International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 201-240 of 1156 results

  • White Papers // Jul 2014

    Optimal Path Selection on TORA algorithm Using Quadratic Assignment techniques in WSN

    Wireless Sensor Networks (WSNs) are comprised of large number of sensor nodes which can be used for monitoring and controlling physical phenomena in an environment such as healthcare monitoring, battlefield monitoring, enemy detection, tactical surveillance and disaster monitoring. A wireless sensor network consists of many small sensors which is capable...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    A Novel Methodology of Frequent Itemset Mining on Hadoop

    Frequent itemset mining is one of the classical data mining problems in most of the data mining applications. It requires very large computations and I/O traffic capacity. Also resources like single processor's memory and CPU are very limited, which degrades the performance of algorithm. In this paper, the authors have...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Detection of IDS Based on Game Theory Pay off with Cluster Formation using DSR Protocol

    Wireless sensor networks has grown a lot in recent years and offers excellent opportunities in defense related applications such as monitoring environment and collecting data related to anti-social activities. So there is a need to develop new techniques or modify the current security mechanisms to transfer data from source to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Multi-Destination Protocol: An Alternate Approach to SMTP

    For the vast majority of people right now, the real e-mail system consists of two different servers running on a server machine. One is called the SMTP server, where SMTP stands for Simple Mail Transfer Protocol. This paper is about providing an alternate approach to the Simple Mail Transfer Protocol...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    An Efficient Ensemble Based Hierarchical Algorithm

    Clustering is an important data mining technique which play and very important role in many application. In this paper, the authors enhanced hierarchical clustering algorithms like single, complete and average linkage methods by using the concept of cluster ensemble techniques. Single linkage method is based on similarity of two clusters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    VLSI Implementation of Cryptography Hash Algorithms

    Providing security to data and information which is to be transferred to and fro has its increasing demand where various remedy measures are to be undertaken for that. It is ensured by providing out some cryptographic algorithms for enhanced security. A few among these were MD5 (Message Digest Algorithm), SHA...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Fuzzy Based Energy Aware Flat Routing (FEAFR) in Wireless Sensor Networks

    A WSN system incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes. Routing is the main operation in Wireless Sensor Network (WSN). In this paper, the energy of a node, distance of a node from the current node and the angle made by a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Routing of Misbehavior Nodes in Manets Using Acknowledgement Method

    A Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. The operation of MANETs does not depend on pre-existing infrastructure or base stations. Network nodes in MANETs are free to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Review on Data Aggregation Techniques for Energy Efficiency in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is most important building block for communications. Wireless sensor network faces some critical challenges like security, fault tolerance, scalability, and heterogeneity, energy efficiency. Energy efficiency is one of the most studied challenges in wireless sensor network by researchers. Different protocols or algorithms are designed to improve...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Possibility of Thinking Mechanism in Artificial Intelligence

    Artificial Intelligence (AI) is the branch of science which deals with the making of machines with the intelligence which is created artificially by the humans. Intelligence means making the users' own decisions according to the circumstances. Human beings are regarded as the most intelligent creature in the earth because the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Detecting and Removing Cooperative Black or Gray Hole Attacks in MANET

    In this paper, the authors given a brief back ground about detecting and removing cooperative black or gray hole attacks in MANETs. Usually, this type of network is more vulnerable to attacks. Due to this there is heavy packet loss. This affects the integrity of the packets in MANETs. To...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Flooding Attack in Delay Tolerant Network

    Delay Tolerant Network (DTN) routing protocols works in an environment where there is no guarantee of end to end path between source and destination. DTNs operate with the principle of store, carry and forward. Mobile nodes have limited buffer space and contact opportunity. So the resources are useful and must...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Implementation and Performance Evaluation of Data Offloading Approaches for Mobile Social Networks

    Cellular networks are facing severe traffic overloads due to the proliferation of smart handheld devices and traffic hungry applications. This paper tries to offload the cellular network traffic through opportunistic communications and social participation formed by the short-range communication technologies in the smart phones (e.g., Wi-Fi, Bluetooth). The authors design...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Wireless Spontaneous Network Creation with Energy Efficient Authentication

