International Journal of Engineering Research and Applications (IJERA)

Displaying 41-80 of 644 results

  • White Papers // Aug 2014

    AODV Improvement by Modification at Source Node and Securing It From Black Hole Attack

    MANETS suffer from constraints in power, storage and computational resources; as a result, they are more vulnerable to various communications security related attacks. Therefore, the authors attempt to focus on analyzing and improving the security of routing protocol for MANET's viz. the Ad hoc On-demand Distance Vector (AODV) routing protocol....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    Fighting Accident Using Eye Detection forSmartphones

    In this paper, the authors investigate an important problem and approaches of human eye detection, blinking and tracking. A new system was proposed and implemented using android technology for Smartphone. System creatively reduces accidents due to drivers' fatigue by focusing on treating the driver after fatigue has been detected to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    A Survey of Software Reusability

    Reusability is an only one best direction to increase developing productivity and maintainability of application. One must first search for good tested software component and reusable. Developed application software by one programmer can be shown useful for others also component. This is proving that code specifics to application requirements can...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    Evaluation of CSSR with Direct TCH Assignment in Cellular Networks

    Global System for Mobile communication (GSM) operators make use of Key Performance Indicators (KPIs) to appreciate the network performance and evaluate the Quality of Service (QoS) regarding end user perceived quality. KPIs are therefore becoming increasingly important in the context of network rollouts as well as within mature network optimization...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    A Novel Cluster-Based Energy Efficient Routing with Hybrid Protocol in Wireless Sensor Networks

    In wireless sensor network, lifetime of sensor nodes is the most essential parameters. Sensor node's lifetime may be extended using LEACH and HEED scheme which is allowing to move the cluster head surrounded by the sensor nodes try to allocate the energy consumption over all nodes in the network. Energy...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    Knowledge Discovery Applied to a Database of Errors of Systems Development

    In this paper, the authors present the knowledge discovery process in a database related to the development of computer systems through the Apriori algorithm. This method of data mining was successfully in discovering of patterns of relationships between kinds of non-conformities found during the software development and relationships of noncompliance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    A Novel Alamouti STBC Technique for MIMO System Using 16-QAM Modulation and Moving Average Filter

    The wireless communication is the emerging field of research among communication researchers and they are continuously working towards the reduction if error occurred in the signal during transmission through wireless media. In this paper, the wireless system is simulated with the application of Alamouti Space Time Block Codes (STBC) with...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    Crosscutting Specification Interference Detection at Aspect Oriented UML-Based Models: A Database Approach

    In aspect oriented development, obliviousness is one of its pillars as it helps developers to implement crosscutting concerns via aspects, which increases the overall software modularity. Despite of its merits, obliviousness brings the problem of interferences among aspects as several aspects pointcuts may address the same joinpoint for the same...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationary Spectrum Sensing

    The need for radio spectrum usage is increasing day-by-day with recent advancements in wireless system. But there is limited amount of spectrum available. So that for solving this problem Cognitive Radio (CR) is used for purpose of the spectrum utilization properly. Basically the Licensed users use the licensed bands but...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    An Overview on Authentication Approaches and Their Usability in Conjunction with Internet and Mobile Applications

    The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day-by-day. These technologies have tremendously improved making the users' daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks

    There are several services that build on the availability of closest node location information like geographic routing in spontaneous networks, data gathering in sensor networks, movement coordination among autonomous robotic nodes, location specific services for hand held devices and danger warning or traffic monitoring in vehicular networks. Ad hoc networking...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2014

    A Case Study on Ip Based Cdma Ran by Controlling Router

    A typical communication system will input data, perform some form of processing and frequency translation, transmit the data, and perform the converse operations at the receiver. As communication plays an important role in day-to-day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Privacy Preservation and Restoration of Data Using Unrealized Data Sets

    In today's world, there is an improved advance in hardware technology which increases the capability to store and record personal data about consumers and individuals. Data mining extracts knowledge to support a variety of areas as marketing, medical diagnosis, weather forecasting, national security etc. successfully. Still there is a challenge...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Tri-State Buffer with Common Data Bus

    For the recent CMOS feature sizes power dissipation becomes an overriding concerns for VLSI circuit design. The authors propose a novel approach named tri-state buffer with common data bus which reduces the total power & delay of elastic buffer. The paper presents a design and implementation of tri-state buffer mechanism....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Detecting Aspect Intertype Declaration Interference at Aspect Oriented Design Models: A Database Approach

