International Journal of Electronics Communication and Computer Engineering

Displaying 1-40 of 271 results

  • White Papers // May 2014

    The Critical Factors Influencing the Adoptions of Data Warehouse

    Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management. A lot has been done in this field regarding design and development of data warehouses and a lot still needs to be done but one area which needs special attention from research...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Efficient Data Mining in SAMS through Association Rule

    The authors propose a protocol for secure mining of association rules in distributed databases. Previous techniques all people deals with different database, now-a-day's people also deals with the distributed database. They can develop a kind of application in which the people can access the distributed data which is already store...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Bilinear Interpolation Image Scaling Processor for VLSI

    The authors introduce image scaling processor using VLSI technique. It consists of bilinear interpolation, clamp filter and a sharpening spatial filter. Bilinear interpolation algorithm is popular due to its computational efficiency and image quality. But resultant image consist of blurring edges and aliasing artifacts after scaling. To reduce the blurring...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2014

    Model of Integration of Material Flow Control System with MES/ERP System via Cloud Computing

    In this paper, the authors deal with a model of application gateway for integration of material flow control system with ERP/MES systems, which are provided by cloud computing and software as service delivery model. The developed gateway interface is supposed to cover fundamental requirements of production systems for customization and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Area Efficient Turbo Encoder for Wireless Applications on FPGA

    Error control is the major insistence in today's wireless communication systems. In this era parallel concatenated convolution codes known as turbo codes plays a crucial role. These codes have been chosen as error control approach for various wireless applications such as UMTS (Universal Mobile Telecommunication System), DVB (Digital Video Broadcasting)...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Intelligent Garbage Location Monitoring using Remote Server and Sensor Networks

    Solid waste management is a serious global issue in the current world. An efficient waste management is a pre requisition for maintain a safe and green environment as there are increasing all kinds of waste disposal. In this paper, a new approach is developed for a systematic development in managing...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2014

    Current Cloud Computing Review and Cost Optimization by DERSP

    Cloud computing promises to deliver cost saving through the \"Pay as you use\" paradigm. The focus is on adding computing resources when needed and releasing them when the need is serviced. Since cloud computing relies on providing computing power through multiple interconnected computers, there is a paradigm shift from one...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Design and Implementation of Enhanced Secured Cloud Computing

    Cloud computing plays a major role in providing different resources in the form of web services like tax calculation web service, e-banking web service etc., for smooth running of the users daily lives. The authors can rely on cloud computing if these useful web services are really secure enough to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    3D Virtual Glove for Data Logging and Pick and Place Robot

    Traditional interaction devices such as mouse and keyboard do not adapt very well to 3D environments, since they were not ergonomically designed for it. The user may be standing or in movement and these devices were projected to work on desks. To solve such problems it has been designed a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Model of Infrastructure as a Service (IaaS) Layer for Cloud Computing and Mission Critical Applications

    In this paper, the authors deal with creation of model for cloud computing with Infrastructure-as-a-Service (IaaS). IaaS is based on a common network infrastructure with physical servers, which can be installed in various locations of the cloud. The virtualization software, called \"Hypervisor\", creates a group of available virtual resources through...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2014

    Efficient Architecture for the Convolution Encoder and Viterbi Decoder for FPGA Implementation

    Error Correcting Codes (ECC) are one of the fundamental building blocks of an efficient communication system and utilization of proper encoding technique guarantees the error free communication in noisy environment although there are many types of ECC available the convolution codes are specifically preferred where the large constrain length are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    A New Method for Optimization of Deadlock resolution of Distributed Database with Formal Model

    A distributed system is a network of sites that send messages to each other, they exchange information. One of the most important applications of distributed systems is enabling resource sharing between systems. In such environments, if a sequence of procedures to control resource allocation is not possible to create a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Feb 2014

    Neutralizing the Impact of Account or Service Traffic Hijacking in Cloud Computing

