International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 201-240 of 957 results

  • White Papers // Apr 2014

    Comparing Various Black Hole Attack Prevention Mechanisms in MANETs

    Mobile ad-hoc network is a temporary wireless network. It is a network which is self-configuring in which nodes moves freely and continuously. As a result the network topology also changes dynamically. Such networks are highly dynamic in nature and nodes communicate without a proper infrastructure. Various routing protocols employed by...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Design a Binary Neural Network Classifier Algorithm with Parallel Training in Hidden Layer

    Since last decade, classification methods are useful in a wide range of applications. Classification is a task to group the sample having similar properties. This capability can be introduced in computer system by designing various types of classifiers. Neural network is one of the artificial intelligent techniques that have many...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    TRApriori Classification Based Algorithm by Fuzzy Techniques to Reduced Time Complexity

    The authors' simple classification technique on this approach is also able to remove the unwanted data sets that are not useful for making the decision system. They can also combined the fuzzy techniques, TRA-priori Algorithm and classification technique to provide the close output. Their classification based fuzzy mining association algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Smart Search Engine for User Query with Instant Backup Support

    Now-a-days it is very difficult to get correct & required results during search through web crawlers i.e. when the users search for particular keyword using existing web search engine, it will retrieves the whole information regarding searched keywords along with some other related information matching to searched keyword. For example...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    XSS Detection in Web Request and Server Response

    In the today's world most of the electronic transactions, web services run via website with stateful reliable communication by transmitting, storing, retrieving essential data on network, client and web-server. The major problem with such reliable communication is that they become vulnerable to an XSS type of attack which mostly carried...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Parameter Sweeping Programming Model in Aneka on Data Mining Applications

    Data mining applications and techniques are used in many areas as a required knowledge discovery from large data sets. Cloud computing is one of the prevailing models based on IP architecture. Cloud computing is nothing but the delivery of the computing services over the internet to improve the business of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    RDH(Reversible Data Hiding) in Encrypted Images by Reserving Room Before Encryption

    Now-a-days, more attention is to Reversible Data Hiding (RDH) in encrypted images as well as in audio and video, by using RDH method excellent property that the original image (cover) can be receive as it is recovered after embedded data is extracted also protecting the image content's confidentiality. All previous...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Superconducting Magnetic Energy Storage System based Improvement of Power Quality on Wind/PV Systems

    In this paper, Superconducting Magnetic Energy Storage (SMES) is applied on Wind Energy Conversion Systems (WECSs) that are equipped with Doubly Fed Induction Generators (DFIGs) and Photo Voltaic (PV) system during the presence of voltage sags and swells in the grid side. The Wind and PV energy are suitable for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Novel Approach for Sentiment Analysis and Opinion Mining

    As the people are being dependent on internet the requirement of user view analysis is increasing exponentially. Customer posts their experience and opinion about the product policy and services. But, because of the massive volume of reviews, customers can't read all reviews. In order to solve this problem, a lot...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Overcoming Information Inference Attacks and Protecting Shared Data in OSN

    Privacy preservation is now becoming essential in today's Internet world. Now-a-days online social networks are becoming most popular and they are said to grow rapidly in near future. These social networks provide many means for sharing information among varied users. Large amount of data are being shared through these networks,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Implementation of 802.11n OFDM Transmitter and Receiver Using FPGA

    The increasing demand on high bit rate and reliable wireless system has led to many new emerging modulation techniques like OFDM (Orthogonal Frequency Division and Multiplexing), which offers reliable high bit rate wireless system with reasonable low complexity. Multiple input multiple output antenna systems provides higher data rates up to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Design and simulation of 16 Bit UART Serial Communication Module Based on VHDL

    In this paper the authors describe the design of UART (Universal Asynchronous Receiver Transmitter) based on VHDL. As UART is consider as a low speed, low cost data exchange between computer and peripherals. To overcome the problem of low speed data transmission, a 16 bit UART is proposed in this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Dynamic Resource Allocation in Cloud Environment

