International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 161-200 of 757 results

  • White Papers // Oct 2013

    Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks

    The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to identify malicious, selfish and compromised nodes. It supports the decision making processes in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Missing Value Imputation of Mixed Attribute FCM Clustered Data Sets Using Higher Order Kernels

    Data mining is the efficient discovery of previously unknown, valid, potentially useful, understandable patterns in large datasets. There is a need for quality of data, thus the quality of data is ultimately important. The existing system provides a new setting for missing data imputation, i.e., imputing missing data in data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Dual Sentinel: Intrusion Detection and Prevention System

    Now-a-days, the use of internet has been increased so rapidly and on large scale which has increased the number of applications and complexity of data. In order to deal with this increase in application and data complexity, web services are designed as multitier services. In this paper, the authors present...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Privacy Preserving Data Publishing of Numerical Sensitive Data

    Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper, the authors have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond k-anonymity. Principles designed in-order to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Packet-Hiding Methods for Preventing Selective Jamming Attacks Using Swarm Intelligence Techniques

    The selective jamming attacks can be launched by performing real time packet classification at the physical layer. To mitigate these attacks develop a scheme that prevent real-time packet classification by combining cryptographic primitives with physical layer attributes. The Swarm intelligence algorithm is proficient enough to adapt change in network topology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Overview of Vulnerability Analysis

    In recent years most of the applications are web based and software based so it is important for these applications to communicate with other system or application in network so it increase growth of cyber-crime and associated risk are forcing most business application to be focus on information security. Vulnerability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    PICQUET: Controlling Malicious Nodes in a Network

    Now-a-days there are many assailants were trying to attack on server using various tools but there are also some firewall present for prevent it. But in case of using Linux OS firewall has some of disadvantages - filters incoming n outgoing packets only, system oriented (separate for each node), doesn't...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Multi Cloud Architecture to Provide Data Security And Integrity

    Cloud servers are being used to store data and application but its security is a major issue in current context. To solve the data security problems in public environment the authors propose an effective model for security and integrity of data stored in a cloud, through data segmentation followed by...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    SPARSH Data Security in Cloud

    Today's scenario, the transfer of data through the cloud without providing the security to the data or information is a major problem. In some of the case, data gets transfer through the cloud with security and the security is provided by using username and password .But password is not the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Secure Intelligent Transportation System Protocol for VANET Using SMAP

    A Vehicular Ad-hoc NETwork (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to receive message. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Proposed Model of Block Based Symmetric Cipher

    In this paper, the authors presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, PDF, audio. Using decryption model, decrypt same data. Due...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Off-line Signature Verification Using Artificial Neural Network

    In this paper off-line signature verification and recognition using a new approach that depends on an artificial neural network which discriminate between two classes forgery and original signature. The proposed scheme is based on the technique that applies pre-processing on the signature, feature point extraction and neural network training and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Enhancing Security in a Distributed Examination Using Biometrics and Distributed Firewall System

    Online examination is a great opportunity for modern life and has seen exponential growth over the past decade. However, the tools used to present and administer this need to be coupled with efficient and reliable security mechanisms to ensure the medium can be established as a dependable one. Identification, authentication...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Survey on Location Based Routing Protocols for Wireless Sensor Network

    Wireless sensor networks are highly susceptible to attacks because of their open and distributed network structure as well as limited resource on the nodes. WSNs are used in critical monitoring and tracking applications. Therefore, routing protocols for such networks should take into consideration the trustworthiness of and the energy available...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Designing a Classifier with KFCM Algorithm to Achieve Optimization of Clustering and Classification Simultaneously

    In this paper, design a classifier with KFCM algorithm to achieve Optimization of Clustering and Classification simultaneously (KOCC) is proposed. This learning algorithm is used to solve any multiclass classification problem. In this Kernalized Fuzzy C-Means (KFCM) algorithm is used for enhance the robustness of the classifier. The training phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Deploying Sensor Nodes and Generating Malicious Attacks by Managing Key Management Technique of Network Test-Bed

    The WSN network was reliable and self contained unit that easily sense the networks and providing fastly data with little energy consumed. The reliability of this paper measured the performances of the all over networks with different parameters that discussed in the result section. The performance of WSN communication better...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Improved Face Recognition with Multilevel BTC Using YCbCr Colour Space

