International Journal of Engineering Research and Applications (IJERA)

Displaying 1-40 of 748 results

  • White Papers // Feb 2015

    Achieving High Performance Distributed System: Using Grid, Cluster and Cloud Computing

    To increase the efficiency of any task, the authors require a system that would provide high performance along with flexibilities and cost efficiencies for user. Distributed computing, as they are all aware, has become very popular over the past decade. Distributed computing has three major types, namely, cluster, grid and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2015

    Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing

    Cloud works as an online storage servers and provides long term storage services over the internet. It is like a third party in whom the user can store a data so they need data confidentiality, robustness and functionality. Encryption and encoding methods are used to solve such problems. After that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2015

    Performance Evaluation and Simulation of OFDM in Optical Communication Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is of prime importance now-a-days in long haul communication networks because of its higher spectral efficiency, immunity to multipath fading and its resilience to interference. Optical orthogonal frequency division multiplexing is considered as a promising technology to satisfy the increased demand for bandwidth in broadband...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2015

    Flexible Broadcasting of Scalable Video Streams in Broadband Wireless System

    In this paper, the authors present a novel cross-layer optimization framework to improve the Quality Of user Experience (QOE) and energy efficiency of the heterogeneous wireless multimedia broadcast receivers. User grouping is based on the respective UE resolution capabilities and received SNR. A UE capability is determined by the BS...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2015

    Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Routing Protocols to Mobile Nodes Networks

    Wireless Sensor Networks (WSNs) are increasingly used in data-intensive applications such as micro-climate monitoring, precision agriculture and audio/video surveillance. A key challenges faced by data-intensive WSNs is to transmit all the data generated with an application's lifetime to the base station despite the fact that sensor nodes have limited power...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2015

    Development of User-Friendly Software to Design Dairy Heat Exchanger and Performance Evaluation

    In this paper, the authors propose a calculation algorithm and development of a software in Visual Basic (Visual Studio 2012 express desktop) used in heat transfer studies when different heat exchangers are involved (e.g. helical type triple tube heat exchanger, plate type heat exchanger). It includes the easy calculation of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Robust Encryption Algorithm for Zigbee Communication

    Zigbee Technology was developed for Wireless Personnel Area Networks (WPAN), aimed at control of military applications with high security. To provide the security in Zigbee networks cryptography technique is used. Cryptography performs encryption operation before transmitting the data. Zigbee networks use stream cipher encryption mechanism. Several new stream cipher cryptography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Enhancing the Security of Information Using Bit Plane Complexity Segmentation

    Security of secret information can be increased by hiding the data. Protecting the contents of the secret information from intruders is the main challenge. The old technique Steganography can be used to hide the data. In steganography the data can be hidden in the image and the authors can transmit...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Cluster Head Selection Scheme Using Fuzzy Based Prediction for Wireless Sensor Networks Based on Leach-Ere Algorithm

    Clustering, an energy efficient approach is used in Wireless Sensor Network (WSN). Clustering involves cluster formation and cluster head selection. As the cluster head is involved in carrying out the entire communication, a high energy node has to be selected as cluster head. Current clustering approaches often use two methods:...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Finger Vein Pattern Based Authentication (Some Investigations)

    The ability to identify the individuals uniquely will be crucial for security reasons. In the recent days, identification based on biometric features is widely used for authentication purposes. Finger vein is one of the biometric features which are unique even to the identical twins. An investigation on finger vein pattern...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Design of Simulink Model for OSTBC and Performance Evaluation of Ieee 802.16 OFDM Phy Link with and Without Space-Time Block Coding for Wireless Communication

    Because of the rapid growth of digital communication in recent years, the need for high speed data transmission is increased. Orthogonal Frequency Division Multiplexing (OFDM) technique is suitable for high speed communication because of its resistance to ISI (Inter-Symbol Interference) and it utilizes the bandwidth efficiently. OSTBCs are an attractive...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    An Enhanced Smart Wireless Sensor Network Based Intelligent Building Monitoring System

