International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 361-400 of 965 results

  • White Papers // Oct 2013

    A Review: RFM Approach on Different Data Mining Techniques

    Data mining is a well-known technique, which can be used to extract hidden information about customers' behaviors. It is used to improve the customer relationship management processes by various Organizations. Previous researches in constraint based pattern mining emphasis only on the concept of frequency. But the changes in the environment...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    The Key Findings of Surveys Related to Email SPAM and Methods of Combating it in Saudi Arabia

    In this paper, the authors presented the key findings of surveys of email users, businesses, and ISPs in Saudi Arabia. The surveys were to investigate the nature of email SPAM in Saudi Arabia, its effects, methods and efforts taken to combat it. They also aimed to investigate the Anti-SPAM filters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Empirical Investigation on Certain Anonymization Strategies for Preserving Privacy of Social Network Data

    In recent years, the rapid growth of web applications developed the need for private data to be published. Most of the social network data necessitates the data to be available for easy access and conversion of data to graph structure to re-identify sensitive labels of individuals became an impeccable issue....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Extensive Review of SQLIA's Detection and Prevention Techniques

    Security of web applications is becoming one of the major concerns today. As per the people survey 70% of web applications over the internet are vulnerable to SQL Injection Attacks (SQLIA's). SQL injection attacks pose serious security threat to these databases and web applications. Through SQLIA's attackers gain unrestricted access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Compound Use of Cryptography and Steganoghaphy for Secure Data Hiding

    According to new era, the steganography and cryptography are the secret writing techniques are available. Steganography hides the existence of message by embedding data in some other digital media like image or audio format and Cryptography converts data in to cipher text that can be in unreadable format to normal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    PICQUET: Controlling Malicious Nodes in a Network

    Now-a-days there are many assailants were trying to attack on server using various tools but there are also some firewall present for prevent it. But in case of using Linux OS firewall has some of disadvantages - filters incoming n outgoing packets only, system oriented (separate for each node), doesn't...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Privacy Preserving Data Publishing of Numerical Sensitive Data

    Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper, the authors have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond k-anonymity. Principles designed in-order to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Dual Sentinel: Intrusion Detection and Prevention System

    Now-a-days, the use of internet has been increased so rapidly and on large scale which has increased the number of applications and complexity of data. In order to deal with this increase in application and data complexity, web services are designed as multitier services. In this paper, the authors present...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Overview of Vulnerability Analysis

    In recent years most of the applications are web based and software based so it is important for these applications to communicate with other system or application in network so it increase growth of cyber-crime and associated risk are forcing most business application to be focus on information security. Vulnerability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Packet-Hiding Methods for Preventing Selective Jamming Attacks Using Swarm Intelligence Techniques

    The selective jamming attacks can be launched by performing real time packet classification at the physical layer. To mitigate these attacks develop a scheme that prevent real-time packet classification by combining cryptographic primitives with physical layer attributes. The Swarm intelligence algorithm is proficient enough to adapt change in network topology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Novel Method to Share Resources in Multi-Core Processors Using Reader Writer Locks

    The migration to multi-core devices requires complex changes to system and software to obtain optimal performance. While the multi-core device improves its resource through higher integration, the complexity of application also grows equally which results in resource constraints. However, the task scheduling and synchronization provided by the Real-Time Operating System...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Multilingual Data Retrieval from Distributed Database Server Using Mobility

    In this paper, the authors are describing the data retrieval from distributed database server using a mobile agent. Many systems have their distributed database server. Among distributed environment to find the data is costly task because transferring of data from database server to base station where the query is generated,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Proposed Model of Block Based Symmetric Cipher

    In this paper, the authors presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, PDF, audio. Using decryption model, decrypt same data. Due...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Resource Provisioning Methodologies: An Approach of Producer and Consumer Favorable in Cloud Environment

    Cloud computing is an emerging technology, having ability to renovate a large part of computing environments by providing resources as services. Cloud environment is composed of a set of resource providers and consumer. Cloud offers two ways of resources provision to the consumers. Firstly resource on-demand and secondly resource on-reservation....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Two Level Hierarchical Model of Load Balancing in Cloud

    A cloud computing is conceptually a distributed system where resources will be computing resources distributed through the network (cloud) and services pooled together and is provided to the users on pay-as-needed basis. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Multi Cloud Architecture to Provide Data Security And Integrity

    Cloud servers are being used to store data and application but its security is a major issue in current context. To solve the data security problems in public environment the authors propose an effective model for security and integrity of data stored in a cloud, through data segmentation followed by...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    SPARSH Data Security in Cloud

