International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 161-200 of 1385 results

  • White Papers // Oct 2014

    Web Services Based SQL Injection Detection and Prevention System for Web Applications

    Web applications form an integral part of the people day-to-day life. The number of attacks on websites and the compromise of many individuals secure data are increasing at an alarming rate. Hence, providing increased amount of security for the users and their data becomes essential. Most important vulnerability as described...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Game Development Using C++

    Computer games have been a preference to most of computer users. Now-a-days, it does not only focus on computer that the user normally use in their office or house, but handheld devices such as hand-phone and Personal Digital Assistant (PDA) have also been a target platform for users to play...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review on Object Tracking System Using Mean Shift Algorithm and Implementation on FPGA

    Various attempts have been made to implement human vision in real-time computer vision. In most cases, however, this capability has been found to be too complex to implement on a practical systems. In short, human vision capability looks like a simple system but in reality it is difficult to model....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review Paper on Packet Scheduling in Wireless Sensor Networks

    In the wireless sensor networks when the authors are dealing with the packets while scheduling, there is always issue of energy consumption & delays in the data transmission from one end to the other. It is important that the order of packets should be correct, means the packets that are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Securing Web Application From Structured Query Language Injection Attacks: A Four-Tier Approach

    A complex combination of curiosity, competition, classic boredom and espionage lead humans to use computer applications in ways unintended, leading (in some cases) to serious security breaches and the need to secure compromised applications from further attacks. With the emergence of web 2.0, information sharing through social networking has increased...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Enhanced Security in Online Database System

    In this era due to unbelievable development in internet, various online attacks have been increased. From all such attacks most popular attack is phishing. This attack is done for extracting confidential information such as banking information, passwords from unsuspecting victims for fraud purposes. Confidential data can't be directly uploaded on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Ethernet Based, Industrial Furnace Control and Data Acquisition

    Developments in technology and the marketplace now make it possible for embedded systems to communicate in local Ethernet networks as well as on the internet. Network communications can make an embedded system more powerful and easier to monitor and control. Ethernet solves the problem of remote communication with the embedded...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    An Analytical and Comparative Study of Various Data Preprocessing Method in Data Mining

    Data pre-processing is a necessary and critical step of the data mining process or knowledge discovery in databases. Base of data pre-processing is a preparing data as form of accurate, reliable and qualities data. Data preprocessing not only use for data mining but it also use of constructing on data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Novel Approach to a Palm Print Classification Using Global Features

    Three dimensional palm print has proved to be significant biometric for personal authentication. Personal authentication plays a key role in application of public security, access control, forensics and e-banking etc. 2-D palm print has been recognized as an effective biometric identifier in past decade. 3-D palm print system develops to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Cross-Layer Video Transmission Over IEEE 802.11 WLANs Using Cognitive Rate Adaptation and Adaptive Encoding

    Rate adaptation is critical to the system performance of wireless networks. In spite of rate adaptation being a MAC layer parameter, potential decisions can be made from the rate of transmission being chosen by the layer. On such decision is the encoding rate of the video at the application layer....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Review on Improving and Enhancing Security Using Hi-Pass

    Now-a-days, user authentication has become a tough challenge to all the web services like banking sector, e-commerce sites etc. To facilitate these same requirements, the authors are going to implement Hi-pass system which is a combination of session password & a random key which is validated with the help of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Study on Modern Cryptography and Their Security Issues

    Cryptography has evolved as one of the core techniques in providing data security in computer systems and various communications methods. Exciting developments in the field of cryptography have been observed during the last few decades in the form of various encryption algorithms and protocols etc. Any system that involves cryptography...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Drought Hazard Assessment and Mapping in Upper Seonath Sub-Basin Using GIS

    Drought is a natural anomaly experienced when circulation pattern get blocked in one phase, or push outside their normal residence time of variation. The assessment of drought impact on agricultural land in Upper Seonath sub-basin is essential for making mitigation plan to reduce the impact of drought. The study has...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Reversible Data Hiding in Encrypted Image using Chaotic Algorithm

