International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 241-280 of 1156 results

  • White Papers // Jun 2014

    An Optimal Var Compensation Strategy Based on Data Mining and Ant Colony Algorithm

    In this paper, the authors propose a new algorithm to find the optimization method of reactive regulation in power system to solve the problem of the var compensation and voltage control in center-substations. Using the daily data collected in power substations, the algorithm is combined with improved ant colony algorithm...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Optimized Utilization of Resources Using Improved Particle Swarm Optimization Based Task Scheduling Algorithms in Cloud Computing

    Cloud computing is one of the hottest topic that is rapidly gaining popularity in the IT industry. It is popular because it provides computing resources as a service. Cloud computing delivers an elastic execution environment of resources over the internet. Cloud computing is based on various other computing research areas...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Anomaly Extraction Using Efficient-Web Miner Algorithm

    Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behavior affecting network security. Anomaly Extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Advance Double Guard System: Detecting & Preventing Intrusions in Multi-Tier Web Applications

    Today there is huge amount of use of computer especially for web application. Most of the people do their transaction through web application. So there are risks of personal data gets hacked then need to be provide more security for both web server and database server. For that advance double...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Comparative Analysis of Bitmap Indexing Techniques in Data Warehouse

    One of the most important elements of \"Business Intelligence (BI)\" is the \"Data Warehouse (DW)\" that used to improve the making of strategic decision. Also, the massive database, historical, nonvolatile, and subject-oriented can represent the DW that forms the treatment of analytical queries, which produces in times with high response....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Laptop Data Theft-Full Disk Encryption System

    Laptop data theft has reached alarming rate requiring urgent steps to bring the menace under control. This research work focused on mechanisms to protect laptop data from theft and abuse. Full Disk Encryption (FDE) system was designed to secure data stored on laptops owned by the company or those owned...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    High Data Aggregation in Wireless Sensor Networks Using Rendezvous-Drina

    Wireless Sensor Networks (WSN) will be established in distinct category of fashion such as healthcare application, home automation, defense etc. As a consequence of plenty of nodes in WSN, unified data and energy preservation is in need for efficient transmission. Due to the massive node environment in WSN, redundant data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Piezoelectric Interconnected Processor Cores

    The author's idea is to improve the performance and efficiency of multicore processors. Using piezoelectric materials, the power supply to each core can be cut off if the load is low. This way, the number of cores running for performing light tasks is less. Improving efficiency and improving performance drastically....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Defend Mechanism Against Intruders in Multi-Hop Wireless Network

    Mobile ad hoc networks are dynamic networks that can be formed without any fixed communication infrastructure. In addition to node mobility, ad-hoc network has limited resources such as bandwidth, battery power, and computational time. In such network the intermediate nodes serve as forwarder or relay nodes, which forward the packets....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Encryption and Decryption of Text Using AES Algorithm

    In the past few years the security and integrity of data is the main concern. In the present scenario almost all the data is transferred over computer networks due to which it is vulnerable to various kinds of attacks. To make the data secure from various attacks and for the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Knowledge Discovery on Agricultural Dataset Using Association Rule Mining

    Data mining is a technique of analyzing the dataset such that the final conclusion can be accessed easily and quickly from the dataset. Here in this paper association rule mining technique is implemented for the analysis of agricultural dataset. The idea is to apply association rule mining technique for generating...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Dual Band T Slot Rectangular Microstrip Patch Antenna

    Microstrip patch antennas are light weight and low profile antennas so use of these kind of antennas are more easy in portable and small communication devices where size is concerned. In this paper the analysis of T-slot rectangular microstrip patch antenna is presented. The antenna is designed for wide applications...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    A Survey on MAC Protocols for Provisioning QOS in Ad-Hoc Wireless Networks

    Past few years, research has increased on Quality of Service (QOS) provisioning in wireless ad hoc networks. They do not require any fixed infrastructure. Nodes are themselves to solve topology changes due to mobility. Such a network needs to support the applications that generate multimedia and real-time traffic. In this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Comparison of Different Scheduling Algorithm for LTE

    In this paper, the authors evaluate the performance of Packet Scheduling (PS) for different packet scheduling algorithms of 3GPP UTRAN Long Term Evolution (LTE) Downlink. Packet scheduling is importance in 3G LTE, because different types of traffic with different Quality of Service (QoS) requirements are competing of the resources. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    LLECLAIR: A Cross Layer Design to Optimize the Performance of TCP in Wireless Networks

