International Journal of Engineering and Technology

Displaying 1-40 of 228 results

  • White Papers // Mar 2015

    An Overview of Semi-Supervised Fuzzy Clustering Algorithms

    Fuzzy clustering plays an important role in data-mining, especially in decision making, pattern recognition, etc. There have been many approaches to improve fuzzy clustering performance and quality when it was first introduced by the researcher. Recently, an approach related to data with sub-information has been most concerned. The idea of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2015

    Predictive Models for Equipment Fault Detection in the Semiconductor Manufacturing Process

    Semiconductor manufacturing is one of the most technologically and highly complicated manufacturing processes. Traditional machine learning algorithms such as univariate and multivariate analyses have long been deployed as a tool for creating predictive model to detect faults. In the past decade major collaborative research projects have been undertaken between fab...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2015

    Development of Attribute-Assign-Editor for Road Surface Point Cloud Data

    In recent years, road register has been drawn and recorded in order to determine various road statuses. The data includes road names, investigated data, starting and ending point of the road, the road intersecting point, etc. Importantly, to undergo road maintenance, annual corrections for work and road facilities are necessary....

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2015

    Secure Storage of Data on Android Based Devices

    With the rapid evolvement in the mobile landscape, mobile devices has become one of the integral part of day-to-day activities. It has also become a storage place for all kind of information which includes personal information, photos, videos, work data, and many more. Moreover, the mobile devices are being widely...

    Provided By International Journal of Engineering and Technology

  • White Papers // Feb 2015

    Performance of Coherent Optical OFDM in WDM System Based on QPSK and 16-QAM Modulation through Super channels

    "In this paper, Polarization Division Multiplexing Coherent Optical Orthogonal Frequency-division Multiplexing (PDM CO-OFDM) system is designed with two modulation formats (QPSK and 16-QAM) at 40 and 100Gb/s bit rates to show their linear and nonlinear behavior, and the maximum achievement reach at difference data rate. The system is first simulated...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2015

    Soft Handover in 3G/4G Networks Using Multiple Sector Antennas

    "Cellular technologies are rising up continuously. It supports high speed data transfer, email, web browsing, audio streaming, multimedia and video telephony. A significant characteristic of 3G/4G technologies is the handover which is a key concept to achieve mobility and this occurs when mobile node moves from base station to another;...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2014

    Identification of Hazardous Road Sections: Crash Data versus Composite Index Method

    In current road safety practices, the identification of hazardous road sections are normally based on crash data. However, the information provided by crash data may not be adequate to explain the causal factors that lead to a crash. Therefore, a different kind of road safety indicator that can extensively describe...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2014

    Evaluating the Node Importance in Lifeline Systems Based on Variable Fuzzy Clustering

    Under disasters, the destruction of some key nodes in the lifeline system generally leads to the entire disastrous consequence. In order to increase the reliability of lifeline network by protecting the key nodes in network, the paper proposes a method to identify the key nodes in lifeline systems by evaluating...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2014

    Adaptive Algorithms Based Cross Talk Reduction Techniques Using Efficient Multipliers in VerilogHDL

    Crosstalk is a phenomenon by which signals from one channel interfere with the signals of another. In this paper, the authors have investigated the applications of cross talk elimination in interferometer, telecommunications, biomedicine, etc. to improve the performance in these areas. This paper discusses the various algorithms and techniques used...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2014

    Humanoid Robotic Arm for Tactual Interaction with Industrial Environment by using Mobile

    "In this paper, the authors' aim is to build up a ""Humanoid robotic arm"" from the garbage materials which can support people in their daily life and also in industry. The vital component of such a robot for handling objects is the construction of its arm gripper. The design of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2014

    "Realization of ZRP, AODV and DSR Models Based On Varied Mobility"

    "Mobile hosts use wireless channels to communicate with fixed access points. Under the ad hoc network configuration, nodes are required to cooperate with each other in establishing transmission paths through the network, using the limited capacity and available resources in the best possible way. The motive of all the networking...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2014

    GSM Based Intelligent Home Security System for Intrusion Detection

    "Conventional security systems which are the commonest form of protection to lives and properties, have certain limitations such as real time monitoring and control of activities such as intruders in the form of human beings, fire, smoke, etc. These limitations in most cases result in high financial loss to properties...

