International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 201-240 of 848 results

  • White Papers // Dec 2013

    An Overview of Clustering Analysis Techniques Used in Data Mining

    Clustering is the division of data into groups containing similar objects. It is used in fields such as pattern recognition, and machine learning. Searching for clusters involves unsupervised learning. Partitioning methods work by dividing a group of n elements into k clusters such that k is less than or equal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Techniques for Third Party Auditor in Cloud Computing

    The authors present a error identify algorithm for using the MHealth Trust computing - Experiments show that their approaches has the following advantage over existing method: cloud services include no upfront investment on infrastructure and transferring responsibility of maintenance, backups and license management of cloud providers, an Optimization problem of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Delay Tolerant Network

    There is no complete network from source to destination in intermediately connected mobile networks which is also called as sparse wireless networks. Those types of networks are categorized in delay tolerant networks. Wildlife tracking sensor networks, military networks, interplanetary networks and an exotic media networks are those networks that follow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters

    Due to the increasing demand of various internet applications such as Voice Over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Review on Density based Clustering Algorithms for Very Large Datasets

    Data mining is widely employed in business management and engineering. The major objective of data mining is to discover helpful and accurate information among a vast quantity of data, providing a orientation basis for decision makers. Data clustering is currently a very popular and frequently applied analytical method in data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Design and Implementation of Data Sanitization Technique for Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram

    Now-a-days cloud environments are widely used for data storage and processing. However, this environment represents a serious threat for data privacy, since document containing confidential information might be made available for unauthorized parties. Although measures to automatically remove or hide sensitive information that may disclose identities of referred entities or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Horizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator

    Preparing dataset is a very difficult process in cases where it has to be given as input for data mining which involves complex queries, joining tables, and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. The authors' project aims...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Chaos Based Public-key Cryptosystem

    In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Cryptography Based on Neural Network

    Cryptography is the ability of changing information into obvious unintelligibility in a way allowing a secret method of un-mangling. The vital idea of cryptography is the capability to send information between participants in a way that prevents others from reading it. Much cryptography methods are available which are based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Centralized and Distributed Energy Efficient Routing Techniques in Wireless Sensor Networks: A Survey

    Recent technology improvements that have been developed in small size nodes, low-cost, battery power devices, which are capable of local processing and efficient wireless communication. Such nodes are called as sensor nodes. These sensor nodes are efficient in computing in various applications, such as office buildings, industrial plants, and reading...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Enabling Video Content Distribution Using the Principle of Cloud Downloads

    Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, video content distribution over the Internet has received tremendous attention from academia and industry. The most common approach for such is the peer-to-peer approach. In this approach, peers who create demand for videos...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Simple Implementation of UML Sequence Diagram to Java Code Generation through XMI Representation

    UML is widely used in the software development, there consists of the designing and coding of the software. Designing phase is done with the help of the UML models, in which consists of the sequence diagrams, activity diagrams, use case diagrams, etc. Since the software development is time and human...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Development of a Secure XML Data Warehouse: A Practical Approach

    Data warehouses are repositories of valuable information that provides a platform to integrate data coming from various sources and thus plays a vital part in formulating future policies of an organization. Due to its importance, security is an important criterion which has to be considered right from the initial phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Study of Text Mining For Web Information Retrieval System From Textual Databases

    Text information retrieval is also known as text data mining or knowledge discovery from textual databases refers to the method of extracting interesting and non-trivial form or information from text documents. Consider by many as the next signal of knowledge discovery, text Information Retrieval has very elevated commercial principles. Previous...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Provenance Based Distributed Cloud System Using Jar Acessibility

    Cloud computing is one of the most important service in the internet. The widespread use of cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow in cloud has become common, as users fear of losing control of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Intrusion Detection Using Double Guard In Multi-Tier Web Applications: A Survey

    Now-a-day's computers are widely used for web application. Majority of transactions are done online these days. Thus data from web server and database server are prone to be hacked easily which relies to provide more security to web applications. To overcome this issue DoubleGuard system is used. Intrusion detection system...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Secure e-Learning Environment With Low Cost

    Cloud computing is spreading around the world with leaps and touching every part of communication era with Internet technology. Rapid growth of the communication techniques and devices are adding the requirements to bind all of these devices under one hood. Cloud is becoming a perfect solution for the same. With...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Frequent Sub-trees Mining Algorithms in XML : A Survey

