International Journal of Engineering and Advanced Technology (IJEAT)

Displaying 1-40 of 333 results

  • White Papers // Dec 2014

    Improved Wavelet-Cusum Spectrum Sensing Algorithm in Cognitive Radio Network

    In the recent days, the development in the field of communication devices leads to the wide usage of spectrum. Since the availability of spectrum was limited, cognitive radio technique was adopted for spectrum sensing. In spectrum sensing number of uncertain conditions were present which may degrade the sensing performance and...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    Secure Data Aggregation with False Temporal Pattern Identification for Wireless Sensor Networks

    Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. It helps the users to understand how the environment changes over time and track real time measurements for trend analysis. In the continuous aggregation, the attacker could manipulate a series of aggregation results through compromised...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    BER Analysis of MIMO-OFDM System using Different Equalization Techniques under Multipath Fading Channels for Different Modulations

    With the rapid growth of digital communication in recent years, the need for high speed data transmission is increased. OFDM is a promising solution for achieving high data rates in mobile environment, due to its resistance to ISI, which is a common problem found in high speed data communication. A...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    An Optimum Relay Sensor Placement Technique to Enhance the Connectivity of Wireless Sensor Network

    In this paper, the authors have presented a novel algorithm of sensor deployment for re-establishing the connectivity of a disconnected sensor network. They also address the way of achieving k-connectivity which can provide the sensor network with some level of fault tolerance. They combine the concept of Voronoi diagram, Delaunay...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    Secure Data Communication Using Protocol Steganography in IPv6

    In secure data communication network security is important. Basically in cryptography encryption is used for data security. Still attacker can attract towards encrypted data due to different form of data. So this limitation could overcome by using steganography. Steganography is the technique of information hiding. In steganography different carriers can...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Prediction of Performance: Practicality between MIMO and Collocated MIMO Radar

    The authors recommend a novel method for Multiple-Input Multiple-Output (MIMO) radar with co-located antennas which they call phased-MIMO radar. The core of the projected method is to panel the broadcast array into a number of sub arrays that are permissible to overlie. Then, each subarray is worn to articulately put...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    A Sector Analysis for RFID Implantation: Technical Analysis for Integrated Security Enhancement Techniques

    Radio Frequency IDentification (RFID) is a microchip technology which produces a lot of attention of scientists toward innovative and future oriented bionics and a most promising and anticipated technologies in recent years. This paper is to undertake a scoping study of emerged technology serving the security purposes of devices, infrastructures...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    A Message-Fleeting Receiver for BICM-OFDM Over Anonymous Crowded - Meagre Channels

    In disparity to surviving designs, ours is proficient of manipulating not onlymeagrely in sampled channel taps but also crowding among the bulky taps, performances which are notorious to evident at larger communication bandwidths. The authors intend a factor-graph-based tactic to united channel - approximation and decrypting of Bit-Interleaved Coded Modulation...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    An Efficient Pseudo Random Number Generator for Cryptographic Applications

    LFSR based Pseudo Random Sequence Generator (PRSG) technique is used for various cryptography applications such as data encryption keys, bank security communication channels etc. The total number of random states generated using LFSR are 2n-1 and depends on the feedback polynomial used in the design. Linear Feedback Shift Register (LFSR)...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Integrated All-Optical OFDM - WDM Transmission of 4x2.5Gbps Data Over 50km for a Radio Over Fiber Network

    Transmission of data above gigabytes, paved way to all-optical transmission, especially all-optical OFDM which enables wide band data to be transmitted over narrow band parallel channels. All optical technology always has higher data rate than electronic system. OFDM is generated by electronic Fast Fourier Transform (FFT) or Hartley Transform. But...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Enhanced Preventation of Password Stealing Using Biometric Factor

    Wording password is typically the most popular form involving user authentication on websites car without any convenience in addition to simplicity. On the other hand, users' passwords are inclined to be ripped off and sacrificed under various threats in addition to vulnerabilities. To begin with, users usually select vulnerable passwords...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Design and Implementation of IEEE-754 Decimal Floating Point Adde, Subtractor and Multiplier

