International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 201-240 of 755 results

  • White Papers // Jul 2013

    Proof of Retrivability: A Third Party Auditor Using Cloud Computing

    Today, there are more and more development for higher security process and benefit when using cloud computing services. Reducing cost, maintaining scale, and high availability are essential for the business to continuation for any techniques or technology. The discusses of the security and privacy data loss concerns are main aspects....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    4G Wireless Networks Challenges and Benefits

    This 4G or Fourth generation is that the future technology for mobile and wireless communications. Close to 4G deployments are expected to be round the year 2010 to 2015. Evolution of wireless access technologies is about to reach its Fourth Generation (4G). 4G systems will be fully IP-based wireless Internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    A Review on Various Resource Allocation Strategies in Cloud Computing

    The computational world is becoming very large and complex. Cloud computing has emerged as a new paradigm of computing and also has gained attention from both academic and business community. Its utility-based usage model allows users to pay per use, similar to other public utility such as electricity, with relatively...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Implementation of a Secure and High Speed Cloud Interface for Cell Phone

    In mobile cloud computing the authors are increasing speed and security which is a major concern area for this research work as day by day multimedia work load increasing on small smart devices and cloud computing should be able to full fill all user requirement on these small devices where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    A Novel Symmetric Key Encryption Algorithm Based on RC5 in Wireless Sensor Network

    In recent years, there has been growing interest in wireless sensor network due to its wide range of potential applications. They are used in military area, industrial process monitoring and control, environment and habitat monitoring, health care. The sensor node has limited computational power and memory size affecting the amount...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Surveillance Through Automatic Signalling in Cloud Computing: A Theoretical Model

    In this paper, the authors have been written to focus on the problem of information hiding by cloud provider to maintain reputation and faith. It also focuses data leakage problem and give new idea for business continuity planning. This paper proposes the solution in two phases first phase is done...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Web Services Security Standards

    Web Services are the way of machine to machine communication over the network to perform specific operation e.g. transaction, information exchange, sale service etc. So web service is having protocols and standards that are used to exchange data between applications or systems. Web Services use SOAP protocol to exchange data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Advanced Autherization System by Using 3D and CCP

    Current authorization systems suffer from many weaknesses. Policies are commonly used based on passwords and username; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Present a New Middleware to Control and Management Database Distributed Environment

    Database systems and computer networks technology led to distributed database development. In this paper, a suitable and flexible middleware called CMDBMS is presented to control and manage database in distributed environment. In middleware the data are distributed entirely among the databases, and each database has its own database management system,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Mining High Utility Item Set From Large Database: - A Recent Survey

    Frequent pattern mining play an essential role in data mining for markets basket analysis. However, items are actually different in many aspects in a number of real life applications, so frequent pattern mining cannot meet the demands arising from these applications. Utility-based data mining is a new research area interested...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Detection of Duplicate Records From Multiple Web Databases Using Pattern Matching in UDD

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the supervised record matching methods require training data provided by users. Such methods can not apply for web database scenario, where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    QoS Aware Routing and Admission Control in MANET

    It is difficult to provide Quality of Service (QoS) assurances in a Mobile Ad-hoc NETwork (MANET) due to node mobility, distributed channel access, fading radio signals, a lack of centralized coordination, and the unreliable nature of the wireless channel. This application gives a thorough overview of QoS routing metrics, resources,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Clustering of Datasets by using Centroid Based Method

    The integrated data mining processing technique to find appropriate initial centroids and vectors in data clustering process by k-means and c-means algorithm. The processes include data cleansing, preprocessing, and finding features relation with Apriori algorithm to get appropriate features. Here, the authors used centriod based model that represents the processes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Review Paper on Crusoe Processor

    Mobile computing has been the buzzword for quite a long time. Mobile computing devices such as laptop, desktop computers etc are very important in day to day life and they require microprocessor. Microprocessor is the heart of those devices. desktop computer have very different command on processor that's why they...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Understanding Web personalization with Web Usage Mining and its Application: Recommender System

    Web is becoming an enormous storehouse of information and it will keep growing with improvements in internet technologies. But the human capability to read, access and understand content does not increase with that pace. Hence it becomes difficult to website owners to provide appropriate information to the users. This led...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Trends in Contemporary Cryptanalysis

    Securing the information and access to this information has been a prime concern ever since the existence of data. Cryptographic system encrypts this data but cryptanalysis techniques are used to test and break these encryption techniques. In this paper, the authors will see recent developments in the field of encryption...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    An Improved Method for Frequent Itemset Mining