    Now-a-days, the reversible data hiding research has become major issue. The reversible data hiding techniques are researched to improve the distortion in sensitive images. The embedding process of this technique is the some of the general data hiding scheme. However, the extraction process has an additional method in comparison with...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    Design of Low Power and Area Efficient FIR Digital Filter

    The impulse response can be either finite or infinite. The methods for designing and implementing these two filter classes differ considerably. Finite Impulse Response (FIR) filters are digital filters whose response to unit impulse (unit sample function) is finite in duration. This paper presents the design of low power FIR...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2014

    A Novel Approach of Preventing SQL Injection Attacks with the use of Combinatorial Approach

    A combinatorial approach for safeguarding net applications against SQL injection is mentioned during this paper that may be a novel plan of incorporating the individuality of Signature based mostly methodology and auditing methodology. The foremost issue of net application security is that the SQL Injection, which may offer the attackers...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Review on Reduction of Optical Background Noise in Light-Emitting Diode (LED) Optical Wireless Communication Systems Using Hadamard Error Correcting Code

    Optical background noises produced by conventional florescent light sources, tungsten filament sources or AC power Light-Emitting Diode (LED) are major source of interference in LED optical wireless communication, which can be significantly affect the performance and produce the challenges to implementation. This paper presents a review of mitigation of optical...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Web Gladiator a Web Application Firewall

    Application protection is a valuable security layer to protect against a number of application layer security threats which is usually not protected by a typical network layer intrusion detection system. The hackers will attack the Web Application using the methods like Structured Query Language (SQL) Injection, Cross Site Scripting (XSS),...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Modified Drop Tail Queuing: A New Approach to Bandwidth Management

    Network congestion and poor performance of the network are the two major problem which the users are facing now-a-days. Both are directly proportional to one another, Due to network congestion performance of network degrades automatically. At most site today condition of over-whelm may occur this may be due to exponential...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Memory Aided Audio Broadcast and Power Reduction Mechanism for Community Radio Service in Mobile Ad Hoc Networks

    The deployment of a rural level community radio application in mobile ad hoc networks comprising completely of mobile phones. The usage of the network is powered to spawn and scattered audio content to the entire network through mobile phones. This paper focuses on the study of suitable broadcast algorithms for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Interactive Multimedia Tool for Dynamic Generation of Web Interfaces with HTML5/PHP/MySQL and JavaScript

    The recent development of interfaces for web-oriented systems and for desktop applications is associated with the use of many different technologies. They focus on the selection, arrangement and presentation of the most appropriate design for the particular software application. In this paper, particular attention is paid to one of the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Review Paper on 4G Communication Network

    The development of broadband wireless access technologies in recent years was the result of growing demand for mobile internet and multimedia application. With the growing user demands, the Third Generation (3G) network faces various limitations with respect to its bandwidth, data rate, etc. which cannot accommodate the future multimedia environment....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Review Paper on Intrusion Detection Using Data Mining Technique

    Now-a-days, Intrusion Detection Systems (IDS) has various issues of rules and attack classification. Intrusion detection systems that practices solitary algorithm, the accuracy and detection rate were not accurate. Increase in the false alarm rate was also come across. Grouping of algorithm is performed to solve this problem. This paper represents...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Report on Vulnerabilities in Web Applications

    Now-a-days, internet and web applications are more useful in day-to-day life. Most of the communications and transactions are done with the help of web applications. When the term web application comes in mind, security is a major concern that the authors have to deal with it. Vulnerabilities in web applications...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Survey on VariousTopic Mining Techniques &Applications

    Text-mining commonly consigns to the development of mining attractive patterns and non-trivial information from the database and gets acquaintance from non-arrangement text. Generally text mining covers several computer science restraints with a physically powerful orientation towards artificial intelligence in wide-ranging, together with but not maximum valued of given attractive patterns...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Review on Various Attribute Based Data Sharing Techniques with Encryption

    Recently when huge amount of documents and web contents are available, so security of data is somewhat difficult. Since most of the systems are based on the distributed network so the sharing of data and more important the security of data on such systems are important. It is a trend...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    An Efficient Retrieval of Cloud Data Using ECIES Scheme

