International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 41-80 of 755 results

  • White Papers // Apr 2014

    Design and simulation of 16 Bit UART Serial Communication Module Based on VHDL

    In this paper the authors describe the design of UART (Universal Asynchronous Receiver Transmitter) based on VHDL. As UART is consider as a low speed, low cost data exchange between computer and peripherals. To overcome the problem of low speed data transmission, a 16 bit UART is proposed in this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Smart Search Engine for User Query with Instant Backup Support

    Now-a-days it is very difficult to get correct & required results during search through web crawlers i.e. when the users search for particular keyword using existing web search engine, it will retrieves the whole information regarding searched keywords along with some other related information matching to searched keyword. For example...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    TRApriori Classification Based Algorithm by Fuzzy Techniques to Reduced Time Complexity

    The authors' simple classification technique on this approach is also able to remove the unwanted data sets that are not useful for making the decision system. They can also combined the fuzzy techniques, TRA-priori Algorithm and classification technique to provide the close output. Their classification based fuzzy mining association algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Data Mining Techniques in Parallel and Distributed Environment- A Comprehensive Survey

    Distributed sources of voluminous data have raised the need of distributed data mining. Conventional data mining techniques works well on structured data which is clean, pre-processed and properly arranged either in the form of structured files, databases or data warehouse. These techniques are based upon centralized data store however they...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Role of Cloud Computing in Business Intelligence: A Review

    Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers that are connected through a real-time communication network. The cloud also focuses on maximizing the effectiveness of the distributed resources. Cloud computing has become a prominent...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Taxonomy on Cloud Computing

    Cloud computing premise is very similar in that it provides a virtual computing environment that's dynamically allocated to meet user needs. From a technical perspective, cloud computing includes Service Oriented Architecture (SOA) and virtual applications of both hardware and software. In this new world of computing, some have conjectured that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Pattern Mining Techniques of Data Mining

    Frequent patterns are patterns that appear in a data set frequently. This method searches for recurring relationship in a given data set. Several techniques have been proposed to improve the performance of frequent pattern mining algorithms. This paper presents revision of different frequent mining techniques including Apriori based algorithms, association...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Preservation of Privacy for Multiparty Computation System with Homomorphic Encryption

    Data mining is the task of discovering significant patterns/rules/results from a set of large amount of data stored in databases, data warehouse or in other information repositories. Even though the focus on data-mining technology has been on the discovery of general patterns some data-mining applications may require to access individual's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

    Present scenario suggests many audio files are needed to be transmitted over internet for various important purposes. Earlier cryptographic schemes for secret sharing lead to high computational complexity during both secret sharing and secret reconstruction phase. Today, various cryptographic methods for secret sharing are there to protect secret data but...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Hiding in Motion Vectors of Compressed Video

    In this paper the authors aim to explain the data hiding concept in motion vector of compressed video. In this data hiding in motion vector is done by stenography technique, data is compressed in different frames of video. The process starts with mailing system such as sending and receiving secret...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    (Mcicpl Protocol): Mobile And Computer Interactive Communication Protocol on Linux

    GPRS network supports to the communication of data or transferring of data, even though GPRS (General Packet Radio Services) is allow transmitting data to the Internet and it is used for communication. The GPRS services provide a packet switch data transmission within GSM network and packet access to data networks....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Survey on QoS Ranking in Cloud Computing

    QoS (Quality-of-Service) is an important topic in cloud computing. It is very difficult to make a decision on choosing the cloud services depending on QoS requirements. These requirements have to be satisfied by both cloud service providers and cloud users. So, optimal service selection is needed to obtain high quality...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    ANT Algorithm for Load Balancing Problem in FTP Server

    The system describes a method of achieving load balancing in distributed networks. A network models a typical distribution of files between nodes; nodes carrying an excess of traffic can become congested, causing data to be lost. The network also supports behaviors modeled on the trail laying abilities of ants. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Interative Services of College Databases

    Now-a-day when there is mobility in every aspect of life, people do not wish to visit different places in order to gather information. Information retrieval is the science of locating from a large documentation collection, those documents that satisfy a specified information need. As the number of users using internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Digitally Controlled Delay Lines Based On NAND Gate for Glitch Free Circuits

    The traditional analog signal processing is expected to progressively substituted by the processing times of the digital domain in the VLSI. Within this novel paradigm, digitally controlled delay lines should play the vital role in the digital-to-analog converters, and in analog intensive circuits. From a practical point of view, now-a-days,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Techniques of Data Privacy in Cloud Using Back Propagation Neural Network

