International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 321-360 of 956 results

  • White Papers // Dec 2013

    Development of a Secure XML Data Warehouse: A Practical Approach

    Data warehouses are repositories of valuable information that provides a platform to integrate data coming from various sources and thus plays a vital part in formulating future policies of an organization. Due to its importance, security is an important criterion which has to be considered right from the initial phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Study of Text Mining For Web Information Retrieval System From Textual Databases

    Text information retrieval is also known as text data mining or knowledge discovery from textual databases refers to the method of extracting interesting and non-trivial form or information from text documents. Consider by many as the next signal of knowledge discovery, text Information Retrieval has very elevated commercial principles. Previous...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Provenance Based Distributed Cloud System Using Jar Acessibility

    Cloud computing is one of the most important service in the internet. The widespread use of cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow in cloud has become common, as users fear of losing control of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Intrusion Detection Using Double Guard In Multi-Tier Web Applications: A Survey

    Now-a-day's computers are widely used for web application. Majority of transactions are done online these days. Thus data from web server and database server are prone to be hacked easily which relies to provide more security to web applications. To overcome this issue DoubleGuard system is used. Intrusion detection system...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Secure e-Learning Environment With Low Cost

    Cloud computing is spreading around the world with leaps and touching every part of communication era with Internet technology. Rapid growth of the communication techniques and devices are adding the requirements to bind all of these devices under one hood. Cloud is becoming a perfect solution for the same. With...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Frequent Sub-trees Mining Algorithms in XML : A Survey

    Now-a-days a large amount of data is being stored in XML documents. Since XML documents are semi structured and also they require large amount of storage space, there has always been a demand of storing them in specific patterns and automation for mining association rules and patterns in XML documents....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Web Personalization: User's Future Request Prediction: A Survey

    The web mining is very interesting research topic which supports two of the activated research areas namely data mining and World Wide Web. The process of extracting knowledge and information from World Wide Web is defined as web mining. This paper is a survey based on recent work in the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Study on Wireless Technologies Wimax and Wlan With Their Interfaced Scenario

    The people are in advanced world of internet with new technologies in these days. So many new wireless networks technologies have been emerged. WiMAX and WLAN are such wireless technologies which are being adopted by most of the users. WiMax is one of the advanced technologies from those. Due to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Trust Based Secure Data Transmission Model in MANET

    A \"Mobile Ad hoc NETwork\" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. For quick data transmission, the people need a routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Review of Privacy Preserving Data Mining Using KADET

    Nowadays, securing the user's information is very important for internet based business. On one hand, the companies can mine data to extract knowledgeable information through data collected from the users. On other hand, the user information that contains sensitive data should prevent from the hackers. PPDM is a popular search...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Secured Data with Enhanced Lifespan for Wireless Multimedia Sensor Networks

    In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. On the other hand introduction of audio video streaming in wireless architecture reveals additional challenges. The image and video transmission not only demands for energy efficiency...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Game Theoretic Approach for SYN Flood Attacks of Web Server

    In this paper, a non-cooperative two person zero-sum static game(with in a discrete interval of time) is formulated and analyzed for the interaction between the SYN flood attacker and the web server administrator. The SYN Flood Game (SFG) payoffs are calculated based on Erlang loss queuing model. The solution of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    MOOCaaS: MOOCs as a Service

    Cloud Computing has laid the ground for a new generation of educational systems, by providing scalable anytime/anywhere services simply accessed through the Web from multiple devices without worrying about how/where those services are installed, maintained or located. According to numerous studies and reports, the Web has ushered in a new...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Cloud Computing Reference Architecture from Different Vendor's Perspective

    The provision of on-demand access to Cloud computing services and infrastructure is attracting numerous consumers, as a result migrating from traditional server centric network to Cloud computing becomes inevitable to benefit from the technology through overall expense diminution. This growth of Cloud computing service consumers may influence the future data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Survey on Data Collection inWireless Sensor Network

