International Journal of Engineering and Technology

Displaying 1-40 of 204 results

  • White Papers // Mar 2014

    Runtime Monitoring Framework for SQL Injection Attacks

    The increasing use of web applications to provide reliable online services, such as banking, shopping, etc., and to store sensitive user data has made them vulnerable to attacks that target them. In particular, SQL injection, which allows attackers to gain unauthorized access to the database by injecting specially crafted input...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Implementation of Efficient Algorithm for Mining High Utility Itemsets in Distributed and Dynamic Database

    Association Rule Mining (ARM) is finding out the frequent itemsets or patterns among the existing items from the given database. High utility pattern mining has become the recent research with respect to data mining. The proposed paper is high utility pattern for distributed and dynamic database. The traditional method of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    HNPC: Hardware Network Packet Classifier for High Speed Intrusion Detection Systems

    Increasing speed and bandwidth of network traffic and existence of related attacks require the intrusion detection system work in real time. Packet classification is an integrated part of a full featured Network Intrusion Detection System (NIDS). Software solutions are available for the packet classification problem but their performance is not...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Multi-Level Privacy Preservation Using Rotation Perturbation

    As the amount of data available and shared in the electronic media increases, the threat for its privacy and security also increases. Every organization publishes its data to many recipients for various reasons. Thus preserving the privacy of data during the process of data mining is the aim of Privacy...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Node Cooperation and Message Authentication in Trusted Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are no infrastructure mobile network that relies on the cooperative route dissemination which forwards the packet in short transmission range. This paper involves in increasing the capabilities of node cooperation and message authentication by eliminating the selfish nodes because the selfish nodes are very harmful...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Convolutional Neural Network for Face Recognition with Pose and Illumination Variation

    Face recognition remains a challenging problem till today. The main challenge is how to improve the recognition performance when affected by the variability of non-linear effects that include illumination variances, poses, facial expressions, occlusions, etc. In this paper, robust 4-layer Convolutional Neural Network (CNN) architecture is proposed for the face...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2014

    Ontology based Comprehensive Architecture for Service Discovery in Emergency Cloud

    Disasters such as Tsunami, landslides, and cyclones occur frequently and a strong emergency management system is required to manage such situations. These kinds of crisis circumstances are expected to increase in future. The role of Information and communication technology can largely aid in handling calamities and provide first aid support....

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Performance Evaluation of Multicore Processors

    Multicore processors represent the latest significant development in microprocessor technology. Computer system performance and evaluation deal with the investigation of computer components (both hardware and software) with a view to establish the level of their performances. This paper carried out performance evaluation studies on AMD dual-core and Intel dual-core processor...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without Using Bilinear Pairings

    Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. The authors have proposed a remote user authentication scheme based on ECC that establish strong authentication with key agreement. As the password verifier table is vulnerable to security attacks and...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    E-MultiSEC: A New ElGamal Based Asymmetric Authentication Technique for WSNs

    Providing security service in wireless sensor networks using authentication techniques turns out to be a non-trivial task due to network resource constraints. To improve the network security it is often necessary to combine intrusion detection techniques with the key management protocols. Several symmetric key cryptographic solutions proposed earlier are inefficient...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    A Generic Framework to Enhance Two-Factor Authentication in Cryptographic Smart-Card Applications

    Today, most authenticating applications using passwords are being compromised and the risk is becoming higher because it's becoming easier to download tools that will crack them. Passwords are no longer sufficient, as threats against them increase in large quantity. With the growing use of internet to access information resources, government...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    An Authentication System of Web Services Based on Web Server Log Analysis

    Authentication is a method which validates users' identity prior to permitting them to access the web services. To enhance the security of web services, providers follow varieties of authentication methods to restrict malicious users from accessing the services. This paper proposes a new authentication method which claims user's identity by...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Virtual Host Based Intrusion Detection System for Cloud

    Cloud computing is an internet or intranet based computing, where infrastructure, information and application are provisioned based on demand. The major breach in cloud is its security due to its huge extends of resources available in it. The major threats are data loss or leakage and hijacking. This paper presents...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Discovery of High Utility Itemsets Using Genetic Algorithm

    Contemporary research in mining high utility itemsets from the databases faces two major challenges: exponential search space and database-dependent minimum utility threshold. The search space is very huge when number of distinct items and size of the database is very large. Data analysts must specify suitable minimum utility thresholds for...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    A Particle Swarm Optimization Based Fuzzy C Means Approach for Efficient Web Document Clustering