    Implementing cross-cutting concerns requires aspect oriented developers to be enabled to introduce some members to core concerns modules along with other. This may lead to a problem of interference among modules, either between classes and aspects or among aspects themselves. Such conflicts may cause program to crash at runtime. Interference...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    FPGA Based IP Core Initialization for Ps2-Vga Peripherals Using Microblaze Processor

    The microblaze processor is a soft core microprocessor that is used in FPGA with Xilinx EDK (embedded development kit) tool. Embedded Development Kit (EDK) is a suite of tools and Intellectual Property (IP) that enables the user to design a complete embedded processor system for implementation in a Xilinx Field...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Interestingness Measures In Rule Mining: A Valuation

    In data mining it is normally desirable that discovered knowledge should possess characteristics such as accuracy, comprehensibility and interestingness. The vast majority of data mining algorithms generate patterns that are accurate and reliable but they might not be interesting. Interestingness measures are used to find the truly interesting rules which...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Interfacing Of PIC 18F252 Microcontroller with Real Time Clock via I2C Protocol

    Now-a-days, electronic clocks have predominately replaced the mechanical clock. They are much reliable, accurate, maintenance free and portable. In general, there are two kinds of electronic clocks. They are analog clock and digital clock. But digital clocks are more common and independent of external source. It would need the controlled...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

    This is a very useful application of RFID (Radio-Frequency IDentification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Implementation of Face Recognition in Cloud Vision Using Eigen Faces

    Cloud computing comes in several different forms and this paper documents how service, face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Web Page Recommendation Using Web Mining

    On World Wide Web various kind of content are generated in huge amount, so to give relevant result to user web recommendation become important part of web application. On web different kind of web recommendation are made available to user every day that includes image, video, audio, query suggestion and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Software Based Traffic Separation at the Access Layer

    Access network is the subscriber part of the telecommunications network or the network connecting the subscribers to the Internet Service Providers (ISP). In many countries including Tanzania access network is still predominantly made up of the copper cable based or other point to point wireless connections. This has kept the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Cross-Cloud Testing Strategies Over Cloud Computing

    Cloud computing is the new paradigm to deliver all the hosted services over internet on demand. The ultimate goal of cloud computing paradigm is to realize computing as a utility. The cloud is rapidly maturing towards its goal to support a wide variety of enterprise and consumer services and real-world...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Privacy Preservation of Data in Data Mining

    For data privacy against an un-trusted party, anonymization is a widely used technique capable of preserving attribute values and supporting data mining algorithms. The technique deals with anonymization methods for users in a domain-driven data mining outsourcing. Several issues emerge when anonymization is applied in a real world outsourcing scenario....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm

    Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to reliability, scalability, high performance and low band width most of the organizations are running their applications in cloud....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Micro-Controller Based Obstacle Avoiding Autonomous Robot

    In this paper, the authors study development of the obstacle avoiding spy robot, which can be operated manually as per the operator wants to take control of the robot himself, it also can be autonomous in its actions while intelligently moving itself by detecting the obstacles in front of it...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Discrimination Discovery and Prevention in Data Mining: A Survey

    Data mining is the computation process of discovering knowledge or patterns in large data sets. But extract knowledge without violation such as privacy and non-discrimination is most difficult and challenging. This is mainly because of data mining techniques such as classification rules are actually learned by the system from the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Novel High Performance Implementation of 64 Bit MAC Units and Their Delay Comparison

    A novel high performance 64 bit Multiplier-and-ACcumulator (MAC) is implemented in this paper. MAC plays a vital role in most of the Digital Signal Processing (DSP). The MAC unit is designed using vedic, braun, dadda multiplier and carry save adder hence, compared with performance of MAC unit using Wallace multiplier...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    User Security in Cloud Using Password Authentication

    Cloud computing technology is an open standard, service-based, Internet-centric, safe, convenient data storage and network computing services. Cloud computing is an internet based model for enabling convenient, on demand network access to a shared pool of configurable computing resources. The software and data that the user access for their work...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Fpga Implementation of 8-Bit Vedic Multiplier by Using Complex Numbers