    Cloud computing is a synonym for distributed computing over a network. The phrase is often used in reference to network-based services which appear to be provided by real server hardware, but are in fact served up by virtual hardware simulated by software running on one or more real machines. Such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Avoiding the Security Attacks by Hardening the Cloud

    Cloud redefines computing by replacing the conventional client server organization-centric model with a more flexible and responsive data-centric model. Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Security is one of the major concerns...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Survey on Incremental Information Extraction Using Relational Database

    Information extraction is the task of automatically extracting structured information from unstructured or semi-structured machine readable documents. In which extraction are expressed in the form of database query and query evaluated by using database system. Information extraction provides automated query generation components so that casual user does not have to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Vibration Measurement System with Accelerometer Sensor Based on ARM

    This vibration amplitude may be measured as a displacement, a velocity, or acceleration. Vibration amplitude measurements may either be relative, or absolute. The basic scheme of vibration measurement is outlined first. Descriptions are given of transducers devices which transform physical variables into equivalent electrical signals and of vibration pickups. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Searching Research Papers Using Clustering and Text Mining

    As the users required more time to search as well as to read the research papers. It consumes more than two to three hours to read a single paper, so it is necessary to move word new search engine based on fastest reading algorithm which provide best result. This will...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Data Integrity Proof in Cloud Storage

    Cloud computing is an important application for storage of data in the cloud. Cloud computing platform avoid the burden of local data storage and also reduce maintenance cost. In cloud storage data is move to a remotely located cloud server on which user does not have any control. Cloud faithfully...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Comprehensive Survey of Frequent Item Set Mining Methods

    In this paper, the authors are presenting an overview of existing frequent item set mining algorithms. Now-a-days frequent item set mining is a very popular and computationally expensive task. They have also explained the fundamentals of frequent item set mining. They have described today's approaches for frequent item set mining....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Ontology in Text Mining to Cluster Research Project Proposals

    For government & private research funding agencies, research project selection is important task. For large number of proposals, it is common to group according to their disciplines. These proposals are then sent to appropriate expert for peer review. Due to their subjective views & mis-interpretations, the research discipline cannot be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Declarative Environment for Performance Evaluation in IaaS Clouds

    Cloud computing infrastructures are providing resources on demand for tackling the needs of large-scale applications. Finding the amount of resources to allocate for a given application is a difficult problem though. Many cloud providers' offers programmatic ways to quickly acquire and release resources, it is vital that users have a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Technique for Migration to IPV6 for a Secure SCADA Architecture

    Supervisory Control And Data Acquisition (SCADA) systems refer to Industrial Control Systems (ICS): computer systems that monitor and control industrial, infrastructure, or facility-based processes. The tremendous increase in the number of network connections to the SCADA systems has made the network more susceptible to attacks by hackers. The vendors of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Detection and Prevention of SQL Injection Attacks on Database Using Web Services

    The Web applications which the authors are using in present times contain huge amount of information. But the implementation of these applications is not very much secured. They are vulnerable to a variety of web based threats. One of these threats is SQL injection attacks. In these kinds of attacks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Design of a High Speed FFT Processor

    The Discrete Fourier Transform (DFT) is used to transform the samples in time domain into frequency domain coefficients. The Fast Fourier Transform (FFT) is a widely used algorithm that computes the Discrete Fourier Transform (DFT) using much less operations than a direct realization of the DFT. FFTs is of great...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Comparative Study of Techniques in Data Mining

    Data mining encompasses tools and technique for the \"Extraction or mining of knowledge from huge repository of data\". In data mining various techniques that used are association rule mining, sequential pattern mining, clustering, and classification. Varieties of algorithms are developed for each of these techniques. This paper present comparison of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology

    Android is the latest and a rapid growing technology available for all the users or customers in today's market. An enormous increase in the end user acceptance has been experienced in the past few years. This paper has been developed on the bus information system in Pune. This paper proposes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Green Cloud : Efficient Use of Cloud Resources & Conservation of Energy at Data Centers

