International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 81-120 of 1129 results

  • White Papers // Nov 2014

    Enhancing the Functionality of Opportunistic Routing in MANET by Using Channel Reuse

    Mobile Ad-hoc NETwork (MANET) is a type of ad-hoc network that can change location and configure itself on fly. In MANET, routing is a very tedious task so it is an important research area of work due to its unpredictable network topology changes. Opportunistic routing is a new technique which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Drought Hazard Assessment and Mapping in Upper Seonath Sub-Basin Using GIS

    Drought is a natural anomaly experienced when circulation pattern get blocked in one phase, or push outside their normal residence time of variation. The assessment of drought impact on agricultural land in Upper Seonath sub-basin is essential for making mitigation plan to reduce the impact of drought. The study has...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Reversible Data Hiding in Encrypted Image using Chaotic Algorithm

    Now-a-days, the reversible data hiding research has become major issue. The reversible data hiding techniques are researched to improve the distortion in sensitive images. The embedding process of this technique is the some of the general data hiding scheme. However, the extraction process has an additional method in comparison with...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Smartphone Application for Ticket Reservation and Validation Using Mobile Network

    In this paper, the authors deal with the android application for ticket reservation and validation using mobile tower network. One of the major challenges in the current ticketing facility is buying ticket standing in the queue. Their application provides the facility for buying the tickets online. Their ticket can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Analysis and Detection of Altered Human Fingerprints Using Minutiae Technique

    Now-a-days, biometric security is popularly used for unique authentication. Biometric authentication system provides more benefits than traditional id and passwords. Fingerprints of a person are unique throughout the users' life. Fingerprint biometric system is cheaper as compared to another biometric such as retina, DNA, face etc. altered fingerprint detection was...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Survey on a Highly Secured Reversible Data Hiding: Principles, Techniques and Recent Studies

    Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and Steganography etc. One of these is data-hiding, using this concept, the authors can provide security, authentication to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Survey of Various Load Balancing Techniques and Enhanced Load Balancing Approach in Cloud Computing

    The cloud computing data centre has abundant hosts as well as solicitation requests. A cloud computing platform that manoeuvre behind the corporate firewall and within control of an organization IT department. Cloud deals numerous aids such as self-service, agility, efficiency, security, better resource utilization and faster time to market. To...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Survey of Data Compression Techniques in Sensor Network

    In this paper, a survey is done on various data compression techniques in wireless sensor network. Data compression seeks to reduce the number of bits used to store or transmit information. A critical issue of power saving in wireless sensor networks arises because sensor nodes are powered by batteries which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Web Services Based SQL Injection Detection and Prevention System for Web Applications

    Web applications form an integral part of the people day-to-day life. The number of attacks on websites and the compromise of many individuals secure data are increasing at an alarming rate. Hence, providing increased amount of security for the users and their data becomes essential. Most important vulnerability as described...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Game Development Using C++

    Computer games have been a preference to most of computer users. Now-a-days, it does not only focus on computer that the user normally use in their office or house, but handheld devices such as hand-phone and Personal Digital Assistant (PDA) have also been a target platform for users to play...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review on Object Tracking System Using Mean Shift Algorithm and Implementation on FPGA

    Various attempts have been made to implement human vision in real-time computer vision. In most cases, however, this capability has been found to be too complex to implement on a practical systems. In short, human vision capability looks like a simple system but in reality it is difficult to model....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review Paper on Packet Scheduling in Wireless Sensor Networks

    In the wireless sensor networks when the authors are dealing with the packets while scheduling, there is always issue of energy consumption & delays in the data transmission from one end to the other. It is important that the order of packets should be correct, means the packets that are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Securing Web Application From Structured Query Language Injection Attacks: A Four-Tier Approach

    A complex combination of curiosity, competition, classic boredom and espionage lead humans to use computer applications in ways unintended, leading (in some cases) to serious security breaches and the need to secure compromised applications from further attacks. With the emergence of web 2.0, information sharing through social networking has increased...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Enhanced Security in Online Database System