    Discovering knowledge in huge amounts of data is called data mining. Frequent itemset mining is an important step in association rule mining. Several algorithms have been proposed for efficient frequent itemset mining in transactional database. The authors present an improved approach to mine frequent itemset in transactional database. The algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Evolution of Data Hiding By Neural Network and Retrieval or Encrypted Image, Text, Audio and Video Files

    Information hiding is a method of hiding secret messages into a cover-media such that an intended observer will not be aware of the existence of hidden messages. In such applications various file formats are used as cover-object which contains confidential data. As the new research field the techniques introduces Artificial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Cloud Computing: The Emergence of Application Service Providers (ASPs) in Developing Economies

    The cloud computing paradigm has triggered a major shake-up in the way ICT infrastructure is delivered, priced and consumed. The underlying factors for this phenomenon are highly abstracted or virtualized infrastructure, a variable OPEX-based model (determined by usage requirements), support for multi-tenant user model and immediate computing resource scalability. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    STEGCRYP: A Multilevel Information Security Shceme

    In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB (Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Role of Component Based Systems in Data Mining & Cloud Computing

    In this paper, the authors proposed a "Collaborative approach" which tells how component based systems are used with data mining as well as cloud computing. Data Mining helps for extracting potentially useful information from the raw data. The function of association rules are an important data mining technique used to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    New Multimodal Biometric Approach with Two Score Level Combination Strategies

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. The anatomy of human fingers is quite complicated and largely responsible for the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Boosting the Efficiency in Similarity Search on Signature Collections

    Computing all signature pairs whose bit differences are less than or equal to a given threshold in large signature collections is an important problem in many applications. In this paper, the authors leverage MapReduce-based parallelization in order to enable scalable similarity search on the signatures. A road-block in using MapReduce...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Adaptive Channel Estimation Technique for MIMO-OFDM

    A Multiple-Input Multiple-Output (MIMO) communication system combined with the Orthogonal Frequency Division Multiplexing (OFDM) modulation technique can achieve reliable high data rate transmission over broadband wireless channels. The most important research topic in the wireless communications is the adaptive channel estimation where the channel is rapidly time-varying. In this paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Efficient Framework for Deploying Information in Virtual Datacenter with Cloud Security Application

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the Cloud Technology most organizations have own challenges when it comes to handle both critical and confidential information. The major challenge in cloud technology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Study on Biometric Recognition in Embedding Web Browers in 3G Mobile Phone Applications

    The novel mobile-phone employs an modular architecture to capture and send the biometric to the web server based on the use of an embedded web browser. Investigating the technologies for embedded web page in order to capture and send the biometrics are Applet Java, ActiveX controls, Flash technology, Javascript, and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Triband Folded Dipole Antenna for GSM Mobile Communication Applications

    Over recent years, a commercial opportunity for the mobile industry has been rapidly developed due to the use of wireless communication technologies. The fast evolution of wireless service applications viz., live online game, real-time video streaming and mobile electronic devices that are capable of handling high data rate applications are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Securing a Firm's Computer Operating System : Trusted Platform Module

    Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design of Reconfigurable and Adjustable Wireless CORDIC Single Core Rake Receiver

    In wireless communication system transmitted signals are subjected to multiple reflections, diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by signal cancellation. Rake receiver...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Usability and Comparisons of Passwords

    Mobile devices such as cell phones/tablets laptops are widely used nowadays, during the last years phones changed from simple phones to smart phones with an increasing number of features. People feel easy to store their information on these devices so that they can get their required information whenever they want....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Review of the Development in the Field of Fiber Optic Communication Systems

    This paper presents a review of the latest research and development in the field of fibre optic communication system. Remarkable developments can be seen in the field of optical fibre communication in the last decade. Wide-bandwidth signal transmission with low latency is emerging as a key requirement in a number...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Performance Increasing in Congested Sensor Networks

    The wireless sensor network consists of hundreds or thousands of sensors. The sensors are shared by the multiple applications like sensing the temperature, pressure etc. Function of sensor is to sense the information and transfer that information to the neighbor of that node. In wireless network every node is connected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System

    MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet, the Internet threat takes a form of attack, targeting individual users to gain control over network and data. Buffer overflow is one...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Design Edge-Coupled Stripline Band Pass Filter at 39 GHz

    In this paper, the authors propose a edge-coupled stripline band pass filter for 39 GHz application using Ansoft designer/Nexxim V2.2 software and Matlab 2009a software. The filter is operated at Q band frequency range in 39 GHz for various microwave applications & the filter is design on Roger RO6006 substrate...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    FPGA Based Wireless Control System for Robotic Applications