    Back propagation is the scheme for neural network learning. This learning accuracy gained by collaborative learning. In existing system support this kind of learning on limited dataset and between two parties. It cannot protect intermediate result. In the authors' proposed system multiple parties perform collaborative learning on arbitrarily partitioned data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Software Testing, Mythology & Methodologies

    It is generally believed that testing phases of software development consume 30% to 50% of the entire software development time and resources. The cost and time of testing should get reduced to increase the productivity of the software development process. To achieve these goals, different levels and tools of automated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Fault Analysis in Reversible Sequential Circuits

    In this paper, the researchers propose the design of reversible circuits using reversible gates. Reversible logic is implemented in reversible circuits. Reversible logic is mostly preferred due to less heat dissipation. Conservative logic gates can be designed in any sequential circuits and can be tested using two test vectors. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    SoftServe (Software Server)

    Software as a service, sometimes referred to as \"On-demand software,\" is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. The authors'...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption

    The emerging cloud technologies, due to their various unique and attractive properties, are rapidly being adopted throughout the IT industry. In this paper, the authors identify security challenges that arise in incorporation of cloud-based services, and present a set of solutions to address them. To assure the user control over...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Advance XML Search Engine

    Internet work in distributed environment different serves is located at different places. Web users retrieve information from internet by firing query. XML search engine is a strong & easy search engine for searching XML content. Advance XML search engine is very efficient and very easy search engine. And this is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Multiple-keyword Search over Encrypted Cloud Data

    As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Novel Method for Data Hiding In Encrypted Image And Video

    Now-a-days the data security and data integrity are the two challenging areas for research. This paper describes the concept of separable reversible data hiding technique that is related with internet security. When it is desired to send the confidential/important/secure data over an insecure and bandwidth-constrained channel it is customary to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Analysis of Challenges in the Design and Development of Multi-Level Secure Databases

    Database security mainly deals with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve privilege abuse, weak authentication, weak audit trails and operating system vulnerabilities. To make the security least compromised; all users are required to follow the rules set up...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Leverage Data Mining Techniques in Intrusion detection

    Data mining techniques have been successfully applied in many fields including marketing, manufacturing, process control, fraud detection and network management. In recent years, data mining-based Intrusion Detection Systems (IDS) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. In data mining...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Proposed Local Data Mart Approach for Data Warehouse Architecture

    A data warehouse is a data repository, containing historical data, prepared for analysis and supporting decision making process. Data warehouses are in use for more than a decade but companies are still finding it difficult to decide on the approach they should take for successful implementation. Data warehouse architecture plays...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Solutions for Mobility in Wireless Body Area Networks

    Body Sensor Network (BSN) that is linked by a wireless network interface roams from one coverage zone to another then interference between Wireless-Body-Area-Networks (WBAN) created, which can cause serious throughput degradation, Scattering of WBAN and Remote Base Station (RBS) will not be in range. When a wireless body area network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Research Caricature Based on Semantic Web Mining

    Research caricature is an analysis method used to scan the contextual literature information and describe the research environment and research efforts wisely. Here the authors carry out a paper which needs to extract intelligence from web resources especially for scientific research analysis. This paper made a research caricature based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    DualGuard: Detecting Intrusions in Multitier Web Applications

    In the people day to day life internet plays very important role, in terms communication and management of personal information from anywhere. Therefore for increase in application and complexity of data, web-services take interest in multi-tiered design like 1-tier, 2-tier and 3-tier design. By the use of these design web...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Effective Data Structure for Mining Frequent Itemset in Cloud Databases

    Due to increase of data in cloud computing environment over the past few years, retrieving required data from the huge database with lesser amount of time becomes tedious. Hence without having a proper cache management framework the retrieval of required data from the cloud data servers becomes difficult. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Migration in Heterogeneous Databases (ETL)

    Development of economic systems presents rapid growth trend and requires establishing a rapid trans-regional clearing system in banks. The authors are studying the approaches and processes of data migration and take a bank's database as an example. The process of data migration has three methods. Data migrated by tools beforehand,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    M-Score and K-Anonymity: A Model for Detection and Protection of Data