    In this paper, the authors describe the development of a decimal floating point adder/subtractor multiplier and division in verilog with the help of ModelSim and will be synthesized by using Xilinx tools. These are available in single cycle and pipeline architectures and fully synthesizable with performance comparable to other available...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Design of Multicore Processor Using Multithreading Technique

    The multicore design has become a design philosophy in engineering applications. Speedup has been achieved by increasing clock speeds and, more recently, adding multiple processing cores to the same chip. Although chip speed has increased exponentially over the years, that time is ending and manufacturers have shifted toward multicore processing....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Certification Revocation in Cluster Based MANET Using Rerouting Mechanism

    Mobile Ad hoc NETworks (MANETs) now-a-days acquires attention of researcher, investors and manufactures due to their mobile nature, easy positioning and hot pluggable nature of involving devices into network. However, the wireless natures reduces security hence MANET becomes more defenseless to various types of security attacks than the cable connected...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Review on Cellular Manufacturing System and Its Components

    Shorter product life cycle, variable demands and international competitions become challenging issues nowadays hence, most of manufacturer made attempts to select type of manufacturing system for their company which is able to respond to these issues. Group Technology (GT) is one of the most recent manufacturing philosophies which is able...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    A Survey on Energy Efficient Target Tracking Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) find its application in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. Energy efficiency is one of the important research issues in WSNs, since it determines the lifetime of the sensor network deployed for the intended applications. Target tracking...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Secure Data Communication on ARM using Embedded 'C'

    The encryption standards such as Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Design and Study of G-Shaped Microstrip Antenna for WLAN Applications

    In this paper, the authors illustrate the usage of G shape patch antenna in Wireless Local Area Network (WLAN) applications. Due to transformation of telecommunication industry and rapid increase in usage of WLAN dual band antennas are preferred. This antenna resonates at single frequency i.e. 2.45GHz and operates on 2.4...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Real-Time Monitoring of ECG Using Zigbee Technology

    Cardiovascular disease is one of the leading causes of death around the world. Telemedicine has a great impact in the cardiac monitoring of patients in remote environment. A wireless electrocardiograph monitoring system is implemented with Zigbee module for remote monitoring of cardiac patient. ECG acquisition system is designed and the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Change Detection of Land use/ Land Cover of a Watershed using Remote Sensing and GIS

    Geographic Information Systems (GIS) and Remote Sensing (RS) techniques provide effective tools for analyzing the land use dynamics of the region as well as for monitoring, mapping and management of natural resources. Some recent studies have shown the use of RS and GIS in land use change detection. Micro-watershed study...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Embedded Spiking Neural Network

    Neural networks are computational models of the brain. These networks are excellent at solving problems for which a solution seems easy to obtain for the brain, but requires a lot of efforts using standard algorithmic techniques. Examples of such problems are pattern recognition, perception, generalization and non-linear control. In the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    A Comprehensive Overview on MANET

    In the last couple of years, the use of wireless networks has become more and more popular. There exist three types of mobile wireless networks: infrastructured networks, ad-hoc networks and hybrid networks which combine infrastructured and ad-hoc aspects. Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    A Reduced Error Pruning Technique for Improving Accuracy of Decision Tree Learning

    Decision tree inductions are well thought-out as it is one of the most accepted approaches for representing classifiers. Many researchers from varied disciplines like statistics, pattern reorganization; machine learning measured the problem of growing a decision tree from available data. Databases are the rich sources of hidden information that can...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Review and Analysis of Software Release Planning Models

    Software maintenance is generally recognized to consume majority of resources in many organizations. Regular replacement of legacy systems with new ones is not a feasible solution. Planning releases so as to maximize the functionality and quality of software is very much in need now. Release Planning plays a very important...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Enhanced Two Dimensional Circular Encryption Algorithm

