International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 361-400 of 1124 results

  • White Papers // Feb 2014

    Algorithm for Identifying Relevant Features Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the ability concerns the time required to find a subset of features and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Design of High Speed, Area Efficient, Low Power Vedic Multiplier Using Reversible Logic Gate

    A systems performance is generally determined by the speed of the multiplier since multiplier is one of the key hardware components in high performance systems such as FIR filters, digital signal processors and microprocessors etc. Multipliers have large area, long latency and consume considerable power. Hence good multiplier architecture increases...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Task Scheduling in Homogeneous Multiprocessor Systems Using Evolutionary Techniques

    Minimizing the total processing time by scheduling the tasks of a given network on to the available processors is an important and challenging problem. It is known to be a NP-complete problem and so the classical techniques of optimization require considerable time and effort to reach the optimum. In this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Comparative Study of Low Power Technology Mapping Like Single Supply Voltages With Multiple Supply Voltages in FPGA Architecture

    In this paper, the authors present a literature survey for technology mapping algorithm in field-programmable gate array architectures with single, dual and multiple supply voltages (Vdds) for power optimization, included both dynamic and leakage power reduction, interconnect power and power gating. To carry out this paper, they first discuss a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Power Reduction for Sequential Circuit Using Merge Flip-Flop Technique

    Flip-flops are the major storage element and most power consumption component in a sequential circuit. In integrated circuits, the power consumed by clocking is more than 50% of the system power because of its transition probability. Given a design, the authors can reduce its power consumption by replacing several flip-flops...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Design of Area Efficient Low Latency Sorting Units

    Sorting is an important technique used in many applications such as Visual Processing Unit (VPU), Digital Signal Processing (DSP), network processing, etc. To achieve high throughput rates today's computers perform several operations simultaneously. This paper presents the efficient technique for low latency area efficient sorting units. The sorting unit utilizes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Dynamic Content Management System for Collaborative Testing Of Web Services

    Software testers are confronted with great challenges in testing WS. They must meet a wide range of test requirements. They must deal with the diversity of implementation techniques used by the other services. An automated testing technique must be developed to be capable of testing on-the-flynonintrusively and nondisruptively. The ontology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Agile Data Collection Tool for Computing Agility

    To deliver any working software at faster rate is the requirement of today's software industry. Thus, agile methods are emerging as most promising software development processes for the organizations. These methods ensure better customer collaboration, simplicity, changes at any stage with least emphasis on documentation. In this paper, the authors...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Threats of Botnet to Internet Security and Respective Defense Strategies

    Botnets are one of the most dangerous threats to internet security. The problem of Botnet is global in nature. A botnet is a network of computers infected with a malicious program that allows cybercriminals to control the infected machines remotely without the user's knowledge. Their target is to steal valuable...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Fusion of Geometrical and Statistical Techniques for Human Ear Recognition

    Biometric systems have been implemented on numerous public facilities that are able to enhance the security system. Ear is one of emerging biometric and proved to have a great potential for identifying a person. Research of ear recognition and its application is a new subject in the field of biometrics...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey on Efficient Incremental Algorithm for Mining High Utility Itemsets in Distributed and Dynamic Database

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. It can be defined as the activity that extracts information contained in very large database. That information can be used to increase the revenue or cut costs. Association Rule Mining (ARM) is finding...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Privacy and Security on Cloud Data Storage Using Hybrid Encryption Technique

    In present scenario cloud network is a boon in network technology. It is providing number of services which are very difficult to summarize because each and everything on cloud is completely dependent on virtualization. Microsoft 2012, window azure, IBM...etc are few companies which are providing these services in a nominal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey of Different Contract Signing Protocols

    Today in the field of security there are various protocols and authentication techniques that make an application in the network more secure and free from various attacks in the network. There are various applications which require exchange of data between parties. A fair exchange is required since the chances of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An Empirical Study of Security Issues in Grid Middleware

    With the passing of each day, grid computing and cloud computing are becoming an important integral part of various applications. More and more software professionals and corporate are focusing on these high performance computing mechanisms. These mechanisms are tremendously evolving as users are also continuously striving for smarter applications and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Lossless Data Hiding using Histogram Modification and Hash Encryption Scheme

    The security of multimedia data can be done with encryption or data hiding algorithms. This paper attempts to undertake the study of authentication creation and proprietorship checking using linear histogram and non linear equalize histogram techniques with and without hash encryption algorithm. The development of information hiding techniques provides a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey on Data Mining Algorithms on Apache Hadoop Platform