    Conversely, limiting access to the information in the interests of preserving secrecy might damage their ability to implement the actions that can best serve the organization. Therefore, data leakage and data misuse detection mechanisms are essential in identifying malicious insiders. One of the emerging concepts in micro data protection is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Adaptive Genetic Algorithm for Efficient Resource Management in Cloud Computing

    Cloud is one of the emerging technologies in computer industry. Several companies migrate to this technology due to reduction in maintenance cost. Several organizations provide cloud service such as SaaS, IaaS, and PaaS. Different organization provides same service with different service charges and waiting time. So customers can select services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Of Various GDI Techniques For Low Power Digital Circuits

    Now-a-days in digital circuit design low power and small area are main issues of concern for VLSI designers. GDI (Gate Diffusion Input)-a technique of low power digital combinational design. This technique as compare to other currently used logic design styles, allows less power consumption and reduced propagation delay for low-power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secure Intrusion Detection to Avoid Zombies Exploration in Cloud

    In cloud system, virtual machine is considered as the security threat. This is because all cloud users install their applications in virtual machines. Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like Distributed Denial Of Service (DDOS)....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Feature Subset Selection in High Dimensional Data by Using Fast Technique

    Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness. A fast clustering-based feature selection algorithm, FAST works in two steps. In the first step,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Cloud computing is a general term anything that involves delivering hosted services, Anything-As-A-Service (AAAS), over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Performance for Scalable Monitoring in Cloud Services

    Cloud monitoring plays a crucial role in providing application guarantees like performance, availability, and security. Primary motive behind more organizations moving to cloud is the reduction in cost and dynamic resource allocation. Since the underlying infrastructure is hosted by the cloud provider. Also, characteristics like Scalability, elasticity, availability, accuracy and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Algorithm for Identifying Relevant Features Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the ability concerns the time required to find a subset of features and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Cloud Computing- SPI Framework, Deployment Models, Challenges

    Cloud Computing is a \"Buzz word\" encompassing a wide variety of aspects. Clouds are a large pool of easily useable and accessible virtualized resources (hardware, development platforms and/or services). Most of the people are already using cloud computing in their daily lives for personal use, and now enterprises are rapidly...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Secure e-Learning Environment With Low Cost

    Cloud computing is spreading around the world with leaps and touching every part of communication era with Internet technology. Rapid growth of the communication techniques and devices are adding the requirements to bind all of these devices under one hood. Cloud is becoming a perfect solution for the same. With...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Design and Implementation of FPGA Based Efficient Data Transmission Using Verilog

    In cryptography, there are two different types of methods to provide the security to a data. They are symmetric & asymmetric. Symmetric means same key for sender as well as receiver. Generally, cryptography concepts having three important blocks, they are encryption, key generation & decryption. Data transmission can be starts...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Efficient Algorithm to Find Information Rich Subset in High Dimensional Data

    Data mining is the process of exploration and analysis, by automatic or semi automatic means, of large quantities of data in order to discover meaningful patterns and rules. Data Mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Broker Based Trust Model for Cloud Computing Environment

    With the increase in an online transactions and interactions on the internet, a key issue is how to use efficient and simple evaluation method to achieve trust based decision making for service users and service providers. Trust plays an important role in all commercial cloud environments. It is the evaluation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Prepare and Optimize Data Sets for Data Mining Analysis

    Getting ready a data set for examination is usually the tedious errand in a data mining task, needing numerous complex SQL queries, joining tables and conglomerating sections. Existing SQL aggregations have limitations to get ready data sets since they give back one section for every amassed bunch. As a rule,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Survey: Evaluation Study of Privacy Conflicts in OSNs

    In the age of the Internet, privacy is a luxury and the users' have to constantly be on their heels to maintain it. OSN makes it particularly hard for users to guard their personal data. Besides many changes, Facebook privacy settings remain complicated. Even, past updates have unexpectedly made previously...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Performance Comparison of AODV and DSDV Routing Protocols in MANET Networks

    Mobile ad-hoc network is a collection of wireless mobile nodes or stations which communicate with each other directly, and not through the aid of a centralized infrastructure. The main attributes of mobile ad-hoc networks are wireless connection, no stand-alone infrastructure, independent nodes and continuously changing topology. A number of routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Smart Home Monitoring and Controlling System Using Android Phone

    In this paper, the authors describes a zigbee module and android based home monitoring system for security, safety and healthcare for human. The existing system provides security and safety or healthcare system but in their project provide combination of these two systems. This system is more flexible and can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    CBUD Micro: A Micro Benchmark for Performance Measurement and Resource Management in IaaS Clouds