    Transmission Control Protocol (TCP) provides reliable and efficient way of communication in wired networks. Increased use of wireless technologies and the available variety of wireless mobile devices in the market demands for efficient technology for communication. TCP throughput however degrades over wireless links; the performance achieved by TCP can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Innovation of Reliability to Improve Software Predictive Models

    In the real-world environment web applications are rapidly developed. To depend upon this web applications information transformation can be easily upgraded, thru certain networking environment depending upon software and hardware can be used. The aim of web application is the customer satisfaction; due to this factor such applications can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Spray and Wait Routing Protocol in Delay Tolerant Networks

    An intermittently connected mobile network means that there does not exist a complete path from the source to the destination. It is also called as wireless networks. These networks are categorized in delay tolerant networks. Wildlife tracking sensor networks, military networks, Vehicular Ad hoc NETworks (VANETs), inter-planetary network and under...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    ITSM Search Knowledge System

    In this paper, the authors develop the service knowledge management system, a tool designed primarily for L1 L2 and L3 engineers to access the information of previously proven and tried solutions and work around that can be used while working the incidents, problems and change requests. The application is robust...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    A Review on Security and Challenges for Vehicular Ad Hoc Networks

    Vehicular Ad-hoc NETworks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems (ITS). VANETs provides many new exciting applications and opportunities albeit transportation safety and facilitation applications are their core drivers. Security of vehicular networks remains the most significant concern in VANETs deployment - because it is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Face Recognition by Weber Law Descriptor for Anti-Theft Smart Car Security System

    In this paper, the authors propose a smart anti-theft car security system, which not only identifies thief but also controls the car. The proposed system consists of embedded control platform, face recognition system, GPS (Global Positioning System) and MMS (Multimedia Messaging Service) modules used for preventing loss of vehicle. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Performance of EPC Global Gen-2 RFID System Using GNU Radio

    In this paper, the authors simulated the performance of an EPC global Gen-2 RFID system using GNU radio. They programmed the building blocks such as PIE encoder, PIE decoder, FM0 encoder and FM0 decoder in C++ and imported them into GNU radio. They introduced the filtering and modulation process along...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Fuzzy-Based Approach to Predict Accident Risk on Road Network

    Road accidents are currently ranked as the eighth largest cause of death in the world. This paper aims to evaluate the accident risk on the road. This paper is working hard to raise awareness of the dangers to drivers, pedestrians, and to provide leadership, expertise about the road. The development...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Design and Implemented Security Concept toward Steganography with Image Encryption

    Primary concern of the proposed concept is not to provide security in perfect way. Rather, the concern of cryptography security can be protect information resources through making unauthorized accessing of the information or changing with the information costly than the existing value that can be gained. Any cryptography, when implemented...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    A Relative Speed Based Route Selection in AODV to Reduce Packet Drop in MANET

    Mobile Ad-hoc NETwork (MANET) contains wireless mobile devices which can communicate each other without any centralized control and the data is exchanged between the mobile devices. Due to the mobility of devices the routing topology changes frequently which may cause of link failure, this link failure may cause of packet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Performance Analysis of WiMAX Network For Multipath Fading Channel In Mobile WiMAX

    In this paper, the authors explain an important requirement for assessing technology for broadband fixed wireless channel presented by a time-varying broadband wireless channel. The paper determined the major factor affecting the broadband wireless channels. They study BER with SNR for multipath fading channel with different modulation type, coding and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    An Anti-jam Adaptive Algorithm for GPS

    Traditional Space-Time Adaptive Processing (STAP) algorithm not only have a big computation, but also cannot suppress the multiple narrowband jammer and the narrowband jammer which come from the same direction with the useful signal. Focus on these problems, an improved GPS anti-jam MultiStage Nested Wiener Filter (MSNWF) method which combines...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    An UKF Scheme for GPS Signal Tracking

    Under high dynamic situation, the typical GPS carrier tracking loop cannot guarantee a reliable tracking. In this paper, an improved high dynamic carrier tracking method based on unscented Kalman filter is presented, a rapid frequency traction method is adopted to ensure that the filter can convergence quickly, and joining a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Comparative Study of Wi-Fi

    Wi-Fi can also be spelled as Wi-Fi or wfi is a technology which help in accessing the data wirelessly i.e. no need of wire is there in order have Wi-Fi connection. Wireless technology provides the users many advantages like portability, flexibility, increased productivity, lower installation cost and many more. Wi-Fi...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Load Balancing of Web Server System Using Service Queue Length

    In this paper, the authors describe on the load balancing system of the web server system. Web based service are used too many organization to support their customers and employee. An important issue in developing such services is ensuring the Quality Of Service (QOS). In recent years many researcher try...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Survey on Hadoop and Introduction to YARN