    In recent years, many multimedia and image encryption techniques based on chaotic maps have been proposed. Recently, a new signal security system called Two-Dimensional Circulation Encryption Algorithm (TDCEA) was proposed for real-time multimedia data transmission. There exist some essential security defects in TDCEA. This paper gives an analysis on the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Remote Data Access for Control of TCP/IP Network Using Android Mobile Device with Fast Transfer of Images

    In today's world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as to create application that controls the desktop nodes in the network with help of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Improving Performance with Security Mechanism for Wireless Multi-Hop Relay Network

    Wireless relay network consist of distribution of network topology commonly used in wireless network. Where it sender and receiver are interconnected by mean some of mobile nodes. Relay technology are used enhance packet delivery and increase performance of wireless networks such as worldwide interoperability for microwave access and LTE-A. Later...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    K-Mean Clustering and PSO: A Review

    Clustering is a method which divides data objects into groups based on the information found in data that describes the objects and relationships among them. There are a variety of algorithms have been developed in recent years for solving problems of data clustering. Data clustering algorithms can be either hierarchical...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Analysis and Literature Review of IEEE 802.1x (Authentication) Protocols

    In this paper, the authors explain about some of the commonly used Extensible Authentication Protocol (EAP) authentication protocol. But before understanding these authentication methods they have to understand what EAP is and how EAP work because it's all start with EAP. So their aim in this paper is to provide...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Comparison of Dual Band UWB Microstrip Antennas

    In this paper, the authors have designed a microstrip patch antenna for UWB wireless communication. The paper presents different types of microstrip antennas and compares their performance based on various characteristics so as to find the best antenna that can be used They have compared them on the basis of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Equalization Techniques for MIMO Systems in Wireless Communication: A Review

    In this paper, the authors provide a review of equalization techniques in Multiple Input, Multiple Output (MIMO) communication system. In wireless communication inter symbol interference is major obstacle which greatly affect the data quality. The chief goal of equalization techniques is to rebuild the actual signal with the help of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Design and Implementation of Advanced Encryption Standard Algorithm-128 Using Verilog

    Security has become an increasingly important feature with the growth of electronic communication. The symmetric in which the same key value is used in both the encryption and decryption calculations are becoming more popular. AES is a symmetric encryption algorithm processing data in block of 128 bits. Under the influence...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // May 2014

    Design and Analysis of Conventional CMOS and Energy Efficient Adiabatic Logic for Low Power VLSI Application

    In recent years, low power circuit design has been an important issue in VLSI design areas. Adiabatic logics, which dissipate less power than static CMOS logic, have been introduced as a promising new approach in low power circuit design energy. This paper proposes an Adder circuit based on energy efficient...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols

    Secure multiparty protocols are used as third party protocols in the data hiding and security. The major problem is, there is no security scheme operated for data storage services between multi party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, this helps parties...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Mining of High Utility Itemsets from Transactional Databases

    Efficient discovery of high utility itemsets from transactional databases has crucial task in data mining. UP-growth and UP-growth+ algorithms are proposed for mining high utility itemsets. In this paper the authors also proposed a compact tree structure, called Utility Pattern tree (UP-Tree) and it maintains the information of high utility...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller

    In this paper the authors present the design and practical implementation of a buck-type power converter for PhotoVoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking (MPPT) algorithm. A buck converter is used to regulate battery charging the system is controlled by a Peripheral...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Privacy Preserving Data Mining: A Novel Approach to Secure Sensitive Data Based on Association Rules

    The availability of data on the internet is increasing on a larger basis daily. Privacy preservation data mining has emerged to address one of the side effects of data mining technology. The threat to individual privacy through data mining is able to infer sensitive information from non-sensitive information or unclassified...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    A Robust Clustering Approach Based on KNN and Modified C-Means Algorithm

    Cluster analysis is used for clustering a data set into groups of similar individuals. It is an approach towards to unsupervised learning and is one of the major techniques in pattern recognition. FCM algorithm needs the number of classes and initial values of center for each cluster. These values are...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    FPGA Based Hardware Implementation of Encryption Algorithm