    Now-a-days a large amount of data is being stored in XML documents. Since XML documents are semi structured and also they require large amount of storage space, there has always been a demand of storing them in specific patterns and automation for mining association rules and patterns in XML documents....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Web Personalization: User's Future Request Prediction: A Survey

    The web mining is very interesting research topic which supports two of the activated research areas namely data mining and World Wide Web. The process of extracting knowledge and information from World Wide Web is defined as web mining. This paper is a survey based on recent work in the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Study on Wireless Technologies Wimax and Wlan With Their Interfaced Scenario

    The people are in advanced world of internet with new technologies in these days. So many new wireless networks technologies have been emerged. WiMAX and WLAN are such wireless technologies which are being adopted by most of the users. WiMax is one of the advanced technologies from those. Due to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Trust Based Secure Data Transmission Model in MANET

    A \"Mobile Ad hoc NETwork\" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. For quick data transmission, the people need a routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Review of Privacy Preserving Data Mining Using KADET

    Nowadays, securing the user's information is very important for internet based business. On one hand, the companies can mine data to extract knowledgeable information through data collected from the users. On other hand, the user information that contains sensitive data should prevent from the hackers. PPDM is a popular search...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Secured Data with Enhanced Lifespan for Wireless Multimedia Sensor Networks

    In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. On the other hand introduction of audio video streaming in wireless architecture reveals additional challenges. The image and video transmission not only demands for energy efficiency...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Game Theoretic Approach for SYN Flood Attacks of Web Server

    In this paper, a non-cooperative two person zero-sum static game(with in a discrete interval of time) is formulated and analyzed for the interaction between the SYN flood attacker and the web server administrator. The SYN Flood Game (SFG) payoffs are calculated based on Erlang loss queuing model. The solution of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    MOOCaaS: MOOCs as a Service

    Cloud Computing has laid the ground for a new generation of educational systems, by providing scalable anytime/anywhere services simply accessed through the Web from multiple devices without worrying about how/where those services are installed, maintained or located. According to numerous studies and reports, the Web has ushered in a new...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Cloud Computing Reference Architecture from Different Vendor's Perspective

    The provision of on-demand access to Cloud computing services and infrastructure is attracting numerous consumers, as a result migrating from traditional server centric network to Cloud computing becomes inevitable to benefit from the technology through overall expense diminution. This growth of Cloud computing service consumers may influence the future data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Survey on Data Collection inWireless Sensor Network

    Wireless sensor networks are the networks which can sense, analyze and then communicate the data. The data collection at sensor nodes consumes a lot of energy but sensor nodes are energy constraints. Most of the WSN architectures consist of stationary nodes which are heavily deployed over a sensing area. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Optimization of Web Content Mining With an Improved Clustering Algorithm

    Web content mining generally consist of mining the content held within the web pages. The aim of this paper is to evaluate, propose and improve the use of advance web data clustering techniques which is highly used in the advent of mining large content based data sets which allows data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Front End and Back End Database Protection From Intruders in Distributed Web Application

    Study of the intrusion detection system. Current network system has large scale trouble from the security vulnerability due to simple routing protocol, security less application, bugs in network & operating system. Therefore need of network intrusion detection system arrives. Generally there are two type of intrusion detection technique. First is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    CBUD Micro: A Micro Benchmark for Performance Measurement and Resource Management in IaaS Clouds

    Cloud computing provides processing power in form of virtual machines. This processing power can be given to very big and small devices. Similarly for providing processing power, devices with small or big processing power can be utilized. These devices can also be ubiquitous computing devices. Ubiquitous computing devices present in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Smart Home Monitoring and Controlling System Using Android Phone

    In this paper, the authors describes a zigbee module and android based home monitoring system for security, safety and healthcare for human. The existing system provides security and safety or healthcare system but in their project provide combination of these two systems. This system is more flexible and can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Performance Comparison of AODV and DSDV Routing Protocols in MANET Networks

    Mobile ad-hoc network is a collection of wireless mobile nodes or stations which communicate with each other directly, and not through the aid of a centralized infrastructure. The main attributes of mobile ad-hoc networks are wireless connection, no stand-alone infrastructure, independent nodes and continuously changing topology. A number of routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Survey: Evaluation Study of Privacy Conflicts in OSNs