    Provided By International Journal of Engineering and Technology

  • White Papers // Sep 2014

    A Proposal of Spatial Indexing Algorithm for Effective Visualization of GIS Based-BIM Data

    The facility maintenance using BIM data reflects a need for maintenance system that considers efficient operation of administrators and managers. This system which takes advantage of the vast amount of 3D facility data is able implement the interoperate navigation and visualization. However, the quick and smooth visualization process for a...

    Provided By International Journal of Engineering and Technology

  • White Papers // Sep 2014

    Cross-Layer Integration Approach for Improving QoS for IPv6 Based VOIP

    "Voice Over IP (VOIP) is today one of the most innovative IP based communication technologies in the telecommunications industry. This has made it to enjoy a high degree of success in its application in small, medium and large scale enterprises, primarily to save cost as well as leveraging on its...

    Provided By International Journal of Engineering and Technology

  • White Papers // Sep 2014

    A Proposed Framework for Ranking and Reservation of Cloud Services

    "With the growth of cloud computing, many organizations started to offer cloud services to various consumers on the basis of their functional and non-functional requirements. Currently there is no software framework which can automatically index cloud providers based on their needs. Due to plethora and the verity of cloud service...

    Provided By International Journal of Engineering and Technology

  • White Papers // Sep 2014

    Optic Fiber as a Reliable Medium for Metropolitan Area Networking (MAN) Connectivity

    "A Metropolitan Area Network (MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN (IEEE Std 802-2002). This paper presents optic fiber...

    Provided By International Journal of Engineering and Technology

  • White Papers // Aug 2014

    TBM Process Data Management System

    Total control of a tunnel project is currently possible with intelligent self-monitoring tools. The implementation of operational parameters of the TBM with other related issues around the construction process provides high quality information useful for the performance improvement. In this paper, the authors present a novel and breakthrough data management...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jul 2014

    FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm

    To solve the existing problems on traditional method of calling function at ultrasonic S-scan coordinate conversion, this paper introduced the FPGA implementation of ultrasonic S-scan coordinate conversion based on Radix-4 CORDIC algorithm. On the analysis of the Radix-4 Rotation CORDIC algorithm, the authors selected 7-level pipeline structure on FPGA used...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jul 2014

    Improved Voice/Data Traffic Performance of Cellular CDMA System

    "More and more wireless subscribers often access the internet through the cellular networks. The Long Range Dependent (LRD) internet data traffic will soon dominate the conventional voice traffic. In this paper, an analytical approach to evaluate the voice/data traffic performance of cellular CDMA system using an SINR based admission control...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2014

    Implementation of Source Routing Protocol in Hierarchical Mobile Ad Hoc Networks

    "A mobile ad hoc network is characterized by constraints such as limited bandwidth, energy constraints, less memory and processing capabilities. Also MANET's are required to be deployed under scalable conditions for some applications. A novel self-organizing hierarchical architecture is proposed for improving the scalability properties of ad-hoc wireless networks. This...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2014

    A Spike Neural Network Design Approach to Reduce Parameters for Evolving Signal Classifiers

    "Spiking neural networks have powerful appeal when it comes to spatio-temporal pattern detection tasks, due to their implicit nature of accepting as well as processing temporally encoded information. However, achieving the dream has proven rather challenging with at least one factor being that the number of tunable parameters grows significantly...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Runtime Monitoring Framework for SQL Injection Attacks

    The increasing use of web applications to provide reliable online services, such as banking, shopping, etc., and to store sensitive user data has made them vulnerable to attacks that target them. In particular, SQL injection, which allows attackers to gain unauthorized access to the database by injecting specially crafted input...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Convolutional Neural Network for Face Recognition with Pose and Illumination Variation

    Face recognition remains a challenging problem till today. The main challenge is how to improve the recognition performance when affected by the variability of non-linear effects that include illumination variances, poses, facial expressions, occlusions, etc. In this paper, robust 4-layer Convolutional Neural Network (CNN) architecture is proposed for the face...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Ontology based Comprehensive Architecture for Service Discovery in Emergency Cloud

    Disasters such as Tsunami, landslides, and cyclones occur frequently and a strong emergency management system is required to manage such situations. These kinds of crisis circumstances are expected to increase in future. The role of Information and communication technology can largely aid in handling calamities and provide first aid support....

