International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 601-640 of 848 results

  • White Papers // Sep 2012

    Planning and Operation of Distributed Generation in Distribution Networks

    Optimal siting and sizing of Distributed Generation (DG) and other power compensating devices in distribution networks are the two crucial and also very important factors to get maximum benefits such as technical, economical, and environmental both for the utility and customers, especially, in sites where the central generation is impracticable...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Implementing Radio Frequency Identification (RFID) Technology Into Supply Chain of Small-to-Medium Manufacturing Factories

    Technology has helped manufacturers to be successful and more competitive in the global market by improving their customers' satisfaction level and providing more reasonable prices compared to their competitors. RFID is a new technology that is used by different manufacturers to achieve their goals including Supply Chain Management (SCM) improvement....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    A Memory Optimized Low Density Parity Check (LDPC) Decoder for Chinese Digital Terrestrial Television Broadcasting

    This paper proposes an LDPC decoder of Forward Error Correction (FEC), for Chinese digital TV, based on Single scan min sum decoder algorithm. The LDPC FEC encoding for Chinese DTV broadcasting includes three kinds of code rates with a code word block size of 7493. The simulated LDPC decoder for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Software Testing Techniques Adopted in Corporate Sectors: A Precise Study

    Software testing forms an integral part of software development. It is an activity carried out to evaluate the performance of a program and it ensures that it meets the desired result. There are several techniques of software testing but an efficient approach to test software is basically a process of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Diversity Analysis in MIMO Systems Using OSTBC(Orthogonal Space Time Block Codes)

    Communication systems become one of the modern technology and which demands for the development of speed reliable communication links with Multiple Input Multiple Output systems. MIMO is one of the prime technologies that can achieve the goal of 4G. As MIMO systems utilizes multiple no of antennas both at the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    UML for UNIX

    Many computer science educators have no formal training in education. Their work simply gets grounded in the technology. For any teacher or student, it is very hard to find out the sources of difficulty in learning particular concept. According to the Sensory Stimulation theory proposed by Laird (1985), effective learning...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Algorithm for the Selection of Target Base Station During Handover in Mobile Wimax 802.16e

    Worldwide Interoperability for Microwave Access (WiMAX) specified by IEEE 802.16 supports Wireless Metropolitan Area Network (WMAN). In the environment of WMAN the mobile client has high mobility as it moves from the coverage area of Serving Base Station (SBS) to Target Base Station (TBS). Handoff is one of the Quality...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Cross Layer Design for P2P Overlay Network Over MANET

    Peer-To-Peer (p2p) network is an alternative of client/server system for sharing resources, e.g. files. P2P network is a robust, distributed and fault tolerant architecture. The authors consider the scenario of p2p network over MANET where all nodes are the members of p2p network and one of the node acts as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    A Reciprocal U Shaped Fractal Ultra Wide Band Patch Antenna

    A reciprocal U Shaped fractal Ultra Wide Band Patch hexagonal antenna with square shape ground plane composed by coaxial-fed microstrip antenna is proposed in this paper. This antenna can be use in ultra-wideband microwave systems applied for WLAN. The antenna is designed to operate across the ultra-wideband frequency band in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    An Architecture for Realizing Transmission for 2?2 MIMO Channel

    The idea of using multiple receive and multiple transmit antennas has emerged as one of the most significant technical breakthroughs in modern wireless communications. Theoretical studies and initial prototyping of these MIMO systems have shown order of magnitude spectral efficiency improvements in communications. As a result, MIMO is considered a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Encrypting Processes and Public Key Infrastructure in Regard to Data Safety and Security in Database Systems

    The people can distinguish three basic properties of information security, which should be implemented in nearly all IT systems: confidentiality, integrity and availability. Confidentiality means to protect the information against unauthorized access. Integrity is mentioned as a warranty of authenticity of information; it is also connected with protection against unauthorized...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Implementation of Web Access Pattern Discovery

    In this era of technology about 70% of people are use internet or web services and moreover it they consume and generate more data in a fraction of small time. This data is helpful to discover new dimensions of knowledge. In this paper, the authors include the implementation of web...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Crypto Cloud Computing the C3 model

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Skin Tone Based Face Recognition and Training Using Network Network

    Within today's environment of increased importance of security and organization, identification, and authentication methods have developed into a key technology. Face recognition is an important means of identifying facial expression, gender. Human faces provides important visual information for gender classification from face perception. Face can be recognized by many methods...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    A Study of Mining Web Intelligent Information

