    HTML5 has brought in several technological changes to the erstwhile HTML realm and even though there are certain security implications due to the introduction of various new APIs, considerable amount of effort has been put to corroborate secure web application development methodology. This paper is to elucidate different HTML5 features...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Key Structure Based Approach towards Scalable Access Control in Cloud Computing

    Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. The existing methods for implementing access...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Cloud Outcome and Troubles with Safety Solutions

    In this paper, the authors introduction of terms cloud security practices, security compliance against standards and best practices, how the cloud changes the role of IT security. Cloud computing executives have pinpointed the rise of security solutions as a key factor in the future of the IT industry. There is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Analyzing the Detection of Active Attacks in MANETs

    In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the active attack, where two or more malicious collision nodes create a higher level virtual tunnel in the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Integrity Verification & Distributed Accountability in High Performance Distributed Clouds

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Effective Algo for the Frequent ItemSet in Data Mining

    A core data mining operation is frequent itemset mining and has been extensively studied over last decade. This paper takes a new approach and implements a new algorithm for this problem and makes the two major contributions. First, it implements a one pass algorithm for frequent itemset mining which has...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2013

    Design of Low Power Column Bypass Multiplier using FPGA and Implementation Using FIR Filter

    Design of area, high speed and power efficient data path logic systems in the low power VLSI circuits has been identified as vital technology in the in the DSP computations and signal processing applications like FIR, IIR filters. Since multipliers consume most of the power in DSP computations it is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2013

    Mobile Network DoS Attack and Detection Technology

    Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of Smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management and mobile network security for various abnormal and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Study of Spam Dection Approaches and Measures of Antispam

    Email has become one of the best ways of communication for modern generation. However, the increase of E-mail users is has resulted in the increases of Spam. Spam is commonly defined as unsolicited email messages; the goal of spam classification is to distinguish between spam and legitimate email messages. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Design and Simulation of Pipelined FFT Processor Using FPGA

    Active radar systems are commonly used in military and commercial applications for the detection and tracking of objects through a medium such as air. A parallel and pipelined Fast Fourier Transform (FFT) processor for use in the Orthogonal Frequency Division Multiplexer (OFDM). Unlike being stored in the traditional ROM, the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Design of Ingenious Randlet, Sinelet and Shocklets for Compression of Satellites Vibration Test Data

    Vibration tests on satellites generate huge amount of data of the order of few Giga bytes per test and about tens of Terra bytes of data every year. This data represents vibration levels monitored at various locations of the satellite during the test. The files storing this huge data are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2013

    Efficient Mining of Emerging Patterns

    Mining frequent patterns from large databases plays an essential role in many data mining tasks and has broad applications. Most of the previously proposed methods adopt apriori-like candidate-generation-and-test approaches. However, those methods may encounter serious challenges when mining datasets with prolific patterns and/or long patterns. In this paper, the authors...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Time-Cost Scheduler for Technological and Economic Challenges Related to Customized Cores and General Purpose Processors

    With the renewed interest in the customization of embedded processors for applications specific needs, it becomes imperative to understand its viability both economically and technologically thus avoiding pitfalls. Customization and scalability are two terms which are often used synonymously to denote add/subtract of additional functional units or increase/decrease of ports...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Data Collection Approaches on Wireless Sensor Networks: A Survey

    A Wireless Sensor Network (WSNs) consists of static nodes which are densely deployed over a sensing area. In wireless sensor environment each of the sensor nodes has data to send to a base station through a mobile agent, the major problem is to minimize the length of each data gathering...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Fusion Using Robust Estimator for Uncertain Noisy Systems Over Sensor Networks

    In this paper, the authors verify the problem of designing robust state estimator for multiple sensor networks with uncertain model and noisy measurements. Multi sensor data fusion by measurement fusion and state vector fusion structure using the Kalman filter were introduced. The standard Kalman filter requires an accurate system model....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    16-Bit RISC Processor Design for Convolution Application

    In this paper, the authors propose a 16-bit non-pipelined RISC processor, which is used for signal processing applications. The processor consists of the blocks, namely, program counter, clock control unit, ALU, IDU and registers. Advantageous architectural modifications have been made in the incremented circuit used in program counter and carry...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Web Mining Using PageRank Algorithm

    Data mining is extracting and automatic discovering the web based information has been used as web mining. It is one of the most universal and a dominant application on the Internet and it becomes increasing in size and search tools that combine the results of multiple search engines are becoming...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2013

    Design of Low Power Column Bypass Multiplier using FPGA and Implementation Using FIR Filter

    Design of area, high speed and power efficient data path logic systems in the low power VLSI circuits has been identified as vital technology in the in the DSP computations and signal processing applications like FIR, IIR filters. Since multipliers consume most of the power in DSP computations it is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Design and Simulation of Pipelined FFT Processor Using FPGA

    Active radar systems are commonly used in military and commercial applications for the detection and tracking of objects through a medium such as air. A parallel and pipelined Fast Fourier Transform (FFT) processor for use in the Orthogonal Frequency Division Multiplexer (OFDM). Unlike being stored in the traditional ROM, the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Design of Ingenious Randlet, Sinelet and Shocklets for Compression of Satellites Vibration Test Data