    Wireless ad-hoc networks are a form of peer-to-peer network where nodes can communicate with each other without any central infrastructure. In spontaneous network, devices are placed close to each other for accessing services and sharing resources among each other for short period of time and network is formed spontaneously without...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Case Study on Implementation and Improvement of Timing Constraints in a 64 Bit RISC Processor Using Floor Planning

    In this paper, the 64- bit RISC processor with 33 instructions is implemented using Verilog HDL and was, in turn, verified on Xillinx ISE simulator. This paper will also present the architecture, of the RISC processor. Total delay and logical delay for data path are also calculated. Floor planning of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Loch-Ness: A Lock Free Method Using Virtual Memory Page Table Entry Mechanism

    Operating systems have offered locking as a de-factor mechanism for mutual exclusion. Locks have enjoyed widespread use due to their simplicity. However, the burden of protecting a critical section is left to the programmer. Programmer has to ensure that the locks are created, acquired, released and destroyed after use. Incorrect...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    IT for Environmental Sustainability

    Global warming and its increasing effects have shed light on the many global environmental issues. The people's planet fragile ecosystem is under attack on many fronts as a result of industrialization and the people's growing usage of information technology. Worldwide change is needed in order to avert this catastrophe. According...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    An Optimal Var Compensation Strategy Based on Data Mining and Ant Colony Algorithm

    In this paper, the authors propose a new algorithm to find the optimization method of reactive regulation in power system to solve the problem of the var compensation and voltage control in center-substations. Using the daily data collected in power substations, the algorithm is combined with improved ant colony algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Optimized Utilization of Resources Using Improved Particle Swarm Optimization Based Task Scheduling Algorithms in Cloud Computing

    Cloud computing is one of the hottest topic that is rapidly gaining popularity in the IT industry. It is popular because it provides computing resources as a service. Cloud computing delivers an elastic execution environment of resources over the internet. Cloud computing is based on various other computing research areas...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Anomaly Extraction Using Efficient-Web Miner Algorithm

    Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behavior affecting network security. Anomaly Extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Advance Double Guard System: Detecting & Preventing Intrusions in Multi-Tier Web Applications

    Today there is huge amount of use of computer especially for web application. Most of the people do their transaction through web application. So there are risks of personal data gets hacked then need to be provide more security for both web server and database server. For that advance double...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    High Data Aggregation in Wireless Sensor Networks Using Rendezvous-Drina

    Wireless Sensor Networks (WSN) will be established in distinct category of fashion such as healthcare application, home automation, defense etc. As a consequence of plenty of nodes in WSN, unified data and energy preservation is in need for efficient transmission. Due to the massive node environment in WSN, redundant data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Piezoelectric Interconnected Processor Cores

    The author's idea is to improve the performance and efficiency of multicore processors. Using piezoelectric materials, the power supply to each core can be cut off if the load is low. This way, the number of cores running for performing light tasks is less. Improving efficiency and improving performance drastically....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Comparative Analysis of Bitmap Indexing Techniques in Data Warehouse

    One of the most important elements of \"Business Intelligence (BI)\" is the \"Data Warehouse (DW)\" that used to improve the making of strategic decision. Also, the massive database, historical, nonvolatile, and subject-oriented can represent the DW that forms the treatment of analytical queries, which produces in times with high response....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Laptop Data Theft-Full Disk Encryption System

    Laptop data theft has reached alarming rate requiring urgent steps to bring the menace under control. This research work focused on mechanisms to protect laptop data from theft and abuse. Full Disk Encryption (FDE) system was designed to secure data stored on laptops owned by the company or those owned...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Survey on Intrusion Detection over the Cloud Computing Environment

    Cloud computing is one of the major demanding topic in area of computer science or information technologies. It is depend on multiple other computing research areas virtualization, grid computing. Cloud computing it is the internet based computing which means that every type of service available to the user from the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    FPGA Implementation of Earth Mover's Distance

