International Journal of Electronics Communication and Computer Engineering

Displaying 1-40 of 292 results

  • White Papers // Oct 2014

    AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

    In a Mobile Wireless Sensor Network (MWSN), mobile sensor nodes move freely at the network environment. So, a large number of attacks threaten this network. Unauthenticated broadcast attack is a common attack which worsens the network congestion as well as energy consumption. In this paper, an efficient method for defending...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Security Issues of Wireless Communication Networks

    Wireless communication networks have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    A Survey of Recent Indoor Positioning Systems Using Wireless Networks

    Global Navigation Satellite Systems (GNSS), which are widely used today by positioning and navigations systems, are becoming increasingly important in daily life. GNSS, however, do not work well in indoor environments due to the satellite signal outages that occur in closed structures. Yet the demand for indoor positioning systems is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Improvement in Energy Optimization in Telecommunication Network Service

    Since the user advert of telecommunication networks, the demand has been growing higher and most communication activities and other socio economy activities now uses telecommunication network as there medium of communication, business transaction, banking and other amenities. Energy-efficient operation is an important issue today in telecommunication networks and in the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Software Development Effort Estimation Techniques: A Review

    The most important activity in software project management process is the estimation of software development effort. The literature shows many algorithmic cost estimation models such as Boehm's COCOMO, Albrecht's function point analysis, Putnam's SLIM, ESTIMACS, soft computing based techniques etc., but each model has their own advantages and disadvantages in...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Alternation Relationships Regarding Architecture for Dense Multiplexing, Reconfigurable Systems and Based on Wavelength Division, Design, and Simulation of ROADM-Based DWDM

    The optical technical advancements currently provide the possibility for building the reconfigurable wavelength practical networks. These networks employ wavelength switching structures for dynamic routing of wavelengths and provide the level of flexibility and scalability that has not been already possible. Other components such as low-noise optical amplifiers, Electronic Dispersion Compensators...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Designing a 64-Point FFT/IFFT Processor for Implementation of OFDM in High Speed WLAN Applications

    In this paper, a methodology is presented for design of a special 32-bit 64-point processor to implement the OFDM in local wireless networks with IEEE standard 800.11a. In this FFT/IFFT, instead of direct approach, the shifter and adder are used for multiplier; thereby, it yields a major reduction in power...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Bluetooth Based Synthesizer for Wireless Sensor Measurements

    In this paper, the authors aim to overcome the spur problems in Bluetooth-based wireless sensors measurement a compact fractional-N frequency synthesizer is presented ranging from 2 GHz to 3 GHz in frequency. Through this technique, the phase noise in the final spectrum is improved and spur tones in the output...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Reduction of Threshold-Based Feedback in Multi- Cellular Cluster Networks

    In this paper, a downward system has cell and dual frequency division characteristics has been considered in which each user send state information of information channel to its home station. Since the cooperation between all stations is not possible in practice, a number of stations are grouped into clusters and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    A New Positioning Method Using Ant Colony Optimization in Wireless Sensor Networks

    Network coverage in sensor positioning is an important challenge of wireless sensor networks. This problem is an NP-hard problem and employing an optimization method is needed. In this paper, the authors propose an efficient method based on Ant Colony Optimization (ACO) to the sensor positioning to gain better performance by...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Threat Analysis with Comparison of IPv4 and IPv6 in Cloud Computing

    Cloud computing is a modern technology which provides its users the remote access to centralized and remotely located servers through internet to get many services like, storage and sharing of data and applications over the servers and cloud. This paper is on the performance measurement of IPv4 and IPv6 on...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Optimal Performance of OFDM Signal Using PAPR Reduction Techniques in LTE Systems

    3rd generation partnership project Long term Evolution (LTE) has been designed to provide more efficient use of radio networks. The LTE provides scalable bandwidth, latency reduction and higher data rates with improved mobility. Single Carrier Frequency Division Multiple Access (SC-FDMA) has been selected for use in the Long Term Evolution...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2014

    Presentation of an Algorithm Configuration for Network-on-Chip Architecture with Reconfiguration Ability

    Due to the challenge that the number of cores is combined on a single chip, the Network-on-Chip (NoC) has gradually become a popular solution. And recently, researchers have focused on improving the performance of NoC chips to achieve good performance. In this paper, the authors present an algorithm configuration for...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Performance Analysis of LEACH Protocol