    Conventional office-based computing is been replaced by network-based cloud computing to a greater extent in recent years. As cloud computing is expanding rapidly, there is an increase in energy consumption of the network and computing resources that underpin the cloud. Data center energy use has received much attention recently, minimum...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Automatic Semantic Rule Extraction in Similar Web Sites using Memetic Algorithm

    Acquiring knowledge is based on the type of ontology in web mining, and using ontology as a knowledge schema in the knowledge acquisition is more common than rule acquisition. As ontology acquisition the rule acquisition is an important, even supposing rule acquisition is still a slowdown process in the deployment...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Comparative Study of Routing Protocols in Mobile Ad-hoc Networks

    A rising importance on Mobile Ad hoc NETworks (MANET), during this system nodes square measure carried by folks and connected to every alternative by multi-hop wireless links. Since the nodes will shift freely, then the nodes quality pattern became a vital feature of the MANET. Mobile Ad-hoc NETwork (MANET) may...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    An Extensive Review on Cognitive Radio Networks

    Cognitive Radio (CR) is an engineering that addresses the issue of shortage of range and prepares for efficient utilization of the same. Cognitive Radio Sensor Networks (CRSN) requests vitality effective and a practical co-agent range sensing procedures which performs well in blurring and shadowing environment with ideal qualities of sensing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Detection Of Routing Misbehaviour in MANET

    Ad hoc On-demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (Route REPly) that it has a latest route with minimum hop count...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Real-Time Intrusion Detection System using Artificial Neural Networks (ANN)

    An intrusion can be defined as any practice or act that attempt to crack the integrity, confidentiality or availability of a resource. This may consist of a deliberate unauthorized attempt to access the information, manipulate the data, or make a system unreliable or unusable. With the expansion of computer networks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    An Analytical Study of Enhancing Energy Efficiency of Wireless Sensor Network through Relay Nodes Placement

    Power consumption of a node in the wireless sensor network increases with the increment of distance between the transmitter and the receiver i.e. the sensor and the base-station. Many published papers have been covered in this paper, which suggests various approaches to minimize power consumption of wireless sensor networks. One...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Android-Based Mobile Payment System Using 3 Factor Authentication

    In this paper, the authors making transaction such as doing payment, transferring funds/money, doing online transaction via android Smartphone platforms for prominent mobile payment. This paper combines a pair of Smartphone for apparent transaction, server and paying client. These devices are featuring 3 types of authentication in this paper to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Simulation Study of Collusion and Network Partition Denial of Service Attack in IEEE 802.11 and FAIRMAC Protocol

    Denial of service is a constant concern in the world of networking. By DoS attack, the authors mean any effort to \"Prevent or impair the legitimate use of computer or network resources\", interrupting or delaying services which can cause a node or an entire network to become unavailable. The industry...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Survey Of Cross Layer Based TCP Congestion Control Techniques in MANET

    In Mobile Ad hoc NETwork (MANET), congestion is one of the most important limitations that affect the performance of the whole network. TCP (Transmission Control Protocol) are the reliable protocol for communication because of their connection oriented behavior. Multi-path routing protocol can balance and share the load better than the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    GPS Based Tour Guide Assistance with Voice Announcement

    GPS is the acronym for Global Positioning System. It is employed to find the position of the location on the earth. This information is provided by the GPS with the help of the data it receives from the satellites. Micro controller is the heart of the device. It stores the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    RFID Based Automatic Billing Trolley

    Now-a-days purchasing and shopping at big malls is becoming a daily activity in metro cities. The authors can see huge rush at malls on holidays and weekends. The rush is even more when there are special offers and discount. People purchase different items and put them in trolley. After total...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Multiple Multicast Services in Wireless Network with Reduction of Storage Overloading

