International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 481-520 of 1011 results

  • White Papers // May 2013

    Present a New Middleware to Control and Management Database Distributed Environment

    Database systems and computer networks technology led to distributed database development. In this paper, a suitable and flexible middleware called CMDBMS is presented to control and manage database in distributed environment. In middleware the data are distributed entirely among the databases, and each database has its own database management system,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Multiprocessor Based Architecture for Controlled Switching of Circuit Breaker

    Circuit breaker is one of the most critical elements of power industry. Controlled switching of grid voltage and grid current is the best solution to prevent the high inrush current and over voltages. This paper describes the controlled switching of circuit breaker by using multi-processor based architecture. With this architecture...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Suitability of COFDM in 3G and Comparison with CDMA: A Technological Review

    This paper gives the effectiveness measures of OFDM as a modulation technique for wireless radio applications. OFDM is checked as a modulation technique for telephony communication system. A comparative study of COFDM a variant of OFDM is done with the CDMA technology for the same application. Various performance matrices like...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Analysis of Cell-Counting Based Attack Against Tor

    The Onion Router (TOR) allows to hide the users identity various software under this categories are available that allows online anonymity. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size cells (512B). In this paper, the authors are analyzing counting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Autonomous Encoding of Packets Against Jamming Attacks in Wireless Network

    In wireless network, the authors will not limit the boundaries of network because it makes vulnerable association among the users. This vulnerable network will be used for generation of denial of service attacks thus this permits the attackers to form electronic counter measures attacks in wireless network thus it's troublesome...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Session Passwords Using Grids and Colors for Web Applications and PDA

    Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    An Identity Based Information Retrieval System for MANET

    Mobile ad hoc networks have unique characteristics like rapid movement of node in infrastructure less network that's changes it's topology, hence security has become a prime concern for providing security while communication between mobile nodes MANETs. Problems such as in distributed authentication environment problems of generation, distribution and assignment of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Application of Microprocessors

    Microprocessors are applicable to a wide range of information processing tasks, ranging from general computing to real-time monitoring systems. The microprocessor facilitates new ways of communication and how to make use of the vast information available online and offline both at home and in workplace. Most electronic devices - including...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Securing Email Applications from Various Cyber Issues

    Information security and integrity are becoming more important as the authors use email for personal communication and business. As it is excessively used it is highly prone to cyber attacks, threats and malwares. The most common of these are masquerading, modification, and Phishing attacks. In order to provide security against...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Web Mining Using Cloud Computing

    In this paper, the author present the technology of cloud computing using web mining .Web mining include how to extract the useful information from the web and gain knowledge using data mining techniques. Here so many online resources are available i.e. web content mining and access through the web servers....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    A Survey on Association Rule Mining in Cloud Computing

    In this paper, the authors give a survey on data mining techniques in cloud computing. More specially speaking, they talk about one important and basic data mining technique called association rule mining, which is to detect all subset of items which frequently occur and the relationship between them. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Technological Comparision Between Cloud and Grid

    In this paper, the authors explain about the limelight the difference between cloud and grid computing according to their performance and also they focus on difference between them based on their functionality. The development of computer industry is promoted by the progress of distributed computing, parallel computing and grid computing,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Use of Web Mining in Network Security

    Web mining is basically knowledge discovery from the World Wide Web (WWW).This practical application of data mining helps to integrate the data gathered by the traditional data mining methodologies or data mining techniques as well as data gathered by the WWW. The term Web mining has been used in three...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    An Efficient Security Scheme for Wireless Sensor Networks

    In wireless sensor networks, sensor nodes are generally distributed in hostile environments so the security services such as confidentiality, authentication and integrity are very important. The basis of these security services is the key management. The majority of key managements use the random key pre-distribution mechanism based on the probability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Supporting Various Techniques to Optimize and Secure Application Performance in a Cloud Computing Security in a Effective Manner

    In recent years, internet plays a vital role in the authors' communication infrastructure and faces the challenges using cloud computing security. In this paper, they strive to frame the full space of cloud-computing security threads, attempting to individual concerns for every organization jobs from possible over-reactions. They suggest that few...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Exploring the Big Data Spectrum

    Today, enterprises are flooded with data - terabytes and petabytes of it. Exabytes, zettabytes and yottabytes are definitely on the way. This tsunami of data, as some experts call it, which is growing exponentially, at a very high velocity from different sources in diverse formats, is being termed as big...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    DIDS Using Fuzzy Logic