    Wireless Sensor Networks (WSN) the availability of cheap, low power, and miniature embedded processors, radios, sensors, and actuators, often integrated on a single chip, is leading to the use of wireless communications and computing for interacting with the physical world in applications such as security and surveillance applications, smart classroom,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Investigation of Cloud Computing: Applications and Challenges

    Cloud computing is a model for saving data or knowledge in distance servers through Internet. It can be save the required memory space and reduce cost of extending memory capacity in users' own machines and etc., Therefore, cloud computing has several benefits for individuals as well as organizations. It provides...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Analysis and Simulation of CDMA QAM-16 for AWGN and RAYLEIGH Channel

    In a Code Division Multiple Access (CDMA) system, a lot of users use concurrently the entire frequency band to transmit their data and users' data is separated on the basis of their unique spreading code. The aim of communication system i.e. Communication at anytime, anywhere and by anybody is still...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Provide a New Model for Query Processing in P2P Integration Systems

    Most of organizations and companies meet their needs for software by providing distinguished software system during the time. Each one of these systems utilize own way for saving information which are not necessarily similar to other systems. Therefore, the authors are facing with a collection of information related to an...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Benchmarking Custom Artificial Neural Network Hardware Accelerator

    In this paper, the authors benchmark the custom design computational architecture supporting Artificial Neural Network (ANN) acceleration. The custom design optimizes the frequently used: Multiply And Accumulate (MAC) operations. In this paper the performance of the custom design is compared with ARM and MIPS architectures supporting basic Single Instruction Multiple...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Review of Existing Models for Estimating the Cost of Software Development in Cloud Computing

    Now-a-days, the number of cloud computing service providers which are providing various services for users are increasing dramatically. These service providers attempt to make several facilities for their consumers or users such as data saving, sharing with others or running their applications with the help of cloud computing resources such...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2014

    E-Learning Based on Cloud Computing: Requirements, Challenges and Solutions

    Cloud computing technology has changed the access method and development of applications. This technology by providing necessary fundamentals runs applications as services on the net via web browsers. E-learning can utilize cloud computing in order to fulfill the required infrastructures and also to provide the improved performance, scalability, and increased...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jul 2014

    On Packet Loss Ratio of IEEE 802.15.4 with Different Sensor Motes for Wireless Sensor Networks

    Packet Loss Ratio (PLR) is one of the key components for the performance enhancement of a Wireless Sensor Networks (WSNs). This paper investigates the PLR at radio receiver for the different current draw parameters: transmit mode, receive mode, and sleep mode and idle mode keeping other parameters like: initial energy...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    The Critical Factors Influencing the Adoptions of Data Warehouse

    Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management. A lot has been done in this field regarding design and development of data warehouses and a lot still needs to be done but one area which needs special attention from research...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Efficient Data Mining in SAMS through Association Rule

    The authors propose a protocol for secure mining of association rules in distributed databases. Previous techniques all people deals with different database, now-a-day's people also deals with the distributed database. They can develop a kind of application in which the people can access the distributed data which is already store...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Bilinear Interpolation Image Scaling Processor for VLSI

    The authors introduce image scaling processor using VLSI technique. It consists of bilinear interpolation, clamp filter and a sharpening spatial filter. Bilinear interpolation algorithm is popular due to its computational efficiency and image quality. But resultant image consist of blurring edges and aliasing artifacts after scaling. To reduce the blurring...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Model of Integration of Material Flow Control System with MES/ERP System via Cloud Computing

    In this paper, the authors deal with a model of application gateway for integration of material flow control system with ERP/MES systems, which are provided by cloud computing and software as service delivery model. The developed gateway interface is supposed to cover fundamental requirements of production systems for customization and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Intelligent Garbage Location Monitoring using Remote Server and Sensor Networks

    Solid waste management is a serious global issue in the current world. An efficient waste management is a pre requisition for maintain a safe and green environment as there are increasing all kinds of waste disposal. In this paper, a new approach is developed for a systematic development in managing...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Area Efficient Turbo Encoder for Wireless Applications on FPGA