    Mutlicast environment are likely to work in multiple group rather than a single group. Where Group Key Management (GKM) able to provide security only to the single group, where multiple group cannot be handled by GKM due to overhead. The MKE-MGKM scheme exploits asymmetric keys, where mater key is generated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Trust based Neighbor Identification in Wireless Sensor Networks using Agents

    Wireless Sensor Networks (WSNs) have been extensively used in various applications such as environmental monitoring, industrial monitoring, agriculture, green house monitoring, structural monitoring, passive localization and tracking, battlefield surveillance, etc. Sensor nodes in these applications are required to sense and process the physical conditions like temperature, pressure, humidity, rainfall, fog,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2014

    Optical Character Recognition Using Artificial Neural Networks Approach

    The recent advances in computer technology many recognition task have been automated. OCR, (Optical Character Recognition) is a scheme of converting the images of typewritten or printed text into a format that is understood by machine. The goal of OCR is to classify the given character data represented by some...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Provenance Based Distributed Cloud System Using Jar Acessibility

    Cloud computing is one of the most important service in the internet. The widespread use of cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow in cloud has become common, as users fear of losing control of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Test Data Compression for Low Power Testing of VLSI Circuits

    The two major areas of concern in the testing of VLSI circuits are test data volume and excessive test power. Among the many different compression coding schemes proposed till now, the CCSDS (Consultative Committee for Space Data Systems) lossless data compression scheme is one of the best. This paper discusses...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Fault Analysis in Reversible Sequential Circuits

    In this paper, the researchers propose the design of reversible circuits using reversible gates. Reversible logic is implemented in reversible circuits. Reversible logic is mostly preferred due to less heat dissipation. Conservative logic gates can be designed in any sequential circuits and can be tested using two test vectors. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Software Testing, Mythology & Methodologies

    It is generally believed that testing phases of software development consume 30% to 50% of the entire software development time and resources. The cost and time of testing should get reduced to increase the productivity of the software development process. To achieve these goals, different levels and tools of automated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Techniques of Data Privacy in Cloud Using Back Propagation Neural Network

    Back propagation is the scheme for neural network learning. This learning accuracy gained by collaborative learning. In existing system support this kind of learning on limited dataset and between two parties. It cannot protect intermediate result. In the authors' proposed system multiple parties perform collaborative learning on arbitrarily partitioned data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Digitally Controlled Delay Lines Based On NAND Gate for Glitch Free Circuits

    The traditional analog signal processing is expected to progressively substituted by the processing times of the digital domain in the VLSI. Within this novel paradigm, digitally controlled delay lines should play the vital role in the digital-to-analog converters, and in analog intensive circuits. From a practical point of view, now-a-days,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption

    The emerging cloud technologies, due to their various unique and attractive properties, are rapidly being adopted throughout the IT industry. In this paper, the authors identify security challenges that arise in incorporation of cloud-based services, and present a set of solutions to address them. To assure the user control over...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Advance XML Search Engine

    Internet work in distributed environment different serves is located at different places. Web users retrieve information from internet by firing query. XML search engine is a strong & easy search engine for searching XML content. Advance XML search engine is very efficient and very easy search engine. And this is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    SoftServe (Software Server)

    Software as a service, sometimes referred to as \"On-demand software,\" is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. The authors'...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    (Mcicpl Protocol): Mobile And Computer Interactive Communication Protocol on Linux

    GPRS network supports to the communication of data or transferring of data, even though GPRS (General Packet Radio Services) is allow transmitting data to the Internet and it is used for communication. The GPRS services provide a packet switch data transmission within GSM network and packet access to data networks....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Survey on QoS Ranking in Cloud Computing

    QoS (Quality-of-Service) is an important topic in cloud computing. It is very difficult to make a decision on choosing the cloud services depending on QoS requirements. These requirements have to be satisfied by both cloud service providers and cloud users. So, optimal service selection is needed to obtain high quality...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    ANT Algorithm for Load Balancing Problem in FTP Server