    In this paper, the authors describe the implementation of 8-bit vedic multiplier using complex numbers previous technique describes that 8-bit vedic multiplier using barrel shifter by FPGA implementation comparing the both technique in this paper propagation delay is reduced so that processing of speed will be high 8-bit vedic multiplier...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Backpressure-Based Packet-By-Packet Adaptive Routing For Traffic Management in Communication Networks

    Back pressure-based adaptive routing algorithms where each packet is routed along a possibly different path have been extensively studied in the literature. However, such algorithms typically result in poor delay performance and involve high implementation complexity. In this paper, the authors develop a new adaptive routing algorithm built upon the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Dual Stacked Wideband Microstrip Antenna Array for Ku-Band Applications

    A microstrip antenna possesses many advantages such as low profile, light weight, small volume, conformal and mass production in addition to low Cost. This paper presents design of dual stacked microstrip patch antenna for operating frequency of 12.5 GHz. Investigations show that the proposed antenna has wide bandwidth and for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Implementing Smart Antenna System in Mobile Ad Hoc Networks

    As the necessity of exchanging and sharing data increases, users demand easy connectivity, and fast networks whether they are at work, at home, or on the move. Now-a-days, users are interested in interconnecting all their Personal Electronic Devices (PEDs) in an ad hoc fashion on the move. This type of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Wireless Mesh Networks Path Planning, Power Control and Optimal Solutions

    Wireless mesh networks are considered as a potential attractive alternative to provide Broadband access to users. In this paper, the authors address the following two questions: given a set of nodes with arbitrary locations, and a set of data rows, what is the max-min achievable throughput? And how should the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Battery-Bandwidth Based Handover Framework for 3G/WLAN Using Android Handheld Devices

    In a heterogeneous network environment, transparent horizontal and vertical handover is a much desired feature. Effective handover solution would allow mobile device users to stay steadily connected, seamlessly switching between different access networks. If it is consistently connected to networks which offers best Quality of Service (QoS) then that would...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Network Life Enhancement in Wireless Sensor Network

    In Wireless Sensor Network (WSN) the main focus is on developing a mechanism to extend the network lifetime by energy balancing. To achieve this, LEACH (Low Energy Adaptive Clustering Hierarchical) protocol and LEACH-CC (LEACH-Centralized with Chain) protocol is used. But LEACH and LEACH-CC have some limitations that are overcome by...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Aggregation Mechanism for Reducing Schedule Length in Tree Based Wireless Sensor Networks

    To explore and evaluate different techniques using real simulation models under multilevel communication paradigm. Data packets are time scheduled on single frequency channel by minimizing the time slots to complete a CONVERGECAST. Scheduling with transmission power control will diminish the effects of interference. The power control helps in reducing the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Crack Identification in Reinforced Concrete Beams Using Ansys Software

    Analytical determination of displacements and stresses in reinforced concrete material was difficult task and engineers had to rely on empirical formulas because concrete consists of heterogeneous material and creep and shrinkage influenced deformations in it. Due to these complexities engineers in past had been facing difficulties in coping such problems,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Messaging and Voice Conferencing Through Wi-Fi Network

    The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Integration of JAM and JADE Architecture in Distributed Data Mining System

    Data mining systems is used to discover patterns and extract useful information from facts recorded in databases. Knowledge can be acquired from database by using machine learning algorithm which computes descriptive representations of the data as well as patterns that may be exhibited in the data. Most of the current...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

    Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Security Thread Analysis & Solution for NGN (Next Generation Network)

    Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper, the authors concern about different security vulnerabilities...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Software Reliability Using SPC and Weibull Order Statistics

    Control charts are widely used for process monitoring. Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Object Oriented Implementation of Concept-Based User Profiles From Search Engine Logs

    User profiling is a fundamental component of any personalization applications. Most existing user profiling strategies are based on objects that users are interested in (i.e., positive references), but not the objects that users dislike (i.e., negative preferences). In this paper, the authors focus on search engine personalization and develop several...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Wireless Power Transmission

    In this paper, the authors have presented the concept of cable less transmission i.e. power without the usage of any kind of the electrical conductor or wires. They present an idea discussed here, how energy can be transmitted as microwaves, so as to reduce the transmission and allocation losses, known...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Hierarchical Scheduling for Multiprocessor Systems

    Heterogeneous computing changes a network of heterogeneous computers into a single computing resource entity. The central theme of heterogeneous computing is to utilize computing resources of different machine architectures. On one hand, many users find that the computers they use are not powerful enough to meet their purposes; on the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Automated Containment of Worms Based on Object Oriented Technologies

