International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 481-520 of 1076 results

  • White Papers // Jul 2013

    MANETs Using Advance DSR Algorithm and Improve the Secure Transmission

    In wireless communications the traffic across a Mobile Ad-hoc NETwork (MANET) can be highly vulnerable to security threats. The mobile ad hoc networks are more prone to suffer from the malicious behaviors than the traditional wired networks. Therefore, it becomes very much necessary to pay more attention to the security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Clustering Algorithm for Temporal Data Mining: An Overview

    Data mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. Temporal data mining is the extraction of knowledge from huge amounts of complex temporal database. Most research in this area has focused...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Designing of Low Power 16-Bit Carry Select Adder with Less Delay in 45 nm CMOS Process Technology

    Designing of power-efficient and high speed digital logic systems is very crucial task. Numbers of adders are designed and provide tradeoffs between power, delay and area. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry SeLect Adder (CSLA)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    High Speed 22nm Metal Gate Strained Si CMOS NOR Gate

    In this paper, the authors have a new high speed NOR gate making use of static forward body biasing. The forward body biasing has the bad impact on power and hence present NOR gate find it's applications where speed is the main priority, although there are ways to reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    FPGA Implementation of Quad Processor Core Architecture for Concurrent Computing

    The embedded multiprocessor core is a design philosophy that has become a mainstream in Scientific and engineering applications. Increasing performance and gate capacity of recent FPGA devices permit complex logic systems to be implemented on a single programmable device. The embedded multiprocessors face a new problem with thread safety. It...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Usability Testing for Android and Apple Smart Phone

    Early use of mobile devices involved using phones simply to communicate over the network. Gradual development of technologies has allowed the users to reach the stage that mobile devices now possess the capability to run desktop applications. For mobile devices to satisfy this development, mobile hardware has to be modified...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Digital Integrated Circuit Tester (using AT89s51 Microcontroller)

    The digital integrated circuit tester implemented as in this paper, is capable of testing 14 pin Integrated Circuits (ICs) of 7400 series. First, the system welcomes the user and asks the user to enter IC number. It takes the last two digits of the IC no. of the IC to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    A Novel Symmetric Key Encryption Algorithm Based on RC5 in Wireless Sensor Network

    In recent years, there has been growing interest in wireless sensor network due to its wide range of potential applications. They are used in military area, industrial process monitoring and control, environment and habitat monitoring, health care. The sensor node has limited computational power and memory size affecting the amount...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Web Services Security Standards

    Web Services are the way of machine to machine communication over the network to perform specific operation e.g. transaction, information exchange, sale service etc. So web service is having protocols and standards that are used to exchange data between applications or systems. Web Services use SOAP protocol to exchange data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Implementation of a Secure and High Speed Cloud Interface for Cell Phone

    In mobile cloud computing the authors are increasing speed and security which is a major concern area for this research work as day by day multimedia work load increasing on small smart devices and cloud computing should be able to full fill all user requirement on these small devices where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Surveillance Through Automatic Signalling in Cloud Computing: A Theoretical Model

    In this paper, the authors have been written to focus on the problem of information hiding by cloud provider to maintain reputation and faith. It also focuses data leakage problem and give new idea for business continuity planning. This paper proposes the solution in two phases first phase is done...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Comparison of Data Mining Techniques Used for Financial Data Analysis

    In banking sectors and other such leading organization the accurate assessment of consumer is of uttermost importance. Credit loans and finances have risk of being defaulted. These loans involve large amounts of capital and their non-retrieval can lead to major loss for the financial institution. In this paper, comparison of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    A Study on Market Basket Analysis using a Data Mining Algorithm

    Association rule mining is the power full tool now-a-days in data mining. It identifies the correlation between the items in large databases. A typical example of association rule mining is market basket analysis. In this method or approach it examines the buying habits of the customers by identifying the associations...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Design of Approximate Adder for Error Tolerant Application