    Cloud computing is an important field area for the access of information over internet. On one hand cloud computing provides efficient use of storage but the chances of accessing un-authorized data also increase. Although there are various techniques implemented for the retrieval of data from the cloud, but the technique...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Fundamental Research on Distributed and Parallel Database

    In today's world of data systems, all courses of individuals would like access to companies' databases. In count to a company's own staff, these embrace the company's customers, probably customers, suppliers, and salespersons of all sorts. This paper is to gift a prologue to distributed database sand parallel information. Conjointly,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Implementation of Sub Micron Level 10T Full Adder in ALU Using Cell Based and SOC Technology

    As technology scales into the nanometer regime leakage current, active power, delay and area are bearing important metric for the analysis and design of complex arithmetic logic circuits. In this paper, major work has been done in determining the leakage current, power and area respectively. The above set design parameters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Optimized Model of Radix-4 Booth Multiplier in VHDL

    In this paper, the authors describe optimized radix-4 booth multiplier algorithm for multiplication of two binary numbers on VHDL device. Radix-4 Booth's algorithm is presented as an alternate solution of basic binary multiplication, which can help in reducing the number of partial products by a factor of 2. Radix-4 Booth's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Analysis of CMOS Multiplier and EEAL Multiplier for Low Power VLSI Application

    A new design of adiabatic circuit, called Energy Efficient Adiabatic Logic (EEAL) is proposed. In adiabatic logic, which dissipates less power than static CMOS logic, have been adiabatic circuits called energy efficient adiabatic logic introduced as a promising new approach in low power circuit design. The adiabatic circuits are those...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Low Power Binary Floating Multiplier Using Bypassing Technique

    Floating point multiplication is used in many Digital Signal Processing (DSP) applications; this multiplication is costly in terms of area, delay and power consumption. Reduction in these parameters will greatly improve the performance of multiplier and this in turn will improve the performance of DSP systems. In this paper, a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Implementation of an Embedded Web Controller for Automation

    Now-a-days, the demand for adding Ethernet connectivity to home appliances has been on rise with the development of powerful processors and network technology. A user friendly interface to easy access the remote network device is an important issue for the embedded systems. Web pages can be used as a rich...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    S3dM: A Heuristic Based Ultrasonic 3D Modeler

    S3dM is based on the fundamental concept of using an ultrasonic sensor to measure distance in a particular direction. Along with the ultrasonic sensor it utilizes a combination of an accelerometer, servomotor and an actuator to generate the 3D coordinates of a room to facilitate in the creation of the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Coexistence of ZIGBEE and WI-FI Frame Control Protocol Simulation Using HMM

    In the midst of the coexistence problems for the 2.4-GHz Industrial, Scientific and Medical (ISM) band, interference between Wi-Fi and IEEE 802.15.4/ZigBee networks in particular has become a dominant problem because of the wide installation of Wi-Fi Access Points (APs). However, the coexistence of such heterogeneous wireless systems is still...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Study The Various Feeding Techniques of Microstrip Antenna Using Design and Simulation Using CST Microwave Studio.

    Microstrip patch antennas can be fed by a variety of methods. These methods can be classified into two categories-contacting and non-contacting. In the contacting method, the RF power is fed directly to the radiating patch using a connecting element such as a microstrip line. In the non-contacting scheme, electromagnetic field...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    The Wireless Transmission of Electricity with Earth Cloud Capacitor

    In this world of era the importance of electricity is not been hidden by any one and the another aspect of is the requirement and transmission of electricity from the points to its generation transmission and distribution. Here in this research paper the authors have trying to present a different...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    A Technique of Human Action Recognition Using 3D Convolutional Neural Network

    In this paper, the authors involve the study of 3D Convolutional Neural Network (CNN) and its application as human action recognition from a video data base. Human action recognition is very important in real world environment. The current methods used for action recognition are highly problem dependent. Therefore the automated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Semantic Web Development Through Ontology Evolution

    The ontology has been widely used in recent years in the field of artificial intelligence, computer and information science especially in domains such as, cooperative information systems, intelligent information integration, information retrieval and extraction, knowledge representation, and database management systems The continual need to be better and better, for a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Development of a Virtual Student Community to Communicate Via an E-learning Platform