    In this paper, the authors describe an application of Wireless Sensor Network (WSN) in monitoring and controlling of energy in residential and commercial buildings. In this paper, the authors design two electronic nodes including sensor node, and coordinator node. In the application layer, user friendly software is designed to control...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    A Secured Approach for ID Authentication System Using RFID and Fingerprint Technology

    Authentication is a fundamental issue to any trust-oriented computing system and also a critical part in many security protocols. In addition, authentication also serves as the first step for many other security purposes, such as key management and secure group communication. Passwords or smartcards have been the most widely used...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Intelligent Vehicle Control Based on Identification of Road and Traffic Signal Operated RFID Transponders

    In this paper, the authors' deal with automatic detection of red light traffic signals or vehicle speed limit signs on roads by using RFID technology to control an automobile. In the present scenario traffic violations are increasing rapidly. It gives rise to major problems which are beyond human control directly...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Security Threat Prevention for Voip Networks

    With the development of computing technology, Voice over Internet Protocol (VoIP) has been established as an alternative to carry out a telephone conversation over a data network. VoIP products promise converged telecommunication and data services that are cheaper, more versatile and provide good quality and security as compared to traditional...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Wireless Body Area Networks

    Recent developments and technological advancements in wireless communication, Micro Electro Mechanical Systems (MEMS) technology and integrated circuits has enabled low-power, intelligent, miniaturized, invasive/non-invasive micro and nano-technology sensor nodes strategically placed in or around the human body to be used in various applications, such as personal health monitoring. This exciting new...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Concerning a Numerous-Hop, Numerous-Path Fault-Tolerant and Load Balancing Stratified Routing Protocol for Wireless Sensor Network

    In this paper, the authors describe a novel energy-aware numerous-hop cluster-based fault-tolerant load balancing stratified routing protocol for a self-organizing Wireless Sensor Network (WSN), which takes into account the broadcast nature of radio. The main idea is using stratified fuzzy soft clusters enabling non-exclusive overlying clusters, thus allowing partial numerousple...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Fuzzy Technique for Software Development Test Effort Estimation

    The software are more complex and size of software increased many folds with additional functionality enhancements on the same way the complication of testing as well as the types of testing changes and new testing tools are available in the software industries. As a result, there is a major shift...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Privacy Preserving of Secured Data in Cloud

    Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover, users should be capable to use the cloud storage as if it is local without perturbing about the need to validate...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Processing and Regaining Storage of Secured Data in Cloud

    Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Performance Analysis and Prevention of Real Time Intrusion

    Intrusion detection and prevention system represents an essential line of defense against variety of web attacks that can compromise with the security and proper functioning of the entire security system. With the evolution of internet, possibilities and opportunities are limitless, unfortunately, so too are the risks and chances of malicious...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Seclusion-Preserving as Well as Substance-Protective Position Based Queries

    The recent technology drive in communications, positioning and geographical systems opens novel location based applications on current good phones. Good phone users need to disclose their identity to substance suppliers to accesses these position based services. In spite of tremendous edges offered by these apps, User Privacy is compromised. During...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Complete Tracking of Vehicles Using GPS Technology

    Now-a-days without transportation the people won't live in this world. May be the transport for personal use or for public use. In transportation most of time the users need information about vehicles for example: government transport vehicles for public service, college bus transportation, personal vehicles etc. Why is it necessary...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Detection and Prevention of Misrouting and Colluding Collision Attacks in Wireless Adhoc Networks

    Wireless ad-hoc networks are composed of autonomous nodes that are self-manage with none infrastructure. During this method, ad-hoc networks have a dynamic topology such nodes will simply be part of or leave the network at any time. In several applications like underground mining, military and navy, wireless ad-hoc networks play...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Device Tracking Using GSM/Satellite Network Coverage