    Image processing has become a vibrant area of research over the last few years and distance measurement between two images is needed in many applications. Earth Mover's Distance (EMD) is the algorithm for measuring similarity between images. However, application of the current software implementations of the EMD algorithm to real...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Data Mining Techniques and Research Challenges and Issues

    Data mining is considered to deal with huge amounts of data which are kept in the database, to locate required information and facts. Data mining is the exploration and analysis of large quantities of data in order to discover valid, novel, potentially useful, and ultimately understandable patterns in data. Non-trivial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Cross Layer TCP Congestion Control Load Balancing Technique in MANET

    The multipath protocol AOMDV is removes the limitation of alternative path and balance the load more efficiently. In this paper, the proposed scheme firstly, introduces a redundant multipath routing strategy, which establishes and maintains multiple backup routes from the source and intermediate node to the destination node and increment the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    A Novel Intrusion Detection System Using Neural-Fuzzy Classifier for Network Security

    An Intrusion Detection System (IDS) is intelligent engine which is used to identify anomalies (abnormality) in a computer network system. Intrusions are generally unauthorized access signatures which is like a attacks for network that attempts to either prevent normal functioning of nodes in a network or to harm the nodes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Design and Analysis of Reliability for Component-Based Software System by using Soft Computing Approaches

    Software reliability is the probability of failure-free software operation for a specified period of time in a specified environment. Software reliability is also an important factor affecting system reliability. Software reliability without excessive limitations. Various approaches can be used to improve the reliability of component-based software system, however, it is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Low Rate Denial of Service (LDoS) attack - A Survey

    Denial of Service (DoS) attacks has become a major problem to intranet and Internet services. DoS attacks can be detected and eliminated using existing efficient Active Queue Management (AQM) schemes like RED. A new kind of DoS attacks have become more common in today's Transmission Control Protocol (TCP) services, i.e.,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    A Review on Test Case Selection And Prioritization In Swarm Intelligence

    In this paper, the authors present a review on selection and prioritization of test cases from a particular test suite. Software testing is the major process in software development life cycle. Regression testing is very costly and inevitable activity that is to be performed in a restricted environment to ensure...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    A Survey on TDMA-based MAC Protocols for Wireless Sensor Network

    Recent advancement in micro-electro-mechanical systems (mems) have enabled the development of Wireless Sensor Network (WSN) which is gaining popularity day-by-day and is used in wide range of applications. The sensor nodes that constitute WSN have several constraints like limited battery power, memory constraint, limited bandwidth etc. Therefore designing an efficient...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Multistage Three Layers Image Steganography Using LSB with Enhanced Security

    Now-a-days a fast growth of internet in the present world, social networking websites like Twitter& Facebook are being increasingly used by individuals of all over the world to share their life activities and events via images. But this vastly popular observable fact of image sharing on internet is exposed to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Integration of Mobile Ad Hoc Networks in 4G Networks

    This fourth-generation wireless networks may require an integration of Mobile Ad hoc NETworks (MANET) into external network to enhance the flexibility of the communication and roaming. This phenomenon is well-suited for commercial and military applications which yield additional benefit of roaming. However, integration of MANET with external network poses a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Online Network Intrusion Detection System Using VFDT

    In a network system the security is a main concern for a user. It's basically virus attack; infiltrators have suffered from mainly two security attacks. Intruder does not only mean it want to hack the private information over the network, it also served a node bandwidth usage and includes an...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    An Efficient Distributed Load Balancing For DHT-Based P2P Systems

    In a distributed system environment it is likely that some nodes are heavily loaded while others are lightly loaded or even idle. It is desirable that the work-load is fully distributed among all nodes so as to utilize the processing time and optimize the whole performance. Many algorithms have been...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    A Survey on Time Efficient and Secure Data Hiding Algorithm

    Cryptography is the process of securing information; it ensures that the information is only understood by authenticated persons. Steganography is the process of exchanging secret information in such a way that nobody else can detect the presence of that secret message. To achieve high security, steganography process is combined with...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Performance Evaluation of AODV and DSR Routing Protocols for Vehicular Ad-Hoc Networks (VANETs)