    Apache hadoop is a major innovation in the IT market place last decade. From humble beginnings apache hadoop has become a world-wide adoption in data centers. It brings parallel processing in hands of average programmer. As more data centers supports hadoop platform, it becomes imperative to migrate existing data mining...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Review on Automatic Annotation Search from Web Database

    The internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexible Information Extraction (IE) systems that transform the web pages into program-friendly structures such as a relational database...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Investigating TCP/IP, HTTP, ARP, ICMP Packets Using Wireshark

    The effect of increasing changes in the network led to threats and security issues that has made monitoring and analysis a challenging task. A good understanding of network, type of network traffic is the good way of solving problems on the network like congestion and bandwidth. In this paper architecture...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Reducing HTTP Collapse with Usage of Pattern Methods

    Security is the major concern in today's scenario a vigorous security mechanism is needed to secure the network from unwanted traffic. There are lots of technologies developed to provide a se currently one of them is by utilizing \"Signature-based\" detection can't bare stressed traffic, where marketing value is incrementing. Signature...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Finding Frequent and Maximal Periodic Patterns in Spatiotemporal Databases Towards Big Data

    Data mining used to find hidden knowledge from large amount of databases. Periodic pattern mining is useful in weather forecasting, fraud detection and GIS Applications. In general, spatio-temporal pattern discovery process finds the partially ordered subsets of the event-types whose instances are located together and occur serially for a given...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An RFID Mutual Authentication Protocol Using ECIES

    Security of data is a major issue in RFID environment as RFID is a wireless radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey of Sensitive Information Hiding Techniques

    In this paper the authors gave an overview of the new and rapidly emerging research area of privacy preserving data mining. Privacy preserving in data mining has been a heart favorite topic of researchers from many years. Every organization contains sensitive data & such data is needed to be protected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Test Data Compression for Low Power Testing of VLSI Circuits

    The two major areas of concern in the testing of VLSI circuits are test data volume and excessive test power. Among the many different compression coding schemes proposed till now, the CCSDS (Consultative Committee for Space Data Systems) lossless data compression scheme is one of the best. This paper discusses...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Analysis and Comparison of CPU Scheduling Algorithms

    Scheduling is a fundamental operating system function, since almost all computer resources are scheduled before use. The CPU is one of the primary computer resources. Central Processing Unit (CPU) scheduling plays an important role by switching the CPU among various processes. A processor is the important resource in computer; the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Application of Multibit Flip-Flops by Using Carry Look Ahead Adder

    The consumption of power has become an important issue in modern VLSI design. Power consumption can be reduced by replacing some flip-flops with fewer multi-bit flip-flops. Multi-bit flip-flop is one of the methods for clock power consumption reduction. This paper focuses on reduction of power using multi-bit flip-flops by clock...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Logical Design of Adders in New Number Representation

    In digital processing the arithmetic operation of addition between signed analogue signals that contains the coefficient in digital form are required. Signed magnitude requires an extra bit for sign and other bits for magnitude of a number. In this paper, digital data processing the arithmetic operation of addition between signed...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Design and Implementation of 16-Bit Ripple Carry Adder for Low Power in 45nm CMOS Technology

    Power consumption and it's minimization is one of the primary concerns in today VLSI design methodologies because of two main reasons one is the long battery operating life requirement of mobile and portable devices and second is due to increasing number of transistors on a single chip leads to high...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An Another Way for Designing of 4-Bit Carry Skip BCD Adder Using DKFG Reversible Logic Gates

    At the present time reversible logic is one of the most significant topics and it has different areas for its application. It is very essential to construct low power, low loss computational structures which are very essential for the construction of arithmetic circuits used in nanotechnology, quantum computation and many...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Clock Domain Crossing Verification in a System on Chip

    A modern complex SOC has a number of different asynchronous clock domains and data is frequently transferred from one clock domain to another which needs to be synchronized. Designer uses many types of synchronizer, most commonly used synchronizer is 2 flop synchronizer which is mainly used for control signals, there...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Reliable Flexi-Router Architecture for NOC Applications

    The technology scaling has brought the importance of on-chip communication in system-on-chip applications. The performance of network on-chip greatly depends on the router, basic block of NOC. The performance of the network depends on latency and throughput. Virtual channel router is used most widely where virtual channels are engaged to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Low Power Modified Feed-Through Logic Circuit for Ultra-Low Voltage Arithmetic Circuits

    A modified approach for Feed-Through Logic (FTL) is developed in this paper, to provide optimized Power Delay Product (PDP). The need for faster circuits with low power dissipation has made it common practice to use feed through logic. Problems associated with domino logic like limitation of non-inverting only logic, charge...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    An Approach for Realization of 2's Complement Adder Subtractor using DKG Reversible Gate

