International Journal of Engineering and Advanced Technology (IJEAT)

Displaying 1-40 of 353 results

  • White Papers // Dec 2014

    An Optimum Relay Sensor Placement Technique to Enhance the Connectivity of Wireless Sensor Network

    In this paper, the authors have presented a novel algorithm of sensor deployment for re-establishing the connectivity of a disconnected sensor network. They also address the way of achieving k-connectivity which can provide the sensor network with some level of fault tolerance. They combine the concept of Voronoi diagram, Delaunay...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    Improved Wavelet-Cusum Spectrum Sensing Algorithm in Cognitive Radio Network

    In the recent days, the development in the field of communication devices leads to the wide usage of spectrum. Since the availability of spectrum was limited, cognitive radio technique was adopted for spectrum sensing. In spectrum sensing number of uncertain conditions were present which may degrade the sensing performance and...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    Secure Data Aggregation with False Temporal Pattern Identification for Wireless Sensor Networks

    Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. It helps the users to understand how the environment changes over time and track real time measurements for trend analysis. In the continuous aggregation, the attacker could manipulate a series of aggregation results through compromised...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    BER Analysis of MIMO-OFDM System using Different Equalization Techniques under Multipath Fading Channels for Different Modulations

    With the rapid growth of digital communication in recent years, the need for high speed data transmission is increased. OFDM is a promising solution for achieving high data rates in mobile environment, due to its resistance to ISI, which is a common problem found in high speed data communication. A...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    Secure Data Communication Using Protocol Steganography in IPv6

    In secure data communication network security is important. Basically in cryptography encryption is used for data security. Still attacker can attract towards encrypted data due to different form of data. So this limitation could overcome by using steganography. Steganography is the technique of information hiding. In steganography different carriers can...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2014

    Design and Implementation of Hamming Code on FPGA using Verilog

    In mathematics, digital communication and information theory, error detection and correction has great practical importance in maintaining information integrity across noisy channels. Error coding is considered as a method of detecting and correcting these errors to ensure that the information is transferred intact from its source to its destination. There...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    A Sector Analysis for RFID Implantation: Technical Analysis for Integrated Security Enhancement Techniques

    Radio Frequency IDentification (RFID) is a microchip technology which produces a lot of attention of scientists toward innovative and future oriented bionics and a most promising and anticipated technologies in recent years. This paper is to undertake a scoping study of emerged technology serving the security purposes of devices, infrastructures...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    A Message-Fleeting Receiver for BICM-OFDM Over Anonymous Crowded - Meagre Channels

    In disparity to surviving designs, ours is proficient of manipulating not onlymeagrely in sampled channel taps but also crowding among the bulky taps, performances which are notorious to evident at larger communication bandwidths. The authors intend a factor-graph-based tactic to united channel - approximation and decrypting of Bit-Interleaved Coded Modulation...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    An Efficient Pseudo Random Number Generator for Cryptographic Applications

    LFSR based Pseudo Random Sequence Generator (PRSG) technique is used for various cryptography applications such as data encryption keys, bank security communication channels etc. The total number of random states generated using LFSR are 2n-1 and depends on the feedback polynomial used in the design. Linear Feedback Shift Register (LFSR)...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Integrated All-Optical OFDM - WDM Transmission of 4x2.5Gbps Data Over 50km for a Radio Over Fiber Network

    Transmission of data above gigabytes, paved way to all-optical transmission, especially all-optical OFDM which enables wide band data to be transmitted over narrow band parallel channels. All optical technology always has higher data rate than electronic system. OFDM is generated by electronic Fast Fourier Transform (FFT) or Hartley Transform. But...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Prediction of Performance: Practicality between MIMO and Collocated MIMO Radar

    The authors recommend a novel method for Multiple-Input Multiple-Output (MIMO) radar with co-located antennas which they call phased-MIMO radar. The core of the projected method is to panel the broadcast array into a number of sub arrays that are permissible to overlie. Then, each subarray is worn to articulately put...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Enhanced Preventation of Password Stealing Using Biometric Factor

    Wording password is typically the most popular form involving user authentication on websites car without any convenience in addition to simplicity. On the other hand, users' passwords are inclined to be ripped off and sacrificed under various threats in addition to vulnerabilities. To begin with, users usually select vulnerable passwords...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Design and Implementation of IEEE-754 Decimal Floating Point Adde, Subtractor and Multiplier

