International Journal of Electronics Communication and Computer Engineering

Displaying 1-40 of 299 results

  • White Papers // Apr 2015

    A Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing is a computing paradigm that delivers on demand IT services to consumers. Cloud computing provides development of large scale, on-demand, flexible computing infrastructure. Confidentiality, availability, privacy and performance are major concerning areas of cloud computing. As an increase demand of resources is based on performance factor, Load balancing...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2015

    Viterbi Decoder Plain Sailing Design for TCM Decoders

    Convolutional codes are error correction technique used in noisy channels. Viterbi algorithm is the most widely -used decoding algorithm, which decodes the sequence in a maximum likelihood sense. But the complexity of the Viterbi decoder increases with the coding rate of the system. Viterbi decoder is the most power hungry...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2015

    Design and Analysis of an Improved MPPT for Photovoltaic Grid-Connected Inverter Based

    One of the major drawbacks of PhotoVoltaic (PV) systems is represented by the effect of module mismatching and of partial shading of the PV field. This paper proposes a method of maximum power point tracking using Quantum behaved Particle Swarm Optimization (QPSO) for grid-connected photovoltaic systems. The system is composed...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2015

    Comparison of Intelligent Algorithms for Economically Optimum Harmonic Passive Filter Design in Radial Distribution Systems

    In this paper, the authors present the optimal planning of harmonic passive filters in distribution system using three intelligent methods including Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) and as a new research are compared with Biogeography Based Optimization (BBO) algorithm. In this paper, the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2015

    Reducing Total Harmonic Content of 9-Level Inverter by Use of Cuckoo Algorithm

    In this paper, a novel procedure to find the firing angles of the multilevel inverters of supply voltage and, consequently, to decline the Total Harmonic Distortion (THD), has been presented. In order to eliminate more harmonics in the multilevel inverters, its number of levels can be lessened or pulse width...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2015

    HDL Design for 1 Zetta Bits Per Second (1 Zbps) Multichannel 64:1 LVDS Data Serializer & De-Serializer ASIC Array Card Design for 6th Sense and Future Ultra High Wireless and Mobile Communication Protocol Cards

    The aim is to HDL design & implementation for exa bit rate multichannel 64:1 LVDS data serializer & de-serializer ASIC array card for ultra-high speed wireless communication products like network on chip routers, data bus communication interface applications, cloud computing networks, Zetta bit Ethernet at Zetta bit rate of data...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2015

    Scara Robot with Adaptive Controller

    The robot is an electromechanical device performing various tasks. A machine can be programmed to act to varied commands or entirely carry out important tasks especially those groups of tasks that are beyond natural abilities and possess a constitutional context. A scara robot is the most widely used in industry....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

    In a Mobile Wireless Sensor Network (MWSN), mobile sensor nodes move freely at the network environment. So, a large number of attacks threaten this network. Unauthenticated broadcast attack is a common attack which worsens the network congestion as well as energy consumption. In this paper, an efficient method for defending...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Security Issues of Wireless Communication Networks

    Wireless communication networks have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    A Survey of Recent Indoor Positioning Systems Using Wireless Networks

    Global Navigation Satellite Systems (GNSS), which are widely used today by positioning and navigations systems, are becoming increasingly important in daily life. GNSS, however, do not work well in indoor environments due to the satellite signal outages that occur in closed structures. Yet the demand for indoor positioning systems is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Improvement in Energy Optimization in Telecommunication Network Service

    Since the user advert of telecommunication networks, the demand has been growing higher and most communication activities and other socio economy activities now uses telecommunication network as there medium of communication, business transaction, banking and other amenities. Energy-efficient operation is an important issue today in telecommunication networks and in the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Software Development Effort Estimation Techniques: A Review

    The most important activity in software project management process is the estimation of software development effort. The literature shows many algorithmic cost estimation models such as Boehm's COCOMO, Albrecht's function point analysis, Putnam's SLIM, ESTIMACS, soft computing based techniques etc., but each model has their own advantages and disadvantages in...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Alternation Relationships Regarding Architecture for Dense Multiplexing, Reconfigurable Systems and Based on Wavelength Division, Design, and Simulation of ROADM-Based DWDM

