International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 161-200 of 921 results

  • White Papers // Apr 2014

    Searching Research Papers Using Clustering and Text Mining

    As the users required more time to search as well as to read the research papers. It consumes more than two to three hours to read a single paper, so it is necessary to move word new search engine based on fastest reading algorithm which provide best result. This will...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Data Integrity Proof in Cloud Storage

    Cloud computing is an important application for storage of data in the cloud. Cloud computing platform avoid the burden of local data storage and also reduce maintenance cost. In cloud storage data is move to a remotely located cloud server on which user does not have any control. Cloud faithfully...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Comprehensive Survey of Frequent Item Set Mining Methods

    In this paper, the authors are presenting an overview of existing frequent item set mining algorithms. Now-a-days frequent item set mining is a very popular and computationally expensive task. They have also explained the fundamentals of frequent item set mining. They have described today's approaches for frequent item set mining....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Ontology in Text Mining to Cluster Research Project Proposals

    For government & private research funding agencies, research project selection is important task. For large number of proposals, it is common to group according to their disciplines. These proposals are then sent to appropriate expert for peer review. Due to their subjective views & mis-interpretations, the research discipline cannot be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Declarative Environment for Performance Evaluation in IaaS Clouds

    Cloud computing infrastructures are providing resources on demand for tackling the needs of large-scale applications. Finding the amount of resources to allocate for a given application is a difficult problem though. Many cloud providers' offers programmatic ways to quickly acquire and release resources, it is vital that users have a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Technique for Migration to IPV6 for a Secure SCADA Architecture

    Supervisory Control And Data Acquisition (SCADA) systems refer to Industrial Control Systems (ICS): computer systems that monitor and control industrial, infrastructure, or facility-based processes. The tremendous increase in the number of network connections to the SCADA systems has made the network more susceptible to attacks by hackers. The vendors of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Detection and Prevention of SQL Injection Attacks on Database Using Web Services

    The Web applications which the authors are using in present times contain huge amount of information. But the implementation of these applications is not very much secured. They are vulnerable to a variety of web based threats. One of these threats is SQL injection attacks. In these kinds of attacks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Design of a High Speed FFT Processor

    The Discrete Fourier Transform (DFT) is used to transform the samples in time domain into frequency domain coefficients. The Fast Fourier Transform (FFT) is a widely used algorithm that computes the Discrete Fourier Transform (DFT) using much less operations than a direct realization of the DFT. FFTs is of great...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Comparative Study of Techniques in Data Mining

    Data mining encompasses tools and technique for the \"Extraction or mining of knowledge from huge repository of data\". In data mining various techniques that used are association rule mining, sequential pattern mining, clustering, and classification. Varieties of algorithms are developed for each of these techniques. This paper present comparison of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology

    Android is the latest and a rapid growing technology available for all the users or customers in today's market. An enormous increase in the end user acceptance has been experienced in the past few years. This paper has been developed on the bus information system in Pune. This paper proposes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Green Cloud : Efficient Use of Cloud Resources & Conservation of Energy at Data Centers

    Conventional office-based computing is been replaced by network-based cloud computing to a greater extent in recent years. As cloud computing is expanding rapidly, there is an increase in energy consumption of the network and computing resources that underpin the cloud. Data center energy use has received much attention recently, minimum...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Automatic Semantic Rule Extraction in Similar Web Sites using Memetic Algorithm

    Acquiring knowledge is based on the type of ontology in web mining, and using ontology as a knowledge schema in the knowledge acquisition is more common than rule acquisition. As ontology acquisition the rule acquisition is an important, even supposing rule acquisition is still a slowdown process in the deployment...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Dynamic Resource Allocation in Cloud Environment

    Cloud computing is a synonym for distributed computing over a network. The phrase is often used in reference to network-based services which appear to be provided by real server hardware, but are in fact served up by virtual hardware simulated by software running on one or more real machines. Such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Avoiding the Security Attacks by Hardening the Cloud