    Finding only relevant information on the Web is one of the hardest challenges faced by researchers. Two reasons are the huge size of the Web and the diversity of available heterogeneous information. Current search engines suffer from low precision rates because pages are not semantically defined and users are allowed...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Capacity Enhancement of WiMAX System Using Adaptive Modulation and Code Rate

    Future wireless networks such as 4G system will support high data rate and multimedia services including facsimile, video teleconferencing, file transfer by consuming less bandwidth such as high-speed Internet accesses .The IEEE WiMAX/802.16 is a promising technology for broadband Wireless Metropolitan Areas Networks (WMANs) as it can provide high throughput...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    IDS : Intrusion Detection System the Survey of Information Security

    With the increased use of computerized/online transactions it is very much of the importance to secure the information from intruders. Intrusion detection is the process of monitoring the activities or events occurring in the computer system or network and analyzing them to find out suspicious events intruding the system or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Implementation of Zero Knowledge Protocol in Wireless Sensor Network for Identification of Various Attacks

    Wireless Sensor Networks (WSN) is excellent technology which provide great potential for situations like battlefields and commercial applications such as building, traffic survey, monitoring environments smart homes and many more scenarios. Security is the most important challenge in wireless sensor networks. Sensor networks dose not haves any user control for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    An Approach of Quality Assurance in Web Application

    This paper provides an overview of quality assurance process for Web Applications. Producing reliable and robust software has become one of the most important software development concerns in recent years and testing is a process by which software quality can be assured through the collection of information about software. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    ARM Based Mobile Phone-Embedded Real-Time Remote Video Surveillance System With Network Camera

    Monitoring facilities will be necessary and useful for the people daily life, because it is very important for them to think about their security. This work developed an remote video surveillance system, which is organized with an integrated web server, network cameras, remote control devices and clients which connected to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Noise Estimation of Speech Signal Using Adaptive Sub -Spectral System

    In the current environment of the modern world, telecommunication has been highly integrated into the people everyday life through their vivid use in speech communication, speech and speaker recognition, aid devices for the hearing impaired and numerous other applications. Speech is a fundamental means of human communication. In the last...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Improved Comparative Analysis of Mobile Ad-Hoc Network

    This paper presents the performance analysis of different routing protocols of a Mobile Ad hoc NETwork (MANET) including cellular wireless nodes. The connections between these cellular nodes have been conducted without any typical control. MANET is a self-organized and self configurable program where cellular nodes are modified randomly. The cellular...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Trust Based Routing Algorithms for Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) comprises of a set of nodes connected by wireless links. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks. Routing in MANETs is a challenging task due to dynamic topology and error prone shared environment....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Content Based Fingerprinting for Video Copyright Detection System

    Security of a fingerprinting system is important for certain applications such as copyright protections, for this reason secure version of the fingerprinting system for video piracy detection is presented. The proposed system relies on a fingerprint extraction algorithm followed by a fast approximate search algorithm for video piracy detection. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Optimization of Handover Performance in Mobile WiMax 802.16E

    For Broadband wireless communication Wimax is the most promising technology to deliver high data rates over large areas to a large number of users. It allow the users to roam over the network. The Wimax standard specify the handover policy. The handover is initiated and optimized by Mobile Station (MS),...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Experimental Analysis of Wavelength Assignment Strategies in Optical Networks

    In survivable optical networks, wavelength assignment is a major concern than assigning routes to the light path requests. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelengths that leads to blocking probability for any connection request. This paper analyzes the performance of the wavelength assignment strategies to reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Cloud Computing Security Issues, Challenges and Solution

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Behavioral Simulation of Delta-Sigma Fractional-N PLL for WiMAX Applications

    Frequency synthesizer's behavior affects the wireless communication system. The quality of the frequency synthesizer is highly dependent on the type of Phase Locked-Loop (PLL) used for the system. It is crucial for the designers determine the correct type of PLL to achieve high noise performance, high switching speed, and high...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Porting Android to Arm for Wireless Data Encryption and Decryption

    This paper presents the design and development of wireless encryption and decryption system using android operating system which is ported to the TI's Beagle Board-xM. Beagle Board-xM has DM3730 chip which internally containing ARM Cortex-A8 processor. By using keypad, the user can compose a text and submit the message using...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Intrusion Detection System Using Shadow Honeypot

    The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper, the authors proposed a shadow honeypot based intrusion detection...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Secure Multicasting in Ad-Hoc Network

    A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. In each communication operation the authors use multicasting technique. In multicasting technique signified for group communication that supports...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Study on Mining Emotions From Literature: A Method Using Computers to Extract Opinionated Knowledge Nuggets