    Cloud computing is a booming computing model in the IT industry. Machines involved in cloud computing provide efficient computing power. Though massive adoption of this technology is seen across the globe, yet security issues are preventing its deep penetration. In a recent survey, 69 percent of North American IT professionals...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Jan 2014

    Modern Power Management System Using ARM Controller

    The introduction of electronic energy meter for electrical energy metering has resulted in various improvements in the operation of utilities apart from the increase revenue due to better recording of energy consumption. In this paper, remote power management and meter reading system is implemented using ARM7 based LPC2148 microcontroller. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Time-Cost Scheduler for Technological and Economic Challenges Related to Customized Cores and General Purpose Processors

    With the renewed interest in the customization of embedded processors for applications specific needs, it becomes imperative to understand its viability both economically and technologically thus avoiding pitfalls. Customization and scalability are two terms which are often used synonymously to denote add/subtract of additional functional units or increase/decrease of ports...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    ARM Processor Based Embedded System for Remote Data Acquisition

    The embedded systems are widely used for the data acquisition. The data acquired may be used for monitoring various activity of the system or it can be used to control the parts of the system. Accessing various signals with remote location has greater advantage for multisite operation or unmanned systems....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2013

    Data Collection Approaches on Wireless Sensor Networks: A Survey

    A Wireless Sensor Network (WSNs) consists of static nodes which are densely deployed over a sensing area. In wireless sensor environment each of the sensor nodes has data to send to a base station through a mobile agent, the major problem is to minimize the length of each data gathering...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Fusion Using Robust Estimator for Uncertain Noisy Systems Over Sensor Networks

    In this paper, the authors verify the problem of designing robust state estimator for multiple sensor networks with uncertain model and noisy measurements. Multi sensor data fusion by measurement fusion and state vector fusion structure using the Kalman filter were introduced. The standard Kalman filter requires an accurate system model....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    16-Bit RISC Processor Design for Convolution Application

    In this paper, the authors propose a 16-bit non-pipelined RISC processor, which is used for signal processing applications. The processor consists of the blocks, namely, program counter, clock control unit, ALU, IDU and registers. Advantageous architectural modifications have been made in the incremented circuit used in program counter and carry...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Web Mining Using PageRank Algorithm

    Data mining is extracting and automatic discovering the web based information has been used as web mining. It is one of the most universal and a dominant application on the Internet and it becomes increasing in size and search tools that combine the results of multiple search engines are becoming...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Challenges and Opportunities of Big Data Analytics in Business Applications

    Big data analytics is to discover a hidden data from the massive and messy data. Analytics is a sophisticated technique to extract actionable knowledge and insight from the data. Big data is not just about size. The amount of data available is growing faster than the authors' ability to deal...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Effective Algo for the Frequent ItemSet in Data Mining

    A core data mining operation is frequent itemset mining and has been extensively studied over last decade. This paper takes a new approach and implements a new algorithm for this problem and makes the two major contributions. First, it implements a one pass algorithm for frequent itemset mining which has...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Integrity Verification & Distributed Accountability in High Performance Distributed Clouds

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Analyzing the Detection of Active Attacks in MANETs

    In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the active attack, where two or more malicious collision nodes create a higher level virtual tunnel in the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Cloud Outcome and Troubles with Safety Solutions

    In this paper, the authors introduction of terms cloud security practices, security compliance against standards and best practices, how the cloud changes the role of IT security. Cloud computing executives have pinpointed the rise of security solutions as a key factor in the future of the IT industry. There is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Key Structure Based Approach towards Scalable Access Control in Cloud Computing

    Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. The existing methods for implementing access...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Improving Modern Web Application Defenses Using HTML5

    HTML5 has brought in several technological changes to the erstwhile HTML realm and even though there are certain security implications due to the introduction of various new APIs, considerable amount of effort has been put to corroborate secure web application development methodology. This paper is to elucidate different HTML5 features...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Data Security Through Steganography and Cryptography in VOIP