    When people are out of station or family member are out of home there is need for real time tracking system for their safety. Now-a-days, mobile phones have capability to give geographical position in real time, by using Global Positioning System (GPS) service. GPS based device tracking has been proven...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Low Power Wireless Sensor Network for Building Monitoring

    A wireless sensor network is proposed for monitoring buildings to assess earthquake damage. The sensor nodes use custom-developed capacitive micro electro mechanical systems strain and 3-D acceleration sensors and a low power readout application-specified integrated circuit for a battery life of up to 12 years. The strain sensors are mounted...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Implementation of Wireless Sensor Networks for Industrial Applications Using The Multi-Core Architecture

    Advancements in silicon technology, embedded systems, sensors, micro-electro-mechanical systems, and wireless communications have led to the emergence of Embedded Wireless Sensor Networks (EWSNs). EWSNs consist of sensor nodes with embedded sensors to sense data about a phenomenon and these sensor nodes communicate with neighboring sensor nodes over wireless links (The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Traffic Sign Recognition for Computer Vision Project-Based Learning

    The authors' system is designed by using ARM 32-bit micro controller which supports different features and algorithms for the development of automotive vision systems. Here, the camera is connected to ARM controller. The camera will capture traffic sign & colors and send the information to controller. While driving if any...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Compact Microstrip Patch Antenna for Dual Band WLAN

    Wireless Local Area Network (WLAN) is one of the most widely used technologies in today's world. It is recognized as a reliable and cost effective solution for wireless high speed data connectivity. THE Wireless Local Area Networks (WLANs) working at IEEE 802.11a employs the higher frequency band 5.15-5.35GHz band and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Security Issues in Mobile Banking Using Cloud Based Services

    With the rapid growth of mobile users and they are converting to use mobile phones for banking applications instead of using personnel computers. Mean while mobile computing is changing the landscaper of mobile banking application as the future of the mobile. However, mobile cloud computing still facing the security issues,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Flexible and Scalable Access Control Set Based Encryption in Cloud Computing (FSC)

    Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. Clouds can be classified as public, private or hybrid. Several schemes employing on cloud for data access. An attribute-based encryption had been proposed for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Homomorphic Encryption Applied on Cloud

    Cloud computing is something that businesses have long been talking about, and in the recent past, many organization have adopted cloud technologies. A highly virtualized data centre environment, with high degrees of automation and the ability to seamlessly move between on and off premise infrastructure is the optimal architecture for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Advanced Sharing Reliable Data in the Cloud for the Multi User Group

    Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud computing platforms. Moreover, the lack of security constraints in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks

    With the next-generation cellular networks making a transition toward smaller cells, two-hop Orthogonal Frequency Division Multiple Access (OFDMA) relay networks have become a dominant, mandatory component in the 4G standards (WiMAX 802.16j, 3GPP LTE-Adv). While unicast flows have received reasonable attention in two-hop OFDMA relay networks, not much light has...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Secure Data Retrieval for Decentralized Disruption Tolerant Military Network

    In the large number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the regular medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

    Cloud computing is emerging as a prevalent data interactive paradigm to realize users' data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Captcha as Graphical Passwords (Security Primitive Based on Hard Ai Problems)

    Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. In this paper, the authors present a new security primitive based on hard AI problems, namely, a novel family of graphical password systems built...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Component Based Software Engineering Systems

    Component based software engineering is one of the major advancement in the field of software engineering. It is a process that emphasizes the design and construction of computer based systems using reusable software components. It provides the methodology of developing very large software systems. It supports both the Commercial-off-the-shelf and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Resource Allocation Using Virtual Machines for Cloud Computing

    Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, the authors present a system that uses virtualization technology to allocate data center resources dynamically...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    A Survey on Network Security Mechanism

    Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Cloud Audit Service Outsourcing by Using KAC for Data Storage Security