    In this era due to unbelievable development in internet, various online attacks have been increased. From all such attacks most popular attack is phishing. This attack is done for extracting confidential information such as banking information, passwords from unsuspecting victims for fraud purposes. Confidential data can't be directly uploaded on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Ethernet Based, Industrial Furnace Control and Data Acquisition

    Developments in technology and the marketplace now make it possible for embedded systems to communicate in local Ethernet networks as well as on the internet. Network communications can make an embedded system more powerful and easier to monitor and control. Ethernet solves the problem of remote communication with the embedded...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    An Analytical and Comparative Study of Various Data Preprocessing Method in Data Mining

    Data pre-processing is a necessary and critical step of the data mining process or knowledge discovery in databases. Base of data pre-processing is a preparing data as form of accurate, reliable and qualities data. Data preprocessing not only use for data mining but it also use of constructing on data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Novel Approach to a Palm Print Classification Using Global Features

    Three dimensional palm print has proved to be significant biometric for personal authentication. Personal authentication plays a key role in application of public security, access control, forensics and e-banking etc. 2-D palm print has been recognized as an effective biometric identifier in past decade. 3-D palm print system develops to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Cross-Layer Video Transmission Over IEEE 802.11 WLANs Using Cognitive Rate Adaptation and Adaptive Encoding

    Rate adaptation is critical to the system performance of wireless networks. In spite of rate adaptation being a MAC layer parameter, potential decisions can be made from the rate of transmission being chosen by the layer. On such decision is the encoding rate of the video at the application layer....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review on Improving and Enhancing Security Using Hi-Pass

    Now-a-days, user authentication has become a tough challenge to all the web services like banking sector, e-commerce sites etc. To facilitate these same requirements, the authors are going to implement Hi-pass system which is a combination of session password & a random key which is validated with the help of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Study on Modern Cryptography and Their Security Issues

    Cryptography has evolved as one of the core techniques in providing data security in computer systems and various communications methods. Exciting developments in the field of cryptography have been observed during the last few decades in the form of various encryption algorithms and protocols etc. Any system that involves cryptography...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Design of Low Power and Area Efficient FIR Digital Filter

    The impulse response can be either finite or infinite. The methods for designing and implementing these two filter classes differ considerably. Finite Impulse Response (FIR) filters are digital filters whose response to unit impulse (unit sample function) is finite in duration. This paper presents the design of low power FIR...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Fundamental Research on Distributed and Parallel Database

    In today's world of data systems, all courses of individuals would like access to companies' databases. In count to a company's own staff, these embrace the company's customers, probably customers, suppliers, and salespersons of all sorts. This paper is to gift a prologue to distributed database sand parallel information. Conjointly,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Implementation of Sub Micron Level 10T Full Adder in ALU Using Cell Based and SOC Technology

    As technology scales into the nanometer regime leakage current, active power, delay and area are bearing important metric for the analysis and design of complex arithmetic logic circuits. In this paper, major work has been done in determining the leakage current, power and area respectively. The above set design parameters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Optimized Model of Radix-4 Booth Multiplier in VHDL

    In this paper, the authors describe optimized radix-4 booth multiplier algorithm for multiplication of two binary numbers on VHDL device. Radix-4 Booth's algorithm is presented as an alternate solution of basic binary multiplication, which can help in reducing the number of partial products by a factor of 2. Radix-4 Booth's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Analysis of CMOS Multiplier and EEAL Multiplier for Low Power VLSI Application

    A new design of adiabatic circuit, called Energy Efficient Adiabatic Logic (EEAL) is proposed. In adiabatic logic, which dissipates less power than static CMOS logic, have been adiabatic circuits called energy efficient adiabatic logic introduced as a promising new approach in low power circuit design. The adiabatic circuits are those...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Low Power Binary Floating Multiplier Using Bypassing Technique

    Floating point multiplication is used in many Digital Signal Processing (DSP) applications; this multiplication is costly in terms of area, delay and power consumption. Reduction in these parameters will greatly improve the performance of multiplier and this in turn will improve the performance of DSP systems. In this paper, a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Review on Reduction of Optical Background Noise in Light-Emitting Diode (LED) Optical Wireless Communication Systems Using Hadamard Error Correcting Code