    Cloud redefines computing by replacing the conventional client server organization-centric model with a more flexible and responsive data-centric model. Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Security is one of the major concerns...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Performance Study of Energy Detection Based Spectrum Sensing for Cognitive Radio Networks

    In this paper, the authors evaluate the performance of the energy detection based spectrum sensing technique in noisy and fading environments. Both single user detection and cooperative detection situations were investigated. Closed form solutions for the probabilities of detection and false alarm were derived. Analytical results were verified by numerical...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Data Aggregation Protocols to Prolong Network Lifetime in Wireless Sensor Network

    Wireless sensor network is made up of low-cost sensor nodes. Sensor nodes are deployed over an geographic region to sense the region. In wireless sensor network base station queries the sensor nodes; sensor nodes send the sensed data to base station. Sensed data contains redundant data because collected by various...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Ensuring Unharmed and Confidentiality Process Information Security Tolerate in Correlative Information Sharing

    The relationship of two or more objects that does not be depends on each other. It is the most common trouble on the Internet. It mainly concerned about the precise problem of sharing the data between the not trusted parties. Previous paper in this area shows that privacy and services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Comparing Various Black Hole Attack Prevention Mechanisms in MANETs

    Mobile ad-hoc network is a temporary wireless network. It is a network which is self-configuring in which nodes moves freely and continuously. As a result the network topology also changes dynamically. Such networks are highly dynamic in nature and nodes communicate without a proper infrastructure. Various routing protocols employed by...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Design a Binary Neural Network Classifier Algorithm with Parallel Training in Hidden Layer

    Since last decade, classification methods are useful in a wide range of applications. Classification is a task to group the sample having similar properties. This capability can be introduced in computer system by designing various types of classifiers. Neural network is one of the artificial intelligent techniques that have many...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Secure Time Synchronization for Wireless Sensor Network

    Wireless sensor network is innovative research area for some research scholars. Time synchronization is the vital part in the Wireless Sensor Network (WSN) due to the requirement of coordination between sensor nodes. Also security plays important role to avoid attacks on time synchronization. In this paper, the authors have shown...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Encourage for VANET Based Traffic Information Sharing System on BRTS

    In this paper, the author propose a process which proficiently accumulate, maintains and proliferate traffic information using inter-vehicle communication with \"Message shipping\" technique used in Vehicular Ad hoc NETwork (VANET). In the proposed process, they use buses (bus route transit system) as message shipping which travel along regular routes. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Person Recognition Using Multimodal Biometrics

    Unimodal biometric systems often face significant limitations due to sensitivity to noise, interclass variability, data quality, no universality, and other factors. To improve the performance of individual matchers in such situations may not prove to be highly effective. Multi-biometric systems seek to alleviate some of these problems by providing multiple...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Vehicle Security System

    The revolution of technology has made vehicle security system. The car security system is prominent worldwide but not a secure system. So by implementing the authors' own ideas a vehicle security system is designed which is a multi functionality embedded system which provides emergency indication to prevent accident. This embedded...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Security Enhanced Ad hoc Routing

    In present era the security has become one of the major issues for data communication over wired and wireless networks. Apart from the earlier work on the designs of cryptography algorithms and system infrastructures, the authors will propose an ad hoc routing algorithm that could randomize delivery paths for data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Comparative Study of Simulators for Vehicular Ad-hoc Networks (VANETs)

    Vehicular Ad hoc NETworks (VANETs) are classified as an application of Mobile Ad-hoc NETworks (MANETs) that has the potential in improving road safety and providing Intelligent Transportation System (ITS). Vehicular communication system facilitates communication devices for exchange of information among vehicles and vehicles and Road Side Units (RSUs). The era...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    EAANS: Energy Aware Adjacent Node Selection Based Optimal Shortest Path Detection in Wireless Sensor Network

    Wireless Sensor Network (WSN) is an ad hoc network based on radio transmission for communications. It has wide variety of applicability in healthcare, military, transportation etc. Getting optimized route in WSN depends upon the number of hops used to transfer the data packets. Lesser the hops counts effective will be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Performance Evaluation and Optimization of CDMA 2000 1X Mobile Cellular Radio Network