    Cloud computing is recognized as an alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. With proven security relied on number theoretic assumptions are more desirable, whenever the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Privacy-Preserving Back Propagation Neural Network Learning In Signature Scheme

    Cloud computing allows their clients to share data. Multiple parties may join through conducting joint Back propagation neural network learning on the union of their respective data sets. During this process no party wants to disclose the user private data to others. Existing schemes supporting this kind of collaborative learning...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Enhancing Downloading Time By Using Content Distribution Algorithm

    A traditional model in Peer-To-Peer (P2P) content distribution is that of a large community of intermittently connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P community must replicate and replace files as a function of their popularity to achieve satisfactory performance. In this paper, the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    An Enhanced Novel Approach For Distributed Document Clustering

    In an era of scientific progression, challenges in the field of Information Retrieval (IR) are wide spread and is so tedious to fathom, due to the increased usage of mass volumes of data. Hence, scalability and efficiency are the two main constraints when it pertains to IR from large complex...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    FAST: A New Novel Feature Selection Algorithm for Large Datasets

    In this paper, the author is to select the relevant features from the large data sets. Now-a-days, feature selection is one of the major problems in the learning algorithm, decision tree making, etc. for the efficient selection of relevant or redundant feature is done by the FAST algorithm. So many...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Feature Based Data Stream Classification (FBDC) and Novel Class Detection

    Data stream classification poses many challenges to the data mining community. Here, this paper solves all the challenges such as infinite length, concept-drift, concept-evolution, and feature-evolution. Since, a data stream is theoretically infinite in length, it is impractical to store and use all the historical data for training. Concept-drift is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing

    Cloud computing has emerged as one of the most influential paradigms in the IT industry. In this, new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing Attribute-Based Encryption (ABE) have been proposed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Reliable Storage Services and Avoidance of Integrity Problems in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Although the cloud infrastructures are much more powerful and reliable than personal computing devices, broad range of internal and external threats for data integrity...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Efficient and Advance Routing Logic for Network on Chip

    VLSI technology has improved in integrating several Intellectual Properties (IP's) on the same chip. Connections between these IP's are the major issue and the Network-on-Chip (NoC) plays an important role in connecting these IP's. NoC has a high level of modularity, flexibility and throughput. The NoC comprises of routers, network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Secure Multiparty Computation and Privacy Preserving Data Sharing With Anonymous ID Assignment

    Sharing of private data among N parties was developed by using anonymous sharing. Each member in the group has specific anonymous id. Id received is unknown to the other members of the group. Anonymous ID Assignment algorithm (AIDA) is utilized for this approach. Serial number allows more complex data to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Dynamic Virtual Resource Management in Cloud Computing Environment

    Cloud computing is the latest technology used by many organizations in this competitive world. As many organizations are using this technology, the major issue is efficient resource provisioning and management because of the dynamic nature of the cloud and the need to satisfy heterogeneous resource requirements. In this paper, the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Private Data Transferring Among ~N~ Nodes in a Group by Using Anonymous ID Assignment

    To overcome the problems in privacy preserving data mining, collision in communications, distributed database access in the wireless communications, the secure sum algorithm is used. This algorithm is also used to provide secure data transmission among 'N' parties in a group by assigning ID numbers ranging from 1 to N....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Different Techniques to Transfer Big Data: A Survey

    Now-a-days the world is moving around the social networks, i.e. most of the people are interacting with each other via internet only. Transmitting data via the Internet is a routine and common task for users today. Transferring a gigabyte of data in an entire day was normal; however, users are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Personal Identification and Verification Using Multimodal Biometrics

    In this paper, the authors present an overview of the fundamentals of personal authentication based on hand geometry measurements and palm print features. Researchers have used some complex methods or algorithms like Quadratic Spline function of Wavelet transform (QSW), voronoi diagram, Gaussian Mixture Model (GMM), Radial Basis Function neural networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2013

