International Journal of Electronics Communication and Computer Engineering

Displaying 1-40 of 211 results

  • White Papers // Nov 2013

    Challenges and Opportunities of Big Data Analytics in Business Applications

    Big data analytics is to discover a hidden data from the massive and messy data. Analytics is a sophisticated technique to extract actionable knowledge and insight from the data. Big data is not just about size. The amount of data available is growing faster than the authors' ability to deal...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Advanced Trust Based Approach for Increasing Security in Cloud Computing

    Cloud computing has become one of the fastest growing fields in computer science. As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Survey on Security Issues and Strategies of Cloud Computing

    Cloud computing has brought new changes and opportunities in IT Industry. The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing and visualization technology. Cloud computing security has become a hot topic in industry and academic research. This paper is a detailed view...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Prior Authentication Approach to Enhance Security in CloudComputing

    Now-a-days cloud computing is an upcoming technology. Cloud allows users to access and share resources such as software, platform and infrastructure by means of virtualization. Even though it offers many advantages, several large organizations like banks, financial organizations and few government agencies are still considering it to be unsafe place....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    A Modern Approach to Cyber Security Analysis Using Vulnerability Assessment and Penetration Testing

    Internet has opened unlimited avenues of opportunity by enabling organizations to conduct business and share information on a global basis. However, it has also brought new levels of security concerns and cyber threats. It exposes valuable corporate information, mission critical business applications and consumer's private information to more risk than...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Security Threats on Vehicular Ad Hoc Networks (VANET): A Review Paper

    The constant growth of automotive market and the increasing demand for the car safety, also driven by regulatory (governmental) domain, the potential of car-to-car connectivity is immense. Emerging Vehicular Ad-hoc NETworks (VANET) has the potential to improve the safety and efficiency of future highways. While during with wireless communication security...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    The Theoretical Approach to Cloud Computing

    The importance of cloud computing is increasing and it is receiving a growing attention in the scientific and industrial communities. Cloud computing enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Security Through Steganography and Cryptography in VOIP

    Current practice of data hiding technique exists, uses image, audio, video, or protocol headers as medium for hiding the people information. The real-time text hiding is to hide the secret text into a cover speech in real-time communication systems such as Voice Over Internet Protocol (VOIP). VOIP the new and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Improving Modern Web Application Defenses Using HTML5

    HTML5 has brought in several technological changes to the erstwhile HTML realm and even though there are certain security implications due to the introduction of various new APIs, considerable amount of effort has been put to corroborate secure web application development methodology. This paper is to elucidate different HTML5 features...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Key Structure Based Approach towards Scalable Access Control in Cloud Computing

    Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. The existing methods for implementing access...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Cloud Outcome and Troubles with Safety Solutions

    In this paper, the authors introduction of terms cloud security practices, security compliance against standards and best practices, how the cloud changes the role of IT security. Cloud computing executives have pinpointed the rise of security solutions as a key factor in the future of the IT industry. There is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Analyzing the Detection of Active Attacks in MANETs

    In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the active attack, where two or more malicious collision nodes create a higher level virtual tunnel in the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Integrity Verification & Distributed Accountability in High Performance Distributed Clouds

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Effective Algo for the Frequent ItemSet in Data Mining

    A core data mining operation is frequent itemset mining and has been extensively studied over last decade. This paper takes a new approach and implements a new algorithm for this problem and makes the two major contributions. First, it implements a one pass algorithm for frequent itemset mining which has...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2013

    Mobile Network DoS Attack and Detection Technology

    Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of Smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management and mobile network security for various abnormal and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Study of Spam Dection Approaches and Measures of Antispam

    Email has become one of the best ways of communication for modern generation. However, the increase of E-mail users is has resulted in the increases of Spam. Spam is commonly defined as unsolicited email messages; the goal of spam classification is to distinguish between spam and legitimate email messages. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Randomized Routing for Wireless Sensor Networks: Optimized Security and Energy Efficiency

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices that use sensors to monitor physical or environmental conditions. Sensor nodes are battery-powered and are expected to operate without attendance for a relatively long period of time. So they must be energy efficient. Sensor networks...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Improving Security in WiMAX Using Evolutionary Algorithm

    The evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. To achieve end-to-end secure communication then the security has to be kept in mind. By keeping in mind the importance of security, the wireless...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Data Quality in Software as a Service Implementation of Public Geographic Information System

    Public Geographic Information System (GIS) is a system that automates the process of collecting community contributions of spatial data cross referenced to base maps. It provides the capabilities of analyzing such spatial data giving effective decision support information such as decisions for appropriate land use planning, planning pedestrian areas in...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    FPGA Based Network Intrusion Detection System Using Counting Bloom Filter