    Big data, the analysis of large quantities of data to gain new insight has become a ubiquitous phrase in recent years. Day-by-day the data is growing at a staggering rate. One of the efficient technologies that deal with the Big Data is Hadoop, which will be discussed in this paper....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption

    Cloud computing is a general term for anything that involves delivering hosted services, scalable services like data sharing, accessing etc., over the web on demand basis. It uses the web and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Security Analysis of Cloud Computing: A Survey

    Now these days is golden days of computing the internet has changed the computing world in a drastic way. Now computer service is fast with the help of parallel computing, distributed computing grid computing and a new technique is cloud computing. And it is very beneficial for computing. The user...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Web Services & Database Services Availability through Multi-Cloud Environment

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Security from various Intrusion Attacks using Honeypots in Cloud

    Cloud computing means accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Now here in this paper an efficient technique of intrusion detection is proposed using the concept of honeypots. The data to be send by the cloudlets...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Microcontroller Based Tool Wear Monitoring during End Milling of Hardened Steel

    In the world of machining, cutting force is considered to be the important variable that best describes the cutting process. The cutting force signal provides rich information for tool wear in end milling operation, hence is considered for tool condition monitoring system. From experimental tests in end milling on AISI-D2...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Comparative Study of Weighted Clustering Algorithms for Mobile Ad Hoc Networks

    Routing in MANET is different from routing in wired network. One way to reduce routing overhead is to divide the network into clusters. Clustering of nodes into groups efficiently minimizes routing traffic overhead. Several algorithms have been proposed by researchers for formation of clusters and election of cluster heads. Most...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2014

    Kerberos Active Directory for HP Thin Clients

    A specialized field in computer networking involves securing computer network infrastructure. In today's computing, organizations including universities and small to medium-sized businesses have to credit a wide range of services to its users. Many of these services require a form of authentication and/or authorization to securely verify the identities of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Review of Booth Algorithm for Design of Multiplier

    Now-a-days many of technologies handle low power consumption to meet the requirements of various outboard applications. In these applications, a multiplier is a fundamental arithmetic unit and used in a great extent in circuits. Multipliers are key components of many high performance systems such as FIR filters, microprocessor, digital signal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Low Power and Area Optimized Using Modified Booth Algorithm Radix-2 and Radix-4

    Modified booth algorithm is most important algorithm for fast multiplier and multiplier take important role in high performance system, reduce power and area optimized is very important in high performance system and DSP system, the focus of this paper is modified booth multiplier algorithm for unsigned Radix-2 and Radix-4 which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Area Optimized and Low Power Using Modified Booth Multiplier for Unsigned Numbers

    Power consumption and small area is very important for fabricating DSP system and high performance system, requirement of present scenario computer system is dedicated for very high speed and low power unique multiplier unit for signed and unsigned number therefore in this paper, focus on unsigned number by using modified...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Distributed Query Execution System for Transactional Database Using Lookup Table

    As data volumes are incrementing rigorously, it is essential to store such large amount of data distributed across many machines. In OLTP databases, the most common strategy for scaling database workload is to horizontally partition the database using hash or range partitioning. It works well in many simple applications such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Implementation of Query Planning for Distributed Database Using Aggregation Queries

    To keep track of timely changing data and to gain fast data access queries are being used continuously. In a distributed data environment user wishes to get the value of aggregation function for data sets. Since the data is collected from multiple sources the need to process the query and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    A Detection of Duplicate Records From Multiple Web Databases Using Pattern Matching in UDD

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the supervised record matching methods require training data provided by users. Such methods can not apply for web database scenario, where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Dual Armor: Intrusion Detection and Prevention System in Multitier Web Applications

    Today, internet services and applications have become an inseparable part of the people daily life. In order to fit in this increase in application and data complexity, web services have moved to a multitier design in which, web server runs the application frontend logic and data are outsourced to a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Clustering Algorithm for Temporal Data Mining: An Overview

    Data mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. Temporal data mining is the extraction of knowledge from huge amounts of complex temporal database. Most research in this area has focused...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Multi Dimensionalised Aggregation in Horizontal Dataset Using Analysis Services

    Projecting data in different dimensions is the core concept taken for this project. Preparing a data set for analysis is generally the most time consuming task in a data mining project. In the existing system they used simple, yet powerful, methods to generate SQL (Structured Query Language) code to return...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Resource Provisioning Methodologies: An Approach of Producer and Consumer Favorable in Cloud Environment