    Robotic applications are much more needed and almost mandatory requirement in today's fast moving industrial economy. In these circumstances the development of Robotics is also taking up the speed with the help of various technologies directly or indirectly suitable for robotic applications. FPGA takes advantage over microcontroller due to its...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Trust-Based Message Reporting Scheme for VANET

    In Vehicular Ad Hoc NETworks (VANET), trust establishment among communicating vehicles is important to be built to secure messages' exchange and reliability. In this paper, the proposed scheme presents a categorized decentralized trust management evaluation scheme for nodes in vehicular ad hoc environments. Each node is evaluated individually according to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Performance Evaluation of V-Blast Mimo System in Fading Diversity Using Matched Filter

    In this paper, the authors are proposing a method which evaluates the performance of V-BLAST MIMO system in different consideration of rayleigh fading environment to get better performance of the system. In V-BLAST MIMO system some of linear detection technique can be used for interference cancellation. Here, they are using...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Fibre Optic Communications: An Overview

    This paper deals with communication using optical fibres. The transmission using high bandwidth can handle vast amounts of information, which can be further improved by reduction in fibre losses, increase in data rates and distances, development of optical sources and detectors compatible with fibres. The recent development in the area...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Review of DDoS and Flooding Attacks in MANET

    The flooding and DDoS (Distributed Denial of Service) attacks are acts as major threats for MANET because of its ability to create huge amount of unwanted traffic. It is very difficult to detect and respond to flooding and DDoS attacks due to large and complex network environments. In this paper,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Suitability of COFDM in 3G and Comparison with CDMA: A Technological Review

    This paper gives the effectiveness measures of OFDM as a modulation technique for wireless radio applications. OFDM is checked as a modulation technique for telephony communication system. A comparative study of COFDM a variant of OFDM is done with the CDMA technology for the same application. Various performance matrices like...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    The New Approach of Quantum Cryptography in Network Security

    Cryptography means that the authors keep a message secret during transmission through untrusted and insecure channel. It's simple means-encoding and decoding messages and has existed as long as people have distrusted each other and sought forms of secure communication. This encoding and decoding is perform by the some special key...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Wireless Sensor Network Cuts: A Survey

    This paper gives formatting guidelines for authors preparing papers for publication in the International Journal of Emerging Technology and Advanced Engineering The authors must follow the instructions given in the document for the papers to be published Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimal PMU Placement on Network Branches for Intentional Islanding to Prevent Blackouts

    Power grids, throughout the world, are operated as large interconnected networks to ensure reliability of supply in an economic way. The interconnected nature of power network makes it vulnerable and sometimes even a small disturbance in the grid may propagate and result in a blackout. Investigations into major blackouts of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Rateless Erasure Code Based Secure Storage in Cloud Computing

    Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers host their data on cloud servers and data consumers can access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimized Node Deployment Using Enhanced Particle Swarm Optimization for WSN

    Sensor nodes deployment is critical for Wireless Sensor Networks (WSNs). Current methods are apt to enlarge the coverage by achieving a nearly even deployment with similar density in the wireless sensor network. Virtual Force (VF) directed Enhanced Particle Swarm Optimization (EPSO) algorithm, which uses a combined objective function to achieve...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism

    Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Automatic Hybrid Detector for Spontaneous Detection of Malicious Nodes in MANET's

    MANET capabilities are expected to be an overall driving force for next-generation wireless functionalities. These multi-hop networks the burden of routing packets from source to destination. Each Node handles part of the management of the network. Fault detection is extremely difficult because of the distributed design. In this paper, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Implementation of Improved WPC for Secured Steganography on Ad-Hoc Networks

    In this paper, the authors aim on transferring the data in a more secured manner using WPC. Cryptography and Steganography techniques of encrypting the data and hiding the data are well known. In this paper, they use Wet Paper Codes (WPCs), which enable the sender to determine the selection channel...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Enhancing Security in Biometric System Using Blind Authentication Protocol

    Biometric authentication system are used prevalently for its template security, retract ability and privacy. The Authentication process is reinforced by biometric cryptosystem. The authors propose a demonstrable secure and blind biometric authentication protocol which discloses only identity and not any other information to both client and server. To reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Message Security Through Digital Signature Generation and Message Digest Algorithm

    It is common now a day to communicate through messages. The sending and receiving message with in a network is not more secure as the people data can be accessed by everyone within that network. In order to provide security to the data most commonly the authors are using the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Modified Cellular Message Encryption Algorithm