    This paper is to achieve a better efficiency in face recognition using Block Truncation Coding (BTC) using RGB and YCbCr colour space. Multilevel Block Truncation Coding is applied to image in RGB and YCbCr colour space up to four levels for face recognition. The experimental analysis has shown an improved...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Benchmarking and Analysis of NoSQL Technologies

    The social web generates terabytes of unstructured, user generated data, spread across thousands of commodity servers. The changed face of web based applications forced to invent new approaches to data management. The NoSQL databases were created as a mean to offer high performance (both in terms of speed and size)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    SMMCOA: Maintaining Multiple Correlations Between Overlapped Attributes Using Slicing Technique

    Knowledge discovery is the most discussed topic now a day. Data which is collected from various resources are processed through various stages and the output of this process is the knowledge which is previously hidden. Basically data mining is a technique whose outputs are previously unknown and potentially useful information...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Design and Implementation of Algorithms for Materialized View Selection and Maintenance in Data Warehousing Environment

    Data warehousing, data mining and online analytical processing represents some of the latest trends in computing environments and information technology application to large scale processing and analysis of data. Data warehousing technology is becoming essential for the effective business strategy formulation and implementation. For the success of any data warehouse,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Secured Data Transmission with Novel Parity Bit Scheme using MAES Algorithm

    In transmission and data storage of information security becomes more important in the fast evolution of data exchange. It is more important to protect the confidential data from unauthorized access. To overcome that difficulty, the authors examine the Advanced Encryption Standard (AES) and modify it, to reduce the calculation of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Synchronous Pattern Mining From Web Log Data Using Association and Correlation Rules

    In this paper, the authors introduce the concept of synchronous patterns, association and correlation rule, and search how they can be mined efficiently. The title of synchronous pattern mining is indeed rich. In this paper is dedicated to methods of synchronous item set mining. They can find synchronous item sets...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Advanced Two-Tier Android Mobile Security Using Cloud

    One of the newer operating system for smart phone is android which is gaining huge popularity. Advancement in computing speed, memory and hardware had lead to development of new applications. These applications make life more comfortable and advanced for the users. Some of these applications often deal with sensitive and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Simple and Secure Key Distribution in Grid Computing

    Grid computing is an emerging technology that provides seamless access to computing power and data storage capacity distributed over the globe for complex systems with large-scale resource sharing and multi-institutional collaboration. The internet is not security-oriented by design; there exist various attacks such as masquerading, replaying, modification, and denial of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Concise Evaluation of Issues and Challenges in MANET Security

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Novel Approach for Secure Communication of Digital Signature Using On-Demand Multipath Routing for Enhancing Network Security in Wireless Mobile Ad Hoc Networks

    With the advances of wireless communication technologies, small-size and high-performance computing and communication devices like laptops and personal digital assistants are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. This interest has led to two types of wireless...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Generic Log Analyzer Using Hadoop Mapreduce Framework

    There are various applications which have a huge database. All databases maintain log files that keep records of database changes. This can include tracking various user events. Apache Hadoop can be used for log processing at scale. Log files have become a standard part of large applications and are essential...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Efficient Query Evaluation Using Joins in Relational Database

    In a relational database all information can be found in a series of tables. A query therefore consists of operations on tables for retrieving the data from tables. In this paper, the authors will introduce the reader to the basic concepts of query processing and query optimization in the relational...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Study of Security Issues & Analysis of Risks for Mobile Agents Using SAB

    In mobile agent system where security is major issue to safe transfer the data by secure method. Mobile agents have autonomous software entity when a mobile agent works in the host environment due to security problem raises during functioning, for the high security it resume its execution in another host...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Study of Black Hole in AODV Based Mobile Adhoc Network

    Black hole attack is one of the major attacks in mobile ad-hoc network. This paper is the study review of black hole attack in mobile ad-hoc network. Mobile Ad-hoc NETwork (MANET) could be a assortment of mobile hosts while not the specified intervention of any existing infrastructure or centralized access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Privacy Preserving Clustering by Hybrid Data Transformation Approach

    Numerous organizations collect and share large amounts of data due to the proliferation of information technologies and internet. The information extracted from these databases through data mining process may reveal private information of individuals. Privacy preserving data mining is a new research area, which allows sharing of privacy-sensitive data for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Mining Multi Level Association Rules Using Fuzzy Logic

    Extracting multilevel association rules in transaction databases is most commonly used tasks in data mining. This paper proposes a multilevel association rule mining using fuzzy concepts. This paper uses different fuzzy membership function to retrieve efficient association rules from multi level hierarchies that exist in a transaction dataset. In general,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    3LAS (Three Level Authentication Scheme)

