International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 281-320 of 1124 results

  • White Papers // Apr 2014

    Ensuring Unharmed and Confidentiality Process Information Security Tolerate in Correlative Information Sharing

    The relationship of two or more objects that does not be depends on each other. It is the most common trouble on the Internet. It mainly concerned about the precise problem of sharing the data between the not trusted parties. Previous paper in this area shows that privacy and services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Approach for Fault Detection and Recovery in WSAN: A Survey

    Wireless Sensor and Actor Networks (WSANs) refer to the collection of heterogeneous elements linked by wireless medium to perform distributed sensing and acting tasks. The realization of wireless sensor and actor networks needs to satisfy the requirements introduced by the coexistence of sensors and actors. In WSANs, sensors gather information...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Performance Evaluation and Optimization of CDMA 2000 1X Mobile Cellular Radio Network

    Evaluation and optimization exercise after service rollout is to correct the expected errors in network planning and to achieve benefits such as improved network capacity, enhanced coverage and quality of service. The key performance indicators viz; call drop ratio, call setup success ratio, call failure rate, call connection rate that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Enhanced Protection for Routing in IP Networks

    Failure of packet delivery due to routing failure which is common on Internet and routing protocol cannot always react fast to recover from them. To overcome this problem fast reroute solution have been proposed to guarantee reroute path availability and avoid high packet loss after network failure. It is quite...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Quick Message Authentication Protocol for Vehicular AD HOC Networks

    Public Key Infrastructure (PKI) plays very important role in Vehicular Ad hoc NETworks (VANETs). In this system; confirmation of received message can be done by checking the sender's certificate is included in the Certificate Revocation Lists (CRLs), which means checking its revocation status, then, substantiating the sender's certificate, and finally...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Security Enhanced Ad hoc Routing

    In present era the security has become one of the major issues for data communication over wired and wireless networks. Apart from the earlier work on the designs of cryptography algorithms and system infrastructures, the authors will propose an ad hoc routing algorithm that could randomize delivery paths for data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Vehicle Security System

    The revolution of technology has made vehicle security system. The car security system is prominent worldwide but not a secure system. So by implementing the authors' own ideas a vehicle security system is designed which is a multi functionality embedded system which provides emergency indication to prevent accident. This embedded...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    EAANS: Energy Aware Adjacent Node Selection Based Optimal Shortest Path Detection in Wireless Sensor Network

    Wireless Sensor Network (WSN) is an ad hoc network based on radio transmission for communications. It has wide variety of applicability in healthcare, military, transportation etc. Getting optimized route in WSN depends upon the number of hops used to transfer the data packets. Lesser the hops counts effective will be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Comparative Study of Simulators for Vehicular Ad-hoc Networks (VANETs)

    Vehicular Ad hoc NETworks (VANETs) are classified as an application of Mobile Ad-hoc NETworks (MANETs) that has the potential in improving road safety and providing Intelligent Transportation System (ITS). Vehicular communication system facilitates communication devices for exchange of information among vehicles and vehicles and Road Side Units (RSUs). The era...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Encourage for VANET Based Traffic Information Sharing System on BRTS

    In this paper, the author propose a process which proficiently accumulate, maintains and proliferate traffic information using inter-vehicle communication with \"Message shipping\" technique used in Vehicular Ad hoc NETwork (VANET). In the proposed process, they use buses (bus route transit system) as message shipping which travel along regular routes. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Secure Time Synchronization for Wireless Sensor Network

    Wireless sensor network is innovative research area for some research scholars. Time synchronization is the vital part in the Wireless Sensor Network (WSN) due to the requirement of coordination between sensor nodes. Also security plays important role to avoid attacks on time synchronization. In this paper, the authors have shown...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Person Recognition Using Multimodal Biometrics

    Unimodal biometric systems often face significant limitations due to sensitivity to noise, interclass variability, data quality, no universality, and other factors. To improve the performance of individual matchers in such situations may not prove to be highly effective. Multi-biometric systems seek to alleviate some of these problems by providing multiple...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Low Power and Area Optimized Using Modified Booth Algorithm Radix-2 and Radix-4