    Optical background noises produced by conventional florescent light sources, tungsten filament sources or AC power Light-Emitting Diode (LED) are major source of interference in LED optical wireless communication, which can be significantly affect the performance and produce the challenges to implementation. This paper presents a review of mitigation of optical...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Web Gladiator a Web Application Firewall

    Application protection is a valuable security layer to protect against a number of application layer security threats which is usually not protected by a typical network layer intrusion detection system. The hackers will attack the Web Application using the methods like Structured Query Language (SQL) Injection, Cross Site Scripting (XSS),...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Modified Drop Tail Queuing: A New Approach to Bandwidth Management

    Network congestion and poor performance of the network are the two major problem which the users are facing now-a-days. Both are directly proportional to one another, Due to network congestion performance of network degrades automatically. At most site today condition of over-whelm may occur this may be due to exponential...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Memory Aided Audio Broadcast and Power Reduction Mechanism for Community Radio Service in Mobile Ad Hoc Networks

    The deployment of a rural level community radio application in mobile ad hoc networks comprising completely of mobile phones. The usage of the network is powered to spawn and scattered audio content to the entire network through mobile phones. This paper focuses on the study of suitable broadcast algorithms for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Interactive Multimedia Tool for Dynamic Generation of Web Interfaces with HTML5/PHP/MySQL and JavaScript

    The recent development of interfaces for web-oriented systems and for desktop applications is associated with the use of many different technologies. They focus on the selection, arrangement and presentation of the most appropriate design for the particular software application. In this paper, particular attention is paid to one of the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Review Paper on 4G Communication Network

    The development of broadband wireless access technologies in recent years was the result of growing demand for mobile internet and multimedia application. With the growing user demands, the Third Generation (3G) network faces various limitations with respect to its bandwidth, data rate, etc. which cannot accommodate the future multimedia environment....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Review Paper on Intrusion Detection Using Data Mining Technique

    Now-a-days, Intrusion Detection Systems (IDS) has various issues of rules and attack classification. Intrusion detection systems that practices solitary algorithm, the accuracy and detection rate were not accurate. Increase in the false alarm rate was also come across. Grouping of algorithm is performed to solve this problem. This paper represents...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Report on Vulnerabilities in Web Applications

    Now-a-days, internet and web applications are more useful in day-to-day life. Most of the communications and transactions are done with the help of web applications. When the term web application comes in mind, security is a major concern that the authors have to deal with it. Vulnerabilities in web applications...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Survey on VariousTopic Mining Techniques &Applications

    Text-mining commonly consigns to the development of mining attractive patterns and non-trivial information from the database and gets acquaintance from non-arrangement text. Generally text mining covers several computer science restraints with a physically powerful orientation towards artificial intelligence in wide-ranging, together with but not maximum valued of given attractive patterns...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Review on Various Attribute Based Data Sharing Techniques with Encryption

    Recently when huge amount of documents and web contents are available, so security of data is somewhat difficult. Since most of the systems are based on the distributed network so the sharing of data and more important the security of data on such systems are important. It is a trend...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    An Efficient Retrieval of Cloud Data Using ECIES Scheme

    Cloud computing is an important field area for the access of information over internet. On one hand cloud computing provides efficient use of storage but the chances of accessing un-authorized data also increase. Although there are various techniques implemented for the retrieval of data from the cloud, but the technique...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Implementation of an Embedded Web Controller for Automation

    Now-a-days, the demand for adding Ethernet connectivity to home appliances has been on rise with the development of powerful processors and network technology. A user friendly interface to easy access the remote network device is an important issue for the embedded systems. Web pages can be used as a rich...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Big Data: Transforming New Ways of Productivity and Profit Booking

    The mushrooming of data in companies about their clients, vendors, and operations has become the function of global economy. Considering the essential elements of productivity such as intellectuals and experts, drivers of modern economic activities, innovation and development couldn't emerge without data. Big data account for substantial portion of the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    POAG and HNG Based Lower Delay ALU Designing using FPGA

    Reversible logic is advance form of logical designing for manufacturing of chips to reduce the calculation delay in and reduce the quantum cost so that the energy consumption of the digital logic chip should be minimized. The optimization of the logic design is the requirement of the VLSI to increase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Maintaining Location Privacy and Anonymity for Vehicle's Drivers in VANET