    The optical technical advancements currently provide the possibility for building the reconfigurable wavelength practical networks. These networks employ wavelength switching structures for dynamic routing of wavelengths and provide the level of flexibility and scalability that has not been already possible. Other components such as low-noise optical amplifiers, Electronic Dispersion Compensators...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Designing a 64-Point FFT/IFFT Processor for Implementation of OFDM in High Speed WLAN Applications

    In this paper, a methodology is presented for design of a special 32-bit 64-point processor to implement the OFDM in local wireless networks with IEEE standard 800.11a. In this FFT/IFFT, instead of direct approach, the shifter and adder are used for multiplier; thereby, it yields a major reduction in power...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Bluetooth Based Synthesizer for Wireless Sensor Measurements

    In this paper, the authors aim to overcome the spur problems in Bluetooth-based wireless sensors measurement a compact fractional-N frequency synthesizer is presented ranging from 2 GHz to 3 GHz in frequency. Through this technique, the phase noise in the final spectrum is improved and spur tones in the output...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Reduction of Threshold-Based Feedback in Multi- Cellular Cluster Networks

    In this paper, a downward system has cell and dual frequency division characteristics has been considered in which each user send state information of information channel to its home station. Since the cooperation between all stations is not possible in practice, a number of stations are grouped into clusters and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    A New Positioning Method Using Ant Colony Optimization in Wireless Sensor Networks

    Network coverage in sensor positioning is an important challenge of wireless sensor networks. This problem is an NP-hard problem and employing an optimization method is needed. In this paper, the authors propose an efficient method based on Ant Colony Optimization (ACO) to the sensor positioning to gain better performance by...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Threat Analysis with Comparison of IPv4 and IPv6 in Cloud Computing

    Cloud computing is a modern technology which provides its users the remote access to centralized and remotely located servers through internet to get many services like, storage and sharing of data and applications over the servers and cloud. This paper is on the performance measurement of IPv4 and IPv6 on...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Presentation of an Algorithm Configuration for Network-on-Chip Architecture with Reconfiguration Ability

    Due to the challenge that the number of cores is combined on a single chip, the Network-on-Chip (NoC) has gradually become a popular solution. And recently, researchers have focused on improving the performance of NoC chips to achieve good performance. In this paper, the authors present an algorithm configuration for...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Optimal Performance of OFDM Signal Using PAPR Reduction Techniques in LTE Systems

    3rd generation partnership project Long term Evolution (LTE) has been designed to provide more efficient use of radio networks. The LTE provides scalable bandwidth, latency reduction and higher data rates with improved mobility. Single Carrier Frequency Division Multiple Access (SC-FDMA) has been selected for use in the Long Term Evolution...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Performance Analysis of LEACH Protocol

    Wireless Sensor Networks (WSN) the availability of cheap, low power, and miniature embedded processors, radios, sensors, and actuators, often integrated on a single chip, is leading to the use of wireless communications and computing for interacting with the physical world in applications such as security and surveillance applications, smart classroom,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Investigation of Cloud Computing: Applications and Challenges

    Cloud computing is a model for saving data or knowledge in distance servers through Internet. It can be save the required memory space and reduce cost of extending memory capacity in users' own machines and etc., Therefore, cloud computing has several benefits for individuals as well as organizations. It provides...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Analysis and Simulation of CDMA QAM-16 for AWGN and RAYLEIGH Channel

    In a Code Division Multiple Access (CDMA) system, a lot of users use concurrently the entire frequency band to transmit their data and users' data is separated on the basis of their unique spreading code. The aim of communication system i.e. Communication at anytime, anywhere and by anybody is still...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Provide a New Model for Query Processing in P2P Integration Systems

    Most of organizations and companies meet their needs for software by providing distinguished software system during the time. Each one of these systems utilize own way for saving information which are not necessarily similar to other systems. Therefore, the authors are facing with a collection of information related to an...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Benchmarking Custom Artificial Neural Network Hardware Accelerator

    In this paper, the authors benchmark the custom design computational architecture supporting Artificial Neural Network (ANN) acceleration. The custom design optimizes the frequently used: Multiply And Accumulate (MAC) operations. In this paper the performance of the custom design is compared with ARM and MIPS architectures supporting basic Single Instruction Multiple...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Review of Existing Models for Estimating the Cost of Software Development in Cloud Computing

    Now-a-days, the number of cloud computing service providers which are providing various services for users are increasing dramatically. These service providers attempt to make several facilities for their consumers or users such as data saving, sharing with others or running their applications with the help of cloud computing resources such...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2014