    Evaluation and optimization exercise after service rollout is to correct the expected errors in network planning and to achieve benefits such as improved network capacity, enhanced coverage and quality of service. The key performance indicators viz; call drop ratio, call setup success ratio, call failure rate, call connection rate that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Approach for Fault Detection and Recovery in WSAN: A Survey

    Wireless Sensor and Actor Networks (WSANs) refer to the collection of heterogeneous elements linked by wireless medium to perform distributed sensing and acting tasks. The realization of wireless sensor and actor networks needs to satisfy the requirements introduced by the coexistence of sensors and actors. In WSANs, sensors gather information...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Quick Message Authentication Protocol for Vehicular AD HOC Networks

    Public Key Infrastructure (PKI) plays very important role in Vehicular Ad hoc NETworks (VANETs). In this system; confirmation of received message can be done by checking the sender's certificate is included in the Certificate Revocation Lists (CRLs), which means checking its revocation status, then, substantiating the sender's certificate, and finally...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Enhanced Protection for Routing in IP Networks

    Failure of packet delivery due to routing failure which is common on Internet and routing protocol cannot always react fast to recover from them. To overcome this problem fast reroute solution have been proposed to guarantee reroute path availability and avoid high packet loss after network failure. It is quite...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Cloud Based: Video on Demand Mobile Social TV

    Today Smartphone combines the features of a mobile phone with those of another popular consumer device, such as a personal digital assistant, a media player, a digital camera, and/or a GPS navigation unit. Modern Smartphone include all of these features plus the features of a laptop, including web browsing, Wi-Fi,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Routing Protocols and Security Issues in MANET: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which are dynamic in nature and they communicate with each other without any help of a preinstalled infrastructure, access point or centralized administration. One of the major challenges in a MANET is to design the robust routing algorithms. Routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Network Security Concept and Protection

    Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Data Mining Techniques in Parallel and Distributed Environment- A Comprehensive Survey

    Distributed sources of voluminous data have raised the need of distributed data mining. Conventional data mining techniques works well on structured data which is clean, pre-processed and properly arranged either in the form of structured files, databases or data warehouse. These techniques are based upon centralized data store however they...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Role of Cloud Computing in Business Intelligence: A Review

    Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers that are connected through a real-time communication network. The cloud also focuses on maximizing the effectiveness of the distributed resources. Cloud computing has become a prominent...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Taxonomy on Cloud Computing

    Cloud computing premise is very similar in that it provides a virtual computing environment that's dynamically allocated to meet user needs. From a technical perspective, cloud computing includes Service Oriented Architecture (SOA) and virtual applications of both hardware and software. In this new world of computing, some have conjectured that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Pattern Mining Techniques of Data Mining

    Frequent patterns are patterns that appear in a data set frequently. This method searches for recurring relationship in a given data set. Several techniques have been proposed to improve the performance of frequent pattern mining algorithms. This paper presents revision of different frequent mining techniques including Apriori based algorithms, association...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Preservation of Privacy for Multiparty Computation System with Homomorphic Encryption

    Data mining is the task of discovering significant patterns/rules/results from a set of large amount of data stored in databases, data warehouse or in other information repositories. Even though the focus on data-mining technology has been on the discovery of general patterns some data-mining applications may require to access individual's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    RFID Based Automatic Billing Trolley

    Now-a-days purchasing and shopping at big malls is becoming a daily activity in metro cities. The authors can see huge rush at malls on holidays and weekends. The rush is even more when there are special offers and discount. People purchase different items and put them in trolley. After total...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Multiple Multicast Services in Wireless Network with Reduction of Storage Overloading

    Mutlicast environment are likely to work in multiple group rather than a single group. Where Group Key Management (GKM) able to provide security only to the single group, where multiple group cannot be handled by GKM due to overhead. The MKE-MGKM scheme exploits asymmetric keys, where mater key is generated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Optimization of Repeater Spacing for Terrestrial and Undersea Fiber Optic Communication