    The probability of errors in the present VLSI technology is very high and it is increasing with technology scaling. Removing all errors is very expensive task and is not required for certain applications. There are certain application where the approximate result is acceptable e.g. image processing and video processing. For...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Enhancing Trust Factor in Mid to High Valued E-Auction Using Virtual Accounting on Existing Money Transfer Network

    Electronic commerce, commonly known as ecommerce, is widely spread but not yet widely accepted due to various factors. Summarizing it will point towards one common factor i.e. 'Human Factor' in form of thinking and then acting towards overall ecommerce activity, called as 'Trust Factor'. Trust factor gets affected due to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Study on Biometric Recognition in Embedding Web Browers in 3G Mobile Phone Applications

    The novel mobile-phone employs an modular architecture to capture and send the biometric to the web server based on the use of an embedded web browser. Investigating the technologies for embedded web page in order to capture and send the biometrics are Applet Java, ActiveX controls, Flash technology, Javascript, and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Triband Folded Dipole Antenna for GSM Mobile Communication Applications

    Over recent years, a commercial opportunity for the mobile industry has been rapidly developed due to the use of wireless communication technologies. The fast evolution of wireless service applications viz., live online game, real-time video streaming and mobile electronic devices that are capable of handling high data rate applications are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Securing a Firm's Computer Operating System : Trusted Platform Module

    Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design of Reconfigurable and Adjustable Wireless CORDIC Single Core Rake Receiver

    In wireless communication system transmitted signals are subjected to multiple reflections, diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by signal cancellation. Rake receiver...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Usability and Comparisons of Passwords

    Mobile devices such as cell phones/tablets laptops are widely used nowadays, during the last years phones changed from simple phones to smart phones with an increasing number of features. People feel easy to store their information on these devices so that they can get their required information whenever they want....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Review of the Development in the Field of Fiber Optic Communication Systems

    This paper presents a review of the latest research and development in the field of fibre optic communication system. Remarkable developments can be seen in the field of optical fibre communication in the last decade. Wide-bandwidth signal transmission with low latency is emerging as a key requirement in a number...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Performance Increasing in Congested Sensor Networks

    The wireless sensor network consists of hundreds or thousands of sensors. The sensors are shared by the multiple applications like sensing the temperature, pressure etc. Function of sensor is to sense the information and transfer that information to the neighbor of that node. In wireless network every node is connected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    QoS Aware Routing and Admission Control in MANET

    It is difficult to provide Quality of Service (QoS) assurances in a Mobile Ad-hoc NETwork (MANET) due to node mobility, distributed channel access, fading radio signals, a lack of centralized coordination, and the unreliable nature of the wireless channel. This application gives a thorough overview of QoS routing metrics, resources,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Boosting the Efficiency in Similarity Search on Signature Collections

    Computing all signature pairs whose bit differences are less than or equal to a given threshold in large signature collections is an important problem in many applications. In this paper, the authors leverage MapReduce-based parallelization in order to enable scalable similarity search on the signatures. A road-block in using MapReduce...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    New Multimodal Biometric Approach with Two Score Level Combination Strategies

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. The anatomy of human fingers is quite complicated and largely responsible for the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    STEGCRYP: A Multilevel Information Security Shceme

    In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB (Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Adaptive Channel Estimation Technique for MIMO-OFDM

    A Multiple-Input Multiple-Output (MIMO) communication system combined with the Orthogonal Frequency Division Multiplexing (OFDM) modulation technique can achieve reliable high data rate transmission over broadband wireless channels. The most important research topic in the wireless communications is the adaptive channel estimation where the channel is rapidly time-varying. In this paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Efficient Framework for Deploying Information in Virtual Datacenter with Cloud Security Application

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the Cloud Technology most organizations have own challenges when it comes to handle both critical and confidential information. The major challenge in cloud technology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System

    MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet, the Internet threat takes a form of attack, targeting individual users to gain control over network and data. Buffer overflow is one...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design Edge-Coupled Stripline Band Pass Filter at 39 GHz