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Multi-Level Privacy Preservation Using Rotation Perturbation

    As the amount of data available and shared in the electronic media increases, the threat for its privacy and security also increases. Every organization publishes its data to many recipients for various reasons. Thus preserving the privacy of data during the process of data mining is the aim of Privacy...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Node Cooperation and Message Authentication in Trusted Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are no infrastructure mobile network that relies on the cooperative route dissemination which forwards the packet in short transmission range. This paper involves in increasing the capabilities of node cooperation and message authentication by eliminating the selfish nodes because the selfish nodes are very harmful...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Implementation of Efficient Algorithm for Mining High Utility Itemsets in Distributed and Dynamic Database

    Association Rule Mining (ARM) is finding out the frequent itemsets or patterns among the existing items from the given database. High utility pattern mining has become the recent research with respect to data mining. The proposed paper is high utility pattern for distributed and dynamic database. The traditional method of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    HNPC: Hardware Network Packet Classifier for High Speed Intrusion Detection Systems

    Increasing speed and bandwidth of network traffic and existence of related attacks require the intrusion detection system work in real time. Packet classification is an integrated part of a full featured Network Intrusion Detection System (NIDS). Software solutions are available for the packet classification problem but their performance is not...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    An Approach for Ontology Integration for Personalization with the Support of XML

    Ontological way of knowledge representation is very much useful to the semantic web. In the modernized computer era, there is a need of a special technique for personalization. XML plays an important role in information retrieval systems and XML being a common format for information interpretation, it will be easy...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Mapping Relational Databases into OWL Ontology

    In this paper the authors present an approach of RDF graph generation from relational databases. This approach consists of structures creation of ontology including classes, properties, hierarchy, cardinality and instances creation. This approach not only saves efforts in developing the semantic web but also makes an amount of data in...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Discovery of High Utility Itemsets Using Genetic Algorithm

    Contemporary research in mining high utility itemsets from the databases faces two major challenges: exponential search space and database-dependent minimum utility threshold. The search space is very huge when number of distinct items and size of the database is very large. Data analysts must specify suitable minimum utility thresholds for...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    A Particle Swarm Optimization Based Fuzzy C Means Approach for Efficient Web Document Clustering

    There is a need to organize a large set of documents into categories through clustering so as to facilitate searching and finding the relevant information on the web with large number of documents becomes easier and quicker. Hence the authors need more efficient clustering algorithms for organizing documents. Clustering on...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Performance Evaluation of Multicore Processors

    Multicore processors represent the latest significant development in microprocessor technology. Computer system performance and evaluation deal with the investigation of computer components (both hardware and software) with a view to establish the level of their performances. This paper carried out performance evaluation studies on AMD dual-core and Intel dual-core processor...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Performance Evaluation of Quality Metrics for Single and Multi Cell Admission Control with Heterogeneous Traffic in WCDMA Networks

    Call Admission Control (CAC) is one of the various Radio Resource Management (RRM) congestion control functions in WCDMA systems. A lot of call admission control CAC algorithms are being used to keeping the interference below specific threshold level in order to improve the Quality of Service (QoS) and performance of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Virtual Host Based Intrusion Detection System for Cloud

    Cloud computing is an internet or intranet based computing, where infrastructure, information and application are provisioned based on demand. The major breach in cloud is its security due to its huge extends of resources available in it. The major threats are data loss or leakage and hijacking. This paper presents...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    An Authentication System of Web Services Based on Web Server Log Analysis

    Authentication is a method which validates users' identity prior to permitting them to access the web services. To enhance the security of web services, providers follow varieties of authentication methods to restrict malicious users from accessing the services. This paper proposes a new authentication method which claims user's identity by...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    A Generic Framework to Enhance Two-Factor Authentication in Cryptographic Smart-Card Applications

    Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them increase in large quantity. With the growing use of internet to access information resources, government...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    E-MultiSEC: A New ElGamal Based Asymmetric Authentication Technique for WSNs

    Providing security service in wireless sensor networks using authentication techniques turns out to be a non-trivial task due to network resource constraints. To improve the network security it is often necessary to combine intrusion detection techniques with the key management protocols. Several symmetric key cryptographic solutions proposed earlier are inefficient...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without Using Bilinear Pairings

    Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. The authors have proposed a remote user authentication scheme based on ECC that establish strong authentication with key agreement. As the password verifier table is vulnerable to security attacks and...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2013