    Cloud computing provides processing power in form of virtual machines. This processing power can be given to very big and small devices. Similarly for providing processing power, devices with small or big processing power can be utilized. These devices can also be ubiquitous computing devices. Ubiquitous computing devices present in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Front End and Back End Database Protection From Intruders in Distributed Web Application

    Study of the intrusion detection system. Current network system has large scale trouble from the security vulnerability due to simple routing protocol, security less application, bugs in network & operating system. Therefore need of network intrusion detection system arrives. Generally there are two type of intrusion detection technique. First is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Optimization of Web Content Mining With an Improved Clustering Algorithm

    Web content mining generally consist of mining the content held within the web pages. The aim of this paper is to evaluate, propose and improve the use of advance web data clustering techniques which is highly used in the advent of mining large content based data sets which allows data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Survey on Data Collection inWireless Sensor Network

    Wireless sensor networks are the networks which can sense, analyze and then communicate the data. The data collection at sensor nodes consumes a lot of energy but sensor nodes are energy constraints. Most of the WSN architectures consist of stationary nodes which are heavily deployed over a sensing area. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Cloud Computing Reference Architecture from Different Vendor's Perspective

    The provision of on-demand access to Cloud computing services and infrastructure is attracting numerous consumers, as a result migrating from traditional server centric network to Cloud computing becomes inevitable to benefit from the technology through overall expense diminution. This growth of Cloud computing service consumers may influence the future data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    MOOCaaS: MOOCs as a Service

    Cloud Computing has laid the ground for a new generation of educational systems, by providing scalable anytime/anywhere services simply accessed through the Web from multiple devices without worrying about how/where those services are installed, maintained or located. According to numerous studies and reports, the Web has ushered in a new...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Game Theoretic Approach for SYN Flood Attacks of Web Server

    In this paper, a non-cooperative two person zero-sum static game(with in a discrete interval of time) is formulated and analyzed for the interaction between the SYN flood attacker and the web server administrator. The SYN Flood Game (SFG) payoffs are calculated based on Erlang loss queuing model. The solution of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Grid Computing: An Overview

    Increased network bandwidth, more powerful computers, and the acceptance of the Internet have driven the ongoing demand for new and better ways to compute. Organizations& institutions alike continue to take advantage of these advancements, and constantly seek new technologies and practices that enable them to reinvent the way they conduct...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    A Novel Uncertain Fuzzy C-Means Clustering Technique Using Genetic Algorithm (UFCM-GA)

    In the last decades, the amount of collected data in information and database systems has increased tremendously. To analyze this enormous amount of data, the interdisciplinary field of Knowledge Discovery in Databases (KDD) has emerged. The field of KDD combines disciplines like database systems. To identify individuals, similarity search on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Centralized and Distributed Energy Efficient Routing Techniques in Wireless Sensor Networks: A Survey

    Recent technology improvements that have been developed in small size nodes, low-cost, battery power devices, which are capable of local processing and efficient wireless communication. Such nodes are called as sensor nodes. These sensor nodes are efficient in computing in various applications, such as office buildings, industrial plants, and reading...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Enabling Video Content Distribution Using the Principle of Cloud Downloads

    Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, video content distribution over the Internet has received tremendous attention from academia and industry. The most common approach for such is the peer-to-peer approach. In this approach, peers who create demand for videos...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Chaos Based Public-key Cryptosystem

    In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Cryptography Based on Neural Network

    Cryptography is the ability of changing information into obvious unintelligibility in a way allowing a secret method of un-mangling. The vital idea of cryptography is the capability to send information between participants in a way that prevents others from reading it. Much cryptography methods are available which are based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Design and Implementation of Data Sanitization Technique for Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram

    Now-a-days cloud environments are widely used for data storage and processing. However, this environment represents a serious threat for data privacy, since document containing confidential information might be made available for unauthorized parties. Although measures to automatically remove or hide sensitive information that may disclose identities of referred entities or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Horizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator

    Preparing dataset is a very difficult process in cases where it has to be given as input for data mining which involves complex queries, joining tables, and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. The authors' project aims...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Review of Privacy Preserving Data Mining Using KADET

    Nowadays, securing the user's information is very important for internet based business. On one hand, the companies can mine data to extract knowledgeable information through data collected from the users. On other hand, the user information that contains sensitive data should prevent from the hackers. PPDM is a popular search...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Secured Data with Enhanced Lifespan for Wireless Multimedia Sensor Networks