    Cloud computing is an emerging technology, having ability to renovate a large part of computing environments by providing resources as services. Cloud environment is composed of a set of resource providers and consumer. Cloud offers two ways of resources provision to the consumers. Firstly resource on-demand and secondly resource on-reservation....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    A Review on Various Resource Allocation Strategies in Cloud Computing

    The computational world is becoming very large and complex. Cloud computing has emerged as a new paradigm of computing and also has gained attention from both academic and business community. Its utility-based usage model allows users to pay per use, similar to other public utility such as electricity, with relatively...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Two Level Hierarchical Model of Load Balancing in Cloud

    A cloud computing is conceptually a distributed system where resources will be computing resources distributed through the network (cloud) and services pooled together and is provided to the users on pay-as-needed basis. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Technological Comparision Between Cloud and Grid

    In this paper, the authors explain about the limelight the difference between cloud and grid computing according to their performance and also they focus on difference between them based on their functionality. The development of computer industry is promoted by the progress of distributed computing, parallel computing and grid computing,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Application of Big Data in Data Mining

    Big data is massive volume of both structured and unstructured data from various sources such as social data, machine generated data, traditional enterprise which is so large that it is difficult to process with traditional database and software techniques. Big Data is data whose scale, diversity, and complexity require new...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Advanced Autherization System by Using 3D and CCP

    Current authorization systems suffer from many weaknesses. Policies are commonly used based on passwords and username; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    Present a New Middleware to Control and Management Database Distributed Environment

    Database systems and computer networks technology led to distributed database development. In this paper, a suitable and flexible middleware called CMDBMS is presented to control and manage database in distributed environment. In middleware the data are distributed entirely among the databases, and each database has its own database management system,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Use of Web Mining in Network Security

    Web mining is basically knowledge discovery from the World Wide Web (WWW).This practical application of data mining helps to integrate the data gathered by the traditional data mining methodologies or data mining techniques as well as data gathered by the WWW. The term Web mining has been used in three...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Web Services Security Standards

    Web Services are the way of machine to machine communication over the network to perform specific operation e.g. transaction, information exchange, sale service etc. So web service is having protocols and standards that are used to exchange data between applications or systems. Web Services use SOAP protocol to exchange data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Study of Security Issues & Analysis of Risks for Mobile Agents Using SAB

    In mobile agent system where security is major issue to safe transfer the data by secure method. Mobile agents have autonomous software entity when a mobile agent works in the host environment due to security problem raises during functioning, for the high security it resume its execution in another host...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Advanced Two-Tier Android Mobile Security Using Cloud

    One of the newer operating system for smart phone is android which is gaining huge popularity. Advancement in computing speed, memory and hardware had lead to development of new applications. These applications make life more comfortable and advanced for the users. Some of these applications often deal with sensitive and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    An Efficient Security Scheme for Wireless Sensor Networks

    In wireless sensor networks, sensor nodes are generally distributed in hostile environments so the security services such as confidentiality, authentication and integrity are very important. The basis of these security services is the key management. The majority of key managements use the random key pre-distribution mechanism based on the probability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Simple and Secure Key Distribution in Grid Computing

    Grid computing is an emerging technology that provides seamless access to computing power and data storage capacity distributed over the globe for complex systems with large-scale resource sharing and multi-institutional collaboration. The internet is not security-oriented by design; there exist various attacks such as masquerading, replaying, modification, and denial of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Concise Evaluation of Issues and Challenges in MANET Security

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Novel Approach for Secure Communication of Digital Signature Using On-Demand Multipath Routing for Enhancing Network Security in Wireless Mobile Ad Hoc Networks

    With the advances of wireless communication technologies, small-size and high-performance computing and communication devices like laptops and personal digital assistants are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. This interest has led to two types of wireless...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    MANETs Using Advance DSR Algorithm and Improve the Secure Transmission

    In wireless communications the traffic across a Mobile Ad-hoc NETwork (MANET) can be highly vulnerable to security threats. The mobile ad hoc networks are more prone to suffer from the malicious behaviors than the traditional wired networks. Therefore, it becomes very much necessary to pay more attention to the security...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Multi Cloud Architecture to Provide Data Security And Integrity

    Cloud servers are being used to store data and application but its security is a major issue in current context. To solve the data security problems in public environment the authors propose an effective model for security and integrity of data stored in a cloud, through data segmentation followed by...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    SPARSH Data Security in Cloud

    Today's scenario, the transfer of data through the cloud without providing the security to the data or information is a major problem. In some of the case, data gets transfer through the cloud with security and the security is provided by using username and password .But password is not the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    Implementation of a Secure and High Speed Cloud Interface for Cell Phone