    The system describes a method of achieving load balancing in distributed networks. A network models a typical distribution of files between nodes; nodes carrying an excess of traffic can become congested, causing data to be lost. The network also supports behaviors modeled on the trail laying abilities of ants. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Application of Microprocessors

    Microprocessors are applicable to a wide range of information processing tasks, ranging from general computing to real-time monitoring systems. The microprocessor facilitates new ways of communication and how to make use of the vast information available online and offline both at home and in workplace. Most electronic devices - including...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Of Various GDI Techniques For Low Power Digital Circuits

    Now-a-days in digital circuit design low power and small area are main issues of concern for VLSI designers. GDI (Gate Diffusion Input)-a technique of low power digital combinational design. This technique as compare to other currently used logic design styles, allows less power consumption and reduced propagation delay for low-power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

    Present scenario suggests many audio files are needed to be transmitted over internet for various important purposes. Earlier cryptographic schemes for secret sharing lead to high computational complexity during both secret sharing and secret reconstruction phase. Today, various cryptographic methods for secret sharing are there to protect secret data but...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Interative Services of College Databases

    Now-a-day when there is mobility in every aspect of life, people do not wish to visit different places in order to gather information. Information retrieval is the science of locating from a large documentation collection, those documents that satisfy a specified information need. As the number of users using internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Hiding in Motion Vectors of Compressed Video

    In this paper the authors aim to explain the data hiding concept in motion vector of compressed video. In this data hiding in motion vector is done by stenography technique, data is compressed in different frames of video. The process starts with mailing system such as sending and receiving secret...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Cloud Computing: The Emergence of Application Service Providers (ASPs) in Developing Economies

    The cloud computing paradigm has triggered a major shake-up in the way ICT infrastructure is delivered, priced and consumed. The underlying factors for this phenomenon are highly abstracted or virtualized infrastructure, a variable OPEX-based model (determined by usage requirements), support for multi-tenant user model and immediate computing resource scalability. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Analysis and Comparison of CPU Scheduling Algorithms

    Scheduling is a fundamental operating system function, since almost all computer resources are scheduled before use. The CPU is one of the primary computer resources. Central Processing Unit (CPU) scheduling plays an important role by switching the CPU among various processes. A processor is the important resource in computer; the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Study of Text Mining For Web Information Retrieval System From Textual Databases

    Text information retrieval is also known as text data mining or knowledge discovery from textual databases refers to the method of extracting interesting and non-trivial form or information from text documents. Consider by many as the next signal of knowledge discovery, text Information Retrieval has very elevated commercial principles. Previous...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Analysis of Challenges in the Design and Development of Multi-Level Secure Databases

    Database security mainly deals with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve privilege abuse, weak authentication, weak audit trails and operating system vulnerabilities. To make the security least compromised; all users are required to follow the rules set up...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Leverage Data Mining Techniques in Intrusion detection

    Data mining techniques have been successfully applied in many fields including marketing, manufacturing, process control, fraud detection and network management. In recent years, data mining-based Intrusion Detection Systems (IDS) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. In data mining...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Multiple-keyword Search over Encrypted Cloud Data

    As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Novel Method for Data Hiding In Encrypted Image And Video

    Now-a-days the data security and data integrity are the two challenging areas for research. This paper describes the concept of separable reversible data hiding technique that is related with internet security. When it is desired to send the confidential/important/secure data over an insecure and bandwidth-constrained channel it is customary to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    An Effective Model for Signcryption using Attribute based Encryption

    Secret and secure delivery of message is most important issue in field of security hence signcryption were used. The term signcryption is referred as a technique of encrypting the data with the use of signatures in area of public key cryptography. A signcryption technique is a combination of digital signature...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    AODV Routing Protocol Modification with Broadcasting RREQ Packet in VANET

    Now-a-days a new ad-hoc type network is introduced for vehicle. This can be use for all type vehicle propagation control in city and highway road map. This is called Vehicle Ad-hoc NETwork (VANET). There is several open research topic for this VANET. The different routing protocols are used for this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    A Generalized Way to Prevent SQL Injection Attacks (SQLIAs) Based on Encryption Algorithms