    Vibration tests on satellites generate huge amount of data of the order of few Giga bytes per test and about tens of Terra bytes of data every year. This data represents vibration levels monitored at various locations of the satellite during the test. The files storing this huge data are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2013

    Efficient Mining of Emerging Patterns

    Mining frequent patterns from large databases plays an essential role in many data mining tasks and has broad applications. Most of the previously proposed methods adopt apriori-like candidate-generation-and-test approaches. However, those methods may encounter serious challenges when mining datasets with prolific patterns and/or long patterns. In this paper, the authors...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    FPGA Implementation of Content Addressable Memory

    Content Addressable Memory (CAM) is a special type of computer memory used in certain very high speed searching applications. It is also known as associative memory or associative storage or associative array. Content Addressable Memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing and networking,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jun 2013

    Enhancing the Search Results through Web Structure Mining Using Frequent Pattern Analysis and Linear Correlation Method

    In this e-world, information is growing at an enormous rate due to voluminous amount of data is updated every day on the WWW. Moreover, the popularity of web grows immensely as it covers wide spectrum in all domains ranging education, business, health, retail and surveillance. As the web serves as...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    A Proposed FPGA Based Architecture for Generation of a Face Image

    In this paper, the authors aim to design a FPGA based architecture for generation of a new human face. This paper is especially useful in criminal investigation department where a new face of a criminal is to be generated based on the description of eye-witness. Currently many image processing algorithms...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2013

    Design Remote Power Control I/O Data Acquisition System and Control on Home Automation

    In this paper, the authors have designed a remote power control based on both an embedded board and on ZigBee communication. This design consists of two parts that regard as the essential two control parts, the ZigBee control module and the server module. Where, the main objective of this paper...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Low-Power Digitally Controlled Oscillator (DCO) for SoC Applications

    In this paper, a novel portable and All-Digital Spread Spectrum Clock Generator (ADSSCG) suitable for System-on-Chip (SoC) applications with low-power consumption is presented. The proposed ADSSCG can provide flexible spreading ratios by the proposed Rescheduling Division Triangular Modulation (RDTM). Thus it can provide different EMI attenuation performance for various system...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Multi Resolution AHB Bus Tracer with Real Time Compression for SOC

    AMBA (Advanced Microcontroller based Bus Architecture) consists of AHB, APB, ASB and AXI. In this paper, the authors are Tracing AHB (Advanced High performance Bus) signals with real time compression and multi-resolution techniques. A simple transaction on the AHB consists of an address phase and a subsequent data phase. Access...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Various Versions of K-means Clustering Algorithm for Segmentation of Microarray Image

    A DeoxyriboNucleic Acid (DNA) microarray is a collection of microscopic DNA spots attached to a solid surface, such as glass, plastic or silicon chip forming an array. The analysis of DNA microarray images allows the identification of gene expressions to draw biological conclusions for applications ranging from genetic profiling to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    FPGA Implementation For Improve in Orthogonal Code Convolution

    As the data is communicated and stored through a communication channel such as cable or wire the parameters like noise or crosstalk can impact this data, so to correct these types of errors the techniques are orthogonal codes. An n-bit orthogonal code has n/2 1s and n/2 0s. In a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Relative Performance Evaluation of Single Chip CFA Color Reconstruction Algorithms Used in Embedded Vision Devices

    Most digital cameras use a color filter array to capture the colors of the scene. Sub-sampled versions of the red, green, and blue components are acquired using Single Sensor Embedded vision devices with the help of Color Filter Array (CFA). Hence Interpolation of the missing color samples is necessary to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    FPGA Implementation of EVD Processor for Fast ICA Application

    A novel hardware architecture based on the extended Jacobi method is presented to solve the calculation of eigenvectors and eigen values inside a FPGA, with high accuracy, taking low execution time and using a reduced number of internal resources. Besides, the execution time is lower than an optimal algorithm to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    High Speed Symmetric Transparent BIST on FPGA

    Symmetric transparent BIST has been proposed as a means to skip the signature prediction phase during RAM testing thereby testing time can be reduced. The proposed symmetric transparent BIST scheme is for single bit and multiple bit RAM's. The principle of this is a characteristic of a polynomial is modified...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Data Mining Techniques : An MRDM Approach

    Data mining techniques with the existing approaches look for data as patterns in a single data table. In recent years, the most common types of patterns and data mining approaches are extended to the multi-relational data. Multi-Relational Data Mining (MRDM) approaches involve multiple tables from a relational database. MRDM now...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Development of Data Acquisition System using VLSI

    Development of data acquisition system using VLSI is basically designed to keep the track of the temperature data entering the system, process it and display it on a Personal Computer (PC). This VLSI-based data acquisition system works as a data logger for measuring the temperature data at different conditions. UART...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Hardware Implementation of Neural Network Using VHDL