    Reversible logic is one of the most important issues at present time and it has different areas for its application. The main purposes of designing reversible logic are to decrease quantum cost, depth of the circuits and the number of garbage outputs In this paper, the authors represent an another...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Centralized and Distributed Energy Efficient Routing Techniques in Wireless Sensor Networks: A Survey

    Recent technology improvements that have been developed in small size nodes, low-cost, battery power devices, which are capable of local processing and efficient wireless communication. Such nodes are called as sensor nodes. These sensor nodes are efficient in computing in various applications, such as office buildings, industrial plants, and reading...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Enabling Video Content Distribution Using the Principle of Cloud Downloads

    Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, video content distribution over the Internet has received tremendous attention from academia and industry. The most common approach for such is the peer-to-peer approach. In this approach, peers who create demand for videos...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Chaos Based Public-key Cryptosystem

    In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Cryptography Based on Neural Network

    Cryptography is the ability of changing information into obvious unintelligibility in a way allowing a secret method of un-mangling. The vital idea of cryptography is the capability to send information between participants in a way that prevents others from reading it. Much cryptography methods are available which are based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Design and Implementation of Data Sanitization Technique for Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram

    Now-a-days cloud environments are widely used for data storage and processing. However, this environment represents a serious threat for data privacy, since document containing confidential information might be made available for unauthorized parties. Although measures to automatically remove or hide sensitive information that may disclose identities of referred entities or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Horizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator

    Preparing dataset is a very difficult process in cases where it has to be given as input for data mining which involves complex queries, joining tables, and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. The authors' project aims...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Storage Techniques in Cloud Computing

    From the past few years, there has been a rapid progress in cloud, with the increasing numbers of companies resorting number of companies resorting to use resources in the cloud, there is a necessity for protecting the data of various users using centralized resource. Cloud storage services avoid the cost...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    PC Based Intruder Detection & Alert System

    In the current world, security concerns have increased alarmingly since thieves and robbers are exploiting the rapid technical advancements to a great extent. Sophisticated surveillance techniques are the need of the hour. Video surveillance and monitoring are the current technologies that come to the authors' rescue. These techniques can help...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Review on Automatic Annotation Search from Web Database

    The internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexible Information Extraction (IE) systems that transform the web pages into program-friendly structures such as a relational database...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Investigating TCP/IP, HTTP, ARP, ICMP Packets Using Wireshark

    The effect of increasing changes in the network led to threats and security issues that has made monitoring and analysis a challenging task. A good understanding of network, type of network traffic is the good way of solving problems on the network like congestion and bandwidth. In this paper architecture...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Reducing HTTP Collapse with Usage of Pattern Methods

    Security is the major concern in today's scenario a vigorous security mechanism is needed to secure the network from unwanted traffic. There are lots of technologies developed to provide a se currently one of them is by utilizing \"Signature-based\" detection can't bare stressed traffic, where marketing value is incrementing. Signature...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Finding Frequent and Maximal Periodic Patterns in Spatiotemporal Databases Towards Big Data

    Data mining used to find hidden knowledge from large amount of databases. Periodic pattern mining is useful in weather forecasting, fraud detection and GIS Applications. In general, spatio-temporal pattern discovery process finds the partially ordered subsets of the event-types whose instances are located together and occur serially for a given...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An RFID Mutual Authentication Protocol Using ECIES

    Security of data is a major issue in RFID environment as RFID is a wireless radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey of Sensitive Information Hiding Techniques

    In this paper the authors gave an overview of the new and rapidly emerging research area of privacy preserving data mining. Privacy preserving in data mining has been a heart favorite topic of researchers from many years. Every organization contains sensitive data & such data is needed to be protected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    Privacy Preservation with Limited Side Effect

    Privacy preserving data mining is a novel research direction in data mining and statistical databases where data mining algorithms are analyzed for the side-effects which incur in process of privacy preservation. The proposed method focuses on minimizing side effects caused by privacy preservation techniques. Side effects are loss of rules...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Off-line Signature Verification Using Artificial Neural Network

    In this paper off-line signature verification and recognition using a new approach that depends on an artificial neural network which discriminate between two classes forgery and original signature. The proposed scheme is based on the technique that applies pre-processing on the signature, feature point extraction and neural network training and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Proposed Local Data Mart Approach for Data Warehouse Architecture