    Modified booth algorithm is most important algorithm for fast multiplier and multiplier take important role in high performance system, reduce power and area optimized is very important in high performance system and DSP system, the focus of this paper is modified booth multiplier algorithm for unsigned Radix-2 and Radix-4 which...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Area Optimized and Low Power Using Modified Booth Multiplier for Unsigned Numbers

    Power consumption and small area is very important for fabricating DSP system and high performance system, requirement of present scenario computer system is dedicated for very high speed and low power unique multiplier unit for signed and unsigned number therefore in this paper, focus on unsigned number by using modified...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Network Security Concept and Protection

    Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Routing Protocols and Security Issues in MANET: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which are dynamic in nature and they communicate with each other without any help of a preinstalled infrastructure, access point or centralized administration. One of the major challenges in a MANET is to design the robust routing algorithms. Routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Cloud Based: Video on Demand Mobile Social TV

    Today Smartphone combines the features of a mobile phone with those of another popular consumer device, such as a personal digital assistant, a media player, a digital camera, and/or a GPS navigation unit. Modern Smartphone include all of these features plus the features of a laptop, including web browsing, Wi-Fi,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Relevant Words Mining with Compiling Technique

    Now-a-days, users search their desired information and knowledge from many sources in different ways. But, they don't get their necessary information accurately. Moreover, some users can't decide which one is useful or useless from search results. Information extraction is able to solve these problems. Many researches directed to be effective...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Intelligent Accidental Control of Car System Using CAN Protocol

    Now-a-days, accidents occur due to errors done by driver. An intelligent system needs to be developed to overcome these errors. This system is proposed where errors done by vehicle driver are prohibited. With rapidly changing computer and IT and much of the technology finding way into cars, cars are undergoing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Data Mining Techniques in Parallel and Distributed Environment- A Comprehensive Survey

    Distributed sources of voluminous data have raised the need of distributed data mining. Conventional data mining techniques works well on structured data which is clean, pre-processed and properly arranged either in the form of structured files, databases or data warehouse. These techniques are based upon centralized data store however they...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Role of Cloud Computing in Business Intelligence: A Review

    Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers that are connected through a real-time communication network. The cloud also focuses on maximizing the effectiveness of the distributed resources. Cloud computing has become a prominent...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Taxonomy on Cloud Computing

    Cloud computing premise is very similar in that it provides a virtual computing environment that's dynamically allocated to meet user needs. From a technical perspective, cloud computing includes Service Oriented Architecture (SOA) and virtual applications of both hardware and software. In this new world of computing, some have conjectured that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Pattern Mining Techniques of Data Mining

    Frequent patterns are patterns that appear in a data set frequently. This method searches for recurring relationship in a given data set. Several techniques have been proposed to improve the performance of frequent pattern mining algorithms. This paper presents revision of different frequent mining techniques including Apriori based algorithms, association...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Preservation of Privacy for Multiparty Computation System with Homomorphic Encryption

    Data mining is the task of discovering significant patterns/rules/results from a set of large amount of data stored in databases, data warehouse or in other information repositories. Even though the focus on data-mining technology has been on the discovery of general patterns some data-mining applications may require to access individual's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    GPS Based Tour Guide Assistance with Voice Announcement

    GPS is the acronym for Global Positioning System. It is employed to find the position of the location on the earth. This information is provided by the GPS with the help of the data it receives from the satellites. Micro controller is the heart of the device. It stores the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Review on Energy Efficient Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) attract the researchers more these days due to their accepted applications in environment monitoring, radiation and nuclear-threat recognition structure, weapon sensors for ships, battlefield investigation and observation, army intelligence, communications, power, control and targeting systems and biomedical aspects. WSNs can provide cheap solutions to a range...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Detection Of Routing Misbehaviour in MANET

    Ad hoc On-demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (Route REPly) that it has a latest route with minimum hop count...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Real-Time Intrusion Detection System using Artificial Neural Networks (ANN)

    An intrusion can be defined as any practice or act that attempt to crack the integrity, confidentiality or availability of a resource. This may consist of a deliberate unauthorized attempt to access the information, manipulate the data, or make a system unreliable or unusable. With the expansion of computer networks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    An Analytical Study of Enhancing Energy Efficiency of Wireless Sensor Network through Relay Nodes Placement