    Error control is the major insistence in today's wireless communication systems. In this era parallel concatenated convolution codes known as turbo codes plays a crucial role. These codes have been chosen as error control approach for various wireless applications such as UMTS (Universal Mobile Telecommunication System), DVB (Digital Video Broadcasting)...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Current Cloud Computing Review and Cost Optimization by DERSP

    Cloud computing promises to deliver cost saving through the \"Pay as you use\" paradigm. The focus is on adding computing resources when needed and releasing them when the need is serviced. Since cloud computing relies on providing computing power through multiple interconnected computers, there is a paradigm shift from one...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Design and Implementation of Enhanced Secured Cloud Computing

    Cloud computing plays a major role in providing different resources in the form of web services like tax calculation web service, e-banking web service etc., for smooth running of the users daily lives. The authors can rely on cloud computing if these useful web services are really secure enough to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    3D Virtual Glove for Data Logging and Pick and Place Robot

    Traditional interaction devices such as mouse and keyboard do not adapt very well to 3D environments, since they were not ergonomically designed for it. The user may be standing or in movement and these devices were projected to work on desks. To solve such problems it has been designed a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Model of Infrastructure as a Service (IaaS) Layer for Cloud Computing and Mission Critical Applications

    In this paper, the authors deal with creation of model for cloud computing with Infrastructure-as-a-Service (IaaS). IaaS is based on a common network infrastructure with physical servers, which can be installed in various locations of the cloud. The virtualization software, called \"Hypervisor\", creates a group of available virtual resources through...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Efficient Architecture for the Convolution Encoder and Viterbi Decoder for FPGA Implementation

    Error Correcting Codes (ECC) are one of the fundamental building blocks of an efficient communication system and utilization of proper encoding technique guarantees the error free communication in noisy environment although there are many types of ECC available the convolution codes are specifically preferred where the large constrain length are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    A New Method for Optimization of Deadlock resolution of Distributed Database with Formal Model

    A distributed system is a network of sites that send messages to each other, they exchange information. One of the most important applications of distributed systems is enabling resource sharing between systems. In such environments, if a sequence of procedures to control resource allocation is not possible to create a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    Neutralizing the Impact of Account or Service Traffic Hijacking in Cloud Computing

    Cloud computing is a booming computing model in the IT industry. Machines involved in cloud computing provide efficient computing power. Though massive adoption of this technology is seen across the globe, yet security issues are preventing its deep penetration. In a recent survey, 69 percent of North American IT professionals...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2014

    Modern Power Management System Using ARM Controller

    The introduction of electronic energy meter for electrical energy metering has resulted in various improvements in the operation of utilities apart from the increase revenue due to better recording of energy consumption. In this paper, remote power management and meter reading system is implemented using ARM7 based LPC2148 microcontroller. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    ARM Processor Based Embedded System for Remote Data Acquisition

    The embedded systems are widely used for the data acquisition. The data acquired may be used for monitoring various activity of the system or it can be used to control the parts of the system. Accessing various signals with remote location has greater advantage for multisite operation or unmanned systems....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Time-Cost Scheduler for Technological and Economic Challenges Related to Customized Cores and General Purpose Processors

    With the renewed interest in the customization of embedded processors for applications specific needs, it becomes imperative to understand its viability both economically and technologically thus avoiding pitfalls. Customization and scalability are two terms which are often used synonymously to denote add/subtract of additional functional units or increase/decrease of ports...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Data Collection Approaches on Wireless Sensor Networks: A Survey

    A Wireless Sensor Network (WSNs) consists of static nodes which are densely deployed over a sensing area. In wireless sensor environment each of the sensor nodes has data to send to a base station through a mobile agent, the major problem is to minimize the length of each data gathering...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Fusion Using Robust Estimator for Uncertain Noisy Systems Over Sensor Networks

    In this paper, the authors verify the problem of designing robust state estimator for multiple sensor networks with uncertain model and noisy measurements. Multi sensor data fusion by measurement fusion and state vector fusion structure using the Kalman filter were introduced. The standard Kalman filter requires an accurate system model....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    16-Bit RISC Processor Design for Convolution Application

    In this paper, the authors propose a 16-bit non-pipelined RISC processor, which is used for signal processing applications. The processor consists of the blocks, namely, program counter, clock control unit, ALU, IDU and registers. Advantageous architectural modifications have been made in the incremented circuit used in program counter and carry...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Stagnant Timing Investigation of Embedded Software on Advanced Processor Architectures