    Intrusion Detection System (IDS) technology is an important component in designing a secure environment. Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts produced by low-level intrusion detection systems using, firewalls, etc. belonging to a specific attack instance which has...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Online Data Storage Using Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Android-Broadcast Receiver

    Android is a comprehensive open source platform designed for mobile devices. it is a truly open platform that is separating hardware from software that runs on it. This allows for a much larger number of devices to run same applications and creates a much richer ecosystem for developers and consumers...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Energy Conservation in MANET Using Power Saving Protocol BECA/AFECA

    Mobile Ad Hoc NETwork (MANET) is a collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or fixed infrastructure. In MANET, each node acts both as a router and as a host even the topology of network may also change rapidly like routers, cell phone...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Combined RFID-Biometric Based MIS for Student Information

    RFID (Radio Frequency IDentifier) and Biometric now a days are one of the most popular technologies in use today. This paper focuses on creating a MIS (Management Information System) system of student using both RFID and biometric (face-detection) technology. With the increasing number of students managing the attendance manually becomes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    HTTP Botnet Detection Mechanism Using Network Behaviour Analysis

    Now-a-days it has been Observed that the Botnet attacks on the internet is increasing day by day. The authors have to find a corresponding solution for this attack otherwise a serious problem will be occur in future. They need to find an effective approach to detect and notify Botnet attacks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Cryptanalysis With a Symmetric Key Algorithm TORDES

    Today's cryptography is vastly more complex than its precursor. Unlike the innovative use of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has far-reaching military implications, has expanded its field, and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Wireless Sensor Network Cuts: A Survey

    This paper gives formatting guidelines for authors preparing papers for publication in the International Journal of Emerging Technology and Advanced Engineering The authors must follow the instructions given in the document for the papers to be published Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimal PMU Placement on Network Branches for Intentional Islanding to Prevent Blackouts

    Power grids, throughout the world, are operated as large interconnected networks to ensure reliability of supply in an economic way. The interconnected nature of power network makes it vulnerable and sometimes even a small disturbance in the grid may propagate and result in a blackout. Investigations into major blackouts of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Rateless Erasure Code Based Secure Storage in Cloud Computing

    Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers host their data on cloud servers and data consumers can access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimized Node Deployment Using Enhanced Particle Swarm Optimization for WSN

    Sensor nodes deployment is critical for Wireless Sensor Networks (WSNs). Current methods are apt to enlarge the coverage by achieving a nearly even deployment with similar density in the wireless sensor network. Virtual Force (VF) directed Enhanced Particle Swarm Optimization (EPSO) algorithm, which uses a combined objective function to achieve...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism

    Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Automatic Hybrid Detector for Spontaneous Detection of Malicious Nodes in MANET's

    MANET capabilities are expected to be an overall driving force for next-generation wireless functionalities. These multi-hop networks the burden of routing packets from source to destination. Each Node handles part of the management of the network. Fault detection is extremely difficult because of the distributed design. In this paper, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Implementation of Improved WPC for Secured Steganography on Ad-Hoc Networks

    In this paper, the authors aim on transferring the data in a more secured manner using WPC. Cryptography and Steganography techniques of encrypting the data and hiding the data are well known. In this paper, they use Wet Paper Codes (WPCs), which enable the sender to determine the selection channel...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Enhancing Security in Biometric System Using Blind Authentication Protocol

    Biometric authentication system are used prevalently for its template security, retract ability and privacy. The Authentication process is reinforced by biometric cryptosystem. The authors propose a demonstrable secure and blind biometric authentication protocol which discloses only identity and not any other information to both client and server. To reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Message Security Through Digital Signature Generation and Message Digest Algorithm

    It is common now a day to communicate through messages. The sending and receiving message with in a network is not more secure as the people data can be accessed by everyone within that network. In order to provide security to the data most commonly the authors are using the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Modified Cellular Message Encryption Algorithm

    The Cellular Message Encryption Algorithm (CMEA) has been designed by the TIA (Telecommunication Industry Association) to protect the control data of cellular phone communication. As cellular telephony industry has boomed, the need for security has increased: both for privacy and fraud prevention. Because all cellular communications are sent over a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Tappered Spiral Helix Antenna

    This paper presents the aspects related to the design and development of a tapered spiral helix antenna covering the frequency range 1.2-18GHz. It is a compact state-of-the-art circularly polarized antenna, which works over multi-octave frequency bandwidth (1.2-18 GHz).The antenna size has been reduced by 50 percent with respect to conventional...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Cloud Computing Security: Issues and Concerns