    To improve the performance of E-Learning Platforms (ELPs), many evaluation studies have been performed, since learning provided by the platform is getting more customized, the evaluation becomes more complex, lengthy and costly and also requires the mobilization of a large number of students and professors to simulate the richest educational...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Implementation of Dual Signature in Java

    The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of credit card companies and software corporations to guarantee the authenticity of e-commerce transactions and the confidentiality of data. When the customer makes a purchase, the SET dual signature keeps his account details secret from the merchant and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Design and Implementation of 5 Stages Pipelined Architecture in 32 Bit RISC Processor

    The proposed paper is the design of a 32 bit RISC (Reduced Instruction Set Computer) processor. The design will help to improve the speed of processor, and to give the higher performance of the processor. It has 5 stages of pipeline viz. instruction fetch, instruction decode, instruction execute, memory access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Goodbye Wires: Approach to Wireless Power Transmission

    In this paper, the authors are dealing with the concept of transmitting power without using wires. The various technologies available so far for wireless transmission of electricity and the need for a wireless system of energy transmission is being discussed here to find its possibility in actual practices, their advantages,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Tracking Location in the Absence of GPS Using Smart Phones

    The objective of this paper is to review existing research done on mobile phone based dead reckoning and to integrate algorithms from various existing research together in a single algorithm incorporating step detection, orientation detection, step length calculation, which gives a good estimated location even in the absence of GPS,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    A Critical Review of Software Reliability

    Taxation of software reliability is an area of the utmost prominence for software-based systems active in safety-critical applications such as computer relaying of power transmission lines. Software Reliability is the probability of failure-free software operation for a specified period of time in a specified environment. Software Reliability is an important...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Architectural Review: Evolution of Embedded Digital Signal Processors

    Digital Signal Processing is one of the most powerful technologies that will shape science and engineering in the twenty-first century. Revolutionary changes have already been made in a broad range of fields: communications, medical imaging, radar & sonar, high fidelity music reproduction, and oil prospecting, to name just a few....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    Data Privacy and Security Using Web Services

    Internet has become a powerful tool for communication and transferring the data between the two parties across the world. Private data or other important information are being exchanged between two parties which has changed the way of communicating. But along with the advantage, the main disadvantage of this capability is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    A Study on Various Methods of Gender Identification Based on Fingerprints

    Within today's environment of increased importance of security and organization, identification and authentication methods have developed into a key technology. Fingerprints are one of the most mature biometric technologies and are considered legitimate proofs of evidence in courts of law all over the world. This paper highlights the various ridge...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Performance Comparison of Stability Enhanced AODV and AOMDV Protocols for MANETs

    Ad hoc network is one sort of multi-hop, self-organizing and dynamically changing network. There are various challenges in designing a wireless ad hoc network like dynamic topology, limited and shared bandwidth and limited battery power. Generally the nodes in the wireless ad hoc network are mobile, due to that the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Performance Evaluation of AODV Under Blackhole Attack

    MANETs (Mobile Ad-Hoc NETwork) is the setup of the network under non-permanent conditions in which wireless mobile computers which moves in the environment randomly in the environment. The nodes maintain the connectivity in distributed manner. As these nodes communicate with each other and cooperate with each other in forwarding the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Comparative Performance Evaluation of Three Object Tracking Methods

    Object tracking is the process of locating a moving object in the consecutive video frames. It is a challenging problem in the field of computer vision, automated surveillance, traffic monitoring, augmented reality, and object based video compression, etc. In this paper three techniques such as kernel based tracking using color...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Learning Solutions for Decreasing the Software Complexity to Improve Software Security

    This paper argues the expansion and development of software and studies the problems of production and maintenance of it such as software complexity. Then the authors explain about the issue of security in software and they express the relation between software security and its complexity. Finally, they will review the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Performance Analysis and Comparison of Adaptive Filters for Wireless Channel Equalization

    In this paper, the authors have applied radial basis function neural networks for equalization of wireless channel in the presence of additive noise. They have been tested the adaptive filter algorithms of simple Kalman filter, extended Kalman filter, rbfn Kalman filter, rbfn extended Kalman filter, fuzzy Kalman filter and fuzzy...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Anomaly Detection in Network Using Data Mining Techniques