    E-Learning Based on Cloud Computing: Requirements, Challenges and Solutions

    Cloud computing technology has changed the access method and development of applications. This technology by providing necessary fundamentals runs applications as services on the net via web browsers. E-learning can utilize cloud computing in order to fulfill the required infrastructures and also to provide the improved performance, scalability, and increased...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2014

    On Packet Loss Ratio of IEEE 802.15.4 with Different Sensor Motes for Wireless Sensor Networks

    Packet Loss Ratio (PLR) is one of the key components for the performance enhancement of a Wireless Sensor Networks (WSNs). This paper investigates the PLR at radio receiver for the different current draw parameters: transmit mode, receive mode, and sleep mode and idle mode keeping other parameters like: initial energy...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    The Critical Factors Influencing the Adoptions of Data Warehouse

    Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management. A lot has been done in this field regarding design and development of data warehouses and a lot still needs to be done but one area which needs special attention from research...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Efficient Data Mining in SAMS through Association Rule

    The authors propose a protocol for secure mining of association rules in distributed databases. Previous techniques all people deals with different database, now-a-day's people also deals with the distributed database. They can develop a kind of application in which the people can access the distributed data which is already store...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Bilinear Interpolation Image Scaling Processor for VLSI

    The authors introduce image scaling processor using VLSI technique. It consists of bilinear interpolation, clamp filter and a sharpening spatial filter. Bilinear interpolation algorithm is popular due to its computational efficiency and image quality. But resultant image consist of blurring edges and aliasing artifacts after scaling. To reduce the blurring...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Model of Integration of Material Flow Control System with MES/ERP System via Cloud Computing

    In this paper, the authors deal with a model of application gateway for integration of material flow control system with ERP/MES systems, which are provided by cloud computing and software as service delivery model. The developed gateway interface is supposed to cover fundamental requirements of production systems for customization and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Intelligent Garbage Location Monitoring using Remote Server and Sensor Networks

    Solid waste management is a serious global issue in the current world. An efficient waste management is a pre requisition for maintain a safe and green environment as there are increasing all kinds of waste disposal. In this paper, a new approach is developed for a systematic development in managing...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Area Efficient Turbo Encoder for Wireless Applications on FPGA

    Error control is the major insistence in today's wireless communication systems. In this era parallel concatenated convolution codes known as turbo codes plays a crucial role. These codes have been chosen as error control approach for various wireless applications such as UMTS (Universal Mobile Telecommunication System), DVB (Digital Video Broadcasting)...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Current Cloud Computing Review and Cost Optimization by DERSP

    Cloud computing promises to deliver cost saving through the \"Pay as you use\" paradigm. The focus is on adding computing resources when needed and releasing them when the need is serviced. Since cloud computing relies on providing computing power through multiple interconnected computers, there is a paradigm shift from one...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Design and Implementation of Enhanced Secured Cloud Computing

    Cloud computing plays a major role in providing different resources in the form of web services like tax calculation web service, e-banking web service etc., for smooth running of the users daily lives. The authors can rely on cloud computing if these useful web services are really secure enough to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    3D Virtual Glove for Data Logging and Pick and Place Robot

    Traditional interaction devices such as mouse and keyboard do not adapt very well to 3D environments, since they were not ergonomically designed for it. The user may be standing or in movement and these devices were projected to work on desks. To solve such problems it has been designed a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Model of Infrastructure as a Service (IaaS) Layer for Cloud Computing and Mission Critical Applications

    In this paper, the authors deal with creation of model for cloud computing with Infrastructure-as-a-Service (IaaS). IaaS is based on a common network infrastructure with physical servers, which can be installed in various locations of the cloud. The virtualization software, called \"Hypervisor\", creates a group of available virtual resources through...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Efficient Architecture for the Convolution Encoder and Viterbi Decoder for FPGA Implementation

    Error Correcting Codes (ECC) are one of the fundamental building blocks of an efficient communication system and utilization of proper encoding technique guarantees the error free communication in noisy environment although there are many types of ECC available the convolution codes are specifically preferred where the large constrain length are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    A New Method for Optimization of Deadlock resolution of Distributed Database with Formal Model

    A distributed system is a network of sites that send messages to each other, they exchange information. One of the most important applications of distributed systems is enabling resource sharing between systems. In such environments, if a sequence of procedures to control resource allocation is not possible to create a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2011