    The accuracy of the prediction results and the applicability of the under laying algorithms are influenced by several parameters. In addition, both issues are interdependent. Thus, the first part of this paper examined this connection regarding memory and cache modeling as well as analysis. In addition, here, the authors learned...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    CSPR Using in Delay Tolerant Networks

    This paper studies Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since, the future node connections are mostly...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Reliable Data Delivery in MANETs Using POR Protocol

    This balance addresses the company of release matter packets for stage sprightly mercurial beating the drum hoc networks in a reliable and timely manner. Most suitable verifiable propaganda hoc routing protocols are susceptible to node mobility, especially for large-scale networks. Dominated by this topic, the authors clench an apt Position-based...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Design and Simulation of Efficient Topology Control Scheme for Wireless Sensor Network

    Topology control plays an important role in the design of wireless ad hoc and sensor networks; it is capable of constructing networks that have desirable characteristics such as sparser connectivity, lower transmission power, and a smaller node degree. In this paper, a new distributed topology control technique is presented that...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    A Survey on Active Mode Energy Consuming Factors of Sensor Nodes in WSN

    Wireless sensor networks play vital role in different emerging applications. As batteries of sensor nodes in wireless sensor networks cannot be either replaced or recharged in many critical situations like military border area monitoring, the sensor nodes have to survive on their own battery backup as maximum as possible to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Energy Efficient Homogenous Clustering and Cluster Head Selection Algorithm for WSN

    Wireless Sensor Networks (WSNs) are energy and resource constrained networks, which are made up of small electronic devices called sensor nodes. Each sensor nodes are capable of sensing, computing and transmitting data from one node to another, till to reach base station. Each node monitors physical or environmental conditions, depending...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Analysis of Fault Tolerance in Peer to Peer Video on Demand System Using V Chaining

    The video on demand system is one of the streaming applications widely access remote video programs over the Internet. One of the variant of VoD system is Peer-To-Peer (p2p) system. In P2P VoD system peers are frequently fails while chaining. To overcome the failure of peers in chaining fault tolerance...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Performance Analysis of Mobile WiMAX System Using Turbo Coding Technique for Different Modulation Schemes Under AWGN and Rayleigh Channel

    In wireless communication, future demands must be met using more data throughput wireless technologies. Since bandwidth is limited and user demand continues to grow. This problem could be solved by WiMAX technology based on IEEE 802.16e specifications, which provides high data services on mobile environment. So, to support high data...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    A Layered Optimization Approach for Efficient MPEG Video Transmission Over Wireless Networks

    Video transmission over wireless network has been a significant challenge for current multimedia technology. As is well-known, wireless channels often suffer from multipath fading, shadowing, inter-symbol interference, and etc. The main aim is to optimize with application layer parameters and transmit video from sender to receiver over wireless networks. In...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2012

    ARMoteGame-A Wireless Device for Augmented Reality 3D Game Environment

    This paper describes an augmented reality gaming system which uses the overlay of virtual 3D game on the real world. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Customer Behaviour Analysis Using CBA

    With the rampant competition in the domestic and international business, the Customer Relationship Management (CRM) has become one of matters of concern to the enterprise. CRM takes the customers as the center, it gives a new life to the enterprise organization system and optimizes the business process. In an effort...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    Exerting Modern Techniques for Data Leakage Problems Detect

    Sometimes sensitive data must be handed over to supposedly trust third parties. With the extensive application of database systems, the owners of the databases have urgent requirements to protect their copyright of databases. Some of the data is leaked and found in an unauthorized place the distributor must assess the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    FPGA Design & Implementation of Hybrid Cellular Automation With Binary Synchronization

    Advanced joint photographic experts group compressor contains very powerful compression engine specially optimized for higher image quality considerably reduces the file size of images. In communication systems when transmitting the information lot of distortions occur. Developing hybrid cellular automation to identify the fault information. Hybrid cellular automation methodology gives cell...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2012

    The New Vision of Go Programming Language

    Computer programmer has a many problem and opinions about how their programming language of choice could be improved. Everyone wants more runtime performance, and faster compilation. That's one of the reasons why there are so many programming languages are introduced now a days with different platform .Every industry wants a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Enhanced Security Encryption Scheme for Lower Bit Error Rates for Use in Noisy Transmission Media