    Vehicular Ad-hoc NETwork (VANET) is a sub class of Mobile Ad-hoc NETworks (MANET). Vehicular Ad-hoc NETwork (VANET) provides wireless communication among vehicles and road side equipment. The communication between vehicles is used for safety and non safety purpose. The performance of communication depends on how better the routing takes place...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Securing Email Applications from Various Cyber Issues

    Information security and integrity are becoming more important as the authors use email for personal communication and business. As it is excessively used it is highly prone to cyber attacks, threats and malwares. The most common of these are masquerading, modification, and Phishing attacks. In order to provide security against...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Surveillance Through Automatic Signalling in Cloud Computing: A Theoretical Model

    In this paper, the authors have been written to focus on the problem of information hiding by cloud provider to maintain reputation and faith. It also focuses data leakage problem and give new idea for business continuity planning. This paper proposes the solution in two phases first phase is done...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Web Mining Using Cloud Computing

    In this paper, the author present the technology of cloud computing using web mining .Web mining include how to extract the useful information from the web and gain knowledge using data mining techniques. Here so many online resources are available i.e. web content mining and access through the web servers....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Multibiometric Cryptosystem with Fuzzy Vault and Fuzzy Commitment by Feature-Level Fusion

    Unibiometric is based on measurement of individual part investigation. Unibiometric system deals with noisy sensor acquisition, non-universality performance rate and so on. And also it may be susceptible to different attacks like man-in-the-middle attack, Trojan horse attack, collision attack and replay attack. Such drawbacks raise the need of multi-biometric system....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Evaluation of BATMAN, DSR, OLSR Routing Protocols - A Review

    Mobile Ad Hoc NETworks (MANETs) can make dynamic changes in topology. The most realistic characteristic which differentiates MANETs from other networks is that it is capable of changing its location. The result of the surveys over the last 5 years, show that it can overcome the two difficulties such as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    The Future of Satellite Communication Antennas: Negative Refractive Index Metamaterials - A Review

    Now-a-days, electromagnetic meta-materials is a rapidly growing research domain involving electromagnetism, microwave and milli-metre wave technology, optics, material technology and nanotechnology. In particular, paper concerns about the utilization of split ring resonators in negative permeability meta materials, the concept and the production of an isotropic negative permeability medium, an isotropic...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Analysis of Various Routing Protocols in Ad-Hoc Network-A Survey

    Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes. An ad...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Design and Analysis of On-Chip Router for Network on Chip

    Continuous scaling of CMOS technology makes it possible to integrate a large number of heterogeneous devices that need to communicate efficiently on a single chip. For this efficient routers are needed to takes place communication between these devices. This paper gives the design of on-chip routers based on optimizing power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Review of Impedance Matching Networks for Bandwidth Enhancement

    A number of techniques can be used to eliminate reflections when the characteristic impedance of the line and the load impedance are mismatched. Impedance matching techniques can be designed to be effective for a specific frequency of operation (narrow band techniques) or for a given frequency spectrum (broadband techniques). The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Identification of Cross Cutting Concerns and Refactoring of Object Oriented System Based on Aspect Mining

    The process of Aspect Mining and Refactoring tries to indentify the cross-cutting concerns in the existing software system and refactoring if for a good AOP. The aim of the paper is to analyze the techniques use for the evaluation of the cross-linking and making the system easier to maintain and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Compensating Frequency Response Mismatches in Time Interleaved Analog to Digital Converters

    Time interleaving of multiple analog-to-digital converters by multiplexing the outputs of (for example) a pair of converters at a doubled sampling rate is by now a mature concept - first introduced by Black and Hodges in 1980. Time interleaving of ADCs offers a conceptually simple method for multiplying the sample...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Detecting Black and Gray Hole Attacks in Mobile Ad Hoc Network Using an Adaptive Method