    In this paper, the authors propose a edge-coupled stripline band pass filter for 39 GHz application using Ansoft designer/Nexxim V2.2 software and Matlab 2009a software. The filter is operated at Q band frequency range in 39 GHz for various microwave applications & the filter is design on Roger RO6006 substrate...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    FPGA Based Wireless Control System for Robotic Applications

    Robotic applications are much more needed and almost mandatory requirement in today's fast moving industrial economy. In these circumstances the development of Robotics is also taking up the speed with the help of various technologies directly or indirectly suitable for robotic applications. FPGA takes advantage over microcontroller due to its...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Trust-Based Message Reporting Scheme for VANET

    In Vehicular Ad Hoc NETworks (VANET), trust establishment among communicating vehicles is important to be built to secure messages' exchange and reliability. In this paper, the proposed scheme presents a categorized decentralized trust management evaluation scheme for nodes in vehicular ad hoc environments. Each node is evaluated individually according to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Performance Evaluation of V-Blast Mimo System in Fading Diversity Using Matched Filter

    In this paper, the authors are proposing a method which evaluates the performance of V-BLAST MIMO system in different consideration of rayleigh fading environment to get better performance of the system. In V-BLAST MIMO system some of linear detection technique can be used for interference cancellation. Here, they are using...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Fibre Optic Communications: An Overview

    This paper deals with communication using optical fibres. The transmission using high bandwidth can handle vast amounts of information, which can be further improved by reduction in fibre losses, increase in data rates and distances, development of optical sources and detectors compatible with fibres. The recent development in the area...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Review of DDoS and Flooding Attacks in MANET

    The flooding and DDoS (Distributed Denial of Service) attacks are acts as major threats for MANET because of its ability to create huge amount of unwanted traffic. It is very difficult to detect and respond to flooding and DDoS attacks due to large and complex network environments. In this paper,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Role of Component Based Systems in Data Mining & Cloud Computing

    In this paper, the authors proposed a "Collaborative approach" which tells how component based systems are used with data mining as well as cloud computing. Data Mining helps for extracting potentially useful information from the raw data. The function of association rules are an important data mining technique used to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Advanced Autherization System by Using 3D and CCP

    Current authorization systems suffer from many weaknesses. Policies are commonly used based on passwords and username; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Present a New Middleware to Control and Management Database Distributed Environment

    Database systems and computer networks technology led to distributed database development. In this paper, a suitable and flexible middleware called CMDBMS is presented to control and manage database in distributed environment. In middleware the data are distributed entirely among the databases, and each database has its own database management system,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Mining High Utility Item Set From Large Database: - A Recent Survey

    Frequent pattern mining play an essential role in data mining for markets basket analysis. However, items are actually different in many aspects in a number of real life applications, so frequent pattern mining cannot meet the demands arising from these applications. Utility-based data mining is a new research area interested...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Detection of Duplicate Records From Multiple Web Databases Using Pattern Matching in UDD

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the supervised record matching methods require training data provided by users. Such methods can not apply for web database scenario, where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Gain Enhancement of Microstrip Patch Antenna Using Hemispherical and Spherical Dielectric Lens Structure for WiMAX Applications

    In this paper a study of the directive gain enhancement obtained using a dielectric lens placed in the near field of radiating elements is discussed. The design and results of a single element patch antenna along with hemispherical and spherical lens radiating in C-band are detailed. The design has been...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Multipath Dynamic Source Routing Protocol for Ad-Hoc Network

    Ad hoc networks is a wireless network where multiple nods move within a network and they communicate to each other in network range, its performance showing on the value of different parameters, like number of nodes and Mobile connections. And analysis and get results for maximum throughput for hues ad...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    BER Performance for OFDM Using Non-Conventional Transform and Non-Conventional Mapping Schemes