    In this paper, the authors present the state of the art in neural network hardware architectures and provide a broad view of principles and practice of hardware implementation of neural networks. The investigation of neuron structures is an incredibly difficult and complex task that yields relatively low rewards in terms...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Association Rule Mining of Classified Data for Predicting Courses Selected by Students in E-Learning

    Data mining is the process which discovers new pattern in large database. Classification & association rule are the techniques of data mining. Classification is supervised machine learning technique which predicts the group membership for data instances. The ADTree (Alternating Decision Tree) is a classification technique that combines decision trees with...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    By Using Internet Integration Technique Implementation of Embedded Systems

    Embedded devices have been recently connected to the Internet, enabling their management and monitoring from the web. Although web interfaces can bring several advantages to embedded systems, from designers to end users, redesigning legacy systems in most cases may not be the most effective way to upgrade a system to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    An Overview of Association Rule Mining

    Data mining is a process concerned with uncovering patterns, associations, anomalies and statistically significant structures in data. Association rule mining is a data mining task that discovers associations among items in a transactional database. Association rules have been extensively studied in the literature for their usefulness in many application domains...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Advanced On-Chip Bus Design with Open Core Protocol Interface

    As more and more IP cores are integrated into a System-on-Chip (SoC) design, the communication flow between IP cores has increased drastically and the efficiency of the on-chip bus has become a dominant factor for the performance of a system. The on-chip bus design can be divided into two parts,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    A Framework of Data Warehouse Systems Success: An Empirical Study

    These increased organizational dependence on Data Warehouse (DW) systems drives management attention towards improving DW systems success. However, the successful implementation rate of DW systems is low and many firms did not achieve intended goals. A recent study shows that improves and evaluates DW success is one of the top...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Design and Analysis of Low power 6T SRAM Cell

    In the past few years, a tremendous rise in VLSI fabrication has led to increase the densities of integrated circuits by decreasing the device geometries. Such high density circuits support high design complexities and very high speed but susceptible to power consumption. Increasing area overhead is a major design concern...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    A Study of Built- in Self-test of RAMs

    The task of testing a RAM chip to guarantee its functionality is extremely complex and often very time consuming. In addition to the problem of testing the RAM chips themselves, the incorporation of the chips into systems has caused test generation's cost to grow exponentially. A widely accepted approach to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    A Study on Credit Card Fraud Detection Methods Using Genetic Algorithm

    In modern day the fraud is one of the major causes of great financial losses, not only for merchants, individual clients are also affected. In this paper, the authors develop a method which improves a credit card fraud detection solution currently being used in a bank .Improving a credit card...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Cipher for Smart Card Using Unicode, Length and Position

    Smart cards have become a common thing today. Smart cards with various utilities are used today since they are easy to carry and relatively secured. But due to advancement of technologies, smart cards are becoming increasingly insecure. A paper from certain conference suggested a new encryption algorithm to keep the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Study of Spam Dection Approaches and Measures of Antispam

    Email has become one of the best ways of communication for modern generation. However, the increase of E-mail users is has resulted in the increases of Spam. Spam is commonly defined as unsolicited email messages; the goal of spam classification is to distinguish between spam and legitimate email messages. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Advanced Trust Based Approach for Increasing Security in Cloud Computing

    Cloud computing has become one of the fastest growing fields in computer science. As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Router Architecture for Network on Chip Using FPGA

    On single chip integration of storage and computational block has becoming feasible due to continuous shrinkage of CMOS technology. Field Programmable Gate Arrays (FPGA's) are power efficient devices support more complex design with good performance and low cost. For effective global on-chip communication, on-chip routers provide essential routing functionality with...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    The Critical Factors Influencing the Adoptions of Data Warehouse

    Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management. A lot has been done in this field regarding design and development of data warehouses and a lot still needs to be done but one area which needs special attention from research...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Efficient Data Mining in SAMS through Association Rule

    The authors propose a protocol for secure mining of association rules in distributed databases. Previous techniques all people deals with different database, now-a-day's people also deals with the distributed database. They can develop a kind of application in which the people can access the distributed data which is already store...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Bilinear Interpolation Image Scaling Processor for VLSI

    The authors introduce image scaling processor using VLSI technique. It consists of bilinear interpolation, clamp filter and a sharpening spatial filter. Bilinear interpolation algorithm is popular due to its computational efficiency and image quality. But resultant image consist of blurring edges and aliasing artifacts after scaling. To reduce the blurring...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Model of Integration of Material Flow Control System with MES/ERP System via Cloud Computing

    In this paper, the authors deal with a model of application gateway for integration of material flow control system with ERP/MES systems, which are provided by cloud computing and software as service delivery model. The developed gateway interface is supposed to cover fundamental requirements of production systems for customization and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Intelligent Garbage Location Monitoring using Remote Server and Sensor Networks

    Solid waste management is a serious global issue in the current world. An efficient waste management is a pre requisition for maintain a safe and green environment as there are increasing all kinds of waste disposal. In this paper, a new approach is developed for a systematic development in managing...

    Provided By International Journal of Electronics Communication and Computer Engineering