    Black and gray hole attack is one sort of routing disturbing attacks and can bring huge harm to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive method to detecting black and gray hole attacks in ad hoc...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Power Dissipation in WCDMA- An Overview

    Code-Division Multiple Access, a digital Cellular technology that uses spread-spectrum techniques such as GSM, that use TDMA, but CDMA does not assign a specific frequency to each user. Wideband Code-Division Multiple Access (WCDMA), for the implementation of the Third-Generation (3G) cellular system. WCDMA efficiently utilizes the radio spectrum to provide...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Wavelet Based Edge Detection Technique for Iris Recognition Using MATLAB

    Edges characterize boundaries and therefore a problem of fundamental importance in image processing. Edge detection significantly reduces the amount of data and filters out useless information, while preserving the important structural properties in an image. In this paper, the authors present wavelet based edge detection technique. Fourier Transform in edge...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Review: Ant Based Ad Hoc Routing Protocols

    A Mobile Ad-Hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Swarm Intelligence (SI) is an artificial intelligence technique based around on the study of collective behavior in decentralized, self-organized systems. Ant Colony Optimization is popular...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A General Study of Associations Rule Mining in Intrusion Detection System

    Intrusion Detection Systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e., alerts that are triggered incorrectly by benign events). This makes it extremely hard for to analyze and react to attacks. Data mining generally refers to the process of extracting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Performance Improvement of 802.11 MAC by Enhancements in DCF

    In the 802.11 protocol, the fundamental mechanism to access the medium is called Distributed Coordination Function (DCF). This is a random access scheme, based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. Retransmission of collided packets is managed according to Binary Exponential Back-off (BEB) rules. BEB increases...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Comparative Analysis of PCA and 2DPCA in Face Recognition

    The growing need for effective biometric identification is widely acknowledged. Human face recognition is an important area in the field of biometrics. It has been an active area of research for several decades, but still remains a challenging problem because of the complexity of the human face. The Principal Component...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    An Improved Techniques Based on Naive Bayesian for Attack Detection

    With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A New Modified Playfair Algorithm Based on Frequency Analysis

    Cryptography is an art and science of achieving security by encoding the message to make them non-readable. One of the well known cryptographic techniques is Playfair Cryptography. After the invention of different techniques like Frequency Analysis it is easy to break Playfair. In this paper, the authors proposed some ways...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Novel Web Usage Mining for Web Mining Techniques

    Web usage mining is a type of web mining, which exploits data mining techniques to discover valuable information from navigations of Web users. As in classical data mining, data processing and pattern discovery are the main issues in web usage mining. The first phase of the web usage mining is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Cloud Computing: A Security Problem or Solution

    The move to cloud computing is the next stage of an unstoppable trend in the breakdown of the enterprise perimeter, both technically and organizationally. This new paradigm presents a number of security challenges that still need to be resolved, but sufficient change in the IT environment has already happened -...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Implementation of Scalable Framework to Reduce Core Development of Cloud Computing Relevants

    Implement a cloud and develop the cloud application is quiet difficult in today's scenario as to implement the cloud the authors required to have the in deep knowledge of very advanced technologies. So to make it more easier, they have develop this paper and implementing it in which the required...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Novel Handoff Technique for Heterogeneous Wireless Network

    After review of literature, most of the work is done on handoff between cellular network, i.e., horizontal handoff but, few papers are on handoff between heterogeneous networks are in existence. This type of handoff called as vertical handoff can be simulated. The current problem in handoff makes the system slow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    A Novel Feature Extraction Techniques for Multimodal Score Fusion Using Density Based Gaussian Mixture Model Approach

    An unimodal biometric systems, which relies only on a single trait of a person for identification is often not able to meet the desired performance. Combining multiple biometrics may enhance the performance of personal authentication system in accuracy and reliability which is adopted in multimodal biometrics. This paper describes the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Capacity Enhancement of WiMAX System Using Adaptive Modulation and Code Rate