    Computer networks face an ever increasing number of threats from hackers, viruses and other malwares. An effective Network Intrusion Detection (NID) is critical before a threat affects end user machines and it leads to many financial and national security problems. As the number of threats and network speed increases, the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Code-injection Buffer Overflow Attack Blocker

    Code injection buffer overflow attack blocker propose a real time, application layer blocker for preventing buffer overflow attacks and all types of code injection message. It can filter out code-injection and buffer overflow attack messages targeting at various Internet services such as web service. This paper is specifically works on...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Data Security in the Cloud using Digital Signature Mechanism

    Cloud is a very powerful technology of all other types of computing. Cloud computing provides three models of services. IaaS, PaaS and SaaS. Cloud computing having four different clouds for provides using of services. Private cloud, public cloud, community cloud and hybrid cloud. In its services having to security over...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Security Challenges in Cloud Storage

    Cloud computing is the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. Cloud computing has brought advantages in the form of online storage. Data security for such a cloud service encompasses several aspects including secure channels, access controls, and encryption. And, when the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Cloud Computing - Wave of the Future

    Cloud computing, metaphor for the internet, is an upcoming paradigm that offers tremendous advantages in all aspects, such as reduced time to market, limitless computing power and flexible computing capabilities. In today's era, it is most enticing and interesting technology which is offering services to its end users on demand....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    A Study on Credit Card Fraud Detection Methods Using Genetic Algorithm

    In modern day the fraud is one of the major causes of great financial losses, not only for merchants, individual clients are also affected. In this paper, the authors develop a method which improves a credit card fraud detection solution currently being used in a bank .Improving a credit card...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Advanced Embedded Laboratory Security System

    In this paper, the authors explain the design and Implementation of an Embedded Laboratory Security System (ELSS). The system uses and ARM7 Controller for the development of the most advanced Laboratory Security System, which acquires video information through camera, and Wireless Sensor Network (WSN) which gets environmental parameters through sensors...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Simulation of AES Encryption and Decryption Algorithm with Parallel Data Execution

    Advanced Encryption Standard (AES), has received significant interest over the past decade due to its performance and security level. Many hardware implementations have been proposed. In most of the previous works sub bytes and inverse sub bytes are implemented using lookup table method and using same key at time in...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    On the KDD'99 Dataset: Support Vector Machine Based Intrusion Detection System (IDS) with Different Kernels

    The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with many features. To get rid of this problem, several types of intrusion detection methods have been proposed and shown different levels of accuracy. This...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Study of Carbon Emission in Computing Scenario

    In this paper, the authors present a case study of what is green computing, why they need to go green computing & will tell the user how to minimize the energy consumption as well how to lessen the CO2 emission by going green computing. The huge amount of computing manufactured...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Cipher for Smart Card Using Unicode, Length and Position

    Smart cards have become a common thing today. Smart cards with various utilities are used today since they are easy to carry and relatively secured. But due to advancement of technologies, smart cards are becoming increasingly insecure. A paper from certain conference suggested a new encryption algorithm to keep the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Information Security Strategy- A New Approach

    Small and Medium Enterprises (SMEs) are gradually believing that information is an asset and like any other asset it needs to be strategically managed and protected. In most of the SMEs developing a strategy and then implementing the security measures are avoided or are considered as redundant. So in most...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Biometric System for User Authentication Based On Hough Transform and Neural Network

    Authentication of a person is the major concern in this era for security purposes. In biometric systems signature is one of the behavioral features used for the authentication purpose. In this paper, the authors work on the offline signature collected through different persons. Morphological operations are applied on these signature...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Performance Analysis of SAODV with DOS Attack

    Protection against Denial of Service (DOS) attacks is critical component in any security system especially for wireless networks. Particularly Mobile Ad-hoc NETwork (MANET) applications are deployed into battleground and its nature of the networking is also susceptible to attacks like DOS. Routing plays an important role when communication is established...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Router Architecture for Network on Chip Using FPGA

    On single chip integration of storage and computational block has becoming feasible due to continuous shrinkage of CMOS technology. Field Programmable Gate Arrays (FPGA's) are power efficient devices support more complex design with good performance and low cost. For effective global on-chip communication, on-chip routers provide essential routing functionality with...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Design of Inspection and Security Vehicle Checking System Based on Arm7