    Knowledge discovery from text has emerged as a possible solution for the current information explosion. This refers to the process of extracting non-trivial previously unknown patterns from unstructured text. With the vast amount of on line resources on web and popularity of fast and rich resources lead to the requirement...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Alleviation of Downstream Impediments of a Passive Optical Network Through Implementation of a Distributed Architecture

    In this paper, the authors examine the downstream impediments of centralized Ethernet passive optical networks supporting LAN emulation [inter-Optical Network Units communication (ONU)]. The available downstream bandwidth in the centralized scheme is reduced due to LAN emulation and upstream bandwidth allocation functions. The reduction in available downstream bandwidth results in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Adoption of Six Sigma Concept in Process Improvements Methodology: A Case Study

    This paper is presenting a developed process improvement methodology that based on the Six Sigma concept. The process improvement methodology applied in the backend assembly process department of a case study company. By adopting process improvement model into the case study, line improvements can be achieved in terms of overall...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security

    A new encryption algorithm based on block cipher generating mechanism is proposed herewith to analyze the time-consumed by the complete process (process starting from sender encryption to receiver decryption) of the selected cryptographic algorithms with proposed algorithm. In this algorithm for evaluation, results calculation using Different Plaintexts in the Same...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Data Security in Cloud Computing Using Linear Programming

    Cloud computing provides robust design with reduced cost representation. Cloud computing provides good computational power generation process. Present cloud contains less computational power are not handle large load of distribution process. Each and every resources are provides the file of content pay per use manner. Those all the cloud data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    A Novel Design of Broadband Patch Antenna With Various Slot Configurations for GSM/PCS/UMTS Mobile Cellular Phone

    The authors present a novel design of a compact, multi frequency, light weight, low cost patch antenna with versatile slot configurations for optimization and normalisation in GSM/PCS/UMTS/WLAN bands. The simulation and design analysis were performed using HFSS software. Antenna parameters were evaluated for different slot configurations and best configuration was...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Fire Protection System Using RFID

    The 1980s brought about the first widespread commercial RFID systems. The systems were simple ones. The 1990s were the significant in that RFID began to enter the main stream of business and technology. By the middle of the decade, RFID toll systems could operate at highway speed, meaning drivers could...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    A X-Layer Protocol is Used in Wireless Sensor Networks to Became a Efficient Wireless Communication

    A CROSS Layer Protocol (XLP) is introduced, which achieves congestion control, routing and medium access control in a cross-layer fashion. The design principle of XLP is based on the cross-layer concept of initiative determination, which enables receiver-based contention initiative-based forwarding, local congestion control and distributed duty cycle operation to realize...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    An Authentication Mechanism Based on Client-Server Architecture for Accessing Cloud Computing

    Cloud Computing is going to be a big change of this decade; it has drastically altered everyone's perception of infrastructure architecture, software delivery and development model, from a security perspective a number of unchartered risk and challenges have been introduced from this relocation to the Clouds, deteriorating much of the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    4G Wireless Networks Challenges and Benefits

    This 4G or Fourth generation is that the future technology for mobile and wireless communications. Close to 4G deployments are expected to be round the year 2010 to 2015. Evolution of wireless access technologies is about to reach its Fourth Generation (4G). 4G systems will be fully IP-based wireless Internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    A Novel Symmetric Key Encryption Algorithm Based on RC5 in Wireless Sensor Network

    In recent years, there has been growing interest in wireless sensor network due to its wide range of potential applications. They are used in military area, industrial process monitoring and control, environment and habitat monitoring, health care. The sensor node has limited computational power and memory size affecting the amount...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    A Survey on Association Rule Mining in Cloud Computing

    In this paper, the authors give a survey on data mining techniques in cloud computing. More specially speaking, they talk about one important and basic data mining technique called association rule mining, which is to detect all subset of items which frequently occur and the relationship between them. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Resource Provisioning Methodologies: An Approach of Producer and Consumer Favorable in Cloud Environment

    Cloud computing is an emerging technology, having ability to renovate a large part of computing environments by providing resources as services. Cloud environment is composed of a set of resource providers and consumer. Cloud offers two ways of resources provision to the consumers. Firstly resource on-demand and secondly resource on-reservation....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    A Review on Various Resource Allocation Strategies in Cloud Computing

    The computational world is becoming very large and complex. Cloud computing has emerged as a new paradigm of computing and also has gained attention from both academic and business community. Its utility-based usage model allows users to pay per use, similar to other public utility such as electricity, with relatively...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Two Level Hierarchical Model of Load Balancing in Cloud