    Wireless sensor networks are the networks which can sense, analyze and then communicate the data. The data collection at sensor nodes consumes a lot of energy but sensor nodes are energy constraints. Most of the WSN architectures consist of stationary nodes which are heavily deployed over a sensing area. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Optimization of Web Content Mining With an Improved Clustering Algorithm

    Web content mining generally consist of mining the content held within the web pages. The aim of this paper is to evaluate, propose and improve the use of advance web data clustering techniques which is highly used in the advent of mining large content based data sets which allows data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Front End and Back End Database Protection From Intruders in Distributed Web Application

    Study of the intrusion detection system. Current network system has large scale trouble from the security vulnerability due to simple routing protocol, security less application, bugs in network & operating system. Therefore need of network intrusion detection system arrives. Generally there are two type of intrusion detection technique. First is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    CBUD Micro: A Micro Benchmark for Performance Measurement and Resource Management in IaaS Clouds

    Cloud computing provides processing power in form of virtual machines. This processing power can be given to very big and small devices. Similarly for providing processing power, devices with small or big processing power can be utilized. These devices can also be ubiquitous computing devices. Ubiquitous computing devices present in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Smart Home Monitoring and Controlling System Using Android Phone

    In this paper, the authors describes a zigbee module and android based home monitoring system for security, safety and healthcare for human. The existing system provides security and safety or healthcare system but in their project provide combination of these two systems. This system is more flexible and can be...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Performance Comparison of AODV and DSDV Routing Protocols in MANET Networks

    Mobile ad-hoc network is a collection of wireless mobile nodes or stations which communicate with each other directly, and not through the aid of a centralized infrastructure. The main attributes of mobile ad-hoc networks are wireless connection, no stand-alone infrastructure, independent nodes and continuously changing topology. A number of routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Survey: Evaluation Study of Privacy Conflicts in OSNs

    In the age of the Internet, privacy is a luxury and the users' have to constantly be on their heels to maintain it. OSN makes it particularly hard for users to guard their personal data. Besides many changes, Facebook privacy settings remain complicated. Even, past updates have unexpectedly made previously...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Prepare and Optimize Data Sets for Data Mining Analysis

    Getting ready a data set for examination is usually the tedious errand in a data mining task, needing numerous complex SQL queries, joining tables and conglomerating sections. Existing SQL aggregations have limitations to get ready data sets since they give back one section for every amassed bunch. As a rule,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Broker Based Trust Model for Cloud Computing Environment

    With the increase in an online transactions and interactions on the internet, a key issue is how to use efficient and simple evaluation method to achieve trust based decision making for service users and service providers. Trust plays an important role in all commercial cloud environments. It is the evaluation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Efficient Algorithm to Find Information Rich Subset in High Dimensional Data

    Data mining is the process of exploration and analysis, by automatic or semi automatic means, of large quantities of data in order to discover meaningful patterns and rules. Data Mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    Design and Implementation of FPGA Based Efficient Data Transmission Using Verilog

    In cryptography, there are two different types of methods to provide the security to a data. They are symmetric & asymmetric. Symmetric means same key for sender as well as receiver. Generally, cryptography concepts having three important blocks, they are encryption, key generation & decryption. Data transmission can be starts...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Finite States Optimization Using Pattern Matching Algorithm

    The pattern sequence is an expression that is a statement in a language designed specifically to represent prescribed targets in the most concise and flexible way to direct the automation of text processing of general text files, specific textual forms, or of random input strings. Regular Expressions (RE) are getting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Detection of Fault-Injection Attacks for Cryptographic Applications

    Cryptographic applications like ATM and other commercial electronics are more susceptible to side-channel attacks in which the fault injection attacks are more crucial at today's Deep Sub Micron Technology. Hence the identification and modeling of these attacks from the intruder is critical and became a challenge for current trend of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks

    The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to identify malicious, selfish and compromised nodes. It supports the decision making processes in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Missing Value Imputation of Mixed Attribute FCM Clustered Data Sets Using Higher Order Kernels