    Security system now-a-days become a need for vehicles and available with many modern features. This car security system comes with extra secure access and message on GSM net. The system only can be accessed and configured by owner using GSM module communication via mobile phone. In this project, when the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2013

    Secure Erasure Code-Based Cloud Storage With Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

    Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jun 2013

    Low-Cost PIR Sensor Based Security System Using Micro Controller

    In this paper, the authors propose the development of a Low-cost security system using small PIR (Pyroelectric InfraRed) sensor built around a microcontroller. The low-power PIR detectors take advantage of pyroelectricity to detect a human body that is a constant source of Passive Infrared (radiation in the infrared region). The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jun 2013

    Privacy Protection of Data Using Chaos and Biometric Template

    The problem with traditional cryptography authentication is that the keys that are very long, difficult to memorize and can easily be attacked. Although it provides sample security but these algorithms are secure only when the key is secure. So instead of using conventional cryptographic approach for protecting or authenticating user...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jun 2013

    Security Optimization of VTP Model in an Enterprise VLAN

    VLANs are extensively used in enterprise network to ease management of hosts to improve scalability and flexibility. Despite their wide usage in enterprise network, VLAN security is a greater concern for the network administrator due to very little attention has been paid on error prone, unsystematic, high risk of misconfiguration...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    DDoS Mitigation in Cloud by Using C.I.T.F.A.

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Stagnant Timing Investigation of Embedded Software on Advanced Processor Architectures

    The accuracy of the prediction results and the applicability of the under laying algorithms are influenced by several parameters. In addition, both issues are interdependent. Thus, the first part of this paper examined this connection regarding memory and cache modeling as well as analysis. In addition, here, the authors learned...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    CSPR Using in Delay Tolerant Networks

    This paper studies Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since, the future node connections are mostly...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Reliable Data Delivery in MANETs Using POR Protocol

    This balance addresses the company of release matter packets for stage sprightly mercurial beating the drum hoc networks in a reliable and timely manner. Most suitable verifiable propaganda hoc routing protocols are susceptible to node mobility, especially for large-scale networks. Dominated by this topic, the authors clench an apt Position-based...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Performance Analysis of Prioritized Call Admission Control Schemes for Integrated Traffic in Wireless Network

    Wireless/mobile communication systems are becoming increasingly popular in recent years. As the wireless resources are scarce, it is important to allocate resources efficiently and carefully, in order to achieve maximum output. The call admission control schemes play a significant role in providing the desired Quality of Service (QoS) by judiciously...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Fingerprint Recognition Using a Reference Point and Pores

    Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. However, considering the automatic fingerprint recognition a completely solved problem is a common mistake. There are many different algorithms being used to get this accomplished. The global level structures consist of many...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Development of a Mathematical Framework for Comparison of Underlay and Overlay Systems

    Overlay and underlay are two main spectrum access strategies in cognitive radio. In this paper, the authors have driven closed form expressions for the primary service outage probabilities of both techniques. They have also formulated and solved optimization problems with the objective of maximizing the secondary service's capacity with constraints...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Network Security Implementation Using Genetic Algorithm in WDM Optical Networks

    Optical networks are high capacity telecommunication network based on optical technologies and components that provide routing, grooming, and restoration at wavelength level as well as wavelength-based services. As networks face increasing bandwidth demand and diminishing fiber availability, network provides are moving towards a crucial milestone in network evolution: the optical...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Statistical Multipath Signal Detection and Transmission Over CDMA Mobile Ad-Hoc Network

    In any communication network, Quality of Service (QoS) plays a major role as it is a measure of the performance of a system reflecting its transmission quality and service availability. Hence achieving QoS in networks such as ad-hoc network is a major challenge because the signal takes different paths to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    High Speed Direct Signal Frequency Synthesizer

    Frequency synthesizers are very critical blocks for embedded systems in communications and instrumentation applications. Direct digital frequency synthesis is widely used technique, due to its high frequency resolution and fast switching between frequencies over a large bandwidth of interest. The DDFS in modulator mode can be used for producing ASK,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Improving Performance in Wireless Sensor Networks Using MEMS Technology

    In this proposal the research is towards improving performance strategy for deployment of Wireless Sensor Networks. This vision of MEMS Technology whereby microsensors, microactuators and microelectronics and other technologies, can be integrated onto a single microchip is expected to be one of the most important technological breakthroughs of the future....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    ISP Security for DDoS Attacks

    Web can be starting the working with ISP edge routers communication environment process. There is no protection in present ISP edge routers. ISP to get the attacks like DDOS attacks and flooding attacks identification. Web can be converted as a complicated web graph generation process. ISP cannot be contains many...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Information Completely Distributed in Wireless Networks