    Repeater spacing in fiber optic communication is optimized taking into consideration various parameters such as fiber attenuation, Stimulated Brillouin Scattering (SBS), Stimulated Raman Scattering (SRS), fiber attenuation, photodiode sensitivity and input power. In the authors' paper, they have taken a trade off between power threshold in order to reduce SBS...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Comparative Study of the Performance of Precoded MIMO Using Trellis and STBC

    Spatial modulation is a transmission technique that uses multiple antennas. It involves mapping of a block of information bits to two information carrying units, as a symbol chosen from constellation diagram and a unique transmit antenna number. The importance of Spatial modulation is that it increases overall spectral efficiency. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Enhancement of MIMO Systems Using Antenna Selection Algorithm

    Multiple-Input Multiple-Output (MIMO) systems are anticipated to be widely employed to address the ever increasing capacity demands for wireless communication systems. MIMO technology is one solution to attain this by transmitting multiple data streams from multiple antennas. Increasing the number of transmit and receive antennas enables to improve system performance,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algorithm

    Distributed file systems are key building blocks for cloud computing applications based on the MapReduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functions; a file is partitioned into a number of chunks allocated in distinct nodes so that MapReduce tasks can be performed in parallel...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Routing for Mesh-of-Tree in Multicluster Systems Based on Communication Networks

    It is increasingly important to understand the capabilities and potential performance of various interconnection networks. An analytical model for communication network in cluster systems have been widely reported. Several analytical models of interconnection networks of multi-cluster systems under uniform traffic pattern have been proposed in the literature. However, there has...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Using OPR

    This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. Most existing ad hoc routing protocols are susceptible to node mobility, especially for large-scale networks. Driven by this issue, the authors propose an efficient Position-based Opportunistic Petal Routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Efficient Bandwidth Utilization Mech-Anism for Consistent Routing in Wireless Mesh Networks

    A wireless mesh network has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area. In this paper, the authors use the existing methods for calculating the bandwidth of a path for wireless networks and using it they provide an...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detecting Selfish Routing and Misbehavior of Malicious Node in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) exploit the intermittent connectivity between nodes to transfer data. It follows a store-carry-forward mechanism to transfer data. A node misbehave by dropping packets and acts selfish as they are unwilling to spend resources such as power and buffer on forwarding packets of other nodes. In such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Resisting Password Based Systems From Online Guessing Attacks

    Authentication to users account to access web services online is achieved using passwords. These passwords are prone to guessing attacks namely brute force and dictionary attacks. Password guessing attack is a method of gaining unauthorized access to one's computer system. Online guessing of passwords is commonly observed in web based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Enhancement by Using Optimum Beamforming Algorithm in Cognitive Network

    Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Neighbor Coverage Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks

    Traditional routing protocols in Mobile Ad hoc NETwork (MANET) send periodic messages to realize the changes in topology. Sending periodic messages cause overhead. Compared to proactive routing protocols, reactive routing protocols can cause less overhead. Broadcasting can cause broadcast storm problem .To discover the route better than broadcasting methodology rebroadcast...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detection of E-Mail Senders With SMTP Extension

    E-mail spam is one of the most common problems that the people face in their day to day life. There exists massive number of spams sent from justifiable home computers that comprises of a malware called as bot. The current scheme to identify mail senders called as Domain Keys Identified...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Comparative Study on Performance of Various Channels Modelling in MIMO Systems

    This paper proposes comparative study on the performance of various channel models. The channel model is also the factor which is considered in the network performance evaluation. As this channel model influences network performance their characteristic (modeling) should be well defined, but as in practical case it is not possible...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    The Relationship Between IPv7 and the Turing Machine