    Data mining is the efficient discovery of previously unknown, valid, potentially useful, understandable patterns in large datasets. There is a need for quality of data, thus the quality of data is ultimately important. The existing system provides a new setting for missing data imputation, i.e., imputing missing data in data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    An Iterative Probabilistic Approach Towards Data Anonymization

    Data mining is the process by which useful knowledge is discovered from database. Publishing various databases for research and analytic purposes may put individual privacy at risk especially if it is possible to uniquely identify the personal details of an individual. Such risks have increased considerably in today's technology-driven world....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Complete Pre Processing Method for Web Usage Mining

    Web usage mining, data mining techniques applied to data from the Web usage patterns is to discover, in order to understand and better serve the needs of Web-based applications. There are several preprocessing tasks that must be performed prior to data collected from server log data mining algorithms to apply....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Triple Security of Information Using Stegnography and Cryptography

    In today's developing age technologies have developed so much most of every person use laptop, desktop, mobile, notepad etc. in their daily life to transfer their secret information across World Wide Web. Some people are waiting for this type of secret information which they called hacker and then change their...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Review: RFM Approach on Different Data Mining Techniques

    Data mining is a well-known technique, which can be used to extract hidden information about customers' behaviors. It is used to improve the customer relationship management processes by various Organizations. Previous researches in constraint based pattern mining emphasis only on the concept of frequency. But the changes in the environment...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    The Key Findings of Surveys Related to Email SPAM and Methods of Combating it in Saudi Arabia

    In this paper, the authors presented the key findings of surveys of email users, businesses, and ISPs in Saudi Arabia. The surveys were to investigate the nature of email SPAM in Saudi Arabia, its effects, methods and efforts taken to combat it. They also aimed to investigate the Anti-SPAM filters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Empirical Investigation on Certain Anonymization Strategies for Preserving Privacy of Social Network Data

    In recent years, the rapid growth of web applications developed the need for private data to be published. Most of the social network data necessitates the data to be available for easy access and conversion of data to graph structure to re-identify sensitive labels of individuals became an impeccable issue....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Extensive Review of SQLIA's Detection and Prevention Techniques

    Security of web applications is becoming one of the major concerns today. As per the people survey 70% of web applications over the internet are vulnerable to SQL Injection Attacks (SQLIA's). SQL injection attacks pose serious security threat to these databases and web applications. Through SQLIA's attackers gain unrestricted access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Compound Use of Cryptography and Steganoghaphy for Secure Data Hiding

    According to new era, the steganography and cryptography are the secret writing techniques are available. Steganography hides the existence of message by embedding data in some other digital media like image or audio format and Cryptography converts data in to cipher text that can be in unreadable format to normal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    PICQUET: Controlling Malicious Nodes in a Network

    Now-a-days there are many assailants were trying to attack on server using various tools but there are also some firewall present for prevent it. But in case of using Linux OS firewall has some of disadvantages - filters incoming n outgoing packets only, system oriented (separate for each node), doesn't...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Privacy Preserving Data Publishing of Numerical Sensitive Data

    Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper, the authors have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond k-anonymity. Principles designed in-order to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Dual Sentinel: Intrusion Detection and Prevention System

    Now-a-days, the use of internet has been increased so rapidly and on large scale which has increased the number of applications and complexity of data. In order to deal with this increase in application and data complexity, web services are designed as multitier services. In this paper, the authors present...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    Maintaining File Storage Security in Cloud Computing

    IT enterprise is looking forward Cloud Computing as its next generation architecture. Services provided by this new emerging technology are dynamically scalable. Cloud Service Providers CSP facilitate users to work on different platforms as per their requirement. Pay-per-use feature of Cloud Computing has always been the dream of thousands of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    A Reliable and Flow Control Communication Protocol for Dynamic Network Coverage and Data Security Having Energy Audit Functionality in Mobile Sensor Network