    There is a need to organize a large set of documents into categories through clustering so as to facilitate searching and finding the relevant information on the web with large number of documents becomes easier and quicker. Hence the authors need more efficient clustering algorithms for organizing documents. Clustering on...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    An Approach for Ontology Integration for Personalization with the Support of XML

    Ontological way of knowledge representation is very much useful to the semantic web. In the modernized computer era, there is a need of a special technique for personalization. XML plays an important role in information retrieval systems and XML being a common format for information interpretation, it will be easy...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2014

    Mapping Relational Databases into OWL Ontology

    In this paper the authors present an approach of RDF graph generation from relational databases. This approach consists of structures creation of ontology including classes, properties, hierarchy, cardinality and instances creation. This approach not only saves efforts in developing the semantic web but also makes an amount of data in...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2013

    Efficient Networking of TINI for Real-Time Weather Data Logging & Deployment over Ethernet and Serial Communication Links

    In this paper, the authors present an efficient technique for the networking of TINI for real-time weather data logging and the deployment of the acquired data over Ethernet and hard-wired serial communication links. An electronic instrumentation system for real-time measurement of three weather parameters (namely: temperature, relative humidity and barometric...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2013

    Deployment of Stream Control Transmission Protocol (SCTP) to Maintain the Application of Data Centers

    With developments of real-time applications into data centers, the need for alternatives of the standard TCP protocol has been prime demand in several applications of data centers. The several alternatives of TCP protocol have been proposed but SCTP has edge due to its several well-built characteristics that make it capable...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2013

    Hard and Soft Embedded FPGA Processor Systems Design: Design Considerations and Performance Comparisons

    In this paper, the authors present a novel and efficient hardware/software co-design techniques for the development of high-performance embedded processor system targeting Field Programmable Gate Arrays (FPGAs). Some very important and critical design considerations for developing FPGA embedded processor systems are first presented. Next, the architectures of the IBM hard-core...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2013

    Finding the Number of Clusters using Visual Validation VAT Algorithm

    Clustering is the process of combining a set of data in such a way that data in the same group are more similar to each other than the groups (clusters). K-means is an algorithm for widely used in clustering techniques. But in this algorithm some of the issues are determined...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2013

    Semantic Web Service Clustering Using Concept Lattice: Multi Agent Based Approach

    Web services is the software functionality or the service functionality which was been exposed in the external world by an abstract interface through the network, described using the standard WSDL language, that was been published by the service provider in UDDI business register office, where the requestors can access their...

    Provided By International Journal of Engineering and Technology

  • White Papers // Nov 2013

    Exclusive-128 Bit NLFSR Stream Cipher for Wireless Sensor Network Applications

    A stream cipher is a common method to protect confidential information from unauthorized person. This kind of cryptosystem is preferred to block ciphers because its implementation in hardware consumes less power and size. Amidst of different stream ciphers, Non-Linear Feedback Shift Register (NLFSR) based one offers the best trade-off between...

    Provided By International Journal of Engineering and Technology

  • White Papers // Aug 2013

    RFID Based Security and Access Control System

    In this paper the authors describe the design of RFID based security and access control system for use in hostels inside the Punjab university premises. The system combines RFID technology and biometrics to accomplish the required task. When the RFID reader installed at the entrance of hostel detects a number,...

    Provided By International Journal of Engineering and Technology

  • White Papers // Aug 2013

    Tradeoffs Between Usability and Security

    Usability and security become a core issue in the designing of modern computer software's. Nevertheless, there are studies have been conducted in different combinatorial ways of these subjects. However, still there is room to improve the relationship in sense of appropriate deployment of these features in software applications. In this...

    Provided By International Journal of Engineering and Technology

  • White Papers // May 2013

    Information Extraction Using Metadata and Solving Polysemy Problems

    Data mining is the exploration and evaluation of large quantity of data to discover substantial, novel, useful and effectively understandable data. Hence determining the knowledge of a document becomes a necessary task in data mining. There are three approaches of metadata in general. They are stylistic, machine learning and knowledge...