    In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. On the other hand introduction of audio video streaming in wireless architecture reveals additional challenges. The image and video transmission not only demands for energy efficiency...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Study on Wireless Technologies Wimax and Wlan With Their Interfaced Scenario

    The people are in advanced world of internet with new technologies in these days. So many new wireless networks technologies have been emerged. WiMAX and WLAN are such wireless technologies which are being adopted by most of the users. WiMax is one of the advanced technologies from those. Due to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Trust Based Secure Data Transmission Model in MANET

    A \"Mobile Ad hoc NETwork\" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. For quick data transmission, the people need a routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    PICQUET: Controlling Malicious Nodes in a Network

    Now-a-days there are many assailants were trying to attack on server using various tools but there are also some firewall present for prevent it. But in case of using Linux OS firewall has some of disadvantages - filters incoming n outgoing packets only, system oriented (separate for each node), doesn't...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Comparative Study of Face Authentication Using Euclidean and Mahalanobis Distance Classification Method

    In face recognition feature extraction and classification are the two aspects to be focused. In Principle Component Analysis (PCA) based face recognition technique, the 2D face image matrices must be previously transformed in to one dimensional image vectors. In this paper Two Dimensional Principle Component Analysis (2DPCA) is used to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Evaluation of Contourlet Transform based Palmprint Recognition using Nearest Neighbour Classifier

    Biometrics-based personal verification is a powerful security features in technology era. Palmprint recognition is an accepted and widely used biometric. Palmprint is an important complement and reliable biometric that can be used for identity verification because it is stable and unique for every individual. This paper presents a new palmprint...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Backing Off, NLP and Indexing Methods for String Matching in Query Execution

    Query is an ad-hoc reporting tool that allows the users' to retrieve data that is stored in the application. It gives users the ability to produce a report of information from a database. The word 'Query' may be defined as retrieval of meaningful information. The language used to provide various...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Survey of Information Hiding Techniques

    To protect the users' secret information from the intruders it is necessary to convert information into unidentified form. So it is impossible to get their original information for intruders. So security is most challenging aspects for all users who want to share their secret information. With the wild growth of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Distributed Packet Inspection by Using PIL-2 Language

    Packet Inspection Language PIL-2 incorporates directly support for distributed processing into the language. PIL-2 supports generic header filter, payload scanning, packet replication and traffic flow in network. By distributing PIL-2 based on the possibility created for heterogeneous network of processing node, which gives monitoring architecture facilities with high speed packet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Speaker Identification Based Automation System Through Speech Recognition

    Automation industry is growing rapidly; the central goal of design of speaker identification based automation is to provide an efficient and convenient integration and inter-operation among appliances in households and industry. Home automation systems must comply with the household standards and convenience of usage. In this paper, the authors discusses...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Improved Hierarchical Clustering Using Time Series Data

    Mining time series data has a remarkable development of interest in today's world. This paper presents and evaluates an incremental clustering structure for time series data stream. The new algorithm is called Improved Hierarchical Clustering Algorithm (IHCA) is developed and applied with ECG data set. This system continuously constructs a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Implementation of Web Access Pattern Discovery

    In this era of technology about 70% of people are use internet or web services and moreover it they consume and generate more data in a fraction of small time. This data is helpful to discover new dimensions of knowledge. In this paper, the authors include the implementation of web...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Encrypting Processes and Public Key Infrastructure in Regard to Data Safety and Security in Database Systems

    The people can distinguish three basic properties of information security, which should be implemented in nearly all IT systems: confidentiality, integrity and availability. Confidentiality means to protect the information against unauthorized access. Integrity is mentioned as a warranty of authenticity of information; it is also connected with protection against unauthorized...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Skin Tone Based Face Recognition and Training Using Network Network

    Within today's environment of increased importance of security and organization, identification, and authentication methods have developed into a key technology. Face recognition is an important means of identifying facial expression, gender. Human faces provides important visual information for gender classification from face perception. Face can be recognized by many methods...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Crypto Cloud Computing the C3 model

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    A Study of Mining Web Intelligent Information

    Finding only relevant information on the Web is one of the hardest challenges faced by researchers. Two reasons are the huge size of the Web and the diversity of available heterogeneous information. Current search engines suffer from low precision rates because pages are not semantically defined and users are allowed...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)