    The Cellular Message Encryption Algorithm (CMEA) has been designed by the TIA (Telecommunication Industry Association) to protect the control data of cellular phone communication. As cellular telephony industry has boomed, the need for security has increased: both for privacy and fraud prevention. Because all cellular communications are sent over a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Tappered Spiral Helix Antenna

    This paper presents the aspects related to the design and development of a tapered spiral helix antenna covering the frequency range 1.2-18GHz. It is a compact state-of-the-art circularly polarized antenna, which works over multi-octave frequency bandwidth (1.2-18 GHz).The antenna size has been reduced by 50 percent with respect to conventional...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Cloud Computing Security: Issues and Concerns

    Cloud Computing is gaining the attention of today's users and businesses. Network-based Cloud Computing is rapidly expanding as an alternative to conventional office-based computing. Cloud Computing provides suitable on-demand network access to a shared pool of computing resources. Several trends are opening up the era of Cloud Computing, which is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Green Solution for Cloud Computing with Load Balancing and Power Consumption Management

    Cloud computing a relatively recent term builds on decades of research in virtualization, distributed computing, utility computing, and networking, web and s/w services. The consequence of network based cloud computing model which is rapidly increasing in delivering computing as a utility to users worldwide is that cloud data centers have...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    An Efficient Wormhole Prevention in MANET Through Digital Signature

    Wireless networks are gaining popularity to its peak nowadays, the desire to be connected anytime and anywhere has led to the development of wireless network, opening new vista of research in pervasive and ubiquitous computing. Mobile Ad hoc NETwork (MANET) has distributed mobile wireless nodes, which do not have pre-determine...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Multilayered Password Security for Banking Application

    The world in which the people are working and surviving their day to day life is going more and more close to Computers. Today if anyone think not to use computers at all, then it will be almost impossible to work. Mostly, today all the sectors use computers, where their...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Intelligent Wireless Mesh Network

    The drawbacks of the previous system is that if the people send the data from one location to another in mesh network due to the link failure data will be loosed. Now, they overcome these drawbacks through intelligent wireless mesh network by using ARS (autonomous reconfiguration system).In this system, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Peer to Peer Node Groupings Based on Content Using Game Theoretic Strategy in Inter-Networks

    Peer-To-Peer systems (P2P) have grown-up drastically in recent years. Peer-to-peer suggests the probable low cost sharing of information, autonomy, and privacy. In Peer to Peer network game theory will be the main tool for modeling and analyzing node behavior. In the authors' concept the participant or nodes are linked based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detecting Routing Misbehavior and Enhancing the Security in Disruption Tolerant Network

    Disruption tolerant network exploit the intermittent connectivity between mobile nodes to transfer the data. In such networks, selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Intelligent Agents for Intrusion Detection System (IAIDS)

    This paper presents a distributed wireless Intrusion Detection System (IDS) based on Intelligent agents. Intelligent agents are randomly traveled in difference nodes which are connected with the network. Each agent may perform specific tests (like mobile sensors). When the test indicates some possibility of an intrusion, the agent may ask...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    To Detect and Recover the Authorized CLI-ENT by Using Adaptive Algorithm

    Computer network is collection of computers and other hardware components interconnected by communication channels that allow sharing of information. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible re-sources. Network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Self Organising Mesh Radio Based Solution for Smart Metering Communication

    This paper describes a mesh networking based solution on Routing Protocol for Low power and Lossy network to realize Automated Metering Infrastructure (AMI) network communication. Automated Metering Infrastructure is expected to facilitate the transport of meter readings from meters to the utility provider and control information in the other direction....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Soft Error Mitigation for Embedded System Using Depth Packet Inspection

    The protection of processor-based systems to mitigate the harmful effect of transient faults. This paper proposes an Depth packet inspection methodology for facilitating the design of fault tolerant embedded systems, the packet inspection is possible in compressed data and thereby achieve high fault coverage in accuracy and speed. The methodology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Human Network Communication

    Today the people have even realized the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as Unique Universal Identification (UUI). Radio Frequency Identification is a wireless data collection technology use to identify human or unique entities. Radio Frequency Identification is a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Providing a Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-Encryption Scheme

    Cloud computing treats the resources on the Internet as a unified entity, cloud. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Storing data in a third party's cloud system causes serious concern on data confidentiality. In order to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Stride Towards Developing a Distributed System for the Identification of Top-L Inner Product Elements

    A distributed scenario can be of two types: homogeneous - where only a fraction of each feature is observed at every site or heterogeneous - where only some of the features are observed at each site. For either scenario centralizing all the data in order to build a global model...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Safe Navigation System Using Ultrasonic and Zigbee Technology