    In this paper, the authors describe the development of a decimal floating point adder/subtractor multiplier and division in verilog with the help of ModelSim and will be synthesized by using Xilinx tools. These are available in single cycle and pipeline architectures and fully synthesizable with performance comparable to other available...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Design of Multicore Processor Using Multithreading Technique

    The multicore design has become a design philosophy in engineering applications. Speedup has been achieved by increasing clock speeds and, more recently, adding multiple processing cores to the same chip. Although chip speed has increased exponentially over the years, that time is ending and manufacturers have shifted toward multicore processing....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2014

    Efficient Communication in any Digital System using Convolutional Encoder and Viterbi Decoder for Constraint Length 9

    Forward Error Correction (FEC) schemes are an essential component of wireless communication systems. Present wireless standards such as Third Generation (3G) systems, GSM, 802.11A, 802.16 utilize some configuration of convolutional coding. Convolutional encoding with Viterbi decoding is a powerful method for forward error correction. The Viterbi algorithm is the most...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Certification Revocation in Cluster Based MANET Using Rerouting Mechanism

    Mobile Ad hoc NETworks (MANETs) now-a-days acquires attention of researcher, investors and manufactures due to their mobile nature, easy positioning and hot pluggable nature of involving devices into network. However, the wireless natures reduces security hence MANET becomes more defenseless to various types of security attacks than the cable connected...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Review on Cellular Manufacturing System and Its Components

    Shorter product life cycle, variable demands and international competitions become challenging issues nowadays hence, most of manufacturer made attempts to select type of manufacturing system for their company which is able to respond to these issues. Group Technology (GT) is one of the most recent manufacturing philosophies which is able...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    A Survey on Energy Efficient Target Tracking Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) find its application in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. Energy efficiency is one of the important research issues in WSNs, since it determines the lifetime of the sensor network deployed for the intended applications. Target tracking...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Secure Data Communication on ARM using Embedded 'C'

    The encryption standards such as Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Design and Study of G-Shaped Microstrip Antenna for WLAN Applications

    In this paper, the authors illustrate the usage of G shape patch antenna in Wireless Local Area Network (WLAN) applications. Due to transformation of telecommunication industry and rapid increase in usage of WLAN dual band antennas are preferred. This antenna resonates at single frequency i.e. 2.45GHz and operates on 2.4...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Real-Time Monitoring of ECG Using Zigbee Technology

    Cardiovascular disease is one of the leading causes of death around the world. Telemedicine has a great impact in the cardiac monitoring of patients in remote environment. A wireless electrocardiograph monitoring system is implemented with Zigbee module for remote monitoring of cardiac patient. ECG acquisition system is designed and the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    A Comprehensive Overview on MANET

    In the last couple of years, the use of wireless networks has become more and more popular. There exist three types of mobile wireless networks: infrastructured networks, ad-hoc networks and hybrid networks which combine infrastructured and ad-hoc aspects. Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Change Detection of Land use/ Land Cover of a Watershed using Remote Sensing and GIS

    Geographic Information Systems (GIS) and Remote Sensing (RS) techniques provide effective tools for analyzing the land use dynamics of the region as well as for monitoring, mapping and management of natural resources. Some recent studies have shown the use of RS and GIS in land use change detection. Micro-watershed study...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    Embedded Spiking Neural Network

    Neural networks are computational models of the brain. These networks are excellent at solving problems for which a solution seems easy to obtain for the brain, but requires a lot of efforts using standard algorithmic techniques. Examples of such problems are pattern recognition, perception, generalization and non-linear control. In the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    DC Motor Torque Control using Fuzzy Proportional-Derivative Controllers

    In this paper, the authors demonstrate the design of a fuzzy logic control system to torque control of a DC motor by using fuzzy rules in Mamdani interference system. So, as to achieve the better control performing results, fuzzy rules and fuzzy sets optimize the input parameters as well as...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2014

    FPGA Implementation of Frame Decoding Behaviour of Flex Ray Communication Protocol