    Real-time technology and agents have garnered limited interest from both end-users and cyber informaticians in the last several years. Contrarily, an extensive obstacle in noisy cyber informatics is the understanding of introspective information. The notion that researchers agree with 802.11b is rarely significant. The emulation of write-ahead logging would profoundly...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detection of Accuracy for Intrusion Detection System Using Neural Network Classifier

    In recent years, the security has become a critical part of any industrial and organizational information systems. The intrusion detection system is an effective approach to deal with the problems of networks and so different classifiers are used to detect the different kinds of attacks. In this paper, the performance...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Intrusion Detection in Multitier Web Applications

    Intrusion detection systems endeavor at detecting attacks against computer systems and networks that offer techniques for modeling and distinguish normal and abusive system behavior. Web Applications are widely used for critical services and sophistication of attacks against these applications has grown as well. In this paper, the authors designed IDS...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    PDIR:Pre-Deployed Infrastructure Routing for Secure Ad Hoc Networks

    Secured routing is the emerging issue in ad hoc networks. One of the major problems in routing is malicious attacks, which are not only possible from outsider nodes but also from compromised nodes within the network. This vulnerability will affect the integrity of the network. In this paper, the authors...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Peer to Peer Node Groupings Based on Content Using Game Theoretic Strategy in Inter-Networks

    Peer-To-Peer systems (P2P) have grown-up drastically in recent years. Peer-to-peer suggests the probable low cost sharing of information, autonomy, and privacy. In Peer to Peer network game theory will be the main tool for modeling and analyzing node behavior. In the authors' concept the participant or nodes are linked based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detecting Routing Misbehavior and Enhancing the Security in Disruption Tolerant Network

    Disruption tolerant network exploit the intermittent connectivity between mobile nodes to transfer the data. In such networks, selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Intelligent Agents for Intrusion Detection System (IAIDS)

    This paper presents a distributed wireless Intrusion Detection System (IDS) based on Intelligent agents. Intelligent agents are randomly traveled in difference nodes which are connected with the network. Each agent may perform specific tests (like mobile sensors). When the test indicates some possibility of an intrusion, the agent may ask...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    To Detect and Recover the Authorized CLI-ENT by Using Adaptive Algorithm

    Computer network is collection of computers and other hardware components interconnected by communication channels that allow sharing of information. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible re-sources. Network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Enhancing Data Delivery with Path Predictable Mobile Observer in Wireless Sensor Networks

    The recent advances in processor, memory, and radio technology have enabled the development of distributed networks of small, inexpensive nodes that are capable of sensing, computation, and wireless communication. Sensor networks of the future are envisioned to revolutionize the paradigm of collecting and processing information in diverse environments. However, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    A Review of Performance Evaluation of AODV Protocol in Manet with and Without Black Hole Attack

    Mobile ad-hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Maintaining Location Privacy and Anonymity for Vehicle's Drivers in VANET

    Vehicular Ad-hoc NETwork (VANET) is an emerging technology that aims at providing both safety and comfort for drivers. One of the most important evolving VANET applications is Location-Based Services (LBS). These applications require providing continuous user location updates to untrusted Location-Based Service Providers (SPs), in order to provide real-time services....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Maximal Ratio Combining SC-FDMA Performance Over Land Mobile Satellite Rice Fading Channel

    The fourth generation mobile communication has used MIMO (Multiple Input Multiple Output) technology to improve system performance. MIMO can be used to get better capacity, coverage, high data rates and throughputs. Land Mobile Satellite (LMS) systems are an important element of the third and fourth generation of wireless systems. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2012

    Analysis of Intrusion Detection System Using Trusted Clients

    Traditionally firewall has been used to stop the intrusion attempts by an attacker. But firewalls have static configurations that block attacks based on source and destination ports and IP addresses. These are not sufficient to provide security from all the attacks. Therefore, the authors need IDS type systems which could...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Boosting the Efficiency in Similarity Search on Signature Collections

    Computing all signature pairs whose bit differences are less than or equal to a given threshold in large signature collections is an important problem in many applications. In this paper, the authors leverage MapReduce-based parallelization in order to enable scalable similarity search on the signatures. A road-block in using MapReduce...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Refining Anomalistic Malicious Attacks in Sovereign Setup