    Power consumption of a node in the wireless sensor network increases with the increment of distance between the transmitter and the receiver i.e. the sensor and the base-station. Many published papers have been covered in this paper, which suggests various approaches to minimize power consumption of wireless sensor networks. One...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Android-Based Mobile Payment System Using 3 Factor Authentication

    In this paper, the authors making transaction such as doing payment, transferring funds/money, doing online transaction via android Smartphone platforms for prominent mobile payment. This paper combines a pair of Smartphone for apparent transaction, server and paying client. These devices are featuring 3 types of authentication in this paper to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Comparative Study of Routing Protocols in Mobile Ad-hoc Networks

    A rising importance on Mobile Ad hoc NETworks (MANET), during this system nodes square measure carried by folks and connected to every alternative by multi-hop wireless links. Since the nodes will shift freely, then the nodes quality pattern became a vital feature of the MANET. Mobile Ad-hoc NETwork (MANET) may...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    An Extensive Review on Cognitive Radio Networks

    Cognitive Radio (CR) is an engineering that addresses the issue of shortage of range and prepares for efficient utilization of the same. Cognitive Radio Sensor Networks (CRSN) requests vitality effective and a practical co-agent range sensing procedures which performs well in blurring and shadowing environment with ideal qualities of sensing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Intelligent Transportation System for Vehicular Ad-Hoc Networks

    Vehicular Ad hoc NETworks (VANETs) are a one form of wireless networks. It is used for communication between vehicles on roads. The conventional routing protocols are suitable for Mobile Ad hoc NETworks (MANETs). But it's poorly in VANETs. As communication links break often happen in VANETs compare than in MANETs,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Multiple Multicast Services in Wireless Network with Reduction of Storage Overloading

    Mutlicast environment are likely to work in multiple group rather than a single group. Where Group Key Management (GKM) able to provide security only to the single group, where multiple group cannot be handled by GKM due to overhead. The MKE-MGKM scheme exploits asymmetric keys, where mater key is generated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    RFID Based Automatic Billing Trolley

    Now-a-days purchasing and shopping at big malls is becoming a daily activity in metro cities. The authors can see huge rush at malls on holidays and weekends. The rush is even more when there are special offers and discount. People purchase different items and put them in trolley. After total...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Cognitive Radio System Analysis Using MATLAB

    Demand of wireless communication is increasing day-by-day; this increasing demand put so many limitations on the use of radio spectrum. Spectrum utilization survey shows that entire spectrum is not used so many times. Because of this radio spectrum is underutilized. This underutilization can be minimized by using Cognitive Radio (CR)....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Trust based Neighbor Identification in Wireless Sensor Networks using Agents

    Wireless Sensor Networks (WSNs) have been extensively used in various applications such as environmental monitoring, industrial monitoring, agriculture, green house monitoring, structural monitoring, passive localization and tracking, battlefield surveillance, etc. Sensor nodes in these applications are required to sense and process the physical conditions like temperature, pressure, humidity, rainfall, fog,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Simulation Study of Collusion and Network Partition Denial of Service Attack in IEEE 802.11 and FAIRMAC Protocol

    Denial of service is a constant concern in the world of networking. By DoS attack, the authors mean any effort to \"Prevent or impair the legitimate use of computer or network resources\", interrupting or delaying services which can cause a node or an entire network to become unavailable. The industry...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Survey Of Cross Layer Based TCP Congestion Control Techniques in MANET

    In Mobile Ad hoc NETwork (MANET), congestion is one of the most important limitations that affect the performance of the whole network. TCP (Transmission Control Protocol) are the reliable protocol for communication because of their connection oriented behavior. Multi-path routing protocol can balance and share the load better than the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Analysis of Low Power, Area and High Speed Multipliers for DSP Applications

    In the signal processing techniques the most important and also commonly used function is multiplier. It can be implemented using various methods such as Braun's multiplier, booth multiplier, Wallace tree multiplier, systolic array multiplier. Depending upon the size of the inputs multiplication operation includes the operations of shift and addition....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Apr 2014