    In this paper, the authors have highlighted the concept of frame decoding behavior of flex ray communication protocol. The VHDL model of flex ray frame decoder of flex ray communication controller is designed. The design is simulated using ModelSim Altera edition 13.0 and synthesized using Quartus II 13.0.0.156. The frame...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    A Reduced Error Pruning Technique for Improving Accuracy of Decision Tree Learning

    Decision tree inductions are well thought-out as it is one of the most accepted approaches for representing classifiers. Many researchers from varied disciplines like statistics, pattern reorganization; machine learning measured the problem of growing a decision tree from available data. Databases are the rich sources of hidden information that can...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    K-Mean Clustering and PSO: A Review

    Clustering is a method which divides data objects into groups based on the information found in data that describes the objects and relationships among them. There are a variety of algorithms have been developed in recent years for solving problems of data clustering. Data clustering algorithms can be either hierarchical...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Analysis and Literature Review of IEEE 802.1x (Authentication) Protocols

    In this paper, the authors explain about some of the commonly used Extensible Authentication Protocol (EAP) authentication protocol. But before understanding these authentication methods they have to understand what EAP is and how EAP work because it's all start with EAP. So their aim in this paper is to provide...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Comparison of Dual Band UWB Microstrip Antennas

    In this paper, the authors have designed a microstrip patch antenna for UWB wireless communication. The paper presents different types of microstrip antennas and compares their performance based on various characteristics so as to find the best antenna that can be used They have compared them on the basis of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Equalization Techniques for MIMO Systems in Wireless Communication: A Review

    In this paper, the authors provide a review of equalization techniques in Multiple Input, Multiple Output (MIMO) communication system. In wireless communication inter symbol interference is major obstacle which greatly affect the data quality. The chief goal of equalization techniques is to rebuild the actual signal with the help of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Design and Implementation of Advanced Encryption Standard Algorithm-128 Using Verilog

    Security has become an increasingly important feature with the growth of electronic communication. The symmetric in which the same key value is used in both the encryption and decryption calculations are becoming more popular. AES is a symmetric encryption algorithm processing data in block of 128 bits. Under the influence...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Review and Analysis of Software Release Planning Models

    Software maintenance is generally recognized to consume majority of resources in many organizations. Regular replacement of legacy systems with new ones is not a feasible solution. Planning releases so as to maximize the functionality and quality of software is very much in need now. Release Planning plays a very important...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Enhanced Two Dimensional Circular Encryption Algorithm

    In recent years, many multimedia and image encryption techniques based on chaotic maps have been proposed. Recently, a new signal security system called Two-Dimensional Circulation Encryption Algorithm (TDCEA) was proposed for real-time multimedia data transmission. There exist some essential security defects in TDCEA. This paper gives an analysis on the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Remote Data Access for Control of TCP/IP Network Using Android Mobile Device with Fast Transfer of Images

    In today's world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as to create application that controls the desktop nodes in the network with help of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    Improving Performance with Security Mechanism for Wireless Multi-Hop Relay Network

    Wireless relay network consist of distribution of network topology commonly used in wireless network. Where it sender and receiver are interconnected by mean some of mobile nodes. Relay technology are used enhance packet delivery and increase performance of wireless networks such as worldwide interoperability for microwave access and LTE-A. Later...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // May 2014

    Design and Analysis of Conventional CMOS and Energy Efficient Adiabatic Logic for Low Power VLSI Application

    In recent years, low power circuit design has been an important issue in VLSI design areas. Adiabatic logics, which dissipate less power than static CMOS logic, have been introduced as a promising new approach in low power circuit design energy. This paper proposes an Adder circuit based on energy efficient...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols

    Secure multiparty protocols are used as third party protocols in the data hiding and security. The major problem is, there is no security scheme operated for data storage services between multi party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, this helps parties...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Mining of High Utility Itemsets from Transactional Databases

    Efficient discovery of high utility itemsets from transactional databases has crucial task in data mining. UP-growth and UP-growth+ algorithms are proposed for mining high utility itemsets. In this paper the authors also proposed a compact tree structure, called Utility Pattern tree (UP-Tree) and it maintains the information of high utility...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller

    In this paper the authors present the design and practical implementation of a buck-type power converter for PhotoVoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking (MPPT) algorithm. A buck converter is used to regulate battery charging the system is controlled by a Peripheral...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols

    Secure multiparty protocols are used as third party protocols in the data hiding and security. The major problem is, there is no security scheme operated for data storage services between multi party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, this helps parties...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Mining of High Utility Itemsets from Transactional Databases

    Efficient discovery of high utility itemsets from transactional databases has crucial task in data mining. UP-growth and UP-growth+ algorithms are proposed for mining high utility itemsets. In this paper the authors also proposed a compact tree structure, called Utility Pattern tree (UP-Tree) and it maintains the information of high utility...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller

    In this paper the authors present the design and practical implementation of a buck-type power converter for PhotoVoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking (MPPT) algorithm. A buck converter is used to regulate battery charging the system is controlled by a Peripheral...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2014

    VLSI Implementation of Fuzzy Logic Circuit

    Fuzzy logic is a mathematical system that analyzes analog input values in terms of logical variables that take on continuous values between 0 and 1, in contrast to classical or digital logic, which operates on discrete values of either 1 or 0 (true or false, respectively). The paper proposes the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2014

    Conceptualization and Simulation of an Error Detection and Correction Code for Baseband Data Transmission

    The purpose of channel coding is to protect emitted information against perturbations (noise) in the transmission channel, which may alter the contents of the information. This consists of adding redundancies to the signal in order to detect and eventually correct reception errors. In this paper, the authors present a detection...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2014

    Physical Design Implementation of Processor Torpedo at Different OCV Scenarios -40, 25, 125 Degree Celsius of an ASIC Design Chip

    In this paper the authors basically studies the physical design implementation of torpedo processor which incorporates 32 macros in overall and 43000 cell instances. They had 5 clocks, 3 propagated and 2 generated clock in a die size of 5.9 mm square which operated at a frequency of 400 megahertz...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2014

    An Efficient Way to Reduce Data Service Delay Using Map Reduce Framework

    The demand of real time data services has increased in various data intensive real time applications such as e-commerce, traffic control, manufacturing etc. Supporting timely data services using such applications is a challenging issue, since the workload may dynamically change based on the current market status. Real time data services...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2012

    Design and analysis of 32-bit CPU based on MIPS

    In this paper, the authors have studied microcomputer without interlocked pipeline stages instruction format instruction data path decoder module function and design theory based on RISC CPUT instruction set. They have also designed Instruction Fetch (IF) module of 32-bit CPU based on RISC CPU instruction set. Function of IF module...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2011

    FPGA Based Efficient Implementation of Viterbi Decoder

    It is well known that data transmissions over wireless channels are affected by attenuation, distortion, interference and noise, which affect the receiver's ability to receive correct information. Convolutional encoding with Viterbi decoding is a powerful method for forward error detection and correction. It has been widely deployed in many wireless...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2011

    Voice Data Compression and Decompression

    An efficient and minimum hardware implementation for the voice data compression and decompression will be presented in this paper. Voice data compression and decompression is about a process which reduces the data rate or file size of digital audio signals. This process reduces the dynamic range (without changing the amount...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2014

    A Novel Approach to Prevent the Discrimination in Data Mining

    Automatic data collection has become the most wanted method in the banking sector to make automatic decisions like loan granting/denial. The discriminations in the dataset will lead to take the decisions in the partiality manner. The discrimination can be either direct or indirect discrimination. Direct discrimination occurs when decisions are...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    Min-min GA Based Task Scheduling In Multiprocessor Systems

    An efficient assignment and scheduling of tasks of a multiprocessor system is one of the key elements in the effective utilization of multiprocessor systems. This problem is extremely hard to solve, consequently several methods have been developed to optimally tackle it which is called NP-hard problem. This paper presents two...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    Moving Object Tracking in Video Scenes Embedded Linux Platform

    Video tracking in real time is one of the most important topic in the field of medical. Detection and tracking of moving objects in the video scenes is the first relevant step in the information extraction in many computer vision applications. This idea can be used for the surveillance purpose,...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    Built In Self Repair for Embedded Sram Using Selectable Redundancy

    Built-in self-test (BIST) refers to those testing techniques where additional hardware is added to a design so that testing is accomplished without the aid of external hardware. Usually, a pseudo-random generator is used to apply test vectors to the circuit under test and a data compactor is used to produce...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    Challenges on Performance Analysis and Enhancement of Multi - Core Architecture, a Solution Parallel Programming Languages