    Provided By International Journal of Engineering and Technology

  • White Papers // May 2013

    FDBKaaS: A Cloud Based Multi-Tenant Feedback as a Service

    Cloud computing is a flavor of distributed computing that supports on-demand access to dynamically scalable virtualized resources and services with a pay-per-usage charge model. In this paper, a cloud SaaS based multi-tenant framework for feedback gathering and processing is implemented. The feedback from users helps the organizations to further enhance...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Geo Forensics: Classes of Locational Data Sources for Embedded Devices

    A number of devices, web services and applications are being released with, or updated to be locationally aware. The use of location data can be used for a wide variety of purposes, including navigation, social networking, data mining and providing localized content. This location data has potential for establishing a...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Development of a GSM Based Control System for Electrical Appliances

    In this paper, the authors present the development and implementation of a Global System for Mobile communication (GSM) based control system for electrical appliances that enables the complete control of the interface on which it is based. GSM module was used for receiving Short Message Service (SMS) from user's mobile...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Verification of a Security Adaptive Protocol Suite Using SPIN

    The advancement of mobile and wireless communication technologies in recent years introduced various adaptive protocols to adapt the need for secured communications. Security is a crucial success factor for any communication protocols, especially in mobile environment due to its ad hoc behavior. Formal verification plays an important role in development...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Next Generation Security Framework to Detect Botnets on Computer Networks

    Botnet is one of the most widespread and serious modern malware occurs commonly in today's cyber attacks. A botnet is a group of compromised computers which are remotely controlled by hackers to launch various network attacks, such as DDoS attack, spam, click fraud, identity theft and information phishing. The effort...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    An Invisible Knowledge Network of Strategic Management Studies: Scientometrics and Tag Cloud Analysis

    This paper is to identify the evolution of the intellectual structure of strategic management studies and to propose a theory of an invisible network of knowledge. By analyzing 303,402 citations of 4,616 articles published in SCI and SSCI journals in the strategic management field from year 2003 to year 2012,...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Secure Electronic Transactions (SET): A Case of Secure System Project Failures

    Secure Electronic Transactions (SET) is a security protocol for an electronic payment system that utilizes PKI to address e-commerce security and privacy concerns. Although PKI technologies used by the SET protocol were proven to be effective in addressing security issues in e-commerce, several implementation issues were found from SET applications...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Embedding Secure Programming in the Curriculum: Some Lessons Learned

    Security is a focus in many systems that are developed today, yet this aspect of systems development is often relegated when the shipping date for a software product looms. This leads to problems post-implementation in terms of patches required to fix security defects or vulnerabilities. One answer is that if...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    A New Secure Authenticated Key Agreement Protocol in Gaussian Field

    Authenticated key establishment protocols are designed to provide two or more specified entities communicating over an open network with a shared secret key which may subsequently be used to achieve some cryptographic goal such as confidentiality or data integrity. Secure authenticated key establishment protocols are important as effective replacements for...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Malware Detection Using Computational Biology Tools

    The Internet is considered to be as a rich platform of information where many people get benefit from its access but still they are being attacked by computer malwares and various other threats which distract their normal work flow to be carried out in an efficient manner. In this paper,...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Secure Lightweight Pairing-Based Key-Agreement Cryptosystems: Issues and Challenges

    Although a large number of pairing-based key-agreement cryptosystems have been proposed, there are still a lot of drawbacks. One of the most important disadvantages of mentioned cryptographic functions is that there is not a comprehensive system to satisfy both security and efficiency requirements. Moreover, there is not an integrated document...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    Automated Malware Detection Based on Novel Network Behavioral Signatures

    In this paper, the authors introduce the second generation of the experimental detection framework of AIPS system which is used for experimentation with detection models and with their combinations. Their research aims mainly on detection of attacks that abuse vulnerabilities of buffer overflow type, but the final goal is to...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    A New Secure Protocol for Authenticated Key Agreement

    Authenticated key agreement protocols have an important role in building secure communications between two or more parties over the open network. In this paper, the authors propose an efficient and secure authenticated key agreement protocol based on RSA factoring and Discrete Logarithm Problem (DLP). They try to design strong protocol...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2013

    A Scalable, Privacy-Preserving and Secure RFID Protocol

    In this paper, the authors propose a communication protocol for Radio Frequency IDentification (RFID) systems that is based on the tags responding only to authenticated readers, otherwise tags always maintain RF silence. The protocol is practical from a deployment point of view and it not only meets the formal definitions...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Comparative Analysis of Various Methods for Preprocessing of Satellite Imagery