    As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall, etc. but all of these are too static to give an effective protection against attack and counter attack. The authors use...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Authentication Watermarking for Transmission of Hidden Data Using Biometrics Technique

    This paper covers, a novel scheme of protecting hidden transmission of biometrics using authentication watermarking. The proposed scheme uses watermark embedding algorithm. Compared with traditional personal identification techniques such as passwords and personal identification number codes, automated biometrics authentication provides a convenient and reliable method in diverse application but their...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Sequential Sequence Mining Technique in Mammographic Information Analysis Database

    The Sequential Sequence Mining produces large sequences of biomedical data. It provides the opportunities for data analysis and knowledge discovery. The Sequential Sequence Mining provides the efficient and scalable methods to extract the sequences of interest in datasets. The synthetic dataset was taken of the medical images of mammography. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Heuristics Based on Object Oriented (OO) Metrics

    The aim of Object Oriented (OO) Metrics is to predict the quality of the object oriented software products. Various attributes, which determine the quality of the software, include maintainability, defect density, fault proneness, normalized rework, understandability, reusability etc. Heuristics plays an important role in software development and is widely used...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Mobile Agent Technology and Its repercussion in Wireless Sensor Networks

    Mobile Agent is the computer program which can automatically move among different network hosts and perform the user's operations. A Mobile Agent characteristic is being automatic, cooperative, mobile, secure and intelligent. These are agents that can physically travel across a network, and perform tasks on machines that provide agent hosting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    An Intelligent Algorithm for Software Effort Estimation

    The most significant activity in software development is to develop projects within confined time and budget. As accuracy plays a vital role for software system. Prediction of effort estimation is one of the critical tasks required for developing software. In this paper, the authors perform the performance study of fuzzy...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Developing Java Web Services Using WSDL

    Because of reusability advantage many business applications are developed using Service Oriented Architecture (SOA). Using Web services the authors can integrate different modules of business logic. Main components of SOA based applications are service provider, service consumer and service repository. Communication between these components is achieved by exchanging SOAP messages,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Photonic Crystal Fiber as Low Loss Dispersion Flattened Fiber and Ultra-Low Confinement Loss

    In this paper, a photonic crystal fibre structure with different air hole sizes is proposed. Multipole method is used for the analysis of this PCF. The PCF has five rings of air holes to analyze the dispersion and confinement loss properties. It is found that the proposed PCF has ultra-flattened...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Parallel Computing: High Performance

    This paper elucidates the importance of parallel computing in various areas like processors design, systems design. Parallel computing plays a vital role in computer architecture where the architect considers the computation as a crucial thing. The change to parallel microprocessors is a milestone in the history of computing. And this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Intermittent Fault Diagnosis on WSNs Using an Energy Efficient Clustering Technique

    Wireless sensor network is a self-organized network that consists of a large number of low-cost and low-powered sensor devices, called sensor nodes, which can be deployed in harsh environment; sensor nodes are prone to have faults. It is thus desirable to detect and locate faulty sensor nodes to ensure the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2011

    A New Software Test Model "Graph Model"

    Organizations that are developing custom software solution are faced with the difficult choice of picking the right Software Development Life Cycle (SDLC). Defining or selecting an SDLC should be undertaken as a project with full time resources that have the appropriate level of expertise. It is an extremely high leverage...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2011

    Applying Feedback Mechanism For Content Based Image Retrieval Using Data Mining Technique

    A project that rigging and tests a simple color histogram based search and recover algorithm for images. The study finds the technique to be helpful as shown by analysis using the Rank Power measurement. The testing also highlights the weaknesses and strengths of the model, ultimate that the technique would...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2011

    A New Technique for LBP Method to Improve Face Recognition Under Varying Lighting Conditions

    LBP is a very powerful method to describe the texture and shape of a digital image. Therefore, it appeared to be suitable for feature extraction in face recognition systems. A face image is first divided into small regions from which LBP histograms are extracted and then concatenated into a single...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Temperature and Humidity Data Analysis for Future Value Prediction Using Clustering Technique: An Approach