    In this paper, the Bit Error Rate (BER), performance of conventional Discrete Fourier Transform (DFT) - OFDM system is compared with Non-conventional Discrete Cosine Transform (DCT)- OFDM system in AWGN and Rayleigh fading environment. Further DCT based technique using nonconventional mapping schemes outperforms the conventional mapping schemes for the same...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Modeling and Simulation of a University LAN in OPNET Modeller Environment

    Academia has peculiar networking needs that must be satisfied for effective dissemination of knowledge. The main purpose of a campus network is efficient resource sharing and access to information among its users. A key issue with designing and implementing such Local Area Networks (LAN) is its performance under ever increasing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Detection of Misbehaving Nodes in Ad Hoc Routing

    The dynamic nature is the major challenge to design and deployment of Mobile Ad hoc NETworks (MANETs), which consist of a set of security measures to be resolved. In this paper, the authors compare the behavior of three routing protocols DSDV, DSR and AODV, with the consideration of the node...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Controller Area Network for Vehicle Automation

    Based on requirements of modern vehicle, in-vehicle Controller Area Network (CAN) architecture has been implemented. In order to reduce point to point wiring harness in vehicle automation, CAN is suggested as a means for data communication within the vehicle environment. The benefits of CAN bus based network over traditional point...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Secure Image Encryption Through Key Hashing and Wavelet Transform Techniques

    To provide security of the images in the multimedia environment encryption plays an important role. The traditional cryptographic algorithm such as AES, DES, TDES, RSA, IDEA, etc., are not so effective for image encryption because of their slow processing speed, inherent features of image data like bulk data capacity, high...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Random Walk Algorithm Implementation for Unstructured Overlay Networks

    This concept the authors are going to focus with the help of p2p system specification process. P2P system the authors are going to use under the content distribution networks. In one single peer any user registered according to his own interest it can available like long interest specification process. Whenever...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Cloud Computing With Green Virtual Systems

    In cloud computing, systems require a hardware inventory that is often prohibitive in terms of cost and manpower involved in its installation and configuration. In addition, physical servers in general are highly underutilized and remain powered on 24 by 7 regardless of the extent of their utilization. This is highly...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Evolution From 3rd Generation Generic Access Networks to Voice over LTE Via Generic Access (VoLGA)

    The paper gives a theoretical overview and comparison of 3rd Generation Generic Access Networks with LTE's VoLGA. Migration towards Packet Switched Technology brought significant changes on Voice and Text services because of their circuit switched nature. The Problem was identified and solution was introduced under 3rd Generation Partnership project. VoLGA...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    SysGen Architecture for Visual Information Hiding Framework

    The development time and cost for DSP solution have been improved significantly due to proliferation of rapid prototyping tools such as MATLAB-Simulink and Xilinx System Generator (SysGen). The present work explains a method for the design and implementation of a real-time DSP application using SysGen for Matlab. The scheme represents...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    The BlueBooster - Mobile Bluetooth Range Expansion

    Bluetooth is widely used technology in today's mobile phones. It enables a device to communicate wirelessly without being in line of site of other device, but Bluetooth has its own shortcomings such as it is applicable between only two Bluetooth enabled mobile phones at a time and it is limited...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    A Comparative Study of Routing Protocol in Vehicular Ad Hoc Network

    Routing protocols for Vehicular Ad hoc NETworks (VANETs) have attracted a lot of attention recently. Vehicular Ad hoc NETworks (VANET) is a subclass of Mobile ad hoc networks which provides a differentiate approach for Intelligent Transport System (ITS). The routing protocols fall into two major categories of topology-based and position-based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Transmission Method for Overhead Reduction in Mobile Ad-Hoc Networks

    The Mobile Ad-hoc Networks are wireless networks that have no fixed infrastructure. There are no fixed routers-instead each node acts as router and forwards traffic from other nodes. Since the nodes in a MANET are highly mobile, the topology changes frequently and the nodes are dynamically connected in an arbitrary...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Survey on Data Mining

    In the Information Technology era information plays vital role in every sphere of the human life. It is very important to gather data from different data sources, store and maintain the data, generate information, generate knowledge .To analyze this vast amount of data and drawing fruitful conclusions and inferences it...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Video Copy Detection Using Spatio-Temporal and Texture Features