    A data warehouse is a data repository, containing historical data, prepared for analysis and supporting decision making process. Data warehouses are in use for more than a decade but companies are still finding it difficult to decide on the approach they should take for successful implementation. Data warehouse architecture plays...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Solutions for Mobility in Wireless Body Area Networks

    Body Sensor Network (BSN) that is linked by a wireless network interface roams from one coverage zone to another then interference between Wireless-Body-Area-Networks (WBAN) created, which can cause serious throughput degradation, Scattering of WBAN and Remote Base Station (RBS) will not be in range. When a wireless body area network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Research Caricature Based on Semantic Web Mining

    Research caricature is an analysis method used to scan the contextual literature information and describe the research environment and research efforts wisely. Here the authors carry out a paper which needs to extract intelligence from web resources especially for scientific research analysis. This paper made a research caricature based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    DualGuard: Detecting Intrusions in Multitier Web Applications

    In the people day to day life internet plays very important role, in terms communication and management of personal information from anywhere. Therefore for increase in application and complexity of data, web-services take interest in multi-tiered design like 1-tier, 2-tier and 3-tier design. By the use of these design web...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Effective Data Structure for Mining Frequent Itemset in Cloud Databases

    Due to increase of data in cloud computing environment over the past few years, retrieving required data from the huge database with lesser amount of time becomes tedious. Hence without having a proper cache management framework the retrieval of required data from the cloud data servers becomes difficult. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Migration in Heterogeneous Databases (ETL)

    Development of economic systems presents rapid growth trend and requires establishing a rapid trans-regional clearing system in banks. The authors are studying the approaches and processes of data migration and take a bank's database as an example. The process of data migration has three methods. Data migrated by tools beforehand,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    M-Score and K-Anonymity: A Model for Detection and Protection of Data

    Conversely, limiting access to the information in the interests of preserving secrecy might damage their ability to implement the actions that can best serve the organization. Therefore, data leakage and data misuse detection mechanisms are essential in identifying malicious insiders. One of the emerging concepts in micro data protection is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Adaptive Genetic Algorithm for Efficient Resource Management in Cloud Computing

    Cloud is one of the emerging technologies in computer industry. Several companies migrate to this technology due to reduction in maintenance cost. Several organizations provide cloud service such as SaaS, IaaS, and PaaS. Different organization provides same service with different service charges and waiting time. So customers can select services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Fusion of Geometrical and Statistical Techniques for Human Ear Recognition

    Biometric systems have been implemented on numerous public facilities that are able to enhance the security system. Ear is one of emerging biometric and proved to have a great potential for identifying a person. Research of ear recognition and its application is a new subject in the field of biometrics...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Clustering of Datasets by using Centroid Based Method

    The integrated data mining processing technique to find appropriate initial centroids and vectors in data clustering process by k-means and c-means algorithm. The processes include data cleansing, preprocessing, and finding features relation with Apriori algorithm to get appropriate features. Here, the authors used centriod based model that represents the processes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Review Paper on Crusoe Processor

    Mobile computing has been the buzzword for quite a long time. Mobile computing devices such as laptop, desktop computers etc are very important in day to day life and they require microprocessor. Microprocessor is the heart of those devices. desktop computer have very different command on processor that's why they...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Understanding Web personalization with Web Usage Mining and its Application: Recommender System

    Web is becoming an enormous storehouse of information and it will keep growing with improvements in internet technologies. But the human capability to read, access and understand content does not increase with that pace. Hence it becomes difficult to website owners to provide appropriate information to the users. This led...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Trends in Contemporary Cryptanalysis

    Securing the information and access to this information has been a prime concern ever since the existence of data. Cryptographic system encrypts this data but cryptanalysis techniques are used to test and break these encryption techniques. In this paper, the authors will see recent developments in the field of encryption...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    An Improved Method for Frequent Itemset Mining

    Discovering knowledge in huge amounts of data is called data mining. Frequent itemset mining is an important step in association rule mining. Several algorithms have been proposed for efficient frequent itemset mining in transactional database. The authors present an improved approach to mine frequent itemset in transactional database. The algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Evolution of Data Hiding By Neural Network and Retrieval or Encrypted Image, Text, Audio and Video Files

    Information hiding is a method of hiding secret messages into a cover-media such that an intended observer will not be aware of the existence of hidden messages. In such applications various file formats are used as cover-object which contains confidential data. As the new research field the techniques introduces Artificial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Cloud Computing: The Emergence of Application Service Providers (ASPs) in Developing Economies