    A new piecewise polynomial correction method based on the nonlinear variability of distortions in different imaging angles has been discussed in Chunyuan WANG et al. The images obtained by remote sensing systems are not quite often sufficient for high precision applications due to various distortions. The distortions can be divided...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Self Acknowledgeable Intranet Mail System

    Intranet mail system allows members of an organization to send or receive mails among them. But the sender don't know whether the sent mail is viewed by the receiver in time or not, the response for the mail in the receiver side and so on, unless he receive a mail...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Offline Handwritten Signatures Classification using Wavelet Packets and Level Similarity Based Scoring

    Offline signature classification has been extensively studied for many years. The challenge in this area is the correct classification of skilled forgeries which are the result of deliberate practice to imitate the signatures of any person. In this paper, the preprocessed images of genuine handwritten signatures are subjected to analysis...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Embedded Based Conveyance Authentication and Notification System

    Amidst the rapid increase in population and urbanization, the use of automobiles is increasing rapidly. Though there are improved safety and security features with advancement in technology, there are no vehicle regulatory systems that provide automation in vehicle monitoring and act violations. The main objective of this paper is to...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

    MANET is a multi hop wireless network in which the mobile nodes are dynamic in nature. Each node in the network has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped to achieve better stability. Grouping the mobile nodes is called...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Slow Intelligence System Framework to Network Management Problems for Attaining Feasible Solution

    The modern computerized world is controlled by the network. Each and everything is easily accessible to people via media and social network. Provision of purchasing the essential things and home goods via internet online market is available. World becomes quite small, because of network development. This significant growth has increased...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Review on Efficient Mutual Authentication RFID System Security Analysis

    Radio Frequency IDentification, a non-contact data storage and access technology which reads or writes information in RFID tags by receiving radio frequency signals through RFID readers. RFID tags can signal their existence, uniqueness, locality and other user-preferred information through wireless information transfer via radio waves. This paper describes the technical...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Drill System Based Hierarchical Trust Calculation to Detect Selfish Nodes in Wireless Sensor Network

    Wireless Sensor Networks applications are numerous in today's trend. Sensing data, aggregating and forwarding data are prime functions in a sensor network. Sensor nodes have serious constrain like energy, memory, battery, computational power. One of the main issues in sensor network is that nodes get compromised or selfish which results...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Survey on Routing Protocol in Wireless Sensor Network

    The Wireless Sensor Network (WSN) is a wireless network consisting of ten to thousand small nodes with sensing, computing and wireless communication capabilities. WSN are generally used to monitor activities and report events, such as fire, overheating etc. in a specific area or environment. It routs data back to the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Over Speed Violation Management of a Vehicle through ZigBee

    In the present day scenario traffic rules are frequently violated by the drivers and over speeding occur due to bad driving behavior. So, a driver assistance system is provided to prevent over speeding, violation of road rules and also to display alert messages. The proposed system has an alerting, recording...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Comprehensive Overview on Different Network Simulators

    Computer networks are being widely used in all fields of life, net-banking, military operations, disaster relief and social networking. As the usage of various computer networks grows so does the need to make these networks faster, efficient and secure greatly increase. Network simulators are used worldwide for education, commercial and...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Texture Analysis for Recognition of Satellite Cloud Images using Orthogonal Polynomial Model

    The main aim of this paper is to classify the satellite cloud images with high accuracy and good recognition rate using texture as a feature. This paper is based on Orthogonal Polynomial Transformation (OPT) to extort the low level feature like texture. Texture is a central feature especially for classifying...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Analysis of Various Deterioration Factors of Data Aggregation in Wireless Sensor Networks

    In embedded systems, Wireless Sensor Network is the interesting field which provides various applications such as battlefield surveillance, disaster management, habitat monitoring, home automation, health care systems etc. Wireless Sensor Network (WSN) handles a huge number of tiny, cost effective, low powered, autonomous devices called sensor nodes which can perform...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Study on Traffic Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network are event-driven network systems consist of collection of sensor nodes that are deployed to monitor physical and environmental conditions. In Wireless Sensor Network, whenever an event is detected, then the data related to the event need to be sent to the sink node (data collection node). While...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Enhancing Building Security with RFID and ZigBee

    ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Maximizing Network Capacity with Topology Control in Cooperative Communication