    Content based feature extraction is a mechanism which is mainly used for applications like copyright application, video browsing etc. The main aim of the paper is to find illegal copies of the video in an efficient manner. This proposed paper discusses on detection of illegal copies of video clips that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Green Computing is Smart Computing - A Survey

    The field of "Green Technology" encompasses a broad range of subjects from new energy generation techniques to the study of advanced materials to be used in the daily life. Green technology focuses on reducing the environmental impact of industrial processes and innovative technologies caused by the Earth's growing population. It...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Internet Banking Trust and Preventive Measure

    This paper investigates the reasons customers use Internet Banking (I-Banking) and whether the use differs across various customer demographics. The relationship between trust & loyalty and customer demographics was also analyzed. The results showed that customers of differing genders perceived different factors as important. "Checking account balance" and "Checking bank...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    An Experimental Approach for Simple Swarm Robots

    Swarm robotics is a relatively new field that focuses on controlling large-scale homogeneous multi-robot systems. Swarm robotics draws inspiration from self-organizing behaviour observed in social insects1 like ants, bees and of other animals, called swarm intelligence. One example of SI is bird flocking. By evading collisions, staying close to each...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Features Preserving Data Encryption Used to Secure Multimedia Data

    Security is required for the protection of delivery of multimedia data. Thus this security is provided by encryption. There are many encryption schemes are present for protecting multimedia data. In this paper, the authors are using selective encryption for protecting multimedia data. It takes less computational workload and provides five...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    A New Way to Save Energy and Cost - Cloud Computing

    Cloud computing is used as an efficient way to achieve green computing in the long run. Most of the system equipment are designed in a way to reduce emissions and achieve energy performance. This kind of computing can always be used for re-provisioning of resources. This will help one to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Design and Development of a Plug in for a Browser Against Phishing Attacks

    Recent years have seen a rapid increase in the size of web users. In the same way scam web sites (fraud web sites) and hackers are also increased. Users enter sensitive information such as passwords, their personal and professional information into scam web sites. Such scam sites cause substantial damages...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Performance Enhancement of Secured Mobile Agents in Distributed Database Using Local Database

    Distributed databases is having highly spreading applications and availability of technologies such as cloud computing is making it more and more important in networked environment. As the need is increasing day by day therefore it is also requiring a secured system of information transfer between distributed databases. Mobile agents are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    A Survey on User Future Request Prediction: Web Usage Mining

    Web Usage Mining is an important type of Web Mining, which deals with extraction of interesting knowledge from the web log files. The lots of research has done in this field but basically this paper emphasize on user future next request prediction using web log record, click streams record and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Best Effort Quality of Services Provided to Random Traffic Demands in WDM Networks

    The authors consider the problem of the best effort Quality Of Service (QOS) provided to random traffic demands in WDM networks. In general, when a new random demand arrives at the network, this demand is accepted only based on the available network resources at its instant of arrival. In such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Generic Approach in Automation and Sensors for Enhanced Efficiency

    The focus of this paper is on increasing the efficiency of the automation process, so that the overall cost of the manufacturing process can be minimized. Efficient power estimation during the design phase is required, in order to meet the power specifications without a costly redesign. Power consumption is an...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Power Saving Analysis of Different Optical Access Networks

    With the increase of bandwidth demands with lower power consumption, broadband fibre access technologies such as P2P(Point To Point), PON (Passive Optical Network) and AON (Active Optical Network), come to the forefront of research field. In this paper, the authors describe the analysis of different optical access networks, power ignoring...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Hybrid Nodal Architecture for Traffic Grooming in WDM Networks

    Multiple node architectures are possible for WDM networks. These architectures strongly condition the cost of optical network planning and traffic engineering. This paper aims first to introduce the four optical switching systems currently considered; namely Optical CROSS Connect (OXC), Optical Circuit Switching (OCS), Optical Packet Switching (OPS), and Optical Burst...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Performance Behaviour of Static Sensor Nodes Using AODV and DSR