    Textual passwords are more commonly used in day to day life. They tend to be more vulnerable as far as security is concerned. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to hidden...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network

    In this paper, a new hybrid concept is proposed by analyzing the principle of the hybrid cryptography based on the combination of symmetric and message digesting. Moreover, the security and performance of the proposed concept will also estimate. In proposed concept the authors designed a new symmetric encryption algorithm and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Uncontrolled Illumination Rectification Using Wavelet Normalisation on Face Recognition

    In this paper, a novel illumination invariant preprocessing algorithm is introduced to overcome the illumination variation problems in face recognition. With this, the recognition system works effectively under a wide range of illumination variations. The system consists of three stages; preprocessing, a hybrid Fourier-based facial feature extraction, and recognition. Wavelet-based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Artificial Neural Network Based Signature Recognition & Verification

    The human signature is proven to be the most important for access. Signature of the person is proven to be the important biometric attribute of a human being which can be used to authenticate human identity. There are many biometric characteristics by which one can have own identity like face...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Rotation Invariant Approach of SURF for Unimodal Biometric System

    The people all have unique physiological characteristics that distinguish one from other people. Biometrics uses these unique characteristics (or identifiers) to ascertain and verify people identity. Fingerprint recognition involves the location and determination of the unique characteristics of the fingerprint. The fingerprint is composed of various 'Ridges' and 'Valleys', which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    XML With Cluster Feature Extraction for Efficient Search

    Searching is a very tedious process because, the people all be giving the different keywords to the search engine until they land up with the best results. There is no clustering approach is achieved in the existing. Feature selection involves identifying a subset of the most useful features that produces...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Improved Snort Intrusion Detection System Using Modified Pattern Matching Technique

    As the number of network attacks rise, the need for security measures such as Intrusion Detection Systems (IDS) is essential. IDS's are considered useful especially when new community hacking tools are emerging. Intrusion detection system identifies problems with security policies, documenting existing threats and detects individuals that violate the security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    A Review on Various Resource Allocation Strategies in Cloud Computing

    The computational world is becoming very large and complex. Cloud computing has emerged as a new paradigm of computing and also has gained attention from both academic and business community. Its utility-based usage model allows users to pay per use, similar to other public utility such as electricity, with relatively...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption

    Cloud computing is a general term for anything that involves delivering hosted services, scalable services like data sharing, accessing etc., over the web on demand basis. It uses the web and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Security Analysis of Cloud Computing: A Survey

    Now these days is golden days of computing the internet has changed the computing world in a drastic way. Now computer service is fast with the help of parallel computing, distributed computing grid computing and a new technique is cloud computing. And it is very beneficial for computing. The user...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Web Services & Database Services Availability through Multi-Cloud Environment

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Security from various Intrusion Attacks using Honeypots in Cloud

    Cloud computing means accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Now here in this paper an efficient technique of intrusion detection is proposed using the concept of honeypots. The data to be send by the cloudlets...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Microcontroller Based Tool Wear Monitoring during End Milling of Hardened Steel

    In the world of machining, cutting force is considered to be the important variable that best describes the cutting process. The cutting force signal provides rich information for tool wear in end milling operation, hence is considered for tool condition monitoring system. From experimental tests in end milling on AISI-D2...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Comparative Study of Weighted Clustering Algorithms for Mobile Ad Hoc Networks

    Routing in MANET is different from routing in wired network. One way to reduce routing overhead is to divide the network into clusters. Clustering of nodes into groups efficiently minimizes routing traffic overhead. Several algorithms have been proposed by researchers for formation of clusters and election of cluster heads. Most...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    High Data Aggregation in Wireless Sensor Networks Using Rendezvous-Drina

    Wireless Sensor Networks (WSN) will be established in distinct category of fashion such as healthcare application, home automation, defense etc. As a consequence of plenty of nodes in WSN, unified data and energy preservation is in need for efficient transmission. Due to the massive node environment in WSN, redundant data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Piezoelectric Interconnected Processor Cores

    The author's idea is to improve the performance and efficiency of multicore processors. Using piezoelectric materials, the power supply to each core can be cut off if the load is low. This way, the number of cores running for performing light tasks is less. Improving efficiency and improving performance drastically....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Kerberos Active Directory for HP Thin Clients