    As most of the web applications are dynamic and all dynamic web applications have databases as backend. Dynamic web applications usually interact with databases using some input value provided by user in input box of dynamic web pages. This input value is checked at server to provide access to databases...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    An Efficient ECIES based Encryption scheme for Smart Grids in Wireless Communication

    The next evolution of the smart grid represents will involve the development and mixing of proceed communications and information technology into all aspects to further improve and optimize the power generation, delivery consumption and other effectiveness operations. The increased functionality joined together with the integration into information systems also comes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Input Validation Vulnerabilities (SQLIA) and Defenses in Web Applications Security

    The internet has evolved into a critical delivery pipeline for institutions to interact with customers, partners and employees. Peoples use web sites to send and receive Information via HyperText Markup Language (HTML) messages to web applications reside on web servers. Generally this information, expected as legitimate messages, can be used...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    An Efficient Technique to Optimize the Energy in Wireless Sensor Networks Using Mobile Relay

    A wireless sensor network consists of one or more sensor nodes. The role of sensor nodes is to process data. Since sensor nodes have limited storage capacity, processing huge volumes of data would result in battery drainage. Hence mobile relays are proposed which are low cost and disposable which helps...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Modern Approach to Enhance Routing Recitation in MANET

    Mobile ad hoc network is a collection of self configuring nodes, linked wirelessly for a very short span of time to communicate with each other without any fixed infrastructure, and are free to move arbitrarily. In recent years, with the advent of wireless technology this network has found greatest attraction...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Synonym Based Ranked Secure Search Over Encrypted Data

    Most of the data owners and the web service providers uses the cloud technology for store and share their data. Because the cloud computing will provide an efficient way to store and share the data without compromising the privacy. Security is enforced by encrypting the data. Encryption will complicate some...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies

    Big data processing is currently becoming increasingly important in modern era due to the continuous growth of data generated by various fields such as particle physics, human genomics, earth observations etc. However the efficiency of processing large-scale data on modern infrastructure is not clear. Machine Learning (ML) concepts play a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data

    Web mining is to discover and extract useful information. In the internet era web applications are increasing at enormous speed and the web users are increasing at exponential speed. As number of users grows, web site publishers are having increasing their information for attracting and satisfying users. It is possible...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANET) is becoming a popular research area among researchers due to its versatile routing nature. Routing in MANET is a challenging issue due to dynamic network topology, limited bandwidth and limited battery power. Attacks are liable to occur if routing algorithms fails to detect vulnerable threats and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    A Review on Various Privacy Preserving Techniuqes & Classifications Algorithms

    Privacy preserving data mining is one of the most demanding research areas within the data mining community. In many cases, multiple parties may wish to share aggregate private data without disclosing any private information at user side. Over the last few years this has naturally lead to a growing interest...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Effect of the Carrier Frequency Offset (CFO) on the Wireless OFDM Communications

    In this paper, the authors analysis the Signal to Noise Ratio (SNR) by changing the CFO. Frequency offset has been recognized as a major disadvantage of OFDM. The OFDM systems are sensitive to the frequency synchronization errors in form of Carrier Frequency Offset (CFO), because it can cause the Inter...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Compression of Data and Routing in SONET with Comparison of Various LANs

    With the advent of new technologies and advancing facilities in the world of communication the requirement to send a large amount of voice and data in a specific time over the communication networks is demanding more and more capacity over the channels. In order to achieve this the authors are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    A Hierarchical Polling-based MAC Scheme for Wireless Body Sensor Network

    A hierarchical polling-based access scheme for Wireless Body Sensor Network (WBSN) is proposed in this paper. The proposed access scheme is structured in hierarchy to collect data from sensor nodes inserted in human body. In first level of hierarchy the sensor nodes are divided into groups and sensor nodes of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)