    Future wireless networks such as 4G system will support high data rate and multimedia services including facsimile, video teleconferencing, file transfer by consuming less bandwidth such as high-speed Internet accesses .The IEEE WiMAX/802.16 is a promising technology for broadband Wireless Metropolitan Areas Networks (WMANs) as it can provide high throughput...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    IDS : Intrusion Detection System the Survey of Information Security

    With the increased use of computerized/online transactions it is very much of the importance to secure the information from intruders. Intrusion detection is the process of monitoring the activities or events occurring in the computer system or network and analyzing them to find out suspicious events intruding the system or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Porting Android to Arm for Wireless Data Encryption and Decryption

    This paper presents the design and development of wireless encryption and decryption system using android operating system which is ported to the TI's Beagle Board-xM. Beagle Board-xM has DM3730 chip which internally containing ARM Cortex-A8 processor. By using keypad, the user can compose a text and submit the message using...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Intrusion Detection System Using Shadow Honeypot

    The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper, the authors proposed a shadow honeypot based intrusion detection...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Enhancing the Throughput in Wireless Networks Using Optimal CSMA Algorithm

    In multi-hop wireless networks, users may compete for accessing a shared transmission medium. For transmission of packets the Medium Access Layer has to schedule the links carefully with minimum collisions. To achieve the maximal throughput the designing of scheduling algorithms is a challenging problem because of the complex interference constraints...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Secure Multicasting in Ad-Hoc Network

    A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. In each communication operation the authors use multicasting technique. In multicasting technique signified for group communication that supports...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Implementation of Zero Knowledge Protocol in Wireless Sensor Network for Identification of Various Attacks

    Wireless Sensor Networks (WSN) is excellent technology which provide great potential for situations like battlefields and commercial applications such as building, traffic survey, monitoring environments smart homes and many more scenarios. Security is the most important challenge in wireless sensor networks. Sensor networks dose not haves any user control for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    An Approach of Quality Assurance in Web Application

    This paper provides an overview of quality assurance process for Web Applications. Producing reliable and robust software has become one of the most important software development concerns in recent years and testing is a process by which software quality can be assured through the collection of information about software. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    ARM Based Mobile Phone-Embedded Real-Time Remote Video Surveillance System With Network Camera

    Monitoring facilities will be necessary and useful for the people daily life, because it is very important for them to think about their security. This work developed an remote video surveillance system, which is organized with an integrated web server, network cameras, remote control devices and clients which connected to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Noise Estimation of Speech Signal Using Adaptive Sub -Spectral System

    In the current environment of the modern world, telecommunication has been highly integrated into the people everyday life through their vivid use in speech communication, speech and speaker recognition, aid devices for the hearing impaired and numerous other applications. Speech is a fundamental means of human communication. In the last...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Improved Comparative Analysis of Mobile Ad-Hoc Network

    This paper presents the performance analysis of different routing protocols of a Mobile Ad hoc NETwork (MANET) including cellular wireless nodes. The connections between these cellular nodes have been conducted without any typical control. MANET is a self-organized and self configurable program where cellular nodes are modified randomly. The cellular...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Trust Based Routing Algorithms for Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) comprises of a set of nodes connected by wireless links. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks. Routing in MANETs is a challenging task due to dynamic topology and error prone shared environment....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Content Based Fingerprinting for Video Copyright Detection System

    Security of a fingerprinting system is important for certain applications such as copyright protections, for this reason secure version of the fingerprinting system for video piracy detection is presented. The proposed system relies on a fingerprint extraction algorithm followed by a fast approximate search algorithm for video piracy detection. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Optimization of Handover Performance in Mobile WiMax 802.16E

    For Broadband wireless communication Wimax is the most promising technology to deliver high data rates over large areas to a large number of users. It allow the users to roam over the network. The Wimax standard specify the handover policy. The handover is initiated and optimized by Mobile Station (MS),...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Experimental Analysis of Wavelength Assignment Strategies in Optical Networks

    In survivable optical networks, wavelength assignment is a major concern than assigning routes to the light path requests. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelengths that leads to blocking probability for any connection request. This paper analyzes the performance of the wavelength assignment strategies to reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)