    In the age of the Internet, privacy is a luxury and the users' have to constantly be on their heels to maintain it. OSN makes it particularly hard for users to guard their personal data. Besides many changes, Facebook privacy settings remain complicated. Even, past updates have unexpectedly made previously...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Prepare and Optimize Data Sets for Data Mining Analysis

    Getting ready a data set for examination is usually the tedious errand in a data mining task, needing numerous complex SQL queries, joining tables and conglomerating sections. Existing SQL aggregations have limitations to get ready data sets since they give back one section for every amassed bunch. As a rule,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Broker Based Trust Model for Cloud Computing Environment

    With the increase in an online transactions and interactions on the internet, a key issue is how to use efficient and simple evaluation method to achieve trust based decision making for service users and service providers. Trust plays an important role in all commercial cloud environments. It is the evaluation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Efficient Algorithm to Find Information Rich Subset in High Dimensional Data

    Data mining is the process of exploration and analysis, by automatic or semi automatic means, of large quantities of data in order to discover meaningful patterns and rules. Data Mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Design and Implementation of FPGA Based Efficient Data Transmission Using Verilog

    In cryptography, there are two different types of methods to provide the security to a data. They are symmetric & asymmetric. Symmetric means same key for sender as well as receiver. Generally, cryptography concepts having three important blocks, they are encryption, key generation & decryption. Data transmission can be starts...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Finite States Optimization Using Pattern Matching Algorithm

    The pattern sequence is an expression that is a statement in a language designed specifically to represent prescribed targets in the most concise and flexible way to direct the automation of text processing of general text files, specific textual forms, or of random input strings. Regular Expressions (RE) are getting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Detection of Fault-Injection Attacks for Cryptographic Applications

    Cryptographic applications like ATM and other commercial electronics are more susceptible to side-channel attacks in which the fault injection attacks are more crucial at today's Deep Sub Micron Technology. Hence the identification and modeling of these attacks from the intruder is critical and became a challenge for current trend of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks

    The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to identify malicious, selfish and compromised nodes. It supports the decision making processes in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Review of the Development in the Field of Fiber Optic Communication Systems

    This paper presents a review of the latest research and development in the field of fibre optic communication system. Remarkable developments can be seen in the field of optical fibre communication in the last decade. Wide-bandwidth signal transmission with low latency is emerging as a key requirement in a number...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Performance Increasing in Congested Sensor Networks

    The wireless sensor network consists of hundreds or thousands of sensors. The sensors are shared by the multiple applications like sensing the temperature, pressure etc. Function of sensor is to sense the information and transfer that information to the neighbor of that node. In wireless network every node is connected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Analysis of Cell-Counting Based Attack Against Tor

    The Onion Router (TOR) allows to hide the users identity various software under this categories are available that allows online anonymity. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size cells (512B). In this paper, the authors are analyzing counting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Autonomous Encoding of Packets Against Jamming Attacks in Wireless Network

    In wireless network, the authors will not limit the boundaries of network because it makes vulnerable association among the users. This vulnerable network will be used for generation of denial of service attacks thus this permits the attackers to form electronic counter measures attacks in wireless network thus it's troublesome...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Session Passwords Using Grids and Colors for Web Applications and PDA

    Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    An Identity Based Information Retrieval System for MANET

    Mobile ad hoc networks have unique characteristics like rapid movement of node in infrastructure less network that's changes it's topology, hence security has become a prime concern for providing security while communication between mobile nodes MANETs. Problems such as in distributed authentication environment problems of generation, distribution and assignment of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System

    MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet, the Internet threat takes a form of attack, targeting individual users to gain control over network and data. Buffer overflow is one...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design Edge-Coupled Stripline Band Pass Filter at 39 GHz

    In this paper, the authors propose a edge-coupled stripline band pass filter for 39 GHz application using Ansoft designer/Nexxim V2.2 software and Matlab 2009a software. The filter is operated at Q band frequency range in 39 GHz for various microwave applications & the filter is design on Roger RO6006 substrate...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    FPGA Based Wireless Control System for Robotic Applications

    Robotic applications are much more needed and almost mandatory requirement in today's fast moving industrial economy. In these circumstances the development of Robotics is also taking up the speed with the help of various technologies directly or indirectly suitable for robotic applications. FPGA takes advantage over microcontroller due to its...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Trust-Based Message Reporting Scheme for VANET