    A cloud computing is conceptually a distributed system where resources will be computing resources distributed through the network (cloud) and services pooled together and is provided to the users on pay-as-needed basis. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Technological Comparision Between Cloud and Grid

    In this paper, the authors explain about the limelight the difference between cloud and grid computing according to their performance and also they focus on difference between them based on their functionality. The development of computer industry is promoted by the progress of distributed computing, parallel computing and grid computing,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Application of Big Data in Data Mining

    Big data is massive volume of both structured and unstructured data from various sources such as social data, machine generated data, traditional enterprise which is so large that it is difficult to process with traditional database and software techniques. Big Data is data whose scale, diversity, and complexity require new...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Advanced Autherization System by Using 3D and CCP

    Current authorization systems suffer from many weaknesses. Policies are commonly used based on passwords and username; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Present a New Middleware to Control and Management Database Distributed Environment

    Database systems and computer networks technology led to distributed database development. In this paper, a suitable and flexible middleware called CMDBMS is presented to control and manage database in distributed environment. In middleware the data are distributed entirely among the databases, and each database has its own database management system,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Web Services Security Standards

    Web Services are the way of machine to machine communication over the network to perform specific operation e.g. transaction, information exchange, sale service etc. So web service is having protocols and standards that are used to exchange data between applications or systems. Web Services use SOAP protocol to exchange data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Use of Web Mining in Network Security

    Web mining is basically knowledge discovery from the World Wide Web (WWW).This practical application of data mining helps to integrate the data gathered by the traditional data mining methodologies or data mining techniques as well as data gathered by the WWW. The term Web mining has been used in three...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Advanced Two-Tier Android Mobile Security Using Cloud

    One of the newer operating system for smart phone is android which is gaining huge popularity. Advancement in computing speed, memory and hardware had lead to development of new applications. These applications make life more comfortable and advanced for the users. Some of these applications often deal with sensitive and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Study of Security Issues & Analysis of Risks for Mobile Agents Using SAB

    In mobile agent system where security is major issue to safe transfer the data by secure method. Mobile agents have autonomous software entity when a mobile agent works in the host environment due to security problem raises during functioning, for the high security it resume its execution in another host...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Simple and Secure Key Distribution in Grid Computing

    Grid computing is an emerging technology that provides seamless access to computing power and data storage capacity distributed over the globe for complex systems with large-scale resource sharing and multi-institutional collaboration. The internet is not security-oriented by design; there exist various attacks such as masquerading, replaying, modification, and denial of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    An Efficient Security Scheme for Wireless Sensor Networks

    In wireless sensor networks, sensor nodes are generally distributed in hostile environments so the security services such as confidentiality, authentication and integrity are very important. The basis of these security services is the key management. The majority of key managements use the random key pre-distribution mechanism based on the probability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Novel Approach for Secure Communication of Digital Signature Using On-Demand Multipath Routing for Enhancing Network Security in Wireless Mobile Ad Hoc Networks

    With the advances of wireless communication technologies, small-size and high-performance computing and communication devices like laptops and personal digital assistants are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. This interest has led to two types of wireless...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Concise Evaluation of Issues and Challenges in MANET Security

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Multi Cloud Architecture to Provide Data Security And Integrity

    Cloud servers are being used to store data and application but its security is a major issue in current context. To solve the data security problems in public environment the authors propose an effective model for security and integrity of data stored in a cloud, through data segmentation followed by...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    MANETs Using Advance DSR Algorithm and Improve the Secure Transmission

    In wireless communications the traffic across a Mobile Ad-hoc NETwork (MANET) can be highly vulnerable to security threats. The mobile ad hoc networks are more prone to suffer from the malicious behaviors than the traditional wired networks. Therefore, it becomes very much necessary to pay more attention to the security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Implementation of a Secure and High Speed Cloud Interface for Cell Phone

    In mobile cloud computing the authors are increasing speed and security which is a major concern area for this research work as day by day multimedia work load increasing on small smart devices and cloud computing should be able to full fill all user requirement on these small devices where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    SPARSH Data Security in Cloud

    Today's scenario, the transfer of data through the cloud without providing the security to the data or information is a major problem. In some of the case, data gets transfer through the cloud with security and the security is provided by using username and password .But password is not the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Secure Intelligent Transportation System Protocol for VANET Using SMAP

    A Vehicular Ad-hoc NETwork (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to receive message. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Supporting Various Techniques to Optimize and Secure Application Performance in a Cloud Computing Security in a Effective Manner