    Multimodal Biometrics Using Palm and Iris

    Biometrics based personal identification is regarded as an effective method for automatically recognizing a person's identity with high confidence. Multimodal biometric systems consolidates the evidence presented by multiple biometric sources and typically give better recognition performance compared to the system based on a single biometric modality. This paper proposes an...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2012

    Enhancing Security in Ad Hoc Wireless Networks Using Cryptography and Routing Protocols

    An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of any fixed infrastructure, it becomes...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2012

    Optimize Adaptive Coding Techniques to Improve BER in OFDM System

    Adaptive modulation and diversity combining represent very important adaptive solutions for the future generations of communication systems. In order to improve the performance and the efficiency of wireless communication systems these two techniques have been recently used jointly in new schemes named joint adaptive modulation and diversity combining. The highest...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2012

    Wireless Smart Sensor Platform

    Today, Wireless Sensor Networks (WSN) are potentially one of the most important technologies of the 21st century. The utilization of wireless sensor based control systems have been augmented to a very great extent due to reduced cost, better power management, ease in maintenance, and effortless application in remote and hazardous...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2012

    Technical Specification Group Services and System Aspects, IP Multimedia Subsystem (IMS)

    Next Generation Networks (NGNs) aims at providing a wide range of services to end-users over an access independent platform while allowing for better Quality of Service (QoS), charging mechanism and integration of services as compared to conventional fixed or mobile networks. The NGN core network is known as IP Multimedia...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    HMAC: An Enhanced Energy Efficient Protocol Design for Control Applications Using WSNS

    In wireless sensor networks, the main objective function is the energy consumption and the constraints are the packet reliability and delay. To reach a maximum efficiency, cross-layer interaction is a major design paradigm to exploit the complex interaction among the layers of the protocol stack. In this paper, the combination...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    A New Approach for Improving Quality of Web Applications Using Design Patterns

    Design patterns are descriptions of communicating objects and classes that are customized to solve a general design problem in a particular context, they describe the problem and its corresponding solution. Professional software engineers always use Design patterns for introducing abstractions in software and by the way they can build complex...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    Wireless Sensor Networks for Privacy Preserving Location Monitoring System

    Individuals whose personal location is being monitored by a third party (untrusted server), are vulnerable to privacy threats. Thus, the authors propose a privacy-preserving location monitoring system for wireless sensor networks. In their system, they design two in-network location anonymization algorithms, namely, cloaked area determination algorithm and quality-aware algorithm that...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    Verification for PAPR Reduction of OFDM Signal Using Partial Transmit Sequences Technique

    In this paper, the authors propose an algorithm for PAPR reduction in OFDM systems, based on a Partial Transmit Sequence Technique. In this present work an introduction to multi-carrier modulation emphasizing OFDM (Orthogonal Frequency Division Multiplexing) is given followed by mathematical and qualitative description of OFDM. This paper work presents...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    Improving Packet Delivery Ratio in TCP Using New Reno Scheme

    In today's Internet, several variants of TCP are deployed. These variants differ with respect to their congestion control and segment loss recovery techniques. There are schemes like TCP Reno, TCP NewReno to overcome the congestion problem. On-demand ad hoc routing protocols respond to network events such as channel noise, mobility,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    A Proposed Process Model for Removing IP Address Conflicts When Different MANETs Merge: Check the Performance of Server When Address Conflict Occurs

    As the number of nodes increases the complexity of MANET increases in various issues. For this reason, various approaches has been produced to reduce the complexity such as cluster head technique and dominating set based gateway technique. Another issue is distribution of IP in MANET. There are various approaches is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    Software as a Service With Cloud Computing

    Cloud Computing (CC) is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud is basically an extension to the object oriented programming concept of abstraction. It eliminates the complex working details from being visible to the users. What...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    An Integrated Algorithm for Secured Communication With Digital Abstract Based on DES and Diffie Hellman

    Security is the most promising field in networks and safe data transmission is a major task in this era. To enhance security in transmission different approaches have been developed, but they are complex and useful for the small sized data. To improve the security level of data Transmission an integrated...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    An Overview of Checkpointing Techniques for Fault Tolerance in Distributed Computing Systems