    Reprogrammable devices such as Field Programmable Gate Arrays (FPGA) are used for hardware implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of Advanced Encryption Standard (AES) with 128-bit key as a constant which is used for encrypting the text file and image for secure transmission. Timing...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Extended Distributed RK- Secure Sum Protocol in Apriori Algorithm for Privacy Preserving

    Secure sum computation is a simple example of secure multi party computation. This provides privacy to data in case more than two parties are present, while finding combined results of individual data. Association rule mining algorithms like apriori are used for mining frequent items from database. In this paper the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Survey Detection and Prevention Scheme Against Wormhole Attack in MANET

    In Mobile Ad-hoc NETwork (MANET) various routing attacks for single-path routing have been proposed in previous work. These nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. Due to absence of a defined central authority, securing the routing...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Co-Operative and Threshold Detection Method and Proposed Algorithm for Black Hole Attack

    Now-a-days various prospective have been proposed to achieve the flexibility and minimize the losses. Various routing protocols have been proposed in case of Mobile and ad-hoc networks. Various optimized link and nodes for routing is insisted in this paper. This paper comes with a complete comparative study of various routing...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Dynamic Resource Allocation for Efficient Parallel Data Processing Using RMI Protocol

    In this paper, the authors discuss the opportunities and challenges for efficient parallel data processing in clouds and present their research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered by today's IaaS clouds for both, task scheduling and execution. In this...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Investigation and Analysis of Efficient Pattern Discovery Method for Text Mining

    The concept of text mining is nothing but the mechanism of extracting non-trivial and interesting data from the unstructured text dataset. Text mining is consisting of many computer science disciplines with highly oriented towards the artificial intelligence in general such as the applications like information retrieval, pattern recognition, machine learning,...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Classification and Selection of Best Saving Service for Potential Investors Using Decision Tree - Data Mining Algorithms

    In this paper, the authors delineate a comprehensive and successful application of decision tree induction to large banking data set of different banking services obtained by numbers of customers. Complex interaction effects among banking services that lead to increased policy variability have been detected. The extracted information has been confirmed...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    A Serial Based Encryption for Enhanced Access Control in Cloud Computing

    Cloud storage allows users to enjoy the on demand cloud application without any hardware implementation. Even though the cloud issues the cloud application without any physical implementation results in a security risk since the cloud data can be accessed by everyone. To avoid security issue in the outsourced data a...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Towards an Improvement of the Security of a WSN Based on Power Management as Part of the QOS

    Wireless Sensor Networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    A Research Paper on Hybrid Intrusion Detection System

    An Intrusion Detection System (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    A Survey on AODV Protocol Performance with Black Hole Node in MANET

    Security is a main concern in any network communication. Because of MANETs special characteristics, it becomes vulnerable to security attacks. MANET has no fixed infrastructure and any centralized system. It has a dynamic topology which randomly changes itself. There are different kinds of security attacks in MANETs. In this paper,...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Detection of SQL Injection Attack and Various Prevention Strategies

    The internet is a demanding technology which is working its way into all aspects of the people civilization. So security is the main critical part in their daily life. The requirements of information security and website security within an organization have undergone several changes in the last several decades. Security...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    An Ameliorated Approach Towards Automating the Relational Database Normalization Process

    In the field of database systems in general and relational systems in particular, database design problem is of utmost importance as it helps to decide on a suitable logical structure for a given data to be represented in a database and concentrates on the fact that which relations are needed...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    Review of Clustering Algorithm for Categorical Data

    Clustering is a partition of data into a group of similar or dissimilar data points and each group is a set of data points called clusters. Clustering is an unsupervised learning with no predefined class label for the data points. Clustering is considered an important tool for data mining. Clustering...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    A Secure Elliptic Curve Digital Signature Approach without Inversion

    The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). Unlike the ordinary discrete logarithm problem Elliptic Curve Discrete Logarithm Problem (ECDLP) has no sub-exponential time algorithm, due to this the strength per key bit is substantially greater when compare with conventional...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    An Implementation of Efficient Text Data Compression