    In recent years, internet plays a vital role in the authors' communication infrastructure and faces the challenges using cloud computing security. In this paper, they strive to frame the full space of cloud-computing security threads, attempting to individual concerns for every organization jobs from possible over-reactions. They suggest that few...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Survey on Intrusion Detection over the Cloud Computing Environment

    Cloud computing is one of the major demanding topic in area of computer science or information technologies. It is depend on multiple other computing research areas virtualization, grid computing. Cloud computing it is the internet based computing which means that every type of service available to the user from the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    FPGA Implementation of Earth Mover's Distance

    Image processing has become a vibrant area of research over the last few years and distance measurement between two images is needed in many applications. Earth Mover's Distance (EMD) is the algorithm for measuring similarity between images. However, application of the current software implementations of the EMD algorithm to real...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Threats of Botnet to Internet Security and Respective Defense Strategies

    Botnets are one of the most dangerous threats to internet security. The problem of Botnet is global in nature. A botnet is a network of computers infected with a malicious program that allows cybercriminals to control the infected machines remotely without the user's knowledge. Their target is to steal valuable...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Clustering of Web Users Using ART1 NN Based Clustering Approach With a Complete Preprocessing Methodology

    In this paper, a complete preprocessing methodology for discovering patterns in web usage mining process to improve the quality of data by reducing the quantity of data has been proposed. A dynamic ART1 neural network clustering algorithm to group users according to their web access patterns with its neat architecture...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Dynamic Content Management System for Collaborative Testing Of Web Services

    Software testers are confronted with great challenges in testing WS. They must meet a wide range of test requirements. They must deal with the diversity of implementation techniques used by the other services. An automated testing technique must be developed to be capable of testing on-the-flynonintrusively and nondisruptively. The ontology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Agile Data Collection Tool for Computing Agility

    To deliver any working software at faster rate is the requirement of today's software industry. Thus, agile methods are emerging as most promising software development processes for the organizations. These methods ensure better customer collaboration, simplicity, changes at any stage with least emphasis on documentation. In this paper, the authors...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Kernel Fisher Analysis Method for Face Recognition

    Face recognition is a challenging task in computer vision and pattern recognition. This paper deals with the correspondence presents color and frequency features based face recognition. The CFF method, which applies an Enhanced Fisher Model (EFM), extracts the complementary frequency features in a new hybrid color space for improving face...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    An Overview of Classification Algorithms for Imbalanced Datasets

    Unbalanced data set, a problem often found in real world application, can cause seriously negative effect on classification performance of machine learning algorithms. There have been many attempts at dealing with classification of unbalanced data sets. In this paper, the authors present a brief review of existing solutions to the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Modeling the Parametric Construction Project Cost Estimate Using Fuzzy Logic

    In this paper, the authors aim to model to predict the parametric cost estimation in construction building projects in Gaza Strip using fuzzy logic. The building factors which effect the parametric cost estimation were surveyed. A questionnaire survey and relative index ranking technique were used to indicate the most five...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Investigating TCP/IP, HTTP, ARP, ICMP Packets Using Wireshark

    The effect of increasing changes in the network led to threats and security issues that has made monitoring and analysis a challenging task. A good understanding of network, type of network traffic is the good way of solving problems on the network like congestion and bandwidth. In this paper architecture...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Review on Automatic Annotation Search from Web Database

    The internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexible Information Extraction (IE) systems that transform the web pages into program-friendly structures such as a relational database...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Privacy and Security on Cloud Data Storage Using Hybrid Encryption Technique

    In present scenario cloud network is a boon in network technology. It is providing number of services which are very difficult to summarize because each and everything on cloud is completely dependent on virtualization. Microsoft 2012, window azure, IBM...etc are few companies which are providing these services in a nominal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey on Efficient Incremental Algorithm for Mining High Utility Itemsets in Distributed and Dynamic Database

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. It can be defined as the activity that extracts information contained in very large database. That information can be used to increase the revenue or cut costs. Association Rule Mining (ARM) is finding...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An RFID Mutual Authentication Protocol Using ECIES

    Security of data is a major issue in RFID environment as RFID is a wireless radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey of Sensitive Information Hiding Techniques

    In this paper the authors gave an overview of the new and rapidly emerging research area of privacy preserving data mining. Privacy preserving in data mining has been a heart favorite topic of researchers from many years. Every organization contains sensitive data & such data is needed to be protected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Reducing HTTP Collapse with Usage of Pattern Methods

    Security is the major concern in today's scenario a vigorous security mechanism is needed to secure the network from unwanted traffic. There are lots of technologies developed to provide a se currently one of them is by utilizing \"Signature-based\" detection can't bare stressed traffic, where marketing value is incrementing. Signature...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)