    Performance of computer is major concern in computer architecture. Mores law has gone now, the authors cannot increase the speed of single processor as it has problem of power requirement. So they need to move on multi core processors. Compiler is a main parameter who can give the detail of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Dec 2013

    Design and Implementation of Microcontroller Based Temperature Data Logging System

    The term data logger (also sometimes referred to as a data recorder) is commonly used to describe a self-contained, standalone data acquisition system or device. These products are comprised of a number of analog and digital inputs that are monitored, and the results or conditions of these inputs is then...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Integrating a PCI IP Core to FPGA- Design and Implementation

    High volume and high throughput rates are the need for high speed data acquisition applications. Higher efficiency and throughput is achieved by the pci bus technology. By becoming a part of the plug & play domain of the host's operating system, no additional data transfer protocols are needed. In this...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Oct 2013

    Mining Functional Dependency from Relational Databases by Removing Redundant Candidates

    Discovery of functional dependencies from relational data base has been identified as an important database analysis technique. In this paper, the authors present a new approach for finding functional dependencies from large databases, based on partitioning the set of rows with respect to their attribute values. The discovery of functional...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2013

    Design of 128- bit Kogge-Stone Low Power Parallel Prefix VLSI Adder for High Speed Arithmetic Circuits

    Parallel prefix adders have been one of the most notable among several designs proposed in the past. The advantage of utilizing the flexibility in implementing the three structures based upon throughput requirements. Due to continuing integrating intensity and the growing needs of portable devices, low-power and high-performance designs are of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Embedded Based Automated Student Attendance Governing System

    In all aspects of the people life, they encounter event recording applications very often. Recording of any entity be it sound, pictures, events etc. is very useful as it enables them to manipulate data to their requirements. One can exploit the full potential of the recorded information for specific user...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Design and Implementation A Digital Sine-Cosine Generator Based FPGA

    The sine and cosine waves are the fundamental building block of communications and signal processing system (modulation, demodulation and FFT spectral analysis). In this paper the authors propose a new way to generate a sine and cosine waves based FPGA. These signals can be used to generate a PWM signals...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2013

    Network Interface Design and Implementation for NoC on FPGA with Advanced Hardware and Networking Functionalities

    As the people are living in a billion transistor era, the number of components on a given chip increases drastically, System on Chip (SoC) architectures become even more powerful. Key to this architecture is the ability to integrate multiple heterogeneous components into a single architecture, which requires modularity and abstraction....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Adaptive Transmission of Data over the Internet

    Internet is a heterogeneous network environment and the network resources that are available to real time applications can be modified very quickly. Today, the underlying infrastructure of the Internet does not sufficiently support Quality of Service (QoS) guarantees. The new technologies, which are used for the implementation of networks, provide...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Communication In USB'S for Data Transfer

    The system enables data sharing between mobile and pen drive directly without using computer or laptop. An arm processor is interfaced USB and USB host controller. Latest mobile phones have got memory capacities GB's and can be connected computers. These mobile phones have capability to get connected to the internet....

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Energy Efficient Partitioning Of Last Level Cache Memory with Cooling Management for Memory and CPU Subsystems

    In this paper the authors present a technique to improve the over-all performance of the multiprocessor chip. Efficient partitioning of last-level cache memory in a multi-processor chip can increase the performance significantly. The concept is to first allocate the fixed number of ways for a core and then forced the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Automatic Fire Sensing and Extinguishig Robot Embedded With GSM Modem

    The authors develop an intelligent multi sensor based fire fighting robot in the people daily life. They design the fire detection system using four flame sensors in the fire fighting robot, and program the fire detection and fighting procedure using sensor based method. The fire fighting robot is equipped with...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    GSM Based Server Control System (SCS) For Better Security of Computer Automation

    Server Control System (SCS) provides remotely controlling approach that allows computer user to control operation on computer from remote location provided the user is authenticated. User does this by carrying out computer operations through GSM modem and SMS technology. This paper also demonstrates on operations related to network and prevent...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2013