    Cooperative Communication becomes apparent as a new scheme of diversity in Mobile Ad-hoc NETworks. Topology control and network capacity are important upper layer issues in considering the performances of a MANETs in cooperative communication. In this paper, the authors put forth the concern of topology control with aspiration of maximizing...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Data Aggregation using Probability Theory for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), generally consists of nodes capable of sensing, processing and transmitting of data, detect and tracks the required information. Recent advances in digital electronics and wireless communication have led to the emergence of WSN's. In WSN for monitoring/obtaining some information, the geographically distributed sensor nodes can cooperate...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Implementing XML-Based Role and Schema Migration Scheme for Clouds

    Cloud computing moves computing and storage tasks from individual systems to the Cloud thereby reducing the burden at user's end. It enables the delivery of hardware and software resources over the Internet as a utility. Cloud computing offers on-demand services with elasticity and scalability on pay per use basis. There...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Comparison of Different Performance Measures of Routing Protocols in WSN

    The emerging trend of Wireless Sensor Networks provides the need for small and low-cost sensor nodes in a wide range of applications. Communication in WSN, are limited within the transmission range, storage and processing capabilities. Data are transmitted with specified delay and energy resources to the sink. Routing protocols are...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Study On Security Protocols In Wireless Sensor Networks

    The extremely un-defendable to attacks which is being composed of hundreds and thousands of tiny sensory nodes with less energy, memory and power is the existence of Wireless Sensor Network. The area covered by WSN application has raised the level of security to the adoption and consumption of sensor networks...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    A Trust Based Approach for Detection and Isolation of Malicious Nodes in MANET

    A Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in network topology and the absence of centralized administration in management, MANET is vulnerable to attacks from malicious nodes. Nodes can change position quite frequently, which mean the mobility of the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Wavelet and S-Transform Based Spectrum Sensing in Cognitive Radio

    Cognitive Radio is an intellectual radio having the ability of recognizing the vacant spectrum to transmit the data to avoid spectrum inefficiently usage problem. Here CR uses the spectrum policies technique, to spot the existence of user in particular frequency band. In this paper, for efficient spectrum sensing operation, a...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Matched Filter Based Spectrum Sensing on Cognitive Radio for OFDM WLANs

    For the unlicensed users to use the licensed spectrum, unused frequency bands called white spaces need to be detected. Cognitive Radio does this task by dynamic spectrum access. This requires intelligent spectrum sensing techniques. In this paper, such unused spectrum for OFDM WLAN (IEEE 802.11a) is predicted by exploring the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Merging Independent Mobile Adhoc Networks-A New Methodology for Auto-Configuration of IP Addresses

    Auto-configuration of mobile nodes is an important issue on self-organizing Mobile Ad-hoc NETwork. Auto-configuration is needed to identify mobile nodes in the network uniquely. This is a critical problem to assign unique IP addresses to the mobile nodes when two or more than two independent ad-hoc networks merges to form...

    Provided By International Journal of Engineering and Technology

  • White Papers // May 2013

    Information Extraction Using Metadata and Solving Polysemy Problems

    Data mining is the exploration and evaluation of large quantity of data to discover substantial, novel, useful and effectively understandable data. Hence determining the knowledge of a document becomes a necessary task in data mining. There are three approaches of metadata in general. They are stylistic, machine learning and knowledge...

    Provided By International Journal of Engineering and Technology

  • White Papers // Feb 2010

    Mining of Egyptian Missions Data for Shaping New Paradigms

    In this paper, the authors review data mining applications of students' databases in educational institutions. Data mining techniques that predict and improve students ' retention rates and success is presented. Moreover, the Missions Administration at the Ministry of Higher Education in Egypt and previous analysis done on the missions databases...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    JIAC Systems and Jade Agents Communication

    Many Mobile Agent Systems (MAS) have been developed, but with diverse proprietary Application Programming Interfaces (APIs). This propagation of incompatible APIs implies the complexity of communication and interaction inter-platforms. In a heterogeneous network, an agent may also need to cooperate with agents developed for different platforms. Furthermore, a group of...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    On Coverage Analysis for LTE-A Cellular Networks

    In this paper, the authors analyze the coverage area for LTE-A cellular network by taking into account the interference of first tier and frequency reuse planning. They considered the numerical calculations and simulation results to measure the received signal strength at the users for downlink and uplink performances. It has...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2013

    Design of Integrated Triple Band-Notched for Ultra-Wideband Microstrip Antenna

    Ultra-WideBand (UWB) is one of the recent topics that received a great concern from academia and industry. However, UWB found many difficulties to be standardized due to the overlay working that made UWB an important potential interference source to many licensed and unlicensed spectrum throughout the band 3.1-to-10.6 GHz. This...