    Wireless Sensor Networks for SCADA and Industrial Control Systems

    "In traditional Supervisory Control And Data Acquisition (SCADA) systems, most sensors are wired, which limits their use. Integrating Wireless Sensor Networks (WSNs) with SCADA and industrial control systems would make monitoring more flexible. Integrated SCADA and WSN capabilities raise the possibility of realizing flexible, maintenance-free systems suitable for most industrial...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2010

    Self_USS: A Self Umpiring System for Security in Mobile Ad Hoc Network

    Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of mobile ad hoc networks. In this paper, the authors propose a solution of self-umpiring system that provides security for routing...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Offline Handwritten Signatures Classification using Wavelet Packets and Level Similarity Based Scoring

    Offline signature classification has been extensively studied for many years. The challenge in this area is the correct classification of skilled forgeries which are the result of deliberate practice to imitate the signatures of any person. In this paper, the preprocessed images of genuine handwritten signatures are subjected to analysis...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Embedded Based Conveyance Authentication and Notification System

    Amidst the rapid increase in population and urbanization, the use of automobiles is increasing rapidly. Though there are improved safety and security features with advancement in technology, there are no vehicle regulatory systems that provide automation in vehicle monitoring and act violations. The main objective of this paper is to...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

    MANET is a multi hop wireless network in which the mobile nodes are dynamic in nature. Each node in the network has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped to achieve better stability. Grouping the mobile nodes is called...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Slow Intelligence System Framework to Network Management Problems for Attaining Feasible Solution

    The modern computerized world is controlled by the network. Each and everything is easily accessible to people via media and social network. Provision of purchasing the essential things and home goods via internet online market is available. World becomes quite small, because of network development. This significant growth has increased...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Review on Efficient Mutual Authentication RFID System Security Analysis

    Radio Frequency IDentification, a non-contact data storage and access technology which reads or writes information in RFID tags by receiving radio frequency signals through RFID readers. RFID tags can signal their existence, uniqueness, locality and other user-preferred information through wireless information transfer via radio waves. This paper describes the technical...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Drill System Based Hierarchical Trust Calculation to Detect Selfish Nodes in Wireless Sensor Network

    Wireless Sensor Networks applications are numerous in today's trend. Sensing data, aggregating and forwarding data are prime functions in a sensor network. Sensor nodes have serious constrain like energy, memory, battery, computational power. One of the main issues in sensor network is that nodes get compromised or selfish which results...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Survey on Routing Protocol in Wireless Sensor Network

    The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. WSN are generally used to monitor activities and report events, such as fire, overheating etc. in a specific area or environment. It routs data back to the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Over Speed Violation Management of a Vehicle through ZigBee

    In the present day scenario traffic rules are frequently violated by the drivers and over speeding occur due to bad driving behavior. So, a driver assistance system is provided to prevent over speeding, violation of road rules and also to display alert messages. The proposed system has an alerting, recording...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Comprehensive Overview on Different Network Simulators

    Computer networks are being widely used in all fields of life, net-banking, military operations, disaster relief and social networking. As the usage of various computer networks grows so does the need to make these networks faster, efficient and secure greatly increase. Network simulators are used worldwide for education, commercial and...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Texture Analysis for Recognition of Satellite Cloud Images using Orthogonal Polynomial Model

    The main aim of this paper is to classify the satellite cloud images with high accuracy and good recognition rate using texture as a feature. This paper is based on Orthogonal Polynomial Transformation (OPT) to extort the low level feature like texture. Texture is a central feature especially for classifying...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Analysis of Various Deterioration Factors of Data Aggregation in Wireless Sensor Networks

    In embedded systems, Wireless Sensor Network is the interesting field which provides various applications such as battlefield surveillance, disaster management, habitat monitoring, home automation, health care systems etc. Wireless Sensor Network (WSN) handles a huge number of tiny, cost effective, low powered, autonomous devices called sensor nodes which can perform...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network are event-driven network systems consist of collection of sensor nodes that are deployed to monitor physical and environmental conditions. In Wireless Sensor Network, whenever an event is detected, then the data related to the event need to be sent to the sink node (data collection node). While...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Enhancing Building Security with RFID and ZigBee

    ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Maximizing Network Capacity with Topology Control in Cooperative Communication

    Cooperative Communication becomes apparent as a new scheme of diversity in Mobile Ad-hoc NETworks. Topology control and network capacity are important upper layer issues in considering the performances of a MANETs in cooperative communication. In this paper, the authors put forth the concern of topology control with aspiration of maximizing...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Data Aggregation using Probability Theory for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), generally consists of nodes capable of sensing, processing and transmitting of data, detect and tracks the required information. Recent advances in digital electronics and wireless communication have led to the emergence of WSN's. In WSN for monitoring/obtaining some information, the geographically distributed sensor nodes can cooperate...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Implementing XML-Based Role and Schema Migration Scheme for Clouds