    Current practice of data hiding technique exists, uses image, audio, video, or protocol headers as medium for hiding the people information. The real-time text hiding is to hide the secret text into a cover speech in real-time communication systems such as Voice Over Internet Protocol (VOIP). VOIP the new and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    The Theoretical Approach to Cloud Computing

    The importance of cloud computing is increasing and it is receiving a growing attention in the scientific and industrial communities. Cloud computing enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Security Threats on Vehicular Ad Hoc Networks (VANET): A Review Paper

    The constant growth of automotive market and the increasing demand for the car safety, also driven by regulatory (governmental) domain, the potential of car-to-car connectivity is immense. Emerging Vehicular Ad-hoc NETworks (VANET) has the potential to improve the safety and efficiency of future highways. While during with wireless communication security...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    A Modern Approach to Cyber Security Analysis Using Vulnerability Assessment and Penetration Testing

    Internet has opened unlimited avenues of opportunity by enabling organizations to conduct business and share information on a global basis. However, it has also brought new levels of security concerns and cyber threats. It exposes valuable corporate information, mission critical business applications and consumer's private information to more risk than...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Prior Authentication Approach to Enhance Security in CloudComputing

    Now-a-days cloud computing is an upcoming technology. Cloud allows users to access and share resources such as software, platform and infrastructure by means of virtualization. Even though it offers many advantages, several large organizations like banks, financial organizations and few government agencies are still considering it to be unsafe place....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Survey on Security Issues and Strategies of Cloud Computing

    Cloud computing has brought new changes and opportunities in IT Industry. The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing and visualization technology. Cloud computing security has become a hot topic in industry and academic research. This paper is a detailed view...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Nov 2013

    Advanced Trust Based Approach for Increasing Security in Cloud Computing

    Cloud computing has become one of the fastest growing fields in computer science. As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2013

    Design of Low Power Column Bypass Multiplier using FPGA and Implementation Using FIR Filter

    Design of area, high speed and power efficient data path logic systems in the low power VLSI circuits has been identified as vital technology in the in the DSP computations and signal processing applications like FIR, IIR filters. Since multipliers consume most of the power in DSP computations it is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Oct 2013

    Mobile Network DoS Attack and Detection Technology

    Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of Smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management and mobile network security for various abnormal and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Study of Spam Dection Approaches and Measures of Antispam

    Email has become one of the best ways of communication for modern generation. However, the increase of E-mail users is has resulted in the increases of Spam. Spam is commonly defined as unsolicited email messages; the goal of spam classification is to distinguish between spam and legitimate email messages. The...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Design and Simulation of Pipelined FFT Processor Using FPGA

    Active radar systems are commonly used in military and commercial applications for the detection and tracking of objects through a medium such as air. A parallel and pipelined Fast Fourier Transform (FFT) processor for use in the Orthogonal Frequency Division Multiplexer (OFDM). Unlike being stored in the traditional ROM, the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2013

    Design of Ingenious Randlet, Sinelet and Shocklets for Compression of Satellites Vibration Test Data

    Vibration tests on satellites generate huge amount of data of the order of few Giga bytes per test and about tens of Terra bytes of data every year. This data represents vibration levels monitored at various locations of the satellite during the test. The files storing this huge data are...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Aug 2013

    Efficient Mining of Emerging Patterns

    Mining frequent patterns from large databases plays an essential role in many data mining tasks and has broad applications. Most of the previously proposed methods adopt apriori-like candidate-generation-and-test approaches. However, those methods may encounter serious challenges when mining datasets with prolific patterns and/or long patterns. In this paper, the authors...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2013

    Migration to Long Term Evolution (LTE) Networks: Prospects and Limitations

    Globally, the issue of improving telecommunication services has been a major challenge to telecommunications services providers due to increasing customer base with few or inadequate facilities on ground to meet the explosion in customer demands. Across the spectrum, customers are demanding more from mobile services. They want expanded services, richer...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Apr 2013