    Vehicular Ad-hoc NETwork (VANET) is an emerging technology that aims at providing both safety and comfort for drivers. One of the most important evolving VANET applications is Location-Based Services (LBS). These applications require providing continuous user location updates to untrusted Location-Based Service Providers (SPs), in order to provide real-time services....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Maximal Ratio Combining SC-FDMA Performance Over Land Mobile Satellite Rice Fading Channel

    The fourth generation mobile communication has used MIMO (Multiple Input Multiple Output) technology to improve system performance. MIMO can be used to get better capacity, coverage, high data rates and throughputs. Land Mobile Satellite (LMS) systems are an important element of the third and fourth generation of wireless systems. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Analysis of Intrusion Detection System Using Trusted Clients

    Traditionally firewall has been used to stop the intrusion attempts by an attacker. But firewalls have static configurations that block attacks based on source and destination ports and IP addresses. These are not sufficient to provide security from all the attacks. Therefore, the authors need IDS type systems which could...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Reliable Load Flow Solution for Controlling Power Network by FACTS Devices

    In this paper a new and efficient method for the reliable load flow solution of power network branches controlled by Flexible AC Transmission Systems (FACTS) is presented. In the various methods proposed in past, the formulations was derived in which the Jacobian matrix is in UDUT form, where U is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Analytical Model for Thin Depleted SOI Enhancement MOSFET

    This paper presents an quasi-2D model for the threshold voltage of partially depleted SOI (Silicon-On-Insulator) MOSFET in contrast with effective channel length down to deep - sub micrometer range. The paper present analytical solution with the help of 2D potential distribution in the silicon film and with the help of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Adaptive Modulation and Coding Rate for OFDM Systems

    Wireless communication is observing a fast development in today's communication era. A poorly designed path can result in periodic system outages, resulting in increased system latency, decreased throughput, or worst case, a complete failure of the system. Planning a good, stable and reliable network can be quite challenging. At the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Refining Anomalistic Malicious Attacks in Sovereign Setup

    Internet is a widely used technology, globally interconnected networks with the use of standard Internet Protocols (IP) to aid abundance of users across the globe. Recently, Internet is afflicted by malicious actions such as spam, phishing to malware, Denial-of-Service (DoS), Man in the middle attack, Eavesdropping attacks etc. Much of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Reduction of PAPR in SFBC-OFDM System Using Clipping and Differential Scaling

    Orthogonal Frequency-Division Multiplexing (OFDM) is a well-known technique for transmission of high rate data over broadband frequency-selective channels that mitigate Inter-Symbol Interference (ISI) caused by the delay spread of wireless channels. Space Frequency Block Coded technique (SFBC) is a spatial diversity technique used to achieve full transmission diversity with higher...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Multihop Energy Efficient Reliable and Fault Tolerant Routing Protocol for Wireless Sensor Networks

    The work in this paper aims at designing a multi-hop energy efficient, reliable and fault tolerant routing protocol. It proposes to maintain an asymmetric network of sensors so that the nodes get a chance to configure their transmission ranges best, and thus delivers data to the base station using as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Biometrics in Access Control System

    This paper describes an automated fingerprint authentication system fusing two different technologies viz. embedded and biometrics accessible to the persons who are authorized by the officials using bio-metric identification of finger print. The system operates in both online and offline mode. The fingerprint reader is an optical reader that captures...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Mesh Based Video Streaming in Heterogeneous Distributed Environment

    Video has been an important media for communications, education and entertainment for many decades. Streaming video over the distributed environment is extremely popular, because of its higher availability, efficiently in playback delay and scalable load management. Many applications like e-learning, Skype, YouTube and games, are require simultaneous streaming of video...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Performance Improvement of Authentication of Fingerprints Using Enhancement and Matching Algorithms

    Fingerprint is one of the most extensively used biometric systems for authentication in areas where security is of high importance. This is due to their permanence, accuracy and reliability. However, extracting features out of degraded fingerprints is the most challenging in order to obtain high fingerprint matching performance. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Real-Time Integration of Cloud and Local ERP Through Middelware