    In this paper, the authors propose a modification to the existing Data Encryption Standard (DES) to make it secure and prone to the bit errors caused by the transmission channel. Channels are an open medium to intruders and their attacks; encryption is a vital process to assure security over these...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Review of Handoff Technique Used for Wireless Heterogeneous Networks

    In the today's global telecommunication network, the introduction of heterogeneous wireless networks has caused a revolution in the telecommunication systems. Vertical handoff is a technique using the interface switching mechanisms to enable transparent roaming across the various networks. Handoff Occurs when a mobile terminal switches from one network to another...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Performance Analysis of Open Loop Fractional Power Control in LTE Network

    Long Term Evolution is currently being standardized in 3GPP with the aim of more than twice the capacity over High-Speed Packet Access. The chosen multiple access for uplink is Single Carrier FDMA, which avoids the intra-cell interference typical of CDMA systems, but it is still sensitive to inter-cell interference. As...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Survey on Seamless Vertical Handover Between Wi-Fi and WiMAX Networks Using RSS and Motion Detection

    In today's world network has become as important as basic needs for human being. People may need internet connectivity to do their work even when they are on the go. For such people connectivity to network is very important and they expect uninterrupted services even when they move from one...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    ICI Mitigation Techniques in OFDM System: A Review

    Carrier frequency offset, phase noise, timing offset and Doppler spread due to frequency error causes Inter Carrier Interference, which degrades the performance of Orthogonal Frequency Division Multiplexing (OFDM). In this paper, the authors present a comprehensive study of different types of Inter Carrier Interference (ICI) reduction technique, presented in different...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Development of Master Chamber Software for Data Acquisition of Ionization Chamber for Indus 2 RRCAT

    The main goal of this paper was to Develop Master control software for DAQ of ionization chamber for INDUS-2 beam lines for detection of X-ray flux by an Ionization chamber that will remotely control and monitor the ultra low current signal detection analog module precisely. This application will be useful...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    FPGA Implementation of Low Power Multi Serials to Ethernet Gateway for Data Acquisition System

    Data acquisition is the process of sampling signals that measure real world physical conditions and converting the resulting samples into digital numeric values that can be manipulated by a computer. The communication between them is standard asynchronous serial form by typical serial control card, which have complicated cable wiring, frequently...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Design of Global Location System Based on Embedded Linux Using ARM9

    The design of Global location system based on ARM mainly builds by Linux. The architecture and working of this system is introduced in details, and introduces the Global location system which uses the ARM microprocessor as a control unit interfaces with GPS and GPRS modules. In general GPS modules will...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Timing Error Estimation in OFDM Based Wireless Communication System Using Matched Filter

    In Orthogonal Frequency Division Multiplexing (OFDM) System time and frequency synchronization are important issues to be solved. This project is focused on time synchronization of OFDM system. Timing synchronization means estimation of timing error followed by correction of timing error. Timing error if present causes misalignment of FFT window and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Advanced Broadcast/Multicast Channel Capable Carrier Reuse WDM-PON

    Advanced broadcast/multicast carriers reuse WDM-PON is mainly used to provide the broadcast and unicast signal at the destination end. It uses the splitting capability of a power splitter and the cyclic property of arrayed waveguide grating at the middle remote node. The broadcast channel with the help of AWG and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Analysis of Single-Lane and Two-Lane Traffic Models by Using Cellular Automata

    The purpose of this paper is to extend the existing Cellular Automata (CA) models and to use the extended CA models to describe the influence of a car accident in single-lane and two-lane traffic flow. To evaluate dynamic traffic flow, the authors developed a traffic flow simulator that uses CA...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Performance Analysis of Prioritized Call Admission Control Schemes for Integrated Traffic in Wireless Network

    Wireless/mobile communication systems are becoming increasingly popular in recent years. As the wireless resources are scarce, it is important to allocate resources efficiently and carefully, in order to achieve maximum output. The call admission control schemes play a significant role in providing the desired Quality of Service (QoS) by judiciously...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Fingerprint Recognition Using a Reference Point and Pores

    Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. However, considering the automatic fingerprint recognition a completely solved problem is a common mistake. There are many different algorithms being used to get this accomplished. The global level structures consist of many...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Development of a Mathematical Framework for Comparison of Underlay and Overlay Systems

    Overlay and underlay are two main spectrum access strategies in cognitive radio. In this paper, the authors have driven closed form expressions for the primary service outage probabilities of both techniques. They have also formulated and solved optimization problems with the objective of maximizing the secondary service's capacity with constraints...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Network Security Implementation Using Genetic Algorithm in WDM Optical Networks

    Optical networks are high capacity telecommunication network based on optical technologies and components that provide routing, grooming, and restoration at wavelength level as well as wavelength-based services. As networks face increasing bandwidth demand and diminishing fiber availability, network provides are moving towards a crucial milestone in network evolution: the optical...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Statistical Multipath Signal Detection and Transmission Over CDMA Mobile Ad-Hoc Network

    In any communication network, Quality of Service (QoS) plays a major role as it is a measure of the performance of a system reflecting its transmission quality and service availability. Hence achieving QoS in networks such as ad-hoc network is a major challenge because the signal takes different paths to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    High Speed Direct Signal Frequency Synthesizer

    Frequency synthesizers are very critical blocks for embedded systems in communications and instrumentation applications. Direct digital frequency synthesis is widely used technique, due to its high frequency resolution and fast switching between frequencies over a large bandwidth of interest. The DDFS in modulator mode can be used for producing ASK,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Digital Signature Based Fax Machine Using ARM9 and Linux

    In this method, the authors are having the S3C2240A (ARM9) Board which is ported with Linux in it. And this ARM9 board with Linux will be connected to the Touch Screen device. This ARM9 board intern will be connected to the LAN network (Ethernet). To design this fax machine they...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Intrusion Detection Systems Based on Packet Sniffing

    In the present era of networks, security of network systems is becoming increasingly important, as more and more sensitive information is being stored and manipulated online. The paper entitled 'Packet Sniffing' is an IDS where it monitors packets on the network wire and attempts to the discovery of hacker/cracker who...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Implementation of SaaS Multitenancy in Cloud Computing

    Multitenacy is single web tenant to serve thousands of your customers. In cloud computing environment to implement multitenancy firstly create private cloud and then provide Software-as-a-Service to the customer. The overall aim of this paper is to implement SaaS in cloud computing, to provide service job scheduling for cloud computing,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Multicasting in Ad-Hoc Networks: Comparing AMRIS and ODMRP

    Multicasting can efficiently support a variety of applications that are characterized by a close degree of collaboration, typical for many ad-hoc applications currently envisioned. Within the wired network, well-established routing protocols exist to offer an efficient multicasting service. As nodes become increasingly mobile, these protocols need to evolve to similarly...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2013

    Analysis of BER of OFDM in Optical Domain With Different Modulation Techniques

    In OFDM system, the subcarrier frequencies are chosen so that the subcarriers are orthogonal to each other, meaning that cross talk between the sub channels is eliminated. Priority of OFDM system is given to minimizing the interference or crosstalk among the channels and symbols comprising the data stream. The primary...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2014

    Analysis and Simulation of CDMA QAM-16 for AWGN and RAYLEIGH Channel

    In a Code Division Multiple Access (CDMA) system, a lot of users use concurrently the entire frequency band to transmit their data and users' data is separated on the basis of their unique spreading code. The aim of communication system i.e. Communication at anytime, anywhere and by anybody is still...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

    In a Mobile Wireless Sensor Network (MWSN), mobile sensor nodes move freely at the network environment. So, a large number of attacks threaten this network. Unauthenticated broadcast attack is a common attack which worsens the network congestion as well as energy consumption. In this paper, an efficient method for defending...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    A Survey of Recent Indoor Positioning Systems Using Wireless Networks

    Global Navigation Satellite Systems (GNSS), which are widely used today by positioning and navigations systems, are becoming increasingly important in daily life. GNSS, however, do not work well in indoor environments due to the satellite signal outages that occur in closed structures. Yet the demand for indoor positioning systems is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2014

    Security Issues of Wireless Communication Networks

    Wireless communication networks have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks...

    Provided By International Journal of Electronics Communication and Computer Engineering