    Effective Data Retrieval System with Bloom in a Unstructured p2p Network

    Bloomcast is an efficient and effective full-text retrieval scheme, in unstructured P2P networks. Bloomcast is effective because it guarantees perfect recall rate with high probability. It is efficient because the overall communication cost of full-text search is reduced below a formal bound. Furthermore casting bloom filters instead of raw data...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Feb 2013

    Lossy Image Compression and Data Embedded In Compressed Encrypted Image

    In this paper the authors propose on lossy image compression and data embedded in compressed encrypted image. In this, the original image is compressed by lossy compression method and encrypted using the encryption key. Data is hided into the compressed encrypted image using the data hiding key. If the receiver...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2012

    Implementation of Carry-Save Adders in FPGA

    The addition operations can be optimized through a special purpose carry propagation logic in most of the FPGAs. The delay is same for small size operands and this redundant adders require more hardware resources than carry propagate adders. Therefore, carry-save adders are not usually implemented on FPGA devices, although they...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Aug 2012

    Design & Simulation of Round Robin Arbiter for NoC Architecture

    NOC means network on chip is a new method for on chip communication to solve a problem that challenges system on chip. Arbiter is used in network on chip when number of input are requested for same output port, the arbiter has generate the grant signal on the basis of...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2012

    Development, Integration and Verification of VHDL code for FPGA based Beam Position Measurement Board

    Continuous increase in FPGA capacity, architectural features and performance, along with decrease in cost, results in an ideal solution to hardware system designers. The embedded designer who is serious about increasing performance must consider the FPGAs ability to accelerate the processor performance with dedicated hardware. Although this technique consumes FPGA...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2012

    A High Performance Binary Data Compression Technique Using Low Puncturing Turbo Codes

    Data compression is a key element to improve performance in communications and data storage systems. In this paper, the authors present a distributed coding technique for binary data compression. The performance of the proposed architecture is higher when compared with the existing techniques. The complexity of the traditional encoder is...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2012

    Pipelined Floating-Point Arithmetic Unit (FPU) for Advanced Computing Systems using FPGA

    Field Programmable Gate Arrays (FPGA) is increasingly being used to design high-end computationally intense microprocessors capable of handling both fixed and floating-point mathematical operations. Addition is the most complex operation in a floating-point unit and offers major delay while taking significant area. Over the years, the VLSI community has developed...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    FPGA Based Hardware Implementation of Encryption Algorithm

    Reprogrammable devices such as Field Programmable Gate Arrays (FPGA) are used for hardware implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of Advanced Encryption Standard (AES) with 128-bit key as a constant which is used for encrypting the text file and image for secure transmission. Timing...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Extended Distributed RK- Secure Sum Protocol in Apriori Algorithm for Privacy Preserving

    Secure sum computation is a simple example of secure multi party computation. This provides privacy to data in case more than two parties are present, while finding combined results of individual data. Association rule mining algorithms like apriori are used for mining frequent items from database. In this paper the...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Effective Resource Utilization for Caching as a Service in Cloud

    With the growing popularity of cloud based data centers as the enterprise IT platform of choice, there is a need for effective management strategies capable of maintaining performance. Caching technology improves the performance of the cloud. Cache as a Service (CaaS) model is an additional service to Infrastructure-as-a-Service (IaaS). The...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    Privacy Preserving Data Mining: A Novel Approach to Secure Sensitive Data Based on Association Rules

    The availability of data on the internet is increasing on a larger basis daily. Privacy preservation data mining has emerged to address one of the side effects of data mining technology. The threat to individual privacy through data mining is able to infer sensitive information from non-sensitive information or unclassified...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Apr 2014

    A Robust Clustering Approach Based on KNN and Modified C-Means Algorithm

    Cluster analysis is used for clustering a data set into groups of similar individuals. It is an approach towards to unsupervised learning and is one of the major techniques in pattern recognition. FCM algorithm needs the number of classes and initial values of center for each cluster. These values are...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)

  • White Papers // Jun 2014

    A Reduced Error Pruning Technique for Improving Accuracy of Decision Tree Learning

    Decision tree inductions are well thought-out as it is one of the most accepted approaches for representing classifiers. Many researchers from varied disciplines like statistics, pattern reorganization; machine learning measured the problem of growing a decision tree from available data. Databases are the rich sources of hidden information that can...

    Provided By International Journal of Engineering and Advanced Technology (IJEAT)