    Wireless Sensor Network (WSN) Consisting of Spatially Circulated independent devices called Sensor node. These devices are used to calculate a variety of environmental changes. In this paper the performance and behavior of Quality of Service (QoS) parameters of WSN using AODV and DSR protocols and Path loss model Two Ray...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Automated Test Approach for Web Based Software

    Modern society is getting themselves more and more familiar with web enabled services. Its efficiency requires different mission critical pre deployments challenges. Thus, the authors require extensive testing of such software applications. However the method of testing for web based applications are dissimilar from traditional software testing methods. This is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Performance Evolution of RSA and New Cryptosystem

    One of the advanced cryptographic scheme for generating public key and private key. These are more significant in developed cryptography system. This paper generates a new cryptosystem of Jordon-Totient function and applied them to RSA public key cryptosystem with public key and private key which can be used for development...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    An Application for Resource Discovery in a Peer to Peer Network Using Mobile Agents

    This paper aims to present an application for resource discovery in a peer to peer network using mobile agents. Mobile agent technology offers a new computing paradigm in which a program, in the form of a mobile agent, can suspend its execution on a host machine and migrate to another...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Comparative Analysis of QoS Routing Protocols in MANETS: Unicast & Multicast

    In Mobile Ad hoc NETworks (MANETs), the provision of Quality of Service (QoS) guarantees is much more challenging than in wire line networks, mainly due to node mobility, multi hop communications, contention for channel access, and a lack of central coordination. The difficulties in the provision of such guarantees have...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Optimum Allocation of Active Filters in a 4-Bus System Using Genetic Algorithm

    Active Power Filters (APF) are employed for harmonic compensation in power systems. In this paper Genetic Algorithms (GA) are used for the selection of optimum location of Active filters in power system. The purpose of the genetic algorithm is to minimize the cost of harmonic filters and, at the same...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Information Technology Research Model for Enhancing Ability of Business Managers

    This paper explores the perception of the Information Technology (IT) competence of professional managers, defined as the set of IT allied explicit and implicit knowledge that a business manager owns that permits him or her to reveal IT leadership in his or her area of business. A manager's knowledge of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Evaluation of Spatial Complexity Metrics of Object Oriented Software

    Spatial complexity plays an important role in developing the maintainable software. One of the important activities of the maintenance phase is to understand the source code first, and if any changes are required in source-code then change it. Understandability of the software gets affected by psychological complexity of the source...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    An Efficient Power Consumption MAC Protocol in MANET

    Mobile Ad-hoc NETwork (MANET) is a self configuring infrastructure-less network of mobile devices connected by wireless They have undergone rapid growth in the past several years because of their application in military and rescue service, disaster recovery operations, mobile conferencing and many other applications. The Media Access Control (MAC) data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Globus Toolkit 5 (GT5): Introduction of a Tool to Develop Grid Application and Middleware

    This paper resents the introduction of Globus Toolkit 5. Latest version of Globus Tookit is version 5 (GT 5). Grid computing is the latest technology in 21st century. There are many tools to develop application in grid computing, GT5 is the one of the tool using which one can create...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Scenario Based Simulation Analysis and Performance Evaluation of Routing Protocol in MANET Using NS-2

    Mobile ad-hoc networks having no fixed Infrastructure and without any physical connections of mobile devices such as laptop etc. Due to mobility of nodes, interference, multipath propagation and path loss, MANET has no fixed topology. Hence, MANET has to need dynamic routing protocols for these networks to function properly for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    UWCAH: Universal Weighted Clustering Algorithm for Heterogeneous Nodes in MANET

    Node clustering has become an efficient way to organize a MANET into a hierarchy with a view to improve the efficiency of routing and system performance. So many clustering algorithms have been proposed assuming homogeneous nodes. Some algorithms have worked for MANETS with heterogeneous nodes. But these algorithms work for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)