    Impact of MOSFET Short Channel Characteristic on Digital Circuit Operation

    The design of high density chips in MOS VLSI technology requires that the packing density of MOSFETs use in circuits is as high as possible and consequently, that the transistor are as small as possible. The reduction of the size i.e. dimensions of MOSFETs can change the MOSFET characteristic. In...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Design of Pyramidal Horn Antenna at 10GHz Using WIPL-D Optimizer

    Rectangular horn is one of the simplest and most widely used microwave antennas. In this paper, an electromagnetic simulator, WIPL-D is used to analyze and optimize the dimensions of the horn antenna which is based on the method of moment's solution for computations. The standard horn antenna at 10 GHz...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Evaluation of Ad-Hoc Routing Protocols on Body Area Networks

    BANs (Body Area Networks) are networks which use different sensors for controlling status of patients. In these networks, according to type of disease, some medical cares' are done inside the hospital or at home. Sending information with the best quality is one of the most challenging tasks in BANs. Because...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    A New Approach for Minimizing the Routing and Wavelength Assignment Problem

    The RWA problem is a crucial and complicated designing issue in optical networks which is known to be an NP-hard problem. In this paper, modeling for Routing and Wavelength Assignment (RWA) problem in DWDM optical networks is proposed. In this technique is introduced for solving RWA problem which is known...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Modelling of Optical Interaction in MOSFET for L Band Application

    Normally off microwave devices like MOSFET are popular due to its high package density, dynamic operating range, low power consumption and sensitivity to light. In this paper, modelling of optical interaction in MOSFET is reported. Sensitivity of S parameters to the light is investigated theoretically at microwave frequency of 1-...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Mar 2013

    Study and Performance Analysis of High Frequency and High Speed Operational Amplifier

    The performance analysis of the two stage CMOS operational amplifiers employing Miller capacitor in conjunction with the common gate current buffer is presented. Unlike the previously reported design strategies of the opamp of this type, this results in the opamp with a lower power supply requirements, better phase margin and...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Life Management and Power Management Issues in Wireless Sensor Networks: A Survey

    Wireless sensor networks consist of small nodes which sense its local environment then it done processing and send the data to the other sensor node or end user. These sensor nodes have very limited battery power, due to this reason their life is small. Power management and life management issues...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    GSM-GPS Based Intelligent Security and Control System for Vehicle

    The revolution of Mobile and Technology has made 'GSM based vehicle security system'. The vehicle security system is prominent worldwide. But it is not so much secure system. Every vehicle owner wants maximum protection of his vehicle; otherwise thief can easily trap the vehicle. So, by combing the idea of...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Analysis of Capacitive Fed Microstrip Antenna for Wideband Applications

    The parametric analysis of capacitive fed micro-strip antenna suspended above the ground plane has been presented in this paper. For the analysis purpose, the reference structure has been taken from paper. In this paper parameters of capacitive fed micro-strip antenna is varied and the corresponding variation of radiation performance (return...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Simulation Study of Some Spatial Multiplexing Techniques for MIMO Wireless Communication Systems

    This paper presents simulation results and comparative analysis of some Spatial Multiplexing Techniques for Multiple-Input Multiple-Output (MIMO) based Wireless Communication Systems. Performance of various detection schemes are evaluated through MATLAB simulation study. The Bit Error rate and complexity of these schemes is discussed. The simulation is carried out for different...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Implementation of Fast Pipelined Data Encryption Algorithm (DES) Architecture With Scan Based Side Channel Attack

    This paper was to implement an innovative architecture that computes the basic Data Encryption Standard (DES), which is used in a wide range of communication systems to protect information being transmitted over a channel from being intercepted and read by unauthorized parties. DES is probably one of the best known...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Design of a Configurable Transmission Device for Interface of a High Speed SOC With Low Speed Components

    UART is the key component of serial communications subsystem of a computer. Here UART is a configurable transmission device and high speed soc is AHB. AHB is used to connect High speed components.DMA acts as a master and memory acts as a slave. The data is transmitting from DMA to...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Multi-Level Mapping for Long Haul Coherent Optical OFDM Systems