    In mobile cloud computing the authors are increasing speed and security which is a major concern area for this research work as day by day multimedia work load increasing on small smart devices and cloud computing should be able to full fill all user requirement on these small devices where...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    Supporting Various Techniques to Optimize and Secure Application Performance in a Cloud Computing Security in a Effective Manner

    In recent years, internet plays a vital role in the authors' communication infrastructure and faces the challenges using cloud computing security. In this paper, they strive to frame the full space of cloud-computing security threads, attempting to individual concerns for every organization jobs from possible over-reactions. They suggest that few...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Secure Intelligent Transportation System Protocol for VANET Using SMAP

    A Vehicular Ad-hoc NETwork (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to receive message. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Proposed Model of Block Based Symmetric Cipher

    In this paper, the authors presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, PDF, audio. Using decryption model, decrypt same data. Due...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Proof of Retrivability: A Third Party Auditor Using Cloud Computing

    Today, there are more and more development for higher security process and benefit when using cloud computing services. Reducing cost, maintaining scale, and high availability are essential for the business to continuation for any techniques or technology. The discusses of the security and privacy data loss concerns are main aspects....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Intrusion Detection System Using Data Mining Technique: Support Vector Machine

    Security and privacy of a system is compromised, when an intrusion happens. Intrusion Detection System (IDS) plays vital role in network security as it detects various types of attacks in network. So here, the authors are going to propose Intrusion Detection System using data mining technique: SVM (Support Vector Machine)....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Study of Black Hole in AODV Based Mobile Adhoc Network

    Black hole attack is one of the major attacks in mobile ad-hoc network. This paper is the study review of black hole attack in mobile ad-hoc network. Mobile Ad-hoc NETwork (MANET) could be a assortment of mobile hosts while not the specified intervention of any existing infrastructure or centralized access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    4G Wireless Networks Challenges and Benefits

    This 4G or Fourth generation is that the future technology for mobile and wireless communications. Close to 4G deployments are expected to be round the year 2010 to 2015. Evolution of wireless access technologies is about to reach its Fourth Generation (4G). 4G systems will be fully IP-based wireless Internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2013

    A Novel Symmetric Key Encryption Algorithm Based on RC5 in Wireless Sensor Network

    In recent years, there has been growing interest in wireless sensor network due to its wide range of potential applications. They are used in military area, industrial process monitoring and control, environment and habitat monitoring, health care. The sensor node has limited computational power and memory size affecting the amount...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2013

    A Survey on Association Rule Mining in Cloud Computing

    In this paper, the authors give a survey on data mining techniques in cloud computing. More specially speaking, they talk about one important and basic data mining technique called association rule mining, which is to detect all subset of items which frequently occur and the relationship between them. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    TRANSISTOR GATING: A Technique for Leakage Power Reduction in CMOS Circuits

    In CMOS circuit's design, as the threshold voltage is reduced due to voltage scaling, it leads to increase in sub-threshold leakage current and hence static power dissipation. In this paper, the authors propose a power reduction technique named transistor gating. In this technique two sleep transistors PMOS and NMOS are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2012

    High Speed DWT Processor Implementation in FPGA

    In this paper, the authors present a high speed and area efficient DWT processor VLSI based design for image compression applications. In this proposed design, pipelined partially serial architecture has been used to enhance the speed along with optimal utilization and resources available on the target FPGA. The architecture consists...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2012

    MasPar MP-1: An SIMD Array Processor

    Parallel processors are computers which carry out multiple tasks in parallel. Flynn gave the classification of computer architecture on the basis of multiplicity of instruction and data streams. According this classification Single Instruction Multiple Data (SIMD) processors are the ones which handle same instruction but operate on different data sets....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Design of 64-Bit Full Adder by Using Dynamic Feedthrough Logic

    Full Adder is important component in application such as Digital Signal Processing (DSP) architecture and microprocessor. In addition to its main task, which adds two numbers. This Paper presents the design of high performance low dynamic power arithmetic circuit using a new CMOS Dynamic Feed Through Logic (DFTL) and analyzes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    FPGA Implementation of Different Adder Architectures

    In this paper, different adder architectures are implemented in XILINX FPGA and compared for their performance. Here, the authors will be finding a suitable adder architecture which will speed up the adder operation. Based on the various speed-up schemes for binary addition, a comprehensive overview of the different adder architectures...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Task Scheduling in Homogeneous Multiprocessor Systems Using Evolutionary Techniques

    Minimizing the total processing time by scheduling the tasks of a given network on to the available processors is an important and challenging problem. It is known to be a NP-complete problem and so the classical techniques of optimization require considerable time and effort to reach the optimum. In this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)