    Routing research in wireless multi-hop networks has traditionally focused on shortest path routing protocols. It has no idea about traffic load. It means it only moves packet in short path from source to destination by this way traffic load increases. The authors get packet with more delay. If the numbers...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Spread Spectrum System With DoS Attack Properties in Wireless Sensor Networks

    Wireless Sensor Networks can be implementing with compromised nodes communication. In compromised nodes to launch DDoS attacks. Using DDoS attacks characteristics to identify the authorized user's communication process. All authorized users reports of information can be available in server. Legitimate reports verify the client's communication reports. In previous system there...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Discovering Usage Patterns From Web Data Using Web Usage Mining

    This paper work concentrates on web usage mining and in particular focuses on discovering the web usage patterns of websites from the server log files. Web Usage Mining is a part of Web Mining, which, in turn, is a part of Data Mining. As Data Mining involves the concept of...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Android Based Processor Performance Analyser

    Android mobile operating system is based on 32 bit ARM Processor. ARM processor consists of 32 bit wide Registers and program counter. The authors measure the difference between two measurements of process statistics and calculate the processor utilization at a particular moment. Android is a embedded mobile real time operating...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

    This paper, proposes an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users data in the cloud. The authors rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability. This construction drastically reduces the communication...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Mobile IP Networks Approaches High Mobility Management for Performance Evaluation

    In wireless networks, efficient management of mobility is a crucial issue to support mobile users. The Mobile Internet Protocol (MIP) has been proposed to support global mobility in IP networks. Several mobility management strategies have been proposed which aim reducing the signaling traffic related to the Mobile Terminals (MTs) registration...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Architecture and Algorithm for an Cooperative Cache Wireless P2P Networks

    The ad hoc networks focus on routing, and not much work has been done on data access. Data caching can improve the efficiency of information access in a wireless networks by reducing the access latency and bandwidth. A common technique used to improve the performance of data access is caching....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Techniques for Resilience of Denial of Service Attacks in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. Ad hoc is Latin and means "For this purpose". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. A...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    High-Speed Data Stream Mining Using VFDT

    Large databases that grow without limit at a rate of several million records per day and to mining these continuous data streams brings unique opportunities to the researchers. Here, the authors describe and evaluate VFDT, an anytime system that builds decision trees using constant memory and constant time per example....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Tracing Sources of DDoS Attacks in IP Networks Using Machine Learning Automatic Defence System

    Internet Protocol (IP) trace back system is the enabling technology to control Internet Crime. In this paper, the authors present a novel and practical IP trace back system called Machine Learning Automatic Defence System (MLADS)the LADS shows to calculate time for better tracing performance compare with other defence system and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    A Review of the Software Testing Process in SDLC

    Software testing is the process of executing software in a controlled manner, in order to answer the question "Does the software behave as specified?" Software testing is often used in association with the terms verification and validation. Verification is the checking or testing of items, including software, for conformance and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    A Sophisticated Study on Best Practices of Agile Software Testing

    From the time procedure is penned for an development process, its best practices and easy way to implement those practices are discussed and optimized. In recent years many Software development life cycles are introduced and their best practices are discussed and studied empirically. Agile software testing being most adopted in...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Hardware Virtualization for Low Cost Solutions in Education

    Currently, Virtualization Technology (VT) is one of the significant technology that provide maximum benefits and opportunities for computing industry, education and research. At present, mostly used and developed mechanism is hardware virtualization which provides a common platform to run multiple operating systems and applications in independent partitions. More precisely, the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Dual Hop Ostbc Transmission Over Rayleigh Fading Channel for Regenerative System

    This paper presents performance analysis of cooperative Multiple-Input Multiple-Output (MIMO) relay network system with single-relay. The MIMO scheme is based on Alamouti Space Time Block Coding (STBC) over Rayleigh flat fading channels. The source node, equipped with two transmit antennas, simply broadcasts each STB code to the relay and the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Control Chart Procedure for Software Reliability: Inflection S-Shaped Model

    Over the last four decades, many software reliability growth models have been developed in tracking the growth of reliability as software is being developed. This paper presents the use of SPC in combination with one of those models. Software reliability process can be monitored efficiently using Statistical Process Control (SPC)....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    BER Analysis of DS-CDMA Using LMS Algorithm and Rake Receiver

    CDMA is interference limited system hence the capacity of the system is limited by interference as number of users' increases. This problem occurs when many mobile users share the same channel. CDMA takes the advantage of multipath fading .This system is resistant to multipath fading & also use the delayed...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    Novel Techniques for Implementing Low Voltage Low Power and High Bandwidth Current Conveyors