    After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to the people society. Facing this great security threat, the authors need to build an early detection system that can detect the presence of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Revolutionary Approach for Protecting the Software

    In this paper a revolutionary approach to protect the software were discussed. Software watermarking techniques was discussed. The various types of watermarking techniques such as static software watermarking and dynamic software watermarking were given. At the end, a more mathematical approach fro embedding a given watermark into software using logical...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Peer-to-Peer Information Exchange in Wireless Network Using Network Coding

    In this paper, the authors study how information exchange is scheduled among peers to achieve high network throughput and lower transmission delay in wireless network using network coding. Based on the study of these scheduling principles, they propose a Peer-to-peer Information Exchange (PIE) scheme with an efficient and light weight...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Review on Secure Data in Wireless Sensor Networks Using Randomized Multipath Routing

    Security in wireless sensor networks (wsn) is major issue recent years i.e., data confidentiality, authenticity, denial of service. In this paper, the authors present secure data delivery mechanism using security protocol. It can compute the same routes known to the source, hence, making all information sent over these routes vulnerable...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Spare Capacity Utilization for Restoration of Mesh Based Networks

    WDM optical networks provide enormous speed & capacity. In case of any failure event due to any physical damage to the network or any other reason, the network should have restoration capability. Restoration requires planning and resources. There are several approaches available to ensure fiber network survivability. But efficiency and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Study of Traditional Fairness Congestion Control Algorithm in Realistic WSN Scenarios

    Wireless Sensor Networks (WSNs) make possible many new emerging applications in a wide range of domains. WSN has large number of tiny sensor nodes densely distributed to produce high packet flow near the sink due to the convergent nature of upstream traffic. Congestion cause packet loss and due to this...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Global RWA Protocol for WDM Networks

    In this paper, the authors present the design of a Global RWA Protocol (GRP) consisting of 'N' sector networks, each with a Centralized Management System (CMS) and sectors acts as a node of a distributed system. As per the connection request it uses centralized or hybrid method (centralized and distributed)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Implementation of Skin Tone Based Steganography in Biometric Applications

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Efficient Key Generation for Multicast Groups Based on Secret Sharing

    Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, the authors propose a scalable, efficient, authenticated group key agreement scheme for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Classification and Prediction Techniques Using Machine Learning for Anomaly Detection

    Network traffic data can be classified into binary class (i.e. anomaly-free and all others) or multi-level classes (e.g., anomaly-free, likely to be anomaly-free, anomaly-free, anomaly, likely to be anomaly, and unable to determined). In this paper, the focus is on the common supervised learning algorithms and methods for binary classification....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Software Standard and Metric Based Framework for Evaluating Service Oriented Architecture

    The paper proposes a metric based framework for evaluating service oriented architecture. Different models and metrics have been proposed in different perspective for evaluating service oriented architecture, but it has been recognized that the available models and metrics are insufficient. This paper gives a software standard based way to identify...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Analysis of Cross Site Scripting Attack

    Web applications have become a dominant way to provide access to online services. Simultaneously, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is being embedded into web pages to support dynamic client-side behavior. This script code is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of P2P Reputation Management Scheme Based on Distributed Identities and Decentralized Recommendation Chains

    The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Approach for Location Privacy Framework for Continuously Moving Objects

    In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. Advances in sensing and tracking technologies create new opportunities for location-based applications but they also create significant privacy risks. According to the report by Computer Science and Telecommunications Board...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Optical Sensor Traffic Monitoring Using Analog Image Processing Techniques

    Governments worldwide are investing much time and effort into developing efficient traffic-management capabilities to overcome growing problems with traffic congestion, accident rates, long travel times, and air pollution from auto emissions. One approach is to use optical sensors to monitor traffic and establish a dynamic road traffic-management system that operates...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Privacy Issues for K-Anonymity Model

    K-anonymity is the approach used for preventing identity disclosure. Identity disclosure means an individual is linked to a particular record in the published data and individual's sensitive data is accessed. Some important information such as Name, Income details, Medical Status and Property details are considered as a sensitive data(or Attribute)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Performance Evaluation of Channel Capacity in MIMO System