    A specialized field in computer networking involves securing computer network infrastructure. In today's computing, organizations including universities and small to medium-sized businesses have to credit a wide range of services to its users. Many of these services require a form of authentication and/or authorization to securely verify the identities of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Comparative Analysis of Bitmap Indexing Techniques in Data Warehouse

    One of the most important elements of \"Business Intelligence (BI)\" is the \"Data Warehouse (DW)\" that used to improve the making of strategic decision. Also, the massive database, historical, nonvolatile, and subject-oriented can represent the DW that forms the treatment of analytical queries, which produces in times with high response....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Laptop Data Theft-Full Disk Encryption System

    Laptop data theft has reached alarming rate requiring urgent steps to bring the menace under control. This research work focused on mechanisms to protect laptop data from theft and abuse. Full Disk Encryption (FDE) system was designed to secure data stored on laptops owned by the company or those owned...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    An Optimal Var Compensation Strategy Based on Data Mining and Ant Colony Algorithm

    In this paper, the authors propose a new algorithm to find the optimization method of reactive regulation in power system to solve the problem of the var compensation and voltage control in center-substations. Using the daily data collected in power substations, the algorithm is combined with improved ant colony algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Optimized Utilization of Resources Using Improved Particle Swarm Optimization Based Task Scheduling Algorithms in Cloud Computing

    Cloud computing is one of the hottest topic that is rapidly gaining popularity in the IT industry. It is popular because it provides computing resources as a service. Cloud computing delivers an elastic execution environment of resources over the internet. Cloud computing is based on various other computing research areas...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Anomaly Extraction Using Efficient-Web Miner Algorithm

    Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behavior affecting network security. Anomaly Extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Advance Double Guard System: Detecting & Preventing Intrusions in Multi-Tier Web Applications

    Today there is huge amount of use of computer especially for web application. Most of the people do their transaction through web application. So there are risks of personal data gets hacked then need to be provide more security for both web server and database server. For that advance double...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    FPGA Implementation of Earth Mover's Distance

    Image processing has become a vibrant area of research over the last few years and distance measurement between two images is needed in many applications. Earth Mover's Distance (EMD) is the algorithm for measuring similarity between images. However, application of the current software implementations of the EMD algorithm to real...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Survey on Intrusion Detection over the Cloud Computing Environment

    Cloud computing is one of the major demanding topic in area of computer science or information technologies. It is depend on multiple other computing research areas virtualization, grid computing. Cloud computing it is the internet based computing which means that every type of service available to the user from the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Review: Ant Based Ad Hoc Routing Protocols

    A Mobile Ad-Hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Swarm Intelligence (SI) is an artificial intelligence technique based around on the study of collective behavior in decentralized, self-organized systems. Ant Colony Optimization is popular...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A General Study of Associations Rule Mining in Intrusion Detection System

    Intrusion Detection Systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e., alerts that are triggered incorrectly by benign events). This makes it extremely hard for to analyze and react to attacks. Data mining generally refers to the process of extracting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Improvement of 802.11 MAC by Enhancements in DCF

    In the 802.11 protocol, the fundamental mechanism to access the medium is called Distributed Coordination Function (DCF). This is a random access scheme, based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Retransmission of collided packets is managed according to Binary Exponential Back-off (BEB) rules. BEB increases...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Comparative Analysis of PCA and 2DPCA in Face Recognition

    The growing need for effective biometric identification is widely acknowledged. Human face recognition is an important area in the field of biometrics. It has been an active area of research for several decades, but still remains a challenging problem because of the complexity of the human face. The Principal Component...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    An Improved Techniques Based on Naive Bayesian for Attack Detection

    With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A New Modified Playfair Algorithm Based on Frequency Analysis

    Cryptography is an art and science of achieving security by encoding the message to make them non-readable. One of the well known cryptographic techniques is Playfair Cryptography. After the invention of different techniques like Frequency Analysis it is easy to break Playfair. In this paper, the authors proposed some ways...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Novel Web Usage Mining for Web Mining Techniques

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigations of Web users. As in classical data mining, data processing and pattern discovery are the main issues in web usage mining. The first phase of the web usage mining is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Cloud Computing: A Security Problem or Solution

    The move to cloud computing is the next stage of an unstoppable trend in the breakdown of the enterprise perimeter, both technically and organizationally. This new paradigm presents a number of security challenges that still need to be resolved, but sufficient change in the IT environment has already happened -...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Implementation of Scalable Framework to Reduce Core Development of Cloud Computing Relevants