    The Middelware Architecture helps to provide powerful real time integration between Software as a Service (SaaS) application of any Cloud within house application like SAP, ERP. Now the user can achieve that integration quickly, reliably and worry-free using through Middelware. There are many worldwide leader in on-demand or Software-as-a-Service (SaaS)-...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Signal Shaping in Single and Multi Carrier Transmission for Optical Wireless Communication

    Signal shaping is a framework for optical wireless communication. The single carrier transmission using pulse amplitude modulation and multi carrier transmission realized through multi level quadrature amplitude modulation was done for optical wireless communication. Through scaling and DC-biasing the transmitted signal is optimally conditioned in accord with the optical power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    LTE: Beyond 3G: A Promising Technology for Next Generation Mobile Platform

    Today is the era of any time any where always on application i.e., high speed internet access. In this fast growing scenario as the user demand for higher bandwidth increases so does its speed and higher rates are also in demand. The current environment almost does not meet the combating...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Design of Flexible Protocol for Intrusion Detection in Wireless Sensor Networks

    A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, multiple type of memory, have a power source and accommodate various sensors and actuators. The system are wireless, have scarce power, are real-time, utilize sensors and actuators as interfaces, have...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Seismic Study of Building with Roof Top Telecommunication Towers

    Due to the boom in the telecommunication business, number of buildings carrying a roof top tower has been increased rapidly. Most of the building were not originally designed to carry a roof top tower, but later converted to carry roof top towers due to the changed requirements. In the present...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Virtualization Technology in Cloud Computing Environment

    Internet, it is a large collection of networks where resources are globally networked, In internet cloud computing plays a major role In order to share the data and one of the important technology in the cloud computing is virtualization. Mainly it is used to maintain the collection IT resources which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Mobility Management for Wireless Systems:Challenges and Future of Mobile IP

    With the tremendous growth in data traffic, the wireless industry is evolving towards new technologies. Recent advances in technology have provides portable computers with wireless interfaces that allow networked communication even while a user is mobile. Wireless networking greatly enhances the utility of a portable computing device. It allows mobile...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    High Throughput Analysis Using Topological Control & Authentication Scheme in MANET

    Since MANETs are mainly composed of lightight devices with limited capabilities, efficiently manage security is crucial to reduce the performance degradation and resources consumption. In particular, Mobile Ad hoc NETworks (MANETs) based on Cooperative Communication (CC) present significant challenges to security issues, as well as issues of network performance and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Multiband Rectennas Using a Bowtie Antenna - A Review

    This paper reviews the rectennas which are employed to harvest the electric energy from RF signals radiated by several communication systems. The modified bowtie antenna considered in this study is used to collect the Electro-Magnetic energy (EM) coming from RFID systems and a 2-stage voltage rectifier used to convert it...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Analysis of Improvement QoS Parameters Techniques Used for Hybrid Networks

    Most real life networks are hybrid networks. A hybrid networks combines the best feature of two or more networks. In networking terminology a hybrid network according to "Information Technology control and Audit "are reliable and versatile. They provide large number of connection and data transmission paths to users. This hybrid...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    QoS Provisioning in Seamless Vertical Handover of WIMAX/WLAN Overlay Network

    The integration of WiMAX and WLAN has been seen as a promising approach towards Fourth Generation (4G). Vertical handoff plays important role while integration of WiMAX and WLAN heterogeneous overlay systems. Vertical handoff is preformed on the basis of Quality of Service (QoS) metrics of the two heterogeneous networks. A...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimization of Resource Providing in Cloud

    The term cloud, the authors can simply say it as pay for use. Now-a-days most of the organization move towards cloud and they can store their data in the cloud and get benefits from their applications. Cloud can offer services in three in such as Software as a service, Platform...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    A Practical Approach to Intrusion Detection System for Multilayer Web Services

    The common technique to detect intrusion is based on behaviors. The primary objective of the system is to detect attacks in opposition to computer systems or against information systems. The proposed system is used to detect malicious actions in a session, analyze the traffic, and respond accordingly to protection strategy....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Suitability of COFDM in 3G and Comparison with CDMA: A Technological Review