    In Vehicular Ad Hoc NETworks (VANET), trust establishment among communicating vehicles is important to be built to secure messages' exchange and reliability. In this paper, the proposed scheme presents a categorized decentralized trust management evaluation scheme for nodes in vehicular ad hoc environments. Each node is evaluated individually according to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Performance Evaluation of V-Blast Mimo System in Fading Diversity Using Matched Filter

    In this paper, the authors are proposing a method which evaluates the performance of V-BLAST MIMO system in different consideration of rayleigh fading environment to get better performance of the system. In V-BLAST MIMO system some of linear detection technique can be used for interference cancellation. Here, they are using...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Fibre Optic Communications: An Overview

    This paper deals with communication using optical fibres. The transmission using high bandwidth can handle vast amounts of information, which can be further improved by reduction in fibre losses, increase in data rates and distances, development of optical sources and detectors compatible with fibres. The recent development in the area...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Review of DDoS and Flooding Attacks in MANET

    The flooding and DDoS (Distributed Denial of Service) attacks are acts as major threats for MANET because of its ability to create huge amount of unwanted traffic. It is very difficult to detect and respond to flooding and DDoS attacks due to large and complex network environments. In this paper,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Role of Component Based Systems in Data Mining & Cloud Computing

    In this paper, the authors proposed a "Collaborative approach" which tells how component based systems are used with data mining as well as cloud computing. Data Mining helps for extracting potentially useful information from the raw data. The function of association rules are an important data mining technique used to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    New Multimodal Biometric Approach with Two Score Level Combination Strategies

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. The anatomy of human fingers is quite complicated and largely responsible for the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2012

    Performance Analysis for Different Modulation Schemes in MIMO for LTE and WLAN

    Next generation wireless systems will use a combination of large system bandwidths and multiple antennas (MIMO) to deliver very high data rate services. The efficient detection of MIMO signals at the receiver can be a challenging task. Zero-Forcing (ZF) and Minimum Mean Square Error (MMSE) detection schemes are simple and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2012

    Data Transfer Between Two USB Disk Without Use of Computer

    Under normal circumstances, if the people want to copy or move data from one mass storage device to another, they use the computer as an intermediate device. When copying data is their only requirement, it is overkill to use a full-fledged computer to do something so mundane as to transfer...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Channel Estimation and Optimization for Pilot Design in MIMO OFDM Systems

    In this paper, pilot carriers are designed using particle swarm optimization method. It is compared with random and orthogonal placement of pilot that is used for LS channel estimation in MIMO OFDM systems. Channel estimation is done with the help of bit error rate and mean square error corresponding values...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Performance Evaluation of Energy Efficient QOS Assurance Routing in WMSN

    One of the important and challenging problems in the routing design of WMSN is the development of an efficient QOS routing protocol that can provide high-quality communications among mobile hosts interference management. It has been a key concept for designing future high data-rate wireless systems that are required to employ...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    A P2P Based Route Optimization Architecture for Mobile IP Based on Simulation Work

    Wireless technologies are rapidly increasing and users are demanding more and more possibility to change their position with respect to the internet without breaking the signal. These services can be achieved by using Mobile IP or NEMO. In mobile IP, HA (Home Agent) and FA (Foreign Agent) concepts is used....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Attaining Pre-Eminent Cloud Security Using Intrusion Detection Systems

    The excitement over the cloud is raised when the need of assets excesses the boundaries. The novelty comes in need at the last quarter of 2007, the trend behind the cloud computing is, it offer all the customer's need as a service like software, infrastructure, storage, hardware and more on,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    A New Approach of Cryptography for Database Security

    Cryptography is a process of encryption/decryption of a plain text/cipher text using appropriate algorithm and suitable key length. Plain text is actually readable facts, data, sentences or information whereas; cipher text is unreadable conversion of the same. In symmetric cryptography a block of plain text is encrypted using appropriate algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Joint Adaptive Modulation and Multiuser Downlink Scheduling - A Survey

    This paper surveys the various combining schemes along with adaptive coded modulation with respect to fading in wireless environment. Adaptive coded modulation increases the energy efficiency and data rate and this modulation scheme along with combining provides high spectral and power efficiency. Antenna diversity systems can increase the reliability of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Microstrip Symmetrical E-Shape Patch Antenna for the Wireless Communication Systems