    Internet is a widely used technology, globally interconnected networks with the use of standard Internet Protocols (IP) to aid abundance of users across the globe. Recently, Internet is afflicted by malicious actions such as spam, phishing to malware, Denial-of-Service (DoS), Man in the middle attack, Eavesdropping attacks etc. Much of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Reduction of PAPR in SFBC-OFDM System Using Clipping and Differential Scaling

    Orthogonal Frequency-Division Multiplexing (OFDM) is a well-known technique for transmission of high rate data over broadband frequency-selective channels that mitigate Inter-Symbol Interference (ISI) caused by the delay spread of wireless channels. Space Frequency Block Coded technique (SFBC) is a spatial diversity technique used to achieve full transmission diversity with higher...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Multihop Energy Efficient Reliable and Fault Tolerant Routing Protocol for Wireless Sensor Networks

    The work in this paper aims at designing a multi-hop energy efficient, reliable and fault tolerant routing protocol. It proposes to maintain an asymmetric network of sensors so that the nodes get a chance to configure their transmission ranges best, and thus delivers data to the base station using as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Biometrics in Access Control System

    This paper describes an automated fingerprint authentication system fusing two different technologies viz. embedded and biometrics accessible to the persons who are authorized by the officials using bio-metric identification of finger print. The system operates in both online and offline mode. The fingerprint reader is an optical reader that captures...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Mesh Based Video Streaming in Heterogeneous Distributed Environment

    Video has been an important media for communications, education and entertainment for many decades. Streaming video over the distributed environment is extremely popular, because of its higher availability, efficiently in playback delay and scalable load management. Many applications like e-learning, Skype, YouTube and games, are require simultaneous streaming of video...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Performance Improvement of Authentication of Fingerprints Using Enhancement and Matching Algorithms

    Fingerprint is one of the most extensively used biometric systems for authentication in areas where security is of high importance. This is due to their permanence, accuracy and reliability. However, extracting features out of degraded fingerprints is the most challenging in order to obtain high fingerprint matching performance. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Real-Time Integration of Cloud and Local ERP Through Middelware

    The Middelware Architecture helps to provide powerful real time integration between Software as a Service (SaaS) application of any Cloud within house application like SAP, ERP. Now the user can achieve that integration quickly, reliably and worry-free using through Middelware. There are many worldwide leader in on-demand or Software-as-a-Service (SaaS)-...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Signal Shaping in Single and Multi Carrier Transmission for Optical Wireless Communication

    Signal shaping is a framework for optical wireless communication. The single carrier transmission using pulse amplitude modulation and multi carrier transmission realized through multi level quadrature amplitude modulation was done for optical wireless communication. Through scaling and DC-biasing the transmitted signal is optimally conditioned in accord with the optical power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    LTE: Beyond 3G: A Promising Technology for Next Generation Mobile Platform

    Today is the era of any time any where always on application i.e., high speed internet access. In this fast growing scenario as the user demand for higher bandwidth increases so does its speed and higher rates are also in demand. The current environment almost does not meet the combating...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Survey on MAC Protocol for Wireless Sensor Network

    Designing wireless sensor networks with the capability of prolonging network lifetime take the attention of many researchers in wireless network field. The Wireless Sensor Networks (WSNs) are used in a wide range of applications to capture, gather and analyze live environmental data. WSNs are an emerging technology that has become...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Securing a Firm's Computer Operating System : Trusted Platform Module

    Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design of Reconfigurable and Adjustable Wireless CORDIC Single Core Rake Receiver

    In wireless communication system transmitted signals are subjected to multiple reflections, diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by signal cancellation. Rake receiver...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Usability and Comparisons of Passwords

    Mobile devices such as cell phones/tablets laptops are widely used nowadays, during the last years phones changed from simple phones to smart phones with an increasing number of features. People feel easy to store their information on these devices so that they can get their required information whenever they want....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)