    The size of data related to a wide range of applications is growing rapidly. Typically a character requires 1 Byte for storing. Compression of the data is very important for data management. Data compression is the process by which the physical size of data is reduced to save on memory...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Efficient and Secure Mutual Authentication Scheme in Cloud Computing

    Now-a-days, cloud computing considers an important topic for small, medium and large e-commences alike. The security is a constitutive trouble that hinders its widespread adoption. The password authentication is a first level of security in cloud computing, aiming to guarantee that only legitimate users are allowed to be used data...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Secure Image Retrieval over Untrusted Cloud Servers

    Security issue represents the main barrier facing the wide adoption of cloud computing. Encryption is the best method to mitigate users' concerns. However, this method makes searching the encrypted data a challenging task. Accordingly, several approaches have been proposed to enable searching the encrypted, remotely stored data without decryption. Till...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    A Comprehensive Overview on Different Cloud Storage Techniques and Security Mechanism

    Cloud computing means application and services over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the \"Cloud\". Examples of cloud computing includes online backup services, social networking services, and personal data services such as Apple's Mobile Me. Cloud computing...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    To Find Solution for Secure and Fast Data Transfer: Improving Network Performance

    The theory of network coding promises significant benefits in network performance, especially in lossy networks and in multicast and multipath scenarios. To realize these benefits in practice, the authors need to understand how coding across packets interacts with the ACKnowledgment (ACK)-based flow control mechanism that forms a central part of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Mining Frequent Pattern Form Large Dynamic Database With Time Granularities to Improve Efficiency

    Incremental algorithms can manipulate the results of earlier mining to derive the final mining output in various businesses. This paper proposes a new algorithm, called the new approach for efficiently incrementally mining frequent pattern from large dynamic database. Proposed approach is a backward method that only requires scanning incremental database....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Proposed Model of GIS - Based Cloud Computing Architecture for Emergency System

    Recent emergency situations in the world display the inclination that the occurrence frequency of natural catastrophes is anticipated to increase in future. Thus new approaches for crisis administration need to be elaborated based on the newest IT expansion. Cloud computing is advised as possible way to smaller the cost and...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Two Tier Data Compression Method for Real- Time Databases

    Modern day applications handle large volumes of data. These applications involve real-time data manipulations to be carried within time constraints. So real-time databases are used in most of the real-time applications. For efficient utilization of database, with no compromise on speed, various compression methods are used to compress the data...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Hardware Implementation of Involutional SPN Block Ciphers

    Consider the two involutional SPN (Substitution-Permutation Network) block ciphers, namely KHAZAD and BSPN, since both of these algorithms adopt SPN structure. Investigation of the energy cost of the FPGA implementation of these two cryptographic algorithms targeted to Wireless Sensor Networks (WSNs) has to be done. Recent trends have seen the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2013

    Activity Based Data Management in Mobile Environment Using CART and ID3 Data Mining Techniques

    Mobile clients feature increasingly sophisticated wireless networking support that enables real-time information exchange with remote databases. Location-dependent queries, such as determining the proximity of stationary objects (e.g., restaurants and gas stations) are an important class of inquiries. The authors present a novel approach to support nearest neighbor queries from mobile...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2013

    Truthful Mechanisms for Scheduling Selfish Related Machines Using ACO

    Task scheduling is a major challenge in parallel and distributed systems. Task scheduling techniques in distributed systems are usually based on trusting the Accuracy of the information about the status of resources. In a commercial multi-Cloud environment, individual providers are focused towards increasing their own profits and do not care...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2013

    Multiple Black Hole Node Attack Detection Scheme in MANET by Modifying AODV Protocol

    Mobile Ad-hoc NETworks (MANET) is a self-configuring, infrastructure less network consists of independent mobile nodes that can communicate via wireless medium. Each mobile node can move freely in any direction, and changes their links to other devices frequently. Security is an essential part of ad hoc networks. Due to its...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2013

    Data Warehousing: A Logical Approach in Organization

    In this paper, the authors present the first steps to ensure a successful data warehouse development effort. The objective of this paper is the problem should be clear, be specific, and have testable criteria for success. If specify these problems and get customer and organization report. This approach is successfully...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2013