    Recently, Coherent Optical Orthogonal Frequency Division Multiplexing (CO-OFDM) has been seen as a potential candidate for long haul optical transmission. It is due to OFDM technique that was proved as an effective solution for mitigating Chromatic Dispersion (CD) effects in optical communication systems. The CO-OFDM systems of 40Gb/s and 100...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Virtex 4 Field Programmable Gate Array Based 32 Bit FPM

    FPGAs are increasingly being used in the high performance and scientific computing community to implement floating-point based hardware accelerators. The authors present FPGA floating-point multiplication. Such circuits can be extremely useful in the FPGA implementation of complex systems that benefit from the re-programability and parallelism of the FPGA device but...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Queuing Delay Analysis in Multi-Hop Wireless Networks

    A Multi-hop wireless network is a wireless network adopting multi-hop wireless technology without deployment of wired backhaul links. In multi-hop wireless networks, the routes between source and destination pairs are relatively fixed. In such networks, a metric called delay is of prime importance. But the delay analysis of multi-hop wireless...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    A Study of Intrusion Detection Systems in Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) composed of smart sensors interconnected over wireless links are quickly becoming the technology of choice for monitoring and measuring geographically distributed physical, chemical, or biological phenomena in real time. These are deployed for monitoring in a range of critical domains for example health care, military, critical...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Nymble Blocking System for Countering Misbehaving Users Over Anonymizing Networks

    Anonymity networks such as TOR provide users with a means to communicate privately over the Internet. These networks help to solve the real and important problem of enabling users to communicate privately over the Internet. But some users misuse this service and they tried to deface popular websites like Wikipedia....

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Performance Evaluation of FPM on Spartan Family FPGas and Analyze Its Effect on Bonded IOBs

    VHDL programming for IEEE single precision floating point multiplier module have been explored because floating point multiplication is a most widely used operation in DSP/Math processors, robots, air traffic controller, digital computers. Because of its vast areas of application, the main emphasis is on the implementing it effectively such that...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Sep 2012

    Reliability Computation With Perfect and Imperfect Vertices Via Binary Decision Diagram of a Computer Communication Network

    In today's market the requirement of computer communication network is increasing due to the exponential growth of internet. As a result traffic on computer communication network is increasing day by day. In this heavy traffic scenario, the nodes and the links may fail in any real computer communication network. Therefore...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack

    Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing collection particular overhaul disruptions, often for total periods of instance. The relative ease and low costs of initiation such attacks, supplemented by the present insufficient sate of any feasible defense method,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Deployment of Law Enforcement Department Using Manhattan Mobility Model Over Hybrid Network

    Manhattan Mobility is a model of Vehicular Ad-hoc NETwork (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // Dec 2012

    Optimized Motion Detection Based Security System Using ARM9 and Linux

    The embedded motion detection system involves various aspects such as the selection of hardware platform and the embedded operating system. The development board with Samsung S3C2440 is selected as the hardware platform. Start-up codes, OS kernel and users' application programs are together stored in a NAND FLASH whose capacity is...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    DDoS Mitigation in Cloud by Using C.I.T.F.A.

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Performance Analysis of WDM/TDM PON Using Different EDFA Pumping Schemes

    In this ambience groovy world where the bandwidth requirements has increased a lot to support wide range of applications such as HD television, video calling etc. it becomes necessary to introduce PON's. PON uses passive components to provide high data rate services to the end user,. Major components of PONs...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Coded Wavelet Packet OFDM with Companding for PAPR Reduction

    In this paper, coded wavelet packet OFDM with companding is proposed. For the proposed OFDM, at the transmitter PAPR is calculated for different coded tree structures developed and tree with minimum PAPR is selected for transmission. The proposed wavelet packet is advantageous in terms of performance as compared to without...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Capturing of HTTP Protocol Packets in a Wireless Network

    The word wide revolution in wireless technology is changing the authors' lives in term of the way they learn and use. Wireless Networks fit into this because the technology has been around long enough and can provide various benefits for development in this area. The main objective of this paper...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Performance Analysis of Hybrid OCDMA/WDM System Complementary Subtraction Detection Technique