    Identity Verification of Newborn Using Biometrics

    A proper identity verification system for newborns is a requisite in the current scenario. The various crimes against newborns' like illegal adoptions (intentionally, accidentally); missing, swapping and child trafficking are on a rise. The proposed system uses biometrics to prevent such acts by using the footprint trait of the newborn....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    A Two-Way Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Analysis of Process Mining Model Using Frequentgroup Based Noise Filtering Algorithm

    Process mining is a process management system used to analyze business processes based on event logs. The knowledge is extracted from event logs by using knowledge retrieval techniques. The process mining algorithms are capable of automatically discover models to give details of all the events registered in some log traces...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Association Rule Mining in Distributed Environment

    Association rule mining is an important term in data mining. Association rule mining generates important rules from the data. These rules are called frequent rules and the whole concept is known as frequent rule mining. Earlier this technique was used to be implemented at local machines to generate rule. But...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Analyzing Performance for Mutual Authentication Mechanism for Wimax: IEEE 802.16e

    The IEEE 802.16 designed to operate in the 10-66 GHz spectrum and it specifies the PHYsical layer (PHY) and Medium Access Control layer (MAC) of the air interface BWA systems. At 10-66 GHz range, transmission requires Line-Of-Sight (LOS). IEEE 802.16 is working group number 16 of IEEE 802, specializing in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    An Overview of Android Operating System and Its Security Features

    Android mobile operating system is based on the Linux kernel and is developed by Google. Android operating system is one of the most widely used operating system these days. Android Operating System is mainly divided into four main layers: the kernel, libraries, application framework and applications. Its kernel is based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Assessment of Efficacy Among String Quest

    Data mining also known as Knowledge Discovery or Knowledge Discovery in Database (KDD), is the process of extracting or mining the data from large amount of databases. In a large spatial database the work mainly deals with the approximate string search. Particularly, the authors examine the query range append with...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Data Sharing Using Cloud Information Accountability Framework

    Cloud computing is the use of computing resources(Hardware & Software) that are delivered as a service over a network (typically the internet). Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Unlike privacy protection technologies, information accountability focuses on keeping the data usage transparent and traceable. The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Providing Authentication in Wireless Network to Prevent Jamming Attacks

    Wireless and mobile networks represent an increasingly important segment of networking research as a whole, driven by the rapid growth of portable computing, communication and embedded devices connected to the internet. Goal of the process is to bring privacy in any conversation between nodes in a network and to provide...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    A Privacy Preserving Approach to Analyze Security in Voip System

    Pre-processing of Speech Signal serves various purposes in any speech processing application. It includes Noise Removal, Endpoint Detection, Pre-emphasis, Framing, Windowing, Echo Canceling etc. Out of these, silence portion removal along with endpoint detection is the fundamental step for applications like Speech and Speaker Recognition. The proposed method uses multi-layer...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Honeyweb: A Web-Based High Interaction Client Honeypot

    Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Performance Evaluation of IEEE 802.16e (Mobile WiMAX) in OFDM Physical Layer

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is standard designated 802.16d-2004 (used in fixed wireless applications) and 802.16e-2005 (mobile wireless) to provide a worldwide interoperability for microwave access. At present, telecommunication industries are highly concerned with the wireless transmission of data which can use...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    An Improved Mesh Network for Massively Parallel Computers

    Mesh is one of the well-known interconnection networks among the parallel architectures in massively parallel computers. Simple and efficient parallel algorithm has been devised for efficient execution on it. The authors propose a new class of parallel architectures that can reduce the cost of the network without affecting the complete...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    An Algorithm for Fingerprint Enhancement & Matching

    Minutiae pattern remains a widely used representation of a fingerprint most fingerprint recognition techniques are based on minutiae matching and have been well studied. However, this technology still suffers from problems associated with the handling of poor quality impressions. One problem besetting fingerprint matching is distortion. Distortion changes both geometric...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Mitigating the Effect of CCI and Multipath in Mobile Communication Using Smart Antenna