    Cloud Computing is gaining the attention of today's users and businesses. Network-based Cloud Computing is rapidly expanding as an alternative to conventional office-based computing. Cloud Computing provides suitable on-demand network access to a shared pool of computing resources. Several trends are opening up the era of Cloud Computing, which is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Green Solution for Cloud Computing with Load Balancing and Power Consumption Management

    Cloud computing a relatively recent term builds on decades of research in virtualization, distributed computing, utility computing, and networking, web and s/w services. The consequence of network based cloud computing model which is rapidly increasing in delivering computing as a utility to users worldwide is that cloud data centers have...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    An Efficient Wormhole Prevention in MANET Through Digital Signature

    Wireless networks are gaining popularity to its peak nowadays, the desire to be connected anytime and anywhere has led to the development of wireless network, opening new vista of research in pervasive and ubiquitous computing. Mobile Ad hoc NETwork (MANET) has distributed mobile wireless nodes, which do not have pre-determine...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Multilayered Password Security for Banking Application

    The world in which the people are working and surviving their day to day life is going more and more close to Computers. Today if anyone think not to use computers at all, then it will be almost impossible to work. Mostly, today all the sectors use computers, where their...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Intelligent Wireless Mesh Network

    The drawbacks of the previous system is that if the people send the data from one location to another in mesh network due to the link failure data will be loosed. Now, they overcome these drawbacks through intelligent wireless mesh network by using ARS (autonomous reconfiguration system).In this system, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    A Survey of Wireless Sensor Network

    The advancement in last decade in electronics & communication, computer science and information technology domain has resulted in the new computing and communication era, known as Wireless Sensor Networks. In the past the wired sensors were implemented in limited applications in industries. However, wireless implementation makes the wide deployment of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    An Intelligent Algorithm for Software Effort Estimation

    The most significant activity in software development is to develop projects within confined time and budget. As accuracy plays a vital role for software system. Prediction of effort estimation is one of the critical tasks required for developing software. In this paper, the authors perform the performance study of fuzzy...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    GSM Based Automatic Meter Reading System Using ARM Controller

    Now a days the automation in every field is becoming necessary. The service provider for energy still uses conventional methods for getting the energy consumed by individual customer. The proposed system automatically reads the energy consumed and sends it to the service provider using the existing Short Messaging Services (SMS)....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Enhanced Wireless Personal Area Network Based Real Time Motion (Human) Data Collection for Advanced Control Room in Power Plants Using ZigBee Transceiver Module

    In many applications a communication link between two devices becomes essential. This communication can be wired or wireless. If two devices are close to each other (like a microprocessor control unit and a Memory) then wired link is preferred. However in many applications two devices are reasonably far apart. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Survey on Intrusion Detection over the Cloud Computing Environment

    Cloud computing is one of the major demanding topic in area of computer science or information technologies. It is depend on multiple other computing research areas virtualization, grid computing. Cloud computing it is the internet based computing which means that every type of service available to the user from the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    FPGA Implementation of Earth Mover's Distance

    Image processing has become a vibrant area of research over the last few years and distance measurement between two images is needed in many applications. Earth Mover's Distance (EMD) is the algorithm for measuring similarity between images. However, application of the current software implementations of the EMD algorithm to real...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Adaptive Genetic Algorithm for Efficient Resource Management in Cloud Computing

    Cloud is one of the emerging technologies in computer industry. Several companies migrate to this technology due to reduction in maintenance cost. Several organizations provide cloud service such as SaaS, IaaS, and PaaS. Different organization provides same service with different service charges and waiting time. So customers can select services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Fusion of Geometrical and Statistical Techniques for Human Ear Recognition

    Biometric systems have been implemented on numerous public facilities that are able to enhance the security system. Ear is one of emerging biometric and proved to have a great potential for identifying a person. Research of ear recognition and its application is a new subject in the field of biometrics...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    An Analytical and Comparative Study of Various Data Preprocessing Method in Data Mining

    Data pre-processing is a necessary and critical step of the data mining process or knowledge discovery in databases. Base of data pre-processing is a preparing data as form of accurate, reliable and qualities data. Data preprocessing not only use for data mining but it also use of constructing on data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review on Improving and Enhancing Security Using Hi-Pass