    Today's scenario, the transfer of data through the cloud without providing the security to the data or information is a major problem. In some of the case, data gets transfer through the cloud with security and the security is provided by using username and password .But password is not the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Secure Intelligent Transportation System Protocol for VANET Using SMAP

    A Vehicular Ad-hoc NETwork (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to receive message. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Secured Data Transmission with Novel Parity Bit Scheme using MAES Algorithm

    In transmission and data storage of information security becomes more important in the fast evolution of data exchange. It is more important to protect the confidential data from unauthorized access. To overcome that difficulty, the authors examine the Advanced Encryption Standard (AES) and modify it, to reduce the calculation of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Synchronous Pattern Mining From Web Log Data Using Association and Correlation Rules

    In this paper, the authors introduce the concept of synchronous patterns, association and correlation rule, and search how they can be mined efficiently. The title of synchronous pattern mining is indeed rich. In this paper is dedicated to methods of synchronous item set mining. They can find synchronous item sets...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    SMMCOA: Maintaining Multiple Correlations Between Overlapped Attributes Using Slicing Technique

    Knowledge discovery is the most discussed topic now a day. Data which is collected from various resources are processed through various stages and the output of this process is the knowledge which is previously hidden. Basically data mining is a technique whose outputs are previously unknown and potentially useful information...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Design and Implementation of Algorithms for Materialized View Selection and Maintenance in Data Warehousing Environment

    Data warehousing, data mining and online analytical processing represents some of the latest trends in computing environments and information technology application to large scale processing and analysis of data. Data warehousing technology is becoming essential for the effective business strategy formulation and implementation. For the success of any data warehouse,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Generic Log Analyzer Using Hadoop Mapreduce Framework

    There are various applications which have a huge database. All databases maintain log files that keep records of database changes. This can include tracking various user events. Apache Hadoop can be used for log processing at scale. Log files have become a standard part of large applications and are essential...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Enhancing Security in a Distributed Examination Using Biometrics and Distributed Firewall System

    Online examination is a great opportunity for modern life and has seen exponential growth over the past decade. However, the tools used to present and administer this need to be coupled with efficient and reliable security mechanisms to ensure the medium can be established as a dependable one. Identification, authentication...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Survey on Location Based Routing Protocols for Wireless Sensor Network

    Wireless sensor networks are highly susceptible to attacks because of their open and distributed network structure as well as limited resource on the nodes. WSNs are used in critical monitoring and tracking applications. Therefore, routing protocols for such networks should take into consideration the trustworthiness of and the energy available...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Efficient Query Evaluation Using Joins in Relational Database

    In a relational database all information can be found in a series of tables. A query therefore consists of operations on tables for retrieving the data from tables. In this paper, the authors will introduce the reader to the basic concepts of query processing and query optimization in the relational...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Improved Face Recognition with Multilevel BTC Using YCbCr Colour Space

    This paper is to achieve a better efficiency in face recognition using Block Truncation Coding (BTC) using RGB and YCbCr colour space. Multilevel Block Truncation Coding is applied to image in RGB and YCbCr colour space up to four levels for face recognition. The experimental analysis has shown an improved...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Benchmarking and Analysis of NoSQL Technologies

    The social web generates terabytes of unstructured, user generated data, spread across thousands of commodity servers. The changed face of web based applications forced to invent new approaches to data management. The NoSQL databases were created as a mean to offer high performance (both in terms of speed and size)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Designing a Classifier with KFCM Algorithm to Achieve Optimization of Clustering and Classification Simultaneously

    In this paper, design a classifier with KFCM algorithm to achieve Optimization of Clustering and Classification simultaneously (KOCC) is proposed. This learning algorithm is used to solve any multiclass classification problem. In this Kernalized Fuzzy C-Means (KFCM) algorithm is used for enhance the robustness of the classifier. The training phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Deploying Sensor Nodes and Generating Malicious Attacks by Managing Key Management Technique of Network Test-Bed

    The WSN network was reliable and self contained unit that easily sense the networks and providing fastly data with little energy consumed. The reliability of this paper measured the performances of the all over networks with different parameters that discussed in the result section. The performance of WSN communication better...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Off-line Signature Verification Using Artificial Neural Network

    In this paper off-line signature verification and recognition using a new approach that depends on an artificial neural network which discriminate between two classes forgery and original signature. The proposed scheme is based on the technique that applies pre-processing on the signature, feature point extraction and neural network training and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Advanced Two-Tier Android Mobile Security Using Cloud