    Implement a cloud and develop the cloud application is quiet difficult in today's scenario as to implement the cloud the authors required to have the in deep knowledge of very advanced technologies. So to make it more easier, they have develop this paper and implementing it in which the required...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Novel Handoff Technique for Heterogeneous Wireless Network

    After review of literature, most of the work is done on handoff between cellular network, i.e., horizontal handoff but, few papers are on handoff between heterogeneous networks are in existence. This type of handoff called as vertical handoff can be simulated. The current problem in handoff makes the system slow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Trends in Contemporary Cryptanalysis

    Securing the information and access to this information has been a prime concern ever since the existence of data. Cryptographic system encrypts this data but cryptanalysis techniques are used to test and break these encryption techniques. In this paper, the authors will see recent developments in the field of encryption...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    An Improved Method for Frequent Itemset Mining

    Discovering knowledge in huge amounts of data is called data mining. Frequent itemset mining is an important step in association rule mining. Several algorithms have been proposed for efficient frequent itemset mining in transactional database. The authors present an improved approach to mine frequent itemset in transactional database. The algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Evolution of Data Hiding By Neural Network and Retrieval or Encrypted Image, Text, Audio and Video Files

    Information hiding is a method of hiding secret messages into a cover-media such that an intended observer will not be aware of the existence of hidden messages. In such applications various file formats are used as cover-object which contains confidential data. As the new research field the techniques introduces Artificial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Cloud Computing: The Emergence of Application Service Providers (ASPs) in Developing Economies

    The cloud computing paradigm has triggered a major shake-up in the way ICT infrastructure is delivered, priced and consumed. The underlying factors for this phenomenon are highly abstracted or virtualized infrastructure, a variable OPEX-based model (determined by usage requirements), support for multi-tenant user model and immediate computing resource scalability. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Application of Microprocessors

    Microprocessors are applicable to a wide range of information processing tasks, ranging from general computing to real-time monitoring systems. The microprocessor facilitates new ways of communication and how to make use of the vast information available online and offline both at home and in workplace. Most electronic devices - including...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Of Various GDI Techniques For Low Power Digital Circuits

    Now-a-days in digital circuit design low power and small area are main issues of concern for VLSI designers. GDI (Gate Diffusion Input)-a technique of low power digital combinational design. This technique as compare to other currently used logic design styles, allows less power consumption and reduced propagation delay for low-power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

    Present scenario suggests many audio files are needed to be transmitted over internet for various important purposes. Earlier cryptographic schemes for secret sharing lead to high computational complexity during both secret sharing and secret reconstruction phase. Today, various cryptographic methods for secret sharing are there to protect secret data but...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Hiding in Motion Vectors of Compressed Video

    In this paper the authors aim to explain the data hiding concept in motion vector of compressed video. In this data hiding in motion vector is done by stenography technique, data is compressed in different frames of video. The process starts with mailing system such as sending and receiving secret...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    (Mcicpl Protocol): Mobile And Computer Interactive Communication Protocol on Linux

    GPRS network supports to the communication of data or transferring of data, even though GPRS (General Packet Radio Services) is allow transmitting data to the Internet and it is used for communication. The GPRS services provide a packet switch data transmission within GSM network and packet access to data networks....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Survey on QoS Ranking in Cloud Computing

    QoS (Quality-of-Service) is an important topic in cloud computing. It is very difficult to make a decision on choosing the cloud services depending on QoS requirements. These requirements have to be satisfied by both cloud service providers and cloud users. So, optimal service selection is needed to obtain high quality...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    ANT Algorithm for Load Balancing Problem in FTP Server

    The system describes a method of achieving load balancing in distributed networks. A network models a typical distribution of files between nodes; nodes carrying an excess of traffic can become congested, causing data to be lost. The network also supports behaviors modeled on the trail laying abilities of ants. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Interative Services of College Databases

    Now-a-day when there is mobility in every aspect of life, people do not wish to visit different places in order to gather information. Information retrieval is the science of locating from a large documentation collection, those documents that satisfy a specified information need. As the number of users using internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Digitally Controlled Delay Lines Based On NAND Gate for Glitch Free Circuits

    The traditional analog signal processing is expected to progressively substituted by the processing times of the digital domain in the VLSI. Within this novel paradigm, digitally controlled delay lines should play the vital role in the digital-to-analog converters, and in analog intensive circuits. From a practical point of view, now-a-days,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)