    Now-a-days, user authentication has become a tough challenge to all the web services like banking sector, e-commerce sites etc. To facilitate these same requirements, the authors are going to implement Hi-pass system which is a combination of session password & a random key which is validated with the help of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Cross-Layer Video Transmission Over IEEE 802.11 WLANs Using Cognitive Rate Adaptation and Adaptive Encoding

    Rate adaptation is critical to the system performance of wireless networks. In spite of rate adaptation being a MAC layer parameter, potential decisions can be made from the rate of transmission being chosen by the layer. On such decision is the encoding rate of the video at the application layer....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Ethernet Based, Industrial Furnace Control and Data Acquisition

    Developments in technology and the marketplace now make it possible for embedded systems to communicate in local Ethernet networks as well as on the internet. Network communications can make an embedded system more powerful and easier to monitor and control. Ethernet solves the problem of remote communication with the embedded...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Enhanced Security in Online Database System

    In this era due to unbelievable development in internet, various online attacks have been increased. From all such attacks most popular attack is phishing. This attack is done for extracting confidential information such as banking information, passwords from unsuspecting victims for fraud purposes. Confidential data can't be directly uploaded on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Survey of Data Compression Techniques in Sensor Network

    In this paper, a survey is done on various data compression techniques in wireless sensor network. Data compression seeks to reduce the number of bits used to store or transmit information. A critical issue of power saving in wireless sensor networks arises because sensor nodes are powered by batteries which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Survey of Various Load Balancing Techniques and Enhanced Load Balancing Approach in Cloud Computing

    The cloud computing data centre has abundant hosts as well as solicitation requests. A cloud computing platform that manoeuvre behind the corporate firewall and within control of an organization IT department. Cloud deals numerous aids such as self-service, agility, efficiency, security, better resource utilization and faster time to market. To...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Game Development Using C++

    Computer games have been a preference to most of computer users. Now-a-days, it does not only focus on computer that the user normally use in their office or house, but handheld devices such as hand-phone and Personal Digital Assistant (PDA) have also been a target platform for users to play...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Clustering of Datasets by using Centroid Based Method

    The integrated data mining processing technique to find appropriate initial centroids and vectors in data clustering process by k-means and c-means algorithm. The processes include data cleansing, preprocessing, and finding features relation with Apriori algorithm to get appropriate features. Here, the authors used centriod based model that represents the processes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Review Paper on Crusoe Processor

    Mobile computing has been the buzzword for quite a long time. Mobile computing devices such as laptop, desktop computers etc are very important in day to day life and they require microprocessor. Microprocessor is the heart of those devices. desktop computer have very different command on processor that's why they...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Understanding Web personalization with Web Usage Mining and its Application: Recommender System

    Web is becoming an enormous storehouse of information and it will keep growing with improvements in internet technologies. But the human capability to read, access and understand content does not increase with that pace. Hence it becomes difficult to website owners to provide appropriate information to the users. This led...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Trends in Contemporary Cryptanalysis

    Securing the information and access to this information has been a prime concern ever since the existence of data. Cryptographic system encrypts this data but cryptanalysis techniques are used to test and break these encryption techniques. In this paper, the authors will see recent developments in the field of encryption...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    An Improved Method for Frequent Itemset Mining

    Discovering knowledge in huge amounts of data is called data mining. Frequent itemset mining is an important step in association rule mining. Several algorithms have been proposed for efficient frequent itemset mining in transactional database. The authors present an improved approach to mine frequent itemset in transactional database. The algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Evolution of Data Hiding By Neural Network and Retrieval or Encrypted Image, Text, Audio and Video Files

    Information hiding is a method of hiding secret messages into a cover-media such that an intended observer will not be aware of the existence of hidden messages. In such applications various file formats are used as cover-object which contains confidential data. As the new research field the techniques introduces Artificial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Web Services Based SQL Injection Detection and Prevention System for Web Applications

    Web applications form an integral part of the people day-to-day life. The number of attacks on websites and the compromise of many individuals secure data are increasing at an alarming rate. Hence, providing increased amount of security for the users and their data becomes essential. Most important vulnerability as described...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Smartphone Application for Ticket Reservation and Validation Using Mobile Network

    In this paper, the authors deal with the android application for ticket reservation and validation using mobile tower network. One of the major challenges in the current ticketing facility is buying ticket standing in the queue. Their application provides the facility for buying the tickets online. Their ticket can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Study on Modern Cryptography and Their Security Issues