    Provided By International Journal of Engineering and Technology

  • White Papers // Apr 2010

    Self_USS: A Self Umpiring System for Security in Mobile Ad Hoc Network

    Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of mobile ad hoc networks. In this paper, the authors propose a solution of self-umpiring system that provides security for routing...

    Provided By International Journal of Engineering and Technology

  • White Papers // Aug 2010

    Evaluating Effectiveness of DSDV Routing Protocol on IEEE 802.11n Wireless LANs

    High-speed Wireless LANs based on 802.11 technologies are becoming increasingly ubiquitous. IEEE 802.11n is the last standard toward achieving higher speeds and aims to enhance 802.11 for higher throughput. Few works studied 802.11n Medium Access Control (MAC) layer, but unfortunately, effects of higher physical rates is still unknown to the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Remote Monitoring in Agricultural Greenhouse Using Wireless Sensor and Short Message Service (SMS)

    In traditional method of farming, human labors were required to visit the greenhouse at specific time and need to check the humidity level and temperature level manually. This conventional method is considered time consuming and needs a lot of work and effort. Therefore this research focuses on developing a system...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Leveraged Assortment of Microsoft Technologies: Marching Onwards in the Coming Battle Field of Grid Computing

    The availability of Powerful microprocessors and high-speed networks as commodity components has enabled high-performance computing on distributed systems (wide-area cluster computing) to be more communally adoptable. In this environment, as the resources are usually distributed geographically at various levels, there is a great challenge in integrating, coordinating and present them...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Performance Comparison of Wavelet Packet Modulation and OFDM Over Multipath Wireless Channel With Narrowband Interference

    Orthogonal Frequency Division Multiplexing (OFDM) suffers from high side lobes in transmitted signal which enhance its sensitivity to Inter-Carrier Interference (ICI) and NarrowBand Interference (NBI). In literature, Wavelet Packet Modulation (WPM) has been proposed as an alternative to OFDM. WPM offers much lower side lobes in transmitted signal, which reduce...

    Provided By International Journal of Engineering and Technology

  • White Papers // Oct 2009

    Handover Control for Heterogeneous Wireless Access Systems

    The convergence of various wireless access technologies has always been a difficult assignment because of the fact that they have emerged independently. Future vision of wireless world is an integrated network of different wireless access technologies with improved system resources utilization anywhere, anytime. WLANs are expected to complement cellular networks...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2010

    Increasing Bandwidth Dual Frequency Triangular Microstrip Antenna for WiMAX Application

    Patch antenna possesses many advantages such as low profile, light weight, small volume and compability with Microwave Integrated Circuit (MIC) and Monolithic Microwave Integrated Circuit (MMIC). However, the narrow bandwidth is the major obstacle in wide applications for the microstrip antenna. In general, the impedance bandwidth of the traditional microstrip...

    Provided By International Journal of Engineering and Technology

  • White Papers // Dec 2010

    On Two Dimensional Cellular Automata and Its VLSI Applications

    It is evident from the literature that very little work has been done to analyze and characterize 2D Cellular Automata. In addition, the randomness properties of 1D CA have been explored at lot. Keeping in view that the extended neighborhood in 2D CA, it is possible to explore the randomness...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2012

    Analysis of View Selection Problem in Data Warehousing Environment

    A Data Warehouse (DW) can be seen as a set of materialized views defined over the source relations. During the initial design and evolution of a DW, the DW designer is faced, on many occasions, with the problem of selecting views to materialize in the DW. This paper presents the...

    Provided By International Journal of Engineering and Technology

  • White Papers // Jan 2012

    SMS Based Secure Mobile Banking

    M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services. Current M-banking applications used by banks are facing security...

    Provided By International Journal of Engineering and Technology

  • White Papers // Mar 2012

    Attack Detection and Classification of Heterogeneous Wireless Sensors Using Co-Clustering

    In a Wireless Sensor Network a large number of sensors are deployed for the purpose of sensing data and then to bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the...

    Provided By International Journal of Engineering and Technology