    Cloud computing moves computing and storage tasks from individual systems to the Cloud thereby reducing the burden at user's end. It enables the delivery of hardware and software resources over the Internet as a utility. Cloud computing offers on-demand services with elasticity and scalability on pay per use basis. There...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Comparison of Different Performance Measures of Routing Protocols in WSN

    The emerging trend of Wireless Sensor Networks provides the need for small and low-cost sensor nodes in a wide range of applications. Communication in WSN, are limited within the transmission range, storage and processing capabilities. Data are transmitted with specified delay and energy resources to the sink. Routing protocols are...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Study On Security Protocols In Wireless Sensor Networks

    The extremely un-defendable to attacks which is being composed of hundreds and thousands of tiny sensory nodes with less energy, memory and power is the existence of Wireless Sensor Network. The area covered by WSN application has raised the level of security to the adoption and consumption of sensor networks...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Trust Based Approach for Detection and Isolation of Malicious Nodes in MANET

    A Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in network topology and the absence of centralized administration in management, MANET is vulnerable to attacks from malicious nodes. Nodes can change position quite frequently, which mean the mobility of the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Wavelet and S-Transform Based Spectrum Sensing in Cognitive Radio

    Cognitive Radio is an intellectual radio having the ability of recognizing the vacant spectrum to transmit the data to avoid spectrum inefficiently usage problem. Here CR uses the spectrum policies technique, to spot the existence of user in particular frequency band. In this paper, for efficient spectrum sensing operation, a...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Matched Filter Based Spectrum Sensing on Cognitive Radio for OFDM WLANs

    For the unlicensed users to use the licensed spectrum, unused frequency bands called white spaces need to be detected. Cognitive Radio does this task by dynamic spectrum access. This requires intelligent spectrum sensing techniques. In this paper, such unused spectrum for OFDM WLAN (IEEE 802.11a) is predicted by exploring the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Merging Independent Mobile Adhoc Networks-A New Methodology for Auto-Configuration of IP Addresses

    Auto-configuration of mobile nodes is an important issue on self-organizing Mobile Ad-hoc NETwork. Auto-configuration is needed to identify mobile nodes in the network uniquely. This is a critical problem to assign unique IP addresses to the mobile nodes when two or more than two independent ad-hoc networks merges to form...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    JIAC Systems and Jade Agents Communication

    Many Mobile Agent Systems (MAS) have been developed, but with diverse proprietary Application Programming Interfaces (APIs). This propagation of incompatible APIs implies the complexity of communication and interaction inter-platforms. In a heterogeneous network, an agent may also need to cooperate with agents developed for different platforms. Furthermore, a group of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    On Coverage Analysis for LTE-A Cellular Networks

    In this paper, the authors analyze the coverage area for LTE-A cellular network by taking into account the interference of first tier and frequency reuse planning. They considered the numerical calculations and simulation results to measure the received signal strength at the users for downlink and uplink performances. It has...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Design of Integrated Triple Band-Notched for Ultra-Wideband Microstrip Antenna

    Ultra-WideBand (UWB) is one of the recent topics that received a great concern from academia and industry. However, UWB found many difficulties to be standardized due to the overlay working that made UWB an important potential interference source to many licensed and unlicensed spectrum throughout the band 3.1-to-10.6 GHz. This...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Comparative Analysis of Various Methods for Preprocessing of Satellite Imagery

    A new piecewise polynomial correction method based on the nonlinear variability of distortions in different imaging angles has been discussed in Chunyuan WANG et al. The images obtained by remote sensing systems are not quite often sufficient for high precision applications due to various distortions. The distortions can be divided...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Self Acknowledgeable Intranet Mail System

    Intranet mail system allows members of an organization to send or receive mails among them. But the sender don't know whether the sent mail is viewed by the receiver in time or not, the response for the mail in the receiver side and so on, unless he receive a mail...

    Provided By International Journal of Engineering and Technology

  • White Papers // May 2013

    Information Extraction Using Metadata and Solving Polysemy Problems

    Data mining is the exploration and evaluation of large quantity of data to discover substantial, novel, useful and effectively understandable data. Hence determining the knowledge of a document becomes a necessary task in data mining. There are three approaches of metadata in general. They are stylistic, machine learning and knowledge...