    This paper gives the effectiveness measures of OFDM as a modulation technique for wireless radio applications. OFDM is checked as a modulation technique for telephony communication system. A comparative study of COFDM a variant of OFDM is done with the CDMA technology for the same application. Various performance matrices like...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Faster Consensus Agreement Approach for Fault Tolerance in a Distributed System

    The essential problem in distributed computing is to achieve overall system reliability in the presence of a number of faulty processes. Maximizing fault tolerance is the important for message exchanges in distributed environment. To achieve this point, solving consensus problem that requires agreement among a number of processors for a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Survey on Optimal Power Flow Under Security Constraints

    The main objective of SCOPF algorithm is to find steady state operation point, which helps in minimizes generation cost, start up cost, loss etc. or maximizes load-ability, social welfare while maintaining the system performance by considering the limits on generator's real and reactive powers, security constraints, line flow limits, etc....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    BPL Classification Using Multilayer Perceptron: Performance Analysis

    Artificial Neural networks have emerged as an important tool for classification. Many neural network models have been proposed for pattern classification, function approximation and regression problems. Among them, the class of multi-layer per-ceptron networks is most popular. This paper presents an approach for classifying a person as below poverty line...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Study of Synchronization Technique in OFDM System

    The authors present an OFDM frequency synchronization scheme. This paper presents an extended solution for the carrier frequency synchronization problem of OFDM. The scheme uses number of bits, modulation level, cyclic prefix, FFT size similarly to the algorithm proposed by Tilde Fusco. The proposed scheme attains considerably higher accuracy than...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Survey on Channel Estimation for OFDM-IDMA Receivers Systems

    In this paper, various channel estimation techniques for iterative receivers are compared for OFDMIDMA system. Pilot - assisted based, semi-blind estimation, blind estimation and Decision - directed channel estimations techniques are considered and there comparisons are presented. The considered estimation techniques differ in terms of complexity, as well as performance....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    STEGCRYP: A Multilevel Information Security Shceme

    In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB (Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Adaptive Channel Estimation Technique for MIMO-OFDM

    A Multiple-Input Multiple-Output (MIMO) communication system combined with the Orthogonal Frequency Division Multiplexing (OFDM) modulation technique can achieve reliable high data rate transmission over broadband wireless channels. The most important research topic in the wireless communications is the adaptive channel estimation where the channel is rapidly time-varying. In this paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Efficient Framework for Deploying Information in Virtual Datacenter with Cloud Security Application

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the Cloud Technology most organizations have own challenges when it comes to handle both critical and confidential information. The major challenge in cloud technology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Study on Biometric Recognition in Embedding Web Browers in 3G Mobile Phone Applications

    The novel mobile-phone employs an modular architecture to capture and send the biometric to the web server based on the use of an embedded web browser. Investigating the technologies for embedded web page in order to capture and send the biometrics are Applet Java, ActiveX controls, Flash technology, Javascript, and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Triband Folded Dipole Antenna for GSM Mobile Communication Applications

    Over recent years, a commercial opportunity for the mobile industry has been rapidly developed due to the use of wireless communication technologies. The fast evolution of wireless service applications viz., live online game, real-time video streaming and mobile electronic devices that are capable of handling high data rate applications are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Securing a Firm's Computer Operating System : Trusted Platform Module

    Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design of Reconfigurable and Adjustable Wireless CORDIC Single Core Rake Receiver

    In wireless communication system transmitted signals are subjected to multiple reflections, diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by signal cancellation. Rake receiver...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Usability and Comparisons of Passwords

    Mobile devices such as cell phones/tablets laptops are widely used nowadays, during the last years phones changed from simple phones to smart phones with an increasing number of features. People feel easy to store their information on these devices so that they can get their required information whenever they want....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Survey on MAC Protocol for Wireless Sensor Network

    Designing wireless sensor networks with the capability of prolonging network lifetime take the attention of many researchers in wireless network field. The Wireless Sensor Networks (WSNs) are used in a wide range of applications to capture, gather and analyze live environmental data. WSNs are an emerging technology that has become...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)