    One of the newer operating system for smart phone is android which is gaining huge popularity. Advancement in computing speed, memory and hardware had lead to development of new applications. These applications make life more comfortable and advanced for the users. Some of these applications often deal with sensitive and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Simple and Secure Key Distribution in Grid Computing

    Grid computing is an emerging technology that provides seamless access to computing power and data storage capacity distributed over the globe for complex systems with large-scale resource sharing and multi-institutional collaboration. The internet is not security-oriented by design; there exist various attacks such as masquerading, replaying, modification, and denial of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Novel Approach for Secure Communication of Digital Signature Using On-Demand Multipath Routing for Enhancing Network Security in Wireless Mobile Ad Hoc Networks

    With the advances of wireless communication technologies, small-size and high-performance computing and communication devices like laptops and personal digital assistants are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. This interest has led to two types of wireless...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Concise Evaluation of Issues and Challenges in MANET Security

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Mining Multi Level Association Rules Using Fuzzy Logic

    Extracting multilevel association rules in transaction databases is most commonly used tasks in data mining. This paper proposes a multilevel association rule mining using fuzzy concepts. This paper uses different fuzzy membership function to retrieve efficient association rules from multi level hierarchies that exist in a transaction dataset. In general,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    3LAS (Three Level Authentication Scheme)

    Textual passwords are more commonly used in day to day life. They tend to be more vulnerable as far as security is concerned. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to hidden...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Privacy Preserving Clustering by Hybrid Data Transformation Approach

    Numerous organizations collect and share large amounts of data due to the proliferation of information technologies and internet. The information extracted from these databases through data mining process may reveal private information of individuals. Privacy preserving data mining is a new research area, which allows sharing of privacy-sensitive data for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Rotation Invariant Approach of SURF for Unimodal Biometric System

    The people all have unique physiological characteristics that distinguish one from other people. Biometrics uses these unique characteristics (or identifiers) to ascertain and verify people identity. Fingerprint recognition involves the location and determination of the unique characteristics of the fingerprint. The fingerprint is composed of various 'Ridges' and 'Valleys', which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Artificial Neural Network Based Signature Recognition & Verification

    The human signature is proven to be the most important for access. Signature of the person is proven to be the important biometric attribute of a human being which can be used to authenticate human identity. There are many biometric characteristics by which one can have own identity like face...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Content Based Fingerprinting for Video Copyright Detection System

    Security of a fingerprinting system is important for certain applications such as copyright protections, for this reason secure version of the fingerprinting system for video piracy detection is presented. The proposed system relies on a fingerprint extraction algorithm followed by a fast approximate search algorithm for video piracy detection. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Review: Ant Based Ad Hoc Routing Protocols

    A Mobile Ad-Hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Swarm Intelligence (SI) is an artificial intelligence technique based around on the study of collective behavior in decentralized, self-organized systems. Ant Colony Optimization is popular...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A General Study of Associations Rule Mining in Intrusion Detection System

    Intrusion Detection Systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e., alerts that are triggered incorrectly by benign events). This makes it extremely hard for to analyze and react to attacks. Data mining generally refers to the process of extracting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Improvement of 802.11 MAC by Enhancements in DCF

    In the 802.11 protocol, the fundamental mechanism to access the medium is called Distributed Coordination Function (DCF). This is a random access scheme, based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Retransmission of collided packets is managed according to Binary Exponential Back-off (BEB) rules. BEB increases...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Comparative Analysis of PCA and 2DPCA in Face Recognition

    The growing need for effective biometric identification is widely acknowledged. Human face recognition is an important area in the field of biometrics. It has been an active area of research for several decades, but still remains a challenging problem because of the complexity of the human face. The Principal Component...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    An Improved Techniques Based on Naive Bayesian for Attack Detection

    With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A New Modified Playfair Algorithm Based on Frequency Analysis

    Cryptography is an art and science of achieving security by encoding the message to make them non-readable. One of the well known cryptographic techniques is Playfair Cryptography. After the invention of different techniques like Frequency Analysis it is easy to break Playfair. In this paper, the authors proposed some ways...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Novel Web Usage Mining for Web Mining Techniques

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigations of Web users. As in classical data mining, data processing and pattern discovery are the main issues in web usage mining. The first phase of the web usage mining is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Cloud Computing: A Security Problem or Solution

    The move to cloud computing is the next stage of an unstoppable trend in the breakdown of the enterprise perimeter, both technically and organizationally. This new paradigm presents a number of security challenges that still need to be resolved, but sufficient change in the IT environment has already happened -...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Implementation of Scalable Framework to Reduce Core Development of Cloud Computing Relevants