    Checkpointing is an important feature in distributed computing systems. It gives fault tolerance without requiring additional efforts from the programmer. In order to provide fault tolerance for distributed systems, the checkpointing technique has widely been used and many researchers have been performed to reduce the overhead of checkpointing coordination. A...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Challenges of Routing in Vehicular Ad Hoc Networks : A Survey

    The advancement in WLAN technologies and introduction of WAVE standards, motivated researchers in the area of Vehicular Ad-hoc NETworks (VANETs). VANETs are special kind of ad-hoc networks having the characteristics of fast topology changes and high node mobility. Commitment of various governments to allocate dedicated wireless frequency spectrum for VANETs...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Secure Web Development Based on Vulnerabilities

    This paper is an effort to develop secure web applications based on known vulnerabilities. It has been seen that in the rapid race of developing web applications in minimum time and budget, security is given least importance as consequence of which web applications are developed and hosted with number of...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    Performance in Heavy Load and in Lower Load Better Performance in MANET

    Mobile Ad-hoc NETwork (MANET) is a wireless network without infrastructure. Nodes can commutate each other without central infrastructure; because they are self-organized and self-configurable with easy deployment. To commutative each other it is required efficient routing protocols in MANET technology. In these the author find out an efficient routing protocols...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Coverage Problems in Sensor Networks

    Now a day's most vital part of research covers on wireless ad-hoc sensor networks due to broad collection of prospective applications. A wireless sensor network causes a new theoretical and challenging optimization problem. Now here the authors discuss one of the essential problems of coverage in sensor networks, which reflects...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2011

    Adaptive Modem for a Software Defined Radio System at Its Front End

    Software Defined Radio (SDR) is the future Trend for mobile communication design. As, the hardware Merges into software gradually in communication system, SDR is supposed to facilitate high-speed multimedia Application for future mobile standards. SDR is flexible Reconfigurable and multi-standard system, which is Capable of providing efficient communication. An adaptive...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2011

    Improve Intrusion Detection for Decision Tree With Stratified Sampling

    This paper aims to improve accuracy of intrusion detection for decision tree algorithm. A number of techniques available for intrusion detection. In this paper, the authors have supervised learning with preprocessing step for intrusion detection. The database is generated using the stratified sampling techniques and the classification algorithm is applied...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2011

    Cluster Based Datagathering in Wireless Sensor Network

    In this paper, clustering in terms of energy efficiency in WSN is explored and proposed Energy Balanced Clustering in Wireless Sensor Network (EBC). Algorithms for energy balanced cluster formation, cluster head selection, intra cluster and inter cluster communication in WSN are proposed. Furthermore, using ns2 simulation performance of proposed protocol...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2011

    Interaction Among Cloud Services on Common Software Application With Service Level Agreement

    Nowadays the cloud computing has plays important role for larger organization, IT Industries, educational industries, etc. Cloud computing is the complex infrastructure of software, hardware, processing and storage that are available as a service. It has huge number of advantages and also suffers lot of disadvantages. In the Cloud Service...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2011

    Algorithms of Buffer Management in Active Real-Time Database System

    Active real-time databases have emerged as a research area in which concepts of active databases and real-time databases are combined into real-time database with reactive behavior. Such systems are envisioned as control systems for environments as diverse as process control, network management and automated financial trading. Sensors distributed throughout the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Detecting and Preventing Security Threats on Servers and Browsers

    The people reliance on web based services through browsers for everyday life activities has increased over the years. Everyday new vulnerabilities are found in what was previously believed to be secure applications, unlocking new risks and security hazards that can be exploited by malicious advertisers or intruders compromising the security...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    A Performance Evaluation of Commonly Used Network Simulators

    It is a very common practice to use network simulators for testing different network performance parameters before the real-life deployment of such a network. Apart from ns-2, few other recent network simulators have come into existence today and are gaining in more popularity. In this paper, the authors survey some...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jun 2011

    Parameter Based Quality Measurement of Data Warehouse

    Data warehousing is most demanding technology to facilitate analytical processing on data from remote sources. This technology is being employed successfully today in many organizations specially where a huge data is managed for example, in the understanding of customers and their buying habits. Data warehouse exists to serve the decision-making...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Hardware Software Co-Design for Low Cost Embedded Systems Based on FPGA

    The fundamental building blocks of a SoC (System on Chip) are its Intellectual Property (IP) cores, which are reusable hardware blocks designed to perform a particular task. For realizing SoC application, IP used may be customized to save silicon Area. With the abundance of proprietary and free IPs, and customized...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Unavoidability Routine Enrichment for Real-Time Embedded Systems by Using Cache-Locking Technique