    This paper represents designing & analysis of E-shape microstrip patch antenna for wireless communication. Low volume, low profile configuration, easily mounted, light weight, low fabrication cost is the advantages of this antenna. The operating frequencies of antenna are 3.1GHz and 3.45GHz, the substrate FR4 is used for proposed antenna which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Reliable Load Flow Solution for Controlling Power Network by FACTS Devices

    In this paper a new and efficient method for the reliable load flow solution of power network branches controlled by Flexible AC Transmission Systems (FACTS) is presented. In the various methods proposed in past, the formulations was derived in which the Jacobian matrix is in UDUT form, where U is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Analytical Model for Thin Depleted SOI Enhancement MOSFET

    This paper presents an quasi-2D model for the threshold voltage of partially depleted SOI (Silicon-On-Insulator) MOSFET in contrast with effective channel length down to deep - sub micrometer range. The paper present analytical solution with the help of 2D potential distribution in the silicon film and with the help of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Adaptive Modulation and Coding Rate for OFDM Systems

    Wireless communication is observing a fast development in today's communication era. A poorly designed path can result in periodic system outages, resulting in increased system latency, decreased throughput, or worst case, a complete failure of the system. Planning a good, stable and reliable network can be quite challenging. At the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Self Organising Mesh Radio Based Solution for Smart Metering Communication

    This paper describes a mesh networking based solution on Routing Protocol for Low power and Lossy network to realize Automated Metering Infrastructure (AMI) network communication. Automated Metering Infrastructure is expected to facilitate the transport of meter readings from meters to the utility provider and control information in the other direction....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Soft Error Mitigation for Embedded System Using Depth Packet Inspection

    The protection of processor-based systems to mitigate the harmful effect of transient faults. This paper proposes an Depth packet inspection methodology for facilitating the design of fault tolerant embedded systems, the packet inspection is possible in compressed data and thereby achieve high fault coverage in accuracy and speed. The methodology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Human Network Communication

    Today the people have even realized the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as Unique Universal Identification (UUI). Radio Frequency Identification is a wireless data collection technology use to identify human or unique entities. Radio Frequency Identification is a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Providing a Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-Encryption Scheme

    Cloud computing treats the resources on the Internet as a unified entity, cloud. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Storing data in a third party's cloud system causes serious concern on data confidentiality. In order to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Stride Towards Developing a Distributed System for the Identification of Top-L Inner Product Elements

    A distributed scenario can be of two types: homogeneous - where only a fraction of each feature is observed at every site or heterogeneous - where only some of the features are observed at each site. For either scenario centralizing all the data in order to build a global model...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Safe Navigation System Using Ultrasonic and Zigbee Technology

    This paper proposes to assist the visually impaired for their safe navigation. The authors are using the Zigbee technology to help them correctly identify their destination without any human guidance. It uses a SD card to store the map of the familiar and unfamiliar environments which helps the visually impaired...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Secure Framework for Data Sharing in Cloud Computing Environment

    Cloud computing is the use of computing of sources (hardware and software) that are delivered as a service over a net-work(typically the internet). It enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major characteristic of the cloud services is that users' data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Acheving QoS in Wireless Networks Using QCSMA/CA Algorithm

    A primary challenge in wireless networks is to use available resources efficiently so that the Quality of Service (QoS) is satisfied while maximizing the throughput and reducing the Delay of the network. In a wireless network, a sophisticated algorithm is required to schedule simultaneous wireless transmissions while satisfying interference constraint...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Effective Geocache Collection in Mobile Networks Using Boomerang Protocol

    In mobile networks, sensing the geo information and retaining them around the location of interest is a challenging task. In particular, the geo information can only be obtained if the geo-cache holder is present in the anchor location. In order to keep the geo cache around the anchor location boomerang...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    DIDS Using Fuzzy Logic

    Intrusion Detection System (IDS) technology is an important component in designing a secure environment. Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts produced by low-level intrusion detection systems using, firewalls, etc. belonging to a specific attack instance which has...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Online Data Storage Using Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Android-Broadcast Receiver

    Android is a comprehensive open source platform designed for mobile devices. it is a truly open platform that is separating hardware from software that runs on it. This allows for a much larger number of devices to run same applications and creates a much richer ecosystem for developers and consumers...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Energy Conservation in MANET Using Power Saving Protocol BECA/AFECA

    Mobile Ad Hoc NETwork (MANET) is a collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or fixed infrastructure. In MANET, each node acts both as a router and as a host even the topology of network may also change rapidly like routers, cell phone...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)