    Knowledge of climate data in a region is necessary for business, society, agriculture, pollution and energy applications. In research and development, it makes the researchers to pay an extra attention towards this type of matter. As there is a impressive achievement in this field over the past few years, among...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Temperature and Humidity Analysis Using Data Logger of Data Acquisition System: An Approach

    The data logger is an invaluable tool to collect and analyze experimental data, having the ability to clearly present real time analysis with sensors and probes able to respond to parameters that are beyond the normal range available from the most traditional equipment. The differences between various data loggers are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Optimization of Repeater Spacing for Terrestrial and Undersea Fiber Optic Communication

    Repeater spacing in fiber optic communication is optimized taking into consideration various parameters such as fiber attenuation, Stimulated Brillouin Scattering (SBS), Stimulated Raman Scattering (SRS), fiber attenuation, photodiode sensitivity and input power. In the authors' paper, they have taken a trade off between power threshold in order to reduce SBS...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Study of the Ultrafast Configuration and Efficient Performance Mechanism of SOA-MZI Switching Devices

    In the paper, the inference of Cross-Phase Modulation and Cross Gain experiments on InGaAsP-based semiconductor optical amplifiers and Mach-Zehnder Interferometer (MZI) switches along with a novel characterization method for semiconductor optical amplifiers MZI switches which combines a pump-probe measurement with an interferometer bias scan are shown. For the 150-fs input...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Analysis of Quadratic Prime Code for Modified Bluetooth FH Communication System

    FH communication is a branch of spread spectrum communication for its outstanding advantages of strong anti jamming and anti-multipath fading. It is widely used in military and civilian applications for its well performances. In FH communication system, FH (Frequency Hopping) sequences are used to hop the frequencies for transmission and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Simulation Based on an Effective Defence Against Duplicate Node Attacks in Wireless Networks

    To achieve an efficient and effective approach to find out the duplicate node attacks in the wireless sensor networks still must be a challenge. Attacker, the user can capture the node form the network and compromise over the network. Attacker he captured any node from the network by using the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Survey on Classification of Imputation Methods in Data Mining

    In data mining one important stage is pre-processing. In which there are different mining tasks for it. In real world most of the data are noisy, inconsistent and incorrect. In fact, the most important step in pre-processing is filling (or handling) missing value. Missing data imputation is an important step...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Wireless Network Security Protocols: A Comparative Study

    In recent years, wireless networks have gained rapid popularity. Wireless networks are inexpensive and provides mobility but they are prone to a variety of threats like denial of service, replay attacks, eavesdropping and data modification. This paper discusses the three wireless security protocols with details about the encryption methods used,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Indicators for Detecting Sinkhole Attack in MANET

    Due to fundamental characteristics, routing protocols in wireless Mobile Ad hoc NETworks (MANETs) are particularly vulnerable to attack as the medium is easily monitored, the topology of the network is dynamic, the networking protocol rely on distributed cooperation of the nodes, and the nodes have constrained capabilities, lack of a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Human Tracking in Video Surveillance

    In the last decade, due to the increase in terrorist activities and general social problems, providing security to citizens have become the top most priorities for almost all the nations and for the same, a very close watch is required to be kept in the areas that needs security. Keeping...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis

    Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    A Novel CPW-Fed Ultra Wide Band T-Shaped Slot Antenna Design

    A Novel Compact Coplanar Ultra Wide Band Slot Antenna is proposed in this paper. The physical size of proposed Antenna is 19mm (L) ? 20 mm (W) ? 1.6 mm (T). The characteristics of the desired antenna are designed by the simulation software HFSS based on FEM method. The simulation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Best Effort Quality of Services Provided to Random Traffic Demands in WDM Networks

    The authors consider the problem of the best effort Quality Of Service (QOS) provided to random traffic demands in WDM networks. In general, when a new random demand arrives at the network, this demand is accepted only based on the available network resources at its instant of arrival. In such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Generic Approach in Automation and Sensors for Enhanced Efficiency

    The focus of this paper is on increasing the efficiency of the automation process, so that the overall cost of the manufacturing process can be minimized. Efficient power estimation during the design phase is required, in order to meet the power specifications without a costly redesign. Power consumption is an...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)