    In a wireless sensor network mobility along with energy efficiency imposes significant challenges for MAC (medium access control) protocol design. An effective MAC protocol for Wireless Sensor Networks must consume less power, avoid collisions, be implemented with small code size and memory requirements. Most of the MAC protocols for wireless...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    Survey of Intrusion Detection System in Multitier Web Application

    This strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. The front end include web server which can responsible to run the application and gives that output to back...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    A Decisive Best Effort Service Algorithm Designed to Rationalize Call Failures in Cellular Network

    The paper proposes an admission control scheme based on adaptive bandwidth reservation to provide QOS guarantees for multimedia traffic carried in high-speed wireless cellular networks. The proposed scheme allocates bandwidth to a connection in the cell where the connection request originates and reserves bandwidth in all neighboring cells. It combines...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    Termite Hill Protocol for Network Lifetime in Wireless Sensor Networks: Review of Selected Techniques

    Improving network lifetime and reliability are the fundamental challenges in Wireless Sensor Networks (WSNs). Most of the research in this area has focused on energy-efficient solutions, but has not thoroughly analyzed the network performance, e.g. in terms of data collection rate and time. A critical aspect of applications with wireless...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    Role Based Access Control Mechanism in Cloud Computing Using Co - Operative Secondary Authorization Recycling Method

    Cloud Computing provides the people the way to share distributed resources and services that belongs to different organization or sites. In cloud computing at present there is no authorization recycling approach. The aim of the work is to develop an authorization recycling approach using CSAR (Co-operative Secondary Authorization Recycling) in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2012

    Crystography-Combination of Cryptography and Steganography With Rapidly Changing Keys

    Cryptography it is the combination of Cryptography and Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    Intersection of Service Oriented Architecture (SOA) and Data Integration

    The organizations have been slow to accept Service-Oriented Architecture (SOA) because the services are only as beneficial as the access they have to data that is spread out across the enterprise. While IT standards and technologies have matured to help organizations turn business logic into services, but not a substantial...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    Design of Intelligent Multichannel Routing Processor Using VHDL

    Network router is a device or a piece of software in a computer that forwards and routes data packets along networks. A network router connects at least two networks, commonly two LANs or WANs or a LAN and its ISP network. A router is often included as part of a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    WiMAX Networks: Services & Their Quality Matrics

    WiMAX is the worldwide interoperability for microwave access, to provide business and consumer world wireless broad band services in metropolitan area networks. It has a target range of 31 miles and a target transmission rate exceeding 100 Mbps. Mobile WiMAX is an OFDM based technology for deployment which allows multiple-antenna...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    Mapping of Power Distribution Network Using Geographical Information System (GIS)

    This paper mainly focuses on the use of Geographical Information System in management of power distribution system. Traditional management system is not only manual but also has flaws such as difficulties in searching previous records and updating them, which is very time consuming task. Using GIS, Roads and buildings of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    An Efficient Route Metric for Evaluating and Selection of Best Routes in Mobile Adhoc Networks

    A Mobile Adhoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. To accommodate the changing topology special routing algorithms are needed. A new routing protocol has been...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    Improving Performance of 802.11 MAC by Optimizing DCF in Mobile Ad-Hoc Network

    Mobile Ad-hoc Network is a self configuring infrastructure-less network of mobile devices connected by wireless They have undergone rapid growth in the past several years because of their application in military and rescue service, disaster recovery operations, mobile conferencing and many other applications. The Media Access Control (MAC) data communication...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jun 2012

    Data Encryption Using Square Grid Transposition With Cryptography DSA Technique

    Data encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it is easily understood. In literature, different techniques are used for encryption and decryption of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    An Efficient on Demand Load Sharing Routing Protocol for Ad Hoc Networks Using RSS With Cross Layer Design

    Ad hoc networks are networks capable of communicating in a set of small, low cost, low power sensing devices. A wireless sensor networks is totally based on the limiting factor, i.e., energy consumption. A wireless sensor network consists of large number of sensor nodes distributed or scattered in particular network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    FlexRay Protocol Based an Automotive Application