    Implement a cloud and develop the cloud application is quiet difficult in today's scenario as to implement the cloud the authors required to have the in deep knowledge of very advanced technologies. So to make it more easier, they have develop this paper and implementing it in which the required...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Novel Handoff Technique for Heterogeneous Wireless Network

    After review of literature, most of the work is done on handoff between cellular network, i.e., horizontal handoff but, few papers are on handoff between heterogeneous networks are in existence. This type of handoff called as vertical handoff can be simulated. The current problem in handoff makes the system slow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Novel Feature Extraction Techniques for Multimodal Score Fusion Using Density Based Gaussian Mixture Model Approach

    An unimodal biometric systems, which relies only on a single trait of a person for identification is often not able to meet the desired performance. Combining multiple biometrics may enhance the performance of personal authentication system in accuracy and reliability which is adopted in multimodal biometrics. This paper describes the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Evaluation of BATMAN, DSR, OLSR Routing Protocols - A Review

    Mobile Ad Hoc NETworks (MANETs) can make dynamic changes in topology. The most realistic characteristic which differentiates MANETs from other networks is that it is capable of changing its location. The result of the surveys over the last 5 years, show that it can overcome the two difficulties such as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    The Future of Satellite Communication Antennas: Negative Refractive Index Metamaterials - A Review

    Now-a-days, electromagnetic meta-materials is a rapidly growing research domain involving electromagnetism, microwave and milli-metre wave technology, optics, material technology and nanotechnology. In particular, paper concerns about the utilization of split ring resonators in negative permeability meta materials, the concept and the production of an isotropic negative permeability medium, an isotropic...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Analysis of Various Routing Protocols in Ad-Hoc Network-A Survey

    Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes. An ad...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Design and Analysis of On-Chip Router for Network on Chip

    Continuous scaling of CMOS technology makes it possible to integrate a large number of heterogeneous devices that need to communicate efficiently on a single chip. For this efficient routers are needed to takes place communication between these devices. This paper gives the design of on-chip routers based on optimizing power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Review of Impedance Matching Networks for Bandwidth Enhancement

    A number of techniques can be used to eliminate reflections when the characteristic impedance of the line and the load impedance are mismatched. Impedance matching techniques can be designed to be effective for a specific frequency of operation (narrow band techniques) or for a given frequency spectrum (broadband techniques). The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Identification of Cross Cutting Concerns and Refactoring of Object Oriented System Based on Aspect Mining

    The process of Aspect Mining and Refactoring tries to indentify the cross-cutting concerns in the existing software system and refactoring if for a good AOP. The aim of the paper is to analyze the techniques use for the evaluation of the cross-linking and making the system easier to maintain and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Compensating Frequency Response Mismatches in Time Interleaved Analog to Digital Converters

    Time interleaving of multiple analog-to-digital converters by multiplexing the outputs of (for example) a pair of converters at a doubled sampling rate is by now a mature concept - first introduced by Black and Hodges in 1980. Time interleaving of ADCs offers a conceptually simple method for multiplying the sample...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Detecting Black and Gray Hole Attacks in Mobile Ad Hoc Network Using an Adaptive Method

    Black and gray hole attack is one sort of routing disturbing attacks and can bring huge harm to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive method to detecting black and gray hole attacks in ad hoc...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Power Dissipation in WCDMA- An Overview

    Code-Division Multiple Access, a digital Cellular technology that uses spread-spectrum techniques such as GSM, that use TDMA, but CDMA does not assign a specific frequency to each user. Wideband Code-Division Multiple Access (WCDMA), for the implementation of the Third-Generation (3G) cellular system. WCDMA efficiently utilizes the radio spectrum to provide...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Optimization of Handover Performance in Mobile WiMax 802.16E

    For Broadband wireless communication Wimax is the most promising technology to deliver high data rates over large areas to a large number of users. It allow the users to roam over the network. The Wimax standard specify the handover policy. The handover is initiated and optimized by Mobile Station (MS),...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Experimental Analysis of Wavelength Assignment Strategies in Optical Networks

    In survivable optical networks, wavelength assignment is a major concern than assigning routes to the light path requests. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelengths that leads to blocking probability for any connection request. This paper analyzes the performance of the wavelength assignment strategies to reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Cloud Computing Security Issues, Challenges and Solution

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Behavioral Simulation of Delta-Sigma Fractional-N PLL for WiMAX Applications