    The demand for Multiple-Input Multiple-Output (MIMO) system is growing at an explosive rate with the anticipation that communication to a end user anywhere on the globe at all times will be available in the near future. Water-Filling Algorithm (WFA) is presented for MIMO Rayleigh fading environment under Channel Side Information...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Hilbert Matrix Based Cryptosystem Using a Session Key

    Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Study of Network File System(NFS) and Its Variations

    A file system is the way in which files are named and where they are placed logically for storage and retrieval. The different operating systems have file systems in which files are placed somewhere in a hierarchical (tree) structure. Network file system is any file system that allows access to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Implementation of MIMO-OFDM System in Mobile AD-Hoc Networks

    Spatial multiplexing is required to configure MIMO antenna. Spatial multiplexing require a high data rate to split into multiple lower data rate stream is transmitted from different transmit antenna in the same frequency channel. If these signals arrive at the receiver antenna array with sufficiently different spatial signature, the receiver...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    A Review on Border Gateway Protocol and Internet Routing Registry

    The strength of the Internet relies heavily on the strength of BGP routing. BGP is the glue that holds the Internet together: it is the common language of the routers (hat interconnects networks or Autonomous Systems (AS). The robustness of BGP and the authors' ability to manage it effectively is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design and Implementation of Built-in-Self Test and Repair

    Survey of ITRS in 2001,the System-on-Chips (SoCs) is moving from logic dominant chips to memory dominant chips in order to deal with today's and future application requirements. The dominating logic (about 64% in 1999) is changing to dominating memory (approaching 90% by 2011). These shrinking technologies give rise to new...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Security Mechanisms for MANET Routing Protocols Using Random Waypoint Models in Cryptography Analysis

    Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, transmitting the data from source to destination in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design & Implementation of 8 Bit Galois Encoder for on FPGA Secure Data Transmission

    Galois Field Theory deals with numbers that are binary in nature, have the properties of a mathematical "Field," and are finite in scope. Galois operations comprises of Addition, multiplication and logarithms. Galois Field multipliers have been used for coding theory and for cryptography. Both areas are complex, with similar needs,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Network Attack Path Identification and Packet Filtering With Traceback Mechanism

    Majority of the network host today are threatened by the network attacks like Denial-of-Service (DoS) attack, Distributed DoS (DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Performance of VoIP in WLANs

    The WLAN is the rapidly growing technology used for communication today. Integration of VoIP is the current area of research that is very lucrative as it would reduce the communication cost to a very large extent. Presently, the authors have high speed data networks available but, they have poor performance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Preventive Measures for MITM in 3G-WLAN Integrated System

    The 3G-WLAN integrated system provides communication with high bit rate and wide area coverage. On the other hand it is also susceptible to attack like non-repudiation, DoS, MITM etc. There can be many problems like data integrity, fraud in wireless communication. To avoid this various preventive measures can be taken...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Intrusion Recognition System in Distributed Systems

    Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. One of the primary challenges in intrusion recognition is modeling typical application behavior, so that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Turbo Coding Based High Performance Technique to Minimise Privacy and Safety Issues in RFID

    Radio Frequency IDentification (RFID) technology is playing a very crucial role in tracking objects and their location, individuals, for the purpose of identification. The RFID system is an emerging technology widely used in various fields including the circulation, military affairs, health care, medicine etc. In this technology a RFID tag...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Implementation of an Algorithm to Identify a BPSK (Barker) Signal

    Modern radars use phase modulated signals to spread their spectrum to improve the processing gain. The Identification of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Implements of Booth and Robertson's Multipliers Algorithm on FPGA

    The Arithmetic and logical unit play an important role in digital systems. Particular, Multiplication is especially relevant instead of other arithmetic operators, such as division or exponentiation, which one is also utilized by multiplier as building blocks. Multipliers are key components of many high performance systems such as FIR filters,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design & Simulation of a CDMA Based Bidirectional Wireless Communication Data Link System for Airborne Applications

    Wireless communications is a rapidly growing segment of the communications industry, with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. The present project will focus on the design and simulation of a secured CDMA based bidirectional communication data link for airborne applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design of High Speed DDR3 SDRAM Controller

    In computing, DDR3 SDRAM or double-data-rate three synchronous dynamic random access memories is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Development of a Secured Routing Scheme for Wireless Sensor Networks

    The development of Wireless Sensor Networks (WSN) advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, WSN do not rely on any fixed infrastructure. Instead, hosts rely on each...

    Provided By International Journal of Engineering Research and Applications (IJERA)