    In multitask, preemptive real-time systems, the use of cache memories make difficult the estimation of the response time of tasks, due to the dynamic, adaptive and non predictable behavior of cache memories. But many embedded and critical applications need the increase of performance provided by cache memories. Recent studies indicate...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2012

    Scheduling Algorithms for Data Collection in Wireless Sensor Networks - A Survey

    Wireless Sensor Networks (WSNs) face unavoidable challenges in the areas of maintaining connectivity, network lifetime and energy efficiency in its implementation. Recently, several WSN architectures based on Mobile Elements (MEs) have been proposed which can be leveraged to overcome these problems. Mobility of the mobile elements is controlled by the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2011

    An Analysis of Cryptosystems Using Elliptic Curve Cryptography

    The true impact of any public-key cryptosystem can only be evaluated in the context of a security protocol. Secure communication is an intrinsic requirement in any transaction. It is very important to implement cryptosystems securely against the attacks. Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2011

    Study of Network Monitoring System Using Java RMI

    The corporate world looks at IT as that critical function having a say on day-to-day business, the choice of a network monitoring solution is a must factor in the business. In this paper, the authors have discussed such software which are already exists for Network Monitoring. They have also discussed...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2011

    Efficient OFDM PAPR Reduction Method Using Linear Phase Variation

    An efficient OFDM Peak to Average Power Ratio (PAPR) reduction method using linear phase variation is proposed. Applying linear phase variations to sub-blocks of subcarriers is equal to cyclic shifting the corresponding time signals and thus can prevent "Peak collisions". This method differs from conventional Partial Transmit Sequence (PTS) techniques...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2011

    Information Security Strategy-A New Approach

    Small and Medium Enterprises (SMEs) are gradually believing that information is an asset and like any other asset it needs to be strategically managed and protected. In most of the SMEs developing a strategy and then implementing the security measures are avoided or are considered as redundant. So in most...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2011

    Cloud Computing Architecture: The Improved Strategy for Good E-Governance

    Cloud Computing provides a great opportunity for enabling reliable E-Governance quickly at lower costs. Cloud computing features like application virtualization, end-to-end service management, instant deployment and ease of maintenance are catalysts that jumpstart application deployment on the Cloud. The paper recommends taking to a Cloud infrastructure step-by-step, rather than going...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2011

    Hardware/Software Co-Design Using Synchronous Interface

    Any engineering designs can be viewed as systems, i.e., as collections of several components whose combined operation provides useful services. Components can be heterogeneous in nature and their interaction may be regulated by some simple or complex means. Interface between Hardware & Software plays a very important role in co-design...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2011

    Enhanced Core Processor Blocks of OFDM System

    OFDM is a multi carrier modulation technique in which the carriers are Orthogonal to each others as a result of which it provides high bandwidth efficiency and multiple carriers share the data among themselves. This paper describes the design and implementation of Enhanced Core Processing Blocks of OFDM Transmitter and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Mobile WiMAX Security, Architecture and Assessment

    WiMAX (Worldwide Interoperability for Microwave Access) is an emerging wireless communication system that can provide broadband access with large-scale coverage. Since 2001, WiMAX has evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e (Mobile WiMAX) standard with mobility support. The importance of IEEE-Standard...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Stagnant Timing Investigation of Embedded Software on Advanced Processor Architectures

    The accuracy of the prediction results and the applicability of the under laying algorithms are influenced by several parameters. In addition, both issues are interdependent. Thus, the first part of this paper examined this connection regarding memory and cache modeling as well as analysis. In addition, here, the authors learned...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Life Management and Power Management Issues in Wireless Sensor Networks: A Survey

    Wireless sensor networks consist of small nodes which sense its local environment then it done processing and send the data to the other sensor node or end user. These sensor nodes have very limited battery power, due to this reason their life is small. Power management and life management issues...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    GSM-GPS Based Intelligent Security and Control System for Vehicle

    The revolution of Mobile and Technology has made 'GSM based vehicle security system'. The vehicle security system is prominent worldwide. But it is not so much secure system. Every vehicle owner wants maximum protection of his vehicle; otherwise thief can easily trap the vehicle. So, by combing the idea of...

    Provided By International Journal of Electronics Communication and Computer Engineering