    This paper proposes to assist the visually impaired for their safe navigation. The authors are using the Zigbee technology to help them correctly identify their destination without any human guidance. It uses a SD card to store the map of the familiar and unfamiliar environments which helps the visually impaired...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Virtualization Technology in Cloud Computing Environment

    Internet, it is a large collection of networks where resources are globally networked, In internet cloud computing plays a major role In order to share the data and one of the important technology in the cloud computing is virtualization. Mainly it is used to maintain the collection IT resources which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Mobility Management for Wireless Systems:Challenges and Future of Mobile IP

    With the tremendous growth in data traffic, the wireless industry is evolving towards new technologies. Recent advances in technology have provides portable computers with wireless interfaces that allow networked communication even while a user is mobile. Wireless networking greatly enhances the utility of a portable computing device. It allows mobile...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    High Throughput Analysis Using Topological Control & Authentication Scheme in MANET

    Since MANETs are mainly composed of lightight devices with limited capabilities, efficiently manage security is crucial to reduce the performance degradation and resources consumption. In particular, Mobile Ad hoc NETworks (MANETs) based on Cooperative Communication (CC) present significant challenges to security issues, as well as issues of network performance and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Multiband Rectennas Using a Bowtie Antenna - A Review

    This paper reviews the rectennas which are employed to harvest the electric energy from RF signals radiated by several communication systems. The modified bowtie antenna considered in this study is used to collect the Electro-Magnetic energy (EM) coming from RFID systems and a 2-stage voltage rectifier used to convert it...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Analysis of Improvement QoS Parameters Techniques Used for Hybrid Networks

    Most real life networks are hybrid networks. A hybrid networks combines the best feature of two or more networks. In networking terminology a hybrid network according to "Information Technology control and Audit "are reliable and versatile. They provide large number of connection and data transmission paths to users. This hybrid...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    QoS Provisioning in Seamless Vertical Handover of WIMAX/WLAN Overlay Network

    The integration of WiMAX and WLAN has been seen as a promising approach towards Fourth Generation (4G). Vertical handoff plays important role while integration of WiMAX and WLAN heterogeneous overlay systems. Vertical handoff is preformed on the basis of Quality of Service (QoS) metrics of the two heterogeneous networks. A...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimization of Resource Providing in Cloud

    The term cloud, the authors can simply say it as pay for use. Now-a-days most of the organization move towards cloud and they can store their data in the cloud and get benefits from their applications. Cloud can offer services in three in such as Software as a service, Platform...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    A Practical Approach to Intrusion Detection System for Multilayer Web Services

    The common technique to detect intrusion is based on behaviors. The primary objective of the system is to detect attacks in opposition to computer systems or against information systems. The proposed system is used to detect malicious actions in a session, analyze the traffic, and respond accordingly to protection strategy....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Suitability of COFDM in 3G and Comparison with CDMA: A Technological Review

    This paper gives the effectiveness measures of OFDM as a modulation technique for wireless radio applications. OFDM is checked as a modulation technique for telephony communication system. A comparative study of COFDM a variant of OFDM is done with the CDMA technology for the same application. Various performance matrices like...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Faster Consensus Agreement Approach for Fault Tolerance in a Distributed System

    The essential problem in distributed computing is to achieve overall system reliability in the presence of a number of faulty processes. Maximizing fault tolerance is the important for message exchanges in distributed environment. To achieve this point, solving consensus problem that requires agreement among a number of processors for a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Effect of High Error Rate on the Behaviour of TCP Variants Using Realistic Error Model in Cellular Mobile Environment

    TCP performance in the wireless environments is impacted by two path characteristics not normally present in wired environments: packet losses due to corruption and mobility. There are two mechanisms to model the wireless packet losses in simulation: uniform error model and the realistic error model (two states). Uniform error model...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Reliability and Security of Large Amounts of Data Storage in Cloud Computing

    In this paper, the authors will present new challenges to the large amounts of data storage in cloud computing, namely Reliability and security. Recent progress in the research area will be briefly reviewed. It has been proved that it is impossible to satisfy consistency, availability, and partitioned-tolerance simultaneously. Trade-off becomes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Performance Study of Voice in Wireless Mesh Network

    The wireless meshed technology is one of the most advanced technology and can be viewed as the technology of the future. This paper deals with aspects like performance metrics i.e. delay, R-Factor and Mean Opinion Score (MOS) that have a direct influence on the performance of the wireless mesh network....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)