    FlexRay protocol is developed to meet the demand of the next generation high capacity in-vehicle data communication. It is the high speed, deterministic, fault-tolerant and flexible protocol. There are large number of Electronic Control Units (ECUs) used in a high end automobile like car. Safety critical and high speed applications...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Energy Management in Zone Routing Protocol (ZRP)

    Ad hoc networks are wireless networks without a fixed infrastructure, and are usually established on a temporary basis for a specific application like emergency rescue or battle field communication. Energy management in wireless networks deals with the process of managing energy resources by means of controlling the battery discharge, adjusting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Design and Implementation of Steganography Along With Secured Message Services in Mobile Phones

    Design and Implementation of Steganography along with secured message services in Mobile Phones is used to provide security to the data that flows across the mobiles. Two people may communicate securely by encrypting the message sent between them. Now a day, several methods are used for communicating secret messages for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Real Time Data Communication Medium Access Control (RC-MAC) Protocol for Wireless Sensor Networks (WSNs)

    Reliable data communication in Real Time is one of the most important requirements in Wireless Sensor Networks where different applications have different reliability requirements. Assuring reliable data delivery in real time between sensor nodes and the sink node in WSNs is a challenging task. Most of the existing medium access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Rerouting Schemes for Traffic Grooming in Optical WDM Networks

    The transmission capacity of a link in today's optical networks has increased significantly due to Wavelength-Division Multiplexing (WDM) technology. The network performance is now mainly limited by the processing capability of the network elements, which are mainly electronic. By efficiently grooming low-speed traffic streams onto high-capacity optical channels, it is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2012

    Privacy Preserving Data Mining With Reduced Communication Overhead

    In today's world privacy and security are more essential elements when data is shared. A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Most of the methods use random permutation techniques to mask the data, for preserving the privacy of sensitive...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2012

    Wavelet Based Edge Detection Technique for Iris Recognition Using MATLAB

    Edges characterize boundaries and therefore a problem of fundamental importance in image processing. Edge detection significantly reduces the amount of data and filters out useless information, while preserving the important structural properties in an image. In this paper, the authors present wavelet based edge detection technique. Fourier Transform in edge...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2011

    Review of Congestion Control Algorithms for Performance Evaluation of WCDMA

    WCDMA is an important air interface technologies for wireless networks. As WCDMA based cellular networks fully developed, the current point-to-point links will evolve to an IP-based Radio Access Network (RAN).This Paper present a review of congestion control mechanism using Router control, channel control and admission control method for IP-RAN on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2011

    Performance of Channel Estimation Algorithm With Joint Channel Estimation Scheme

    In this paper, multi-cell channel estimation algorithm based on Successive Interference Cancellation (SIC).This channel algorithm is also used for Time Division Synchronization Code Division Multiple Access Systems (TD-SCDMA). TD-SCDMA is the country's standard of 3G mobile telecommunication. This reduces the number of users in each timeslot, which reduces the implementation...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    A Compact Planar Multiband Antenna for WLAN: Design, Simulation and Results

    With the rapid development of wireless communication systems, the multiple separated frequency bands antenna has become one of the most important circuit elements and attracted much interest. In order to satisfy the IEEE 802.11 WLAN standards in the 2.4 GHz (2400 - 2484 MHz)/5.2 GHz (5150 - 5350 MHz)/5.8 GHz...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Soft Computing Tools in Credit Card Fraud & Detection

    Fraud is one of the major ethical issues in the credit card industry. The significance of the application of the techniques reviewed here is in the minimization of credit card fraud. Depending on the type of fraud faced by banks or credit card companies, various measures can be adopted and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Embedded System for Multiplatform Communication of Real Time Data Using Vx Works

    Communication between different platforms is necessary for every embedded concern, since the people use different OS for their project developments. In this paper, the authors explain the multiplatform communication for real time data using VxWorks and TCP/IP model based communication between two platforms. Microcontrollers are used for real time data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Analysis of Data Mining Algorithm in Intrusion Detection