    Review of Booth Algorithm for Design of Multiplier

    Now-a-days many of technologies handle low power consumption to meet the requirements of various outboard applications. In these applications, a multiplier is a fundamental arithmetic unit and used in a great extent in circuits. Multipliers are key components of many high performance systems such as FIR filters, microprocessor, digital signal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Booth Multiplier: Ease of Multiplication

    Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and speed of the multiplier is an important issue, increment in speed results in large area consumption and vice...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    FPGA Implementation of Different Multiplier Architectures

    Multiplication is one of the basic functions used in Digital Signal Processing (DSP). It requires more hardware resources and processing time than addition and subtraction. In fact, 8.72% of all instructions in a typical processing unit is multiplier. The multiplier is a fairly large block of a computing system. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Study of PandaBoard and Interfacing with Peripherals

    In this paper, the authors include a complete study on PandaBoard, it also tells the users about interfacing of peripherals (like LED and seven segment display) with PandaBoard and comparison of system-on-chip in PandaBoard (OMAP4430) with other system-on-chips available in market (OMAP4460, S3, S4, Apple A5 and Apple A5X) in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Implementation of RISC System in FPGA

    Reduced Instruction Set Computer (RISC) strategy based on the insight that simplified instructions can provide higher performance if this simplicity enables much faster execution of each instruction. It use fewer instructions with simple constructs, therefore they can be executed much faster within the CPU without having to use memory as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    High Speed 22nm Metal Gate Strained Si CMOS NOR Gate

    In this paper, the authors have a new high speed NOR gate making use of static forward body biasing. The forward body biasing has the bad impact on power and hence present NOR gate find it's applications where speed is the main priority, although there are ways to reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Performance Evaluation of Single Electron Transistor With CMOS Technology

    With the dominance of CMOS technology over decades under the rules of Moore's law, the authors estimate that its further limitation of size will reach a lower limit within the next 10 to 15 years. Recent development in the nano-scale devices paves a new way for low power system design....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Comparison of Transistor Count Optimized Full Adders With Modified CMOS Full Adders

    A full adder circuit is one of the basic building blocks of a digital design. In general, it is made by CMOS technology. In the CMOS technology the full adder is built by 28 transistors. So, the transistor count is very high. The average power consumption, leakage power consumption and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2015

    A Survey on Big Data Concepts and Tools

    The term big data refers to the massive amount of structured, unstructured and semi-structured data that are so large and unwieldy the regular database management tools or statistics tools have difficulty among capturing, analysis, storing, sharing, visualize and managing the information. Big data includes e-mail messages, snaps, business deals, surveillance...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2015

    A Study on Text Mining over Hadoop Framework

    In today's scenario as data is increasing day-by-day so text data mining approaches are playing a vital role in extracting many potential information and association from a large amount of text data. The term data mining is used for methods that analyze data and data mining deals with structured data,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2015

    Analysis of Self-Data Devastation Using Active Storage Object for Improving Security

    Cloud computing is very much popular because it provides everything according to the user need but every good thing attached with some problems. In cloud when data transfer from source to destination temporary dossier that stored must be deleted from each point but in much case that does not happens....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2015

    Design of CMOS Buck Converter Using Two Stage Operational Amplifier

    A power electronic converter uses semiconductor devices to transform power from one form (DC or AC) into another form (DC or AC). This paper presents design of Sub 1v CMOS buck converter using two stage operational amplifiers is implemented. The proposed buck converter improves transient time response, reduces the number...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2015

    Integer Implementation of 3D Wavelet Transform for Lossy Data Compression

    A new non-separable 2D structure is proposed for integer implementation of a 3D lifting wavelet transform. It reduces total amount of rounding noise due to expressing signal values as integers inside the transform. In the existing method, a non-separable 3D structure is used to minimize lifting steps. It contributes to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2015

    Content Based Image Retrieval from Web Based Data Sources

    Web is concentration of information and different data, which allows user to access the data as per their use. It has so many applications one of which is search engine. The data from search engines can be found in different formats and types. But now in these days multimedia data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2015

    Developing a Real Time Smart Herbicide Sprayer Robot and Automatic Weed Detection System