    Provided By International Journal of Engineering and Technology

  • White Papers // Feb 2010

    Mining of Egyptian Missions Data for Shaping New Paradigms

    In this paper, the authors review data mining applications of students' databases in educational institutions. Data mining techniques that predict and improve students ' retention rates and success is presented. Moreover, the Missions Administration at the Ministry of Higher Education in Egypt and previous analysis done on the missions databases...

    Provided By International Journal of Engineering and Technology

  • White Papers // May 2012

    A Simulation Model for the Waterfall Software Development Life Cycle

    Software development life cycle or SDLC for short is a methodology for designing, building, and maintaining information and industrial systems. So far, there exist many SDLC models, one of which is the Waterfall model which comprises five phases to be completed sequentially in order to develop a software solution. However,...

    Provided By International Journal of Engineering and Technology

  • White Papers // Aug 2010

    Evaluating Effectiveness of DSDV Routing Protocol on IEEE 802.11n Wireless LANs

    High-speed Wireless LANs based on 802.11 technologies are becoming increasingly ubiquitous. IEEE 802.11n is the last standard toward achieving higher speeds and aims to enhance 802.11 for higher throughput. Few works studied 802.11n Medium Access Control (MAC) layer, but unfortunately, effects of higher physical rates is still unknown to the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2010

    Automated EB Billing System Using GSM and Ad-Hoc Wireless Routing

    With the passage of time, technology has merged itself with the daily life of humans. The authors have seen so much progress in the field of science and technology but they are not able to make full use of it. One such area for improvement is the Electricity board billing...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Remote Monitoring in Agricultural Greenhouse Using Wireless Sensor and Short Message Service (SMS)

    In traditional method of farming, human labors were required to visit the greenhouse at specific time and need to check the humidity level and temperature level manually. This conventional method is considered time consuming and needs a lot of work and effort. Therefore this research focuses on developing a system...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Leveraged Assortment of Microsoft Technologies: Marching Onwards in the Coming Battle Field of Grid Computing

    The availability of Powerful microprocessors and high-speed networks as commodity components has enabled high-performance computing on distributed systems (wide-area cluster computing) to be more communally adoptable. In this environment, as the resources are usually distributed geographically at various levels, there is a great challenge in integrating, coordinating and present them...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Performance Comparison of Wavelet Packet Modulation and OFDM Over Multipath Wireless Channel With Narrowband Interference

    Orthogonal Frequency Division Multiplexing (OFDM) suffers from high side lobes in transmitted signal which enhance its sensitivity to Inter-Carrier Interference (ICI) and NarrowBand Interference (NBI). In literature, Wavelet Packet Modulation (WPM) has been proposed as an alternative to OFDM. WPM offers much lower side lobes in transmitted signal, which reduce...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Handover Control for Heterogeneous Wireless Access Systems

    The convergence of various wireless access technologies has always been a difficult assignment because of the fact that they have emerged independently. Future vision of wireless world is an integrated network of different wireless access technologies with improved system resources utilization anywhere, anytime. WLANs are expected to complement cellular networks...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2010

    Increasing Bandwidth Dual Frequency Triangular Microstrip Antenna for WiMAX Application

    Patch antenna possesses many advantages such as low profile, light weight, small volume and compability with Microwave Integrated Circuit (MIC) and Monolithic Microwave Integrated Circuit (MMIC). However, the narrow bandwidth is the major obstacle in wide applications for the microstrip antenna. In general, the impedance bandwidth of the traditional microstrip...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2011

    Channel Capacity of MIMO FSO System Under Strong Turbulent Condition

    Free Space Optics (FSO) or optical wireless communication is a promising solution for the need to very high data rate point-to-point communication. In FSO communication links, atmospheric turbulence causes fluctuations in both the intensity and the phase of the received light signal, impairing link performance. This intensity fluctuation, also known...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2011

    A Model for Least Distance Protocol in MANET Using Artificial Intelligence Search Techniques

    Adhoc networks consist of nodes that communicate with each other. However, a node has limited CPU capacity, storage capacity, bandwidth, and battery power. Therefore, the chosen protocol should take all these into consideration. In infrastructure based network, the wireless network uses a specific piece of hardware which is called the...

    Provided By International Journal of Engineering and Technology