    This paper gives an overview of current conveyor and its various generations in terms of its historical evolution along with possible techniques for improvements in their performance. The techniques for designing low voltage and low power configuration are discussed in brief which can be utilized in performance improvement of several...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    Application of Biometric Image as a Key in Ensuring Security of Data Using Steganographic Approach

    In this paper, the authors have proposed a new image steganographic technique capable of producing a secret embedded image that is entirely indistinguishable from the original image by the human eye. Data bits from textual message are embedded about the entire image to some suitable pixel positions. Initially the root...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    The Design and Implementation of a Packet Sniffer (PSniffer) Model for Network Security

    This paper presents another type of packet sniffer software that captures network data as well as provides sufficient means for the decision making process of an administrator. This paper designed a new model and defined its benefits over existing packet sniffers; the model was developed in Java totally. The aim...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    Performance Improvement of Wireless LAN Over Wired Networking System

    Present days various inventions take place in science and technology for the fulfillment of users demands. In today's world computer technology is on demand. In order to fulfill the demand of users 802.11wireless LAN standard developed by IEEE 802.11committee. Wireless networking is additional recent substitute to wired networking that relies...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    A Survey of Data Mining Techniques for Smart Grid Systems

    Electricity generated through steam and hydro - turbines have been serving one since ages. It has reached its limits. Outages, blackouts are becoming inevitable. So, there is a need to develop a system that is able to identify the links right from the source of electricity generation to the consumers...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    Design of Broadband W-Slotted Microstrip Patch Antenna

    In this paper, the authors presented to improve the bandwidth a W-slot technique is used, it is efficient to enhance the bandwidth of antenna. A broadband W-slot microstrip patch antenna is designed which attains a bandwidth of 22.74% at 10dB return loss with centre frequency of 4.5GHz and also it...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    Server Sensor and Remote Unit Authentication by Smart Card

    This paper aims to provide mutual authentication of remote unit and remote server side. It uses cryptanalysis process of two user authentication protocols i.e. remote unit which is represented by microcontroller and remote server which is represented by personal computer. It consists of registration, login, verification phase in remote server...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2012

    Performance of 2:1 MISO System for M-QAM Underrayleigh and RICIAN Channels

    Wireless access to data networks is expected to be an area of rapid growth for both fixed and mobile communications. Current and future wireless systems or standards like cellular mobile phones, Wireless Local Area Network (WLAN), Bluetooth, 4G all has to support multiple mode of operations like voice, image, text,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2012

    Simulation of Digital Audio Broadcasting System in QPSK, AWGN and RICIAN Channel

    Radio broadcasting technology has evolved rapidly over the last few years due to ever increasing demands for as high quality sound services with ancillary data transmission in mobile environment. Digital Audio Broadcasting (DAB) system developed within the Eureka 147 Project is a new digital radio technology for broadcasting radio stations...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2012

    Optimized MSE Analysis of Maximum Power Adaptation With Code Rates Over Wireless Cropped Image Transmission Using Labview

    Coding plays significant role in wireless transmission as the most important scheme for communication of cropped images over wireless channels, due to its ability to deal with various channel qualities and to approach the hypothetical limits of transmission rates. In this paper, maximum power adaptation algorithm is implemented along with...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Identification of Cracks in a Structure Using Fibre Optic Sensors

    Fibre optic sensors modulate some of the features in the light wave used in the optical fibre. The features such as intensity and phase modulation are the most commonly features used in an optical fibre as a sensor. And an OTDR (Optical Time Domain Reflectometry) is a common system used...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Efficient and High-Performance Parallel Hardware Architectures for the AES-GCM Encryption and Decryption

    The Advanced Encryption Standard (AES) is a symmetric key algorithm and its recently standardized authentication Galois/Counter Mode (GCM) have been utilized in various security-constrained applications. Many of the AES-GCM applications are power and resources constrained and require efficient hardware implementations. In this paper, different Application-Specific Integrated Circuit (ASIC) architectures of...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Simulation Study of Some Spatial Multiplexing Techniques for MIMO Wireless Communication Systems

    This paper presents simulation results and comparative analysis of some Spatial Multiplexing Techniques for Multiple-Input Multiple-Output (MIMO) based Wireless Communication Systems. Performance of various detection schemes are evaluated through MATLAB simulation study. The Bit Error rate and complexity of these schemes is discussed. The simulation is carried out for different...

    Provided By International Journal of Electronics Communication and Computer Engineering