    In this paper, the authors have presented a survey on the different data mining technique of intrusion detection which is basically used for the intrusion detection purpose in the field of data mining. Today intrusion detection in data mining has gain more interest to the researches, there are many intrusion...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    The SEDA for Highly-Concurrent Internet Server Applications

    This paper presents architecture for handling the massive concurrency and load conditioning demands of busy Internet services. The authors' paper is that existing programming models and operating system structures do not adequately meet the needs of complex, dynamic Internet servers, which must support extreme concurrency (on the order of tens...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Implementation of 4x4 Crossbar Switch for Network Processor

    The network processor incorporates a processor and a number of coprocessors that can be connected to the processor either Directly or using a shared bus This paper presents the proposal and development of a reconfigurable crossbar switch architecture for network processors. Its main purpose is to increase the performance, and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Proposed Water Filling Model in a MIMO System

    In the paper, the authors have discussed the proposed water filling algorithm which has been used for allocating the power to the MIMO channels so as to enhance the capacity of the MIMO network. Here they present a theoretical framework for allocating the power here they have considered a 4x4...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2011

    Opportunistic Spectrum Access Using Greedy and Optimal Approach in Cognitive Radios

    In cognitive radio networks, the secondary user network are allowed to utilize the underutilized frequency bands of primary user network on non-interfering basis. To achieve this task, the Secondary Users (SU) are required to sense the RF environment, and once the Primary User (PU) is found to be active, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Capacity Enhancement of WiMAX System Using Adaptive Modulation and Code Rate

    Future wireless networks such as 4G system will support high data rate and multimedia services including facsimile, video teleconferencing, file transfer by consuming less bandwidth such as high-speed Internet accesses .The IEEE WiMAX/802.16 is a promising technology for broadband Wireless Metropolitan Areas Networks (WMANs) as it can provide high throughput...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    IDS : Intrusion Detection System the Survey of Information Security

    With the increased use of computerized/online transactions it is very much of the importance to secure the information from intruders. Intrusion detection is the process of monitoring the activities or events occurring in the computer system or network and analyzing them to find out suspicious events intruding the system or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Implementation of Zero Knowledge Protocol in Wireless Sensor Network for Identification of Various Attacks

    Wireless Sensor Networks (WSN) is excellent technology which provide great potential for situations like battlefields and commercial applications such as building, traffic survey, monitoring environments smart homes and many more scenarios. Security is the most important challenge in wireless sensor networks. Sensor networks dose not haves any user control for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    An Approach of Quality Assurance in Web Application

    This paper provides an overview of quality assurance process for Web Applications. Producing reliable and robust software has become one of the most important software development concerns in recent years and testing is a process by which software quality can be assured through the collection of information about software. This...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    ARM Based Mobile Phone-Embedded Real-Time Remote Video Surveillance System With Network Camera

    Monitoring facilities will be necessary and useful for the people daily life, because it is very important for them to think about their security. This work developed an remote video surveillance system, which is organized with an integrated web server, network cameras, remote control devices and clients which connected to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Noise Estimation of Speech Signal Using Adaptive Sub -Spectral System

    In the current environment of the modern world, telecommunication has been highly integrated into the people everyday life through their vivid use in speech communication, speech and speaker recognition, aid devices for the hearing impaired and numerous other applications. Speech is a fundamental means of human communication. In the last...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Improved Comparative Analysis of Mobile Ad-Hoc Network

    This paper presents the performance analysis of different routing protocols of a Mobile Ad hoc NETwork (MANET) including cellular wireless nodes. The connections between these cellular nodes have been conducted without any typical control. MANET is a self-organized and self configurable program where cellular nodes are modified randomly. The cellular...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Trust Based Routing Algorithms for Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) comprises of a set of nodes connected by wireless links. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks. Routing in MANETs is a challenging task due to dynamic topology and error prone shared environment....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)