    In this paper, the authors develop the weed detection system and the classification algorithm which is applied for autonomous weed controller robot. To achieve this objective by using the variety of machine vision algorithm the weeds and crops were classified between plants. Weed is a plants which is grow in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2015

    An Intelligent Approach for Data Fortification in Cloud Computing

    Popularity of cloud computing is increasing now-a-days. With the increasing use of cloud computing the authors can share information, resources, and data. Also they can store their personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2015

    A 6.03 GHz Low Power Transimpedance Amplifier TIA in CMOS 0.18µm Technology

    A low power and high gain TransImpedance Amplifier (TIA) in 0.18µm CMOS technology is presented. TIA with better performance is realized by reducing the effects of input parasitic capacitor. A negative admittance output stage enables the transimpedance gain and the bandwidth to be improved. Cadence tools were conducted for this...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2015

    CDMA System Implementation by using VHDL

    A robust multiplexing technique is imperative to serve multiple users over a common air interface channel for communication purpose a new multiple access technique based on identifying a user based on set of orthogonal codes is called is called a code division multiple access. Digital Code Division Multiple Access (CDMA)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Artificial Intelligence Based Casualty Management System

    Involvement in road accidents is one of the three leading causes of death. Consequently, thousands die in accidents on roads every hour. 80 percent of deaths are caused on roads because victims do not receive medical care within the golden hours. Timely and proper treatment of road casualties is essential...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2014

    Review on Data Mining Techniques used for Educational System

    Indian government showing great interest in failure and dropout of children at different educational level from last decade. Great deal of research has been done on identifying the factors that affect the low performance of student at different educational levels. Data mining methods represent a valid approach for the extraction...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2015

    Comparative Analysis of WEKA Data Mining Algorithm RandomForest, RandomTree and LADTree for Classification of Indigenous News Data

    The amount of data in the world and in the people lives seems ever-increasing and there's no end to it. The authors are overwhelmed with data. The WWW overwhelms the user with information. The Weka workbench is an organized collection of state-of-the-art machine learning algorithms and data preprocessing tools. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2015

    Review on Classification Algorithms in Data Mining

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. Classification is a data mining technique based on machine learning which is used to classify each item in a set of data into a set of predefined classes or groups. Classification methods make...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2014

    Review on Keyword Search Over Relational Databases

    Keyword search is the most effective information discovery method in documents. The large volume of data is stored in databases. Plain text coexists with structured data; unstructured data for this type of data efficient processing of top-k queries is a crucial requirement. This paper describes fundamental characteristics including relational database,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2014

    An Empirical Study of Database Models and Technologies

    Use of database systems for storage and manipulation of business data was revolutionized by the introduction of the relational data model by the researcher. Since then there have been numerous developments in the area of database modeling. Several new modeling technologies like object oriented, semantic and NoSQL have been invented....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2014

    Design and Implementation of Multichannel Data Acquisition and Controlling System Using LabVIEW

    The data acquisition and processing architecture covers the most demanding applications of continuous monitoring in industrial field. The Multichannel data acquisition is essential for acquiring and monitoring the various signals from industrial sensors. The data obtained in real-time is processed at runtime and stored in an external storage for future...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Fundamental Research on Distributed and Parallel Database

    In today's world of data systems, all courses of individuals would like access to companies' databases. In count to a company's own staff, these embrace the company's customers, probably customers, suppliers, and salespersons of all sorts. This paper is to gift a prologue to distributed database sand parallel information. Conjointly,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Implementation of Sub Micron Level 10T Full Adder in ALU Using Cell Based and SOC Technology

    As technology scales into the nanometer regime leakage current, active power, delay and area are bearing important metric for the analysis and design of complex arithmetic logic circuits. In this paper, major work has been done in determining the leakage current, power and area respectively. The above set design parameters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Optimized Model of Radix-4 Booth Multiplier in VHDL

    In this paper, the authors describe optimized radix-4 booth multiplier algorithm for multiplication of two binary numbers on VHDL device. Radix-4 Booth's algorithm is presented as an alternate solution of basic binary multiplication, which can help in reducing the number of partial products by a factor of 2. Radix-4 Booth's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Design and Analysis of CMOS Multiplier and EEAL Multiplier for Low Power VLSI Application