    The cloud computing paradigm has triggered a major shake-up in the way ICT infrastructure is delivered, priced and consumed. The underlying factors for this phenomenon are highly abstracted or virtualized infrastructure, a variable OPEX-based model (determined by usage requirements), support for multi-tenant user model and immediate computing resource scalability. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Test Data Compression for Low Power Testing of VLSI Circuits

    The two major areas of concern in the testing of VLSI circuits are test data volume and excessive test power. Among the many different compression coding schemes proposed till now, the CCSDS (Consultative Committee for Space Data Systems) lossless data compression scheme is one of the best. This paper discusses...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Provenance Based Distributed Cloud System Using Jar Acessibility

    Cloud computing is one of the most important service in the internet. The widespread use of cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow in cloud has become common, as users fear of losing control of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Application of Microprocessors

    Microprocessors are applicable to a wide range of information processing tasks, ranging from general computing to real-time monitoring systems. The microprocessor facilitates new ways of communication and how to make use of the vast information available online and offline both at home and in workplace. Most electronic devices - including...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Of Various GDI Techniques For Low Power Digital Circuits

    Now-a-days in digital circuit design low power and small area are main issues of concern for VLSI designers. GDI (Gate Diffusion Input)-a technique of low power digital combinational design. This technique as compare to other currently used logic design styles, allows less power consumption and reduced propagation delay for low-power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

    Present scenario suggests many audio files are needed to be transmitted over internet for various important purposes. Earlier cryptographic schemes for secret sharing lead to high computational complexity during both secret sharing and secret reconstruction phase. Today, various cryptographic methods for secret sharing are there to protect secret data but...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Hiding in Motion Vectors of Compressed Video

    In this paper the authors aim to explain the data hiding concept in motion vector of compressed video. In this data hiding in motion vector is done by stenography technique, data is compressed in different frames of video. The process starts with mailing system such as sending and receiving secret...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    (Mcicpl Protocol): Mobile And Computer Interactive Communication Protocol on Linux

    GPRS network supports to the communication of data or transferring of data, even though GPRS (General Packet Radio Services) is allow transmitting data to the Internet and it is used for communication. The GPRS services provide a packet switch data transmission within GSM network and packet access to data networks....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Survey on QoS Ranking in Cloud Computing

    QoS (Quality-of-Service) is an important topic in cloud computing. It is very difficult to make a decision on choosing the cloud services depending on QoS requirements. These requirements have to be satisfied by both cloud service providers and cloud users. So, optimal service selection is needed to obtain high quality...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    ANT Algorithm for Load Balancing Problem in FTP Server

    The system describes a method of achieving load balancing in distributed networks. A network models a typical distribution of files between nodes; nodes carrying an excess of traffic can become congested, causing data to be lost. The network also supports behaviors modeled on the trail laying abilities of ants. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Interative Services of College Databases

    Now-a-day when there is mobility in every aspect of life, people do not wish to visit different places in order to gather information. Information retrieval is the science of locating from a large documentation collection, those documents that satisfy a specified information need. As the number of users using internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Digitally Controlled Delay Lines Based On NAND Gate for Glitch Free Circuits

    The traditional analog signal processing is expected to progressively substituted by the processing times of the digital domain in the VLSI. Within this novel paradigm, digitally controlled delay lines should play the vital role in the digital-to-analog converters, and in analog intensive circuits. From a practical point of view, now-a-days,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Techniques of Data Privacy in Cloud Using Back Propagation Neural Network

    Back propagation is the scheme for neural network learning. This learning accuracy gained by collaborative learning. In existing system support this kind of learning on limited dataset and between two parties. It cannot protect intermediate result. In the authors' proposed system multiple parties perform collaborative learning on arbitrarily partitioned data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Software Testing, Mythology & Methodologies

    It is generally believed that testing phases of software development consume 30% to 50% of the entire software development time and resources. The cost and time of testing should get reduced to increase the productivity of the software development process. To achieve these goals, different levels and tools of automated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Fault Analysis in Reversible Sequential Circuits

    In this paper, the researchers propose the design of reversible circuits using reversible gates. Reversible logic is implemented in reversible circuits. Reversible logic is mostly preferred due to less heat dissipation. Conservative logic gates can be designed in any sequential circuits and can be tested using two test vectors. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    SoftServe (Software Server)

    Software as a service, sometimes referred to as \"On-demand software,\" is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. The authors'...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption

    The emerging cloud technologies, due to their various unique and attractive properties, are rapidly being adopted throughout the IT industry. In this paper, the authors identify security challenges that arise in incorporation of cloud-based services, and present a set of solutions to address them. To assure the user control over...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)