    In mobile communication systems, capacity and performance of network are usually limited by two major impairments. They are multipath and co-channel interference. Smart antenna is one of the most promising technologies that will enable a higher capacity in wireless networks by effectively reducing multipath and co-channel interference Smart Antenna use...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Detection in Video Streams

    Object detection is the most challenging area in video surveillance that is one part of multimedia mining. Its task is to detect the object of interest in video. The wide application of this is in field like security, criminology etc. In this paper background elimination technique is used to identify...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Path Loss Propagation Model for Rural and Semiurban Mobile Environment

    In order to estimate the signal parameters accurately for mobile systems, it is necessary to find a system's propagation characteristics through a medium. The path loss is one of such parameter which is associated with the design of base stations, as it tells them how much a transmitter needs to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Broadband e-Shaped Microstrip Patch Antenna for Wireless Communication

    This paper presents a single-patch broadband microstrip antenna: the E-shaped patch antenna on a single-layer foam substrate is investigated. The broadband mechanism is explored by investigating the behavior of the currents on the patch. Bandwidth enhancement of the antenna is achieved by inserting two parallel slots into its radiating patch....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Smart Antenna Using Switched Multibeam Array

    This paper describes the design and realization of a 4x4 Butler Matrix as a beam forming network along with 4 linear antenna arrays to obtain four steerable beams, operating at 2.4 GHz. The simulation results are obtained using HFSS software. Further the concept of multi-beam switching is discussed with an...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    A Survey on Data Security Models in Cloud Computing

    The world of data computing is becoming larger and complex day-by-day. Could computing is the most popular model for supporting large and complex data. Organizations are moving toward cloud computing for getting benefit of its cost reduction and elasticity features. However, cloud computing has potential risks and vulnerabilities. One of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Comparative Analysis of Mobile Security Threats and Solution

    Presently, 96% of Smartphone's do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular i.e. Android, iPhone and Blackberry. Traditional security software found in Personal Computers (PCs), such as firewalls, anti-virus, and encryption, is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design and Simulation of Enhancing RC4 Stream Cipher for Wi-Fi Security Using Verilog HDL

    IEEE 802.11 is a wireless LAN technology is based on a cellular architecture where the system is sub divided into cells, Each cell is called Basic Service Set (BSS) is controlled by a base station is called Accesses Point (AP). Access points are connected through Distribution System (DS), typically Ethernet...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Module Based and Difference Based Implementation of Partial Reconfiguration on FPGA: A Review

    Dynamically adaptable computing systems are promising research area at developing systems which can adapt to changes in their environment while executing. The premisses for such systems are reconfigurable computing systems which allow the system hardware to be changed periodically in order to execute different applications on the same hardware. Partial...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Asynchronous Topology Using SAPTL

    By using low-leakage pass transistor networks at low supply voltages SAPTL (Sense Amplifier-based Pass Transistor Logic) structure can realize very low energy computation. With the introduction of asynchronous operation in SAPTL further improves energy-delay performance without a significant increase in hardware complexity. So in this paper, the authors are going...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Flip-Flop Circuit Families: Comparison of Layout and Topology for Low Power VLSI Circuits

    The pertinent choice of flip-flop topologies is an essential importance in the design of VLSI integrated circuits for high speed and high performance CMOS circuits. Understanding the suitability of flip-flops and selecting the best topology for a given application is an important issue to fulfill the need of the design...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Review: Identifying the Behaviour of Vulnerabities by Attacking Server's Using Aject Tool

    Today's networked computer systems yield great value to businesses and governments, but also create risks. Vulnerabilities in computer systems lead to security and privacy risks. The authors are going to present how automatically they can detect the vulnerabilities in a software system which is similar to how hackers and security...

    Provided By International Journal of Engineering Research and Applications (IJERA)