    A new design of adiabatic circuit, called Energy Efficient Adiabatic Logic (EEAL) is proposed. In adiabatic logic, which dissipates less power than static CMOS logic, have been adiabatic circuits called energy efficient adiabatic logic introduced as a promising new approach in low power circuit design. The adiabatic circuits are those...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2014

    Low Power Binary Floating Multiplier Using Bypassing Technique

    Floating point multiplication is used in many Digital Signal Processing (DSP) applications; this multiplication is costly in terms of area, delay and power consumption. Reduction in these parameters will greatly improve the performance of multiplier and this in turn will improve the performance of DSP systems. In this paper, a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Big Data: Transforming New Ways of Productivity and Profit Booking

    The mushrooming of data in companies about their clients, vendors, and operations has become the function of global economy. Considering the essential elements of productivity such as intellectuals and experts, drivers of modern economic activities, innovation and development couldn't emerge without data. Big data account for substantial portion of the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    POAG and HNG Based Lower Delay ALU Designing using FPGA

    Reversible logic is advance form of logical designing for manufacturing of chips to reduce the calculation delay in and reduce the quantum cost so that the energy consumption of the digital logic chip should be minimized. The optimization of the logic design is the requirement of the VLSI to increase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Design of Optical Demultiplexer using Arrayed Waveguide Grating

    The foremost function of an optical demultiplexer is to receive a beam comprised of multiple optical frequencies from a fiber and to divide it into its frequency components, which are further coupled in as many individual fibers as there are frequencies. Optical demultiplexers are used to receive multiple frequency signals...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2014

    Low-Power and Low-Area Dual Dynamic Node Hybrid Flip-Flop Featuring Efficient Embedded Logic for Low Power CMOS VLSI Circuits Using 120nm Technology

    In this paper, a new Dual Dynamic node hybrid Flip-Flop (DDFF) and a novel Embedded Logic Module (DDFF-ELM) based on DDFF are introduced. The DDFF offers power and area reduction when compared to the conventional flip-flops. The main aim of DDFF-ELM is to reduce pipeline overhead which arises due to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2014

    Data Mining Techniques and Research Challenges and Issues

    Data mining is considered to deal with huge amounts of data which are kept in the database, to locate required information and facts. Data mining is the exploration and analysis of large quantities of data in order to discover valid, novel, potentially useful, and ultimately understandable patterns in data. Non-trivial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Understanding Big Data & DV2 Law

    Big data is a rapidly expanding research area spanning the multi disciplinary fields. As the rapidity of data growth increases exceeding the expectations, its accessibility levels also should compete with the growth. One such growth of data leads, the authors' talk to the concept of Big Data, which is providing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2014

    Efficient Design of Reversible Multiplexers With Low Quantum Cost and Power Consumption

    Multiplexing is the generic term used to designate the operation of sending one or more analogue or digital signals over a common transmission line at dissimilar times or speeds and as such, the scheme, the authors use to do just that is called a multiplexer. In digital electronics, multiplexers are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Analysis of Low Power, Area and High Speed Multipliers for DSP Applications

    In the signal processing techniques the most important and also commonly used function is multiplier. It can be implemented using various methods such as Braun's multiplier, booth multiplier, Wallace tree multiplier, systolic array multiplier. Depending upon the size of the inputs multiplication operation includes the operations of shift and addition....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Evaluation of Power Delay Product for Low Power Full Adder Circuits Based on GDI Logic Cell Using Mentor Graphics

    In this paper, the authors present high speed and low power full adder cells designed with an alternative internal logic structure and Gate Diffusion Input (GDI) logic styles and hybrid CMOS logic style that lead to have a reduced Power Delay Product (PDP). The main design objective for this adder...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Design of High Speed, Area Efficient, Low Power Vedic Multiplier Using Reversible Logic Gate

    A systems performance is generally determined by the speed of the multiplier since multiplier is one of the key hardware components in high performance systems such as FIR filters, digital signal processors and microprocessors etc. Multipliers have large area, long latency and consume considerable power. Hence good multiplier architecture increases...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)