    Cryptography has evolved as one of the core techniques in providing data security in computer systems and various communications methods. Exciting developments in the field of cryptography have been observed during the last few decades in the form of various encryption algorithms and protocols etc. Any system that involves cryptography...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Survey on a Highly Secured Reversible Data Hiding: Principles, Techniques and Recent Studies

    Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and Steganography etc. One of these is data-hiding, using this concept, the authors can provide security, authentication to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Analysis and Detection of Altered Human Fingerprints Using Minutiae Technique

    Now-a-days, biometric security is popularly used for unique authentication. Biometric authentication system provides more benefits than traditional id and passwords. Fingerprints of a person are unique throughout the users' life. Fingerprint biometric system is cheaper as compared to another biometric such as retina, DNA, face etc. altered fingerprint detection was...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Multi Dimensional Hand Geometry Based Biometric Verification and Recognition System

    Two-Dimensional (2-D) hand-geometry features carry limited discriminatory information and therefore yield moderate performance when utilized for personal identification. This paper focuses on developing an efficient human identification and verification system using multi dimensional hand based biometrics for secured access control. This paper investigates a new approach to achieve performance improvement...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Credit Card Fraud Detection Using Hidden Markov Model

    As number of credit card users both online and physical users' increases daily and at the same time the credit card fraud ratio is also increases. In this paper, the authors are showing how they can use HMM to detect an online as well as physical credit card fraud. Also...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Iris Recognition Using Independent Component Analysis

    The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition rate, and non-infringing etc. The iris recognition...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Study of Various Normal forms and Functional Dependency

    Normalization and functional dependency are most fundamental part in relational database. The normalization rules are designed to prevent update anomalies and data inconsistencies. The normal form defines in relation database theory represent the guidelines for record design. The guidelines corresponding to first through fifth normal form are presented. Normalization process...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Fuzzy Logic Based Trained Fault Locating Mechanism in Power Distribution Network

    In this paper a noble method of fault locating in a radial power distribution system is discussed. Fuzzy system will ease the calculation involved. The history associated with fault occurred in power system can be effectively used as a strong database. This database will act as the trainer to the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Log Agent for Knowledge Management Based on Multi Agent System

    Multi-Agent System (MAS) is one of the most exciting and the fastest growing domains in agent oriented technology which deals with the different area of modeling of autonomous decision making entities and Knowledge Management (KM). Agents can be beneficial in the development of Knowledge management. Knowledge are managed throughout different...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2014

    Trusted Security Model for User's Data for Public Cloud Using RSA Encryption

    Now-a-days, cloud computing concepts are new paradigm for researchers and software industry. Cloud computing providing people the way to share distributed resources and services that belong to different organizations or sites. By providing distributed resources via the network in the open (public) environment, having different types of issues, securing user's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Storage Techniques in Cloud Computing

    From the past few years, there has been a rapid progress in cloud, with the increasing numbers of companies resorting number of companies resorting to use resources in the cloud, there is a necessity for protecting the data of various users using centralized resource. Cloud storage services avoid the cost...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    PC Based Intruder Detection & Alert System

    In the current world, security concerns have increased alarmingly since thieves and robbers are exploiting the rapid technical advancements to a great extent. Sophisticated surveillance techniques are the need of the hour. Video surveillance and monitoring are the current technologies that come to the authors' rescue. These techniques can help...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Detailed Comprehensive Survey Paper on Techniques for Face Recognition

    Now-a-day's Face detection approach is the best technique to find the identity of any face image. It is a 2-D problem that is used for detection. The information in a face can be efficiently analyzed among the factors like identity, gender, expression, age, race and pose. Generally, face detection technique...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    An Overview of Clustering Analysis Techniques Used in Data Mining

    Clustering is the division of data into groups containing similar objects. It is used in fields such as pattern recognition, and machine learning. Searching for clusters involves unsupervised learning. Partitioning methods work by dividing a group of n elements into k clusters such that k is less than or equal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Techniques for Third Party Auditor in Cloud Computing

    The authors present a error identify algorithm for using the MHealth Trust computing - Experiments show that their approaches has the following advantage over existing method: cloud services include no upfront investment on infrastructure and transferring responsibility of maintenance, backups and license management of cloud providers, an Optimization problem of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Delay Tolerant Network

    There is no complete network from source to destination in intermediately connected mobile networks which is also called as sparse wireless networks. Those types of networks are categorized in delay tolerant networks. Wildlife tracking sensor networks, military networks, interplanetary networks and an exotic media networks are those networks that follow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters

    Due to the increasing demand of various internet applications such as Voice Over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)