    Frequency synthesizer's behavior affects the wireless communication system. The quality of the frequency synthesizer is highly dependent on the type of Phase Locked-Loop (PLL) used for the system. It is crucial for the designers determine the correct type of PLL to achieve high noise performance, high switching speed, and high...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Porting Android to Arm for Wireless Data Encryption and Decryption

    This paper presents the design and development of wireless encryption and decryption system using android operating system which is ported to the TI's Beagle Board-xM. Beagle Board-xM has DM3730 chip which internally containing ARM Cortex-A8 processor. By using keypad, the user can compose a text and submit the message using...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Intrusion Detection System Using Shadow Honeypot

    The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper, the authors proposed a shadow honeypot based intrusion detection...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Enhancing the Throughput in Wireless Networks Using Optimal CSMA Algorithm

    In multi-hop wireless networks, users may compete for accessing a shared transmission medium. For transmission of packets the Medium Access Layer has to schedule the links carefully with minimum collisions. To achieve the maximal throughput the designing of scheduling algorithms is a challenging problem because of the complex interference constraints...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Secure Multicasting in Ad-Hoc Network

    A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. In each communication operation the authors use multicasting technique. In multicasting technique signified for group communication that supports...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Comparative Analysis of QoS Routing Protocols in MANETS: Unicast & Multicast

    In Mobile Ad hoc NETworks (MANETs), the provision of Quality of Service (QoS) guarantees is much more challenging than in wire line networks, mainly due to node mobility, multi hop communications, contention for channel access, and a lack of central coordination. The difficulties in the provision of such guarantees have...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Optimum Allocation of Active Filters in a 4-Bus System Using Genetic Algorithm

    Active Power Filters (APF) are employed for harmonic compensation in power systems. In this paper Genetic Algorithms (GA) are used for the selection of optimum location of Active filters in power system. The purpose of the genetic algorithm is to minimize the cost of harmonic filters and, at the same...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Information Technology Research Model for Enhancing Ability of Business Managers

    This paper explores the perception of the Information Technology (IT) competence of professional managers, defined as the set of IT allied explicit and implicit knowledge that a business manager owns that permits him or her to reveal IT leadership in his or her area of business. A manager's knowledge of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Evaluation of Spatial Complexity Metrics of Object Oriented Software

    Spatial complexity plays an important role in developing the maintainable software. One of the important activities of the maintenance phase is to understand the source code first, and if any changes are required in source-code then change it. Understandability of the software gets affected by psychological complexity of the source...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Node Distribution in Wireless Sensor Networks Using Component Based Localization Algorithm

    Localization is crucial for wireless ad hoc and sensor networks. As the distance-measurement ranges are often less than the communication ranges for many ranging systems, most communication-dense wireless networks are localization-sparse. Consequently, existing algorithms fail to provide accurate localization supports. In order to address this issue, by introducing the concept...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Decentralized and Role-Based Authentication

    The security plays a key role to achieve authentication by making use of different ways and it can be heighten with multiple factors of security. The main aim of this paper was to design and implement a pure decentralized authentication system for an Educational Academy Automation Software which uses OpenID...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Thermal Effects of Mobile Phones

    This paper presents a study of the absorption of electromagnetic waves in the human head while using a mobile phone. This absorption is presented in the form of thermal effects of exposure to radiofrequency electromagnetic fields for long period or in the form of non-thermal effect for short period exposure....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Online Email Classification Using Ant Clustering Algorithm

    Classification of email messages & web page content is essential to many tasks in web information retrieval such as maintaining email directories, web directories and focused crawling. The uncontrolled nature of email & web content presents additional challenges to their classification as compared to traditional text classification, but the common...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Improving Security Architecture of Anonymous Wireless Mesh Networks

    As users of networks increasingly aware of their privacy needs, the importance of anonymity is gaining popularity. The reason behind it is that anonymity can hide the actual identity of end users while allowing their to access services of network or web site. More over they are allowed to do...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    A Technical Survey on Cluster Analysis in Data Mining

    In data mining functionalities, clustering analysis is the most significant tool for distribution of data. Clustering is dynamic field of research in data mining concept. It is related to unsupervised learning in machine learning. On the basis of similarity measures cluster formation process is initiated. With the help of different...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    An Epigrammatic Study of some of the Fundamental Concepts in Wireless Sensor Networks

    In this paper, the authors are discussing on the basic concepts of wireless sensor networks, with the survey of some of the basic necessary of the wireless sensor networks. Since wireless sensor network consists of the many research oriented terms like resource utilization of the network it may be battery,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)