    The authors proposed a hybrid Optical Code Division Multiple Access (OCDMA) over Wavelength Division Multiplexing (WDM) system is proposed for supporting large numbers of subscriber for Fiber To-The-Home (FTTH) network. The system combines two different techniques, namely OCDMA and WDM in order to support many subscribers simultaneously. In this study,...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    A Survey of Various Spectrum Sensing Techniques in Cognitive Radio Networks: Non Cooperative Systems

    Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. Spectrum sensing is one of the essential mechanisms of CRs that has attracted great...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Zigbee GPS Based Tracking System Using ARM 9

    Real Time person tracking is an important building block in advanced humanoid robots. The applications extend to small area security system like offices, hospitals, prisons, industries etc. There are various methods and some of them are now used in smart mobile applications using GSM-GPS, Sensor networks, vision based tracking system...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Research, Implementations and Issues on Cloud Computing

    Cloud computing - a relatively recent term, builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Routing with Guaranteed Delivery in Ad Hoc Wireless Networks

    A network wide zone-based bidirectional tree is constructed to achieve more efficient membership management and multicast delivery. The position information is used to guide the zone structure building, multicast tree construction, and multicast packet forwarding, which efficiently reduces the overhead for route searching and tree structure maintenance. Several strategies have...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Improvisation of MAC Protocol for Wireless Sensor Network

    Wireless sensor networks are collection of sensor nodes connected via wireless LAN links. The information gathered at sensor node is propagates in the form of radio signal to control room via multi hop communication. In the networks, many sensors where lying in same channel to pass message, so as well...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Sheltered Data Storage Services in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Framework for Monitoring and Evaluation of Users in Trusted Cloud

    In the cloud computing, due to users directly use and operate the software and OS, and even basic programming environment and network infrastructure which provided by the Cloud Services Providers (CSP), so the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Complexity Reduction in ML Decoding for MIMO Systems

    In this paper, the authors propose a combined Breadth first tree search ML (Maximum Likelihood)-ZF (Zero Forcing) method of detection for Spatial Multiplexed MIMO (Multiple Input Multiple Output) systems with reduced complexity. The detection of real and imaginary parts of QAM (Quadrature Amplitude Modulation) modulated symbol is carried out in...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Analysis on QPSK Modulation Technique for Wideband Code Division Multiple Access

    This paper is the study of the QPSK (Quadrature Phase Shift keying) modulation technique using AWGN (Additive White Gaussian Noise) and Multipath Rayleigh fading channel. In QPSK scheme the authors can transmit one of the 4 possible signals during each interval of signaling. WCDMA systems are based on higher modulations...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Low-Power Maximum a Posteriori (MAP) Algorithm for WiMAX Convolutional Turbo Decoder

    The authors propose to design a Low-Power Memory-Reduced Traceback MAP iterative decoding of Convolutional Turbo Code (CTC) which has large data access with large memories consumption and verify the functionality by using simulation tool. The traceback Maximum a Posteriori Algorithm (MAP) decoding provides the best performance in terms of Bit...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Optical Time Division Multiplexing (OTDM) and Hybrid WDM/OTDM PON Performance Investigation

    Every day, the need for high speed reliable data transmission increases more and more. One important option is the passive optical networks which use the optical fiber and provides high data rates and long distance. This work investigates the performance of a four users Optical Time Division Multiplexing OTDM over...

    Provided By International Journal of Electronics Communication and Computer Engineering

  • White Papers // May 2013

    Performance Comparison in Terms of Communication Overhead for Wireless Sensor Network Based on Clustering Technique

    Wireless sensor network refers to a group of spatially distributed and dedicated sensors for monitoring and recording the physical conditions of environment like temperature, sound, pollution levels, humidity, wind speed with direction and pressure. Sensors are self powered nodes which also possess limited processing capabilities and the nodes communicate wirelessly...

    Provided By International Journal of Electronics Communication and Computer Engineering