    Virtual Environments Provide Mammoth Security for Critical Server

    Security is the key factor of resolution of computer era. In every field of computer it may be cloud computing, neural network, data ware house, data mining, or grid computing in every field the security is central theme. The authors can provide the security by means of authentication process. Authentication...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2013

    Data Mining and Business Intelligence Applications in Telecommunication Industry

    Telecommunication companies today are operating in highly competitive and challenging environment. Huge volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2012

    A Survey on CIMDS: Adapting Post Processing Techniques of Associative Classification for Malware Detection

    The Malware is program/software that damages or affects the computer system. In this paper, the authors describe post processing techniques that are Rule Pruning, Rule Ranking and Rule Selection. Then number of classification rule evaluation measures is considered. Here number of selection technique is used to order classification rule contained...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2012

    Security Against Side Channel Attack in Cloud Computing

    Cloud computing is a word that delivering hosted service over the internet. Cloud computing has been ideate as the next generation architecture of IT enterprise because of its provides ubiquitous network, cost reducing, flexibility and scalability to users. Now days with the fast growing of cloud computing technology introduces new...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2012

    Threats and Countermeasures in GSM Networks

    There are many antivirus products available in market. They provide different type of security levels to the user's data. This paper is used for automation of all these process to provide effective and better way of screen shot analysis by extracting text from them. Hence, the purpose of this paper...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2012

    Automation of Screen-Shot Analysis for Anti-Virus Toaster Windows

    Mobile networks not only provide great benefits to their users but they also introduce inherent securityissues. With respect to security, the emerging risks of Denial Of Service (DOS) attacks will evolve into a critical danger asthe availability of mobile networks becomes more and moreimportant for the modern information society. This...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2012

    Optimizing Clustering Technique Based on Partitioning DBSCAN and Ant Clustering Algorithm

    Clustering is the process of organizing similar objects into the same clusters and dissimilar objects in to different cluster. Similarities between objects are evaluated by using the attribute value of object; a distance metric is used for evaluating dissimilarity. DBSCAN algorithm is attractive because it can find arbitrary shaped clusters...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2012

    Providing Authorization by Using Face Recognization for Private Cloud Computing

    In this paper, the authors focus on how to solve the security issues of cloud computing. Authentication based on facial biometrics will be applied to the cloud computing security. This paper illustrates authentication based security by using facial biometrics. Face recognition system consists of face verification, and face recognition tasks....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Temperature-Aware Virtual Machine Scheduling in Green Clouds

    In this paper, the author presents the temperature-aware virtual machine scheduling in green clouds which is design to maintain the temperature of virtualized cloud system below critical temperature threshold by scheduling VMs according to temperature of node and insures reliable quality of service. High temperature gradients degrade reliability and performance...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Survey on Privacy and Data Security Issues in Cloud Computing

    Cloud computing is a better way to run the business. Instead of running the apps by the user, they run on a shared data center. Cloud computing provides customers the illusion of infinite computing resources which are available from anywhere, anytime, on demand. Apart from this cloud computing is subject...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    A Survey: Access Patterns Mining Techniques and ACO

    In this paper, the authors define Web Mining as Data Mining on the web. Further they define Web Usage Mining along with its applications and tools. Overall the focus of the paper will be to present a survey of the recent developments of the past and current work in Web...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Concept & Proposed Architecture of Hybrid Intrusion Detection System Using Data Mining

    Now-a-day's security is the primary concerned in the field of computer science. Intrusion detection system provides stronger security services with the help of rules. This paper has developed a security model based on hybrid intrusion detection system using data mining approach. Proposed security model is the combing network based and...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Study the Effects of Encryption on Compressive Sensed Data

    Today's technological era is highly dominated by data transfer. Since confidential data is transmitted over risky media like internet, faithful data transfer is now accompanied with secure data transfer. Security is the need of the hour. Here, a new and relatively simple encryption algorithm is proposed which shuffles the elements....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Performance Enhancement of Cloud Computing with Clustering

    Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)