International Journal of Engineering Research and Applications (IJERA)

Displaying 41-80 of 264 results

  • White Papers // Apr 2014

    VLSI Design of Multichannel AMBA AHB

    The on chip bus plays key role in the system on chip design by enabling the efficient integration of heterogeneous system component like CPUs, DSPs, application specific cores, memories, custom logic. As the level of design complexity has become higher, soc design requires a system bus with high bandwidth to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    USB to USB and Mobile Data Transfer Without Connecting to PC Using Arm Processor

    In this paper, a data transfer between pen drive to pen drive without using a computer or laptop is discussed. A data transfer is done by using a computer or laptop means it consumes more power and it is not a handy device to carry to particular locations. To overcome...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Arithmetic Unit for High Speed Performance Using Vedic Mathematics

    As many of know that the Computation unit is main unit of any science and technology, which perform different arithmetic operation like as addition, subtraction and multiplication etc. also in some places it perform logical operation such as add, or, invert, x- or etc. Multiplexer are extensively used in microprocessor,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design and Development of Remote Monitoring and Controlling System Based on Embedded Web Technology

    The application of remote monitoring and controlling systems is used to implement a monitoring and controlling system using ARM intelligent monitoring and controlling center which uses Samsung's processor (S3C6410) as its major controller. The environmental circumstances present within laboratory can be monitored using sensors and other devices are connected to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Multi-functional High frequency DDS using HDL for Soft IP core

    A multi-functional high-efficiency generation of spectrally pure, wide-band, multi-carrier waveforms is a key objective in modern communication and radar applications. A high-efficiency signal generator is a device that can output various types of signal waveforms, such as sine wave, saw tooth wave, square wave, triangle wave, trapezoidal wave and so...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An optimal Reconfigurable Cross Bar Switch for Network On Chip Applications

    In this paper, the authors present the technique and method to develop a Reconfigurable Crossbar Switch (RCS) architecture for network processors. The main purpose of this paper is to increase the performance and flexibility of crossbar and reduce the excess power consumption. The method they proposed to reduce the power...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Nios II Based System for the Playing of Wave Files on Cyclone II FPGA

    Indicative of the popularity of being able to read wave files on SD (Secure Data) cards, there is no shortage of entries in the literature, on blogs and discussion boards, and postings of schematics. The motivation behind this study is the impact made on today's social media by music players,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Leon Processor Architecture Implementation with LISA

    Recent advances & progress in the semiconductor technology has enabled the electronics industry with the dreams of realizing more ambitious design goal. With the tremendous progress in the fabrication technology & the Computer-Aided-Design (CAD) tools, there is an remarkable growth in the market of embedded processors & the Application Specific...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    The Analysis of Crucial Parameter Determining the Performance of Real Time Operating System VxWorks

    A remarkable rise has been seen in retrospect in the demand of the embedded systems in human affairs. It has made its mark almost in every field varying from domestic purposes to defense. The authors are very much familiar that the embedded system is the blend of software and hardware...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Improving Bisecting K-Means by Applying Natural Language Processing

    Text clustering techniques usually used to structure the text documents into topic related groups which can facilitate users to get a comprehensive understanding on corpus or results from information retrieval system. Most of existing text clustering algorithm which derived from traditional formatted data clustering heavily rely on term analysis methods...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Approach by Applying Clustering Algorithm for Document Clustering

    Document clustering is the process of partitioning a collection of texts into subgroups including content based similar ones. The process of document clustering is used for searching information and understanding by the human. In today era, all the documents are in electronic format, because of smaller storage and quick access....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Survey of Adaptive and Dynamic Management of Cloud Datacenters

    As cloud computing has emerged as an enabling technology that allows the Information Technology world to use the computer resources more efficiently and effectively such that the users have unlimited computing power at their disposals whenever required, so the cloud services has made it the best information technology solution. Additionally,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Secured Caching Strategy for Information Sharing in VANETs

    With high mobility, it is barely easy for the vehicles to access confined data in VANETS and to overcome this difficulty data is being stored in local storage of vehicles. Although a lot of this paper has been done on efficient information sharing, security issues are largely ignored in these...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Predictive-Reactive Method for Improving the Robustness of Real-Time Data Services

    Real time data services represent the data generated frequently based on the up to date transactions such as trading, share marketing etc. In this system implement a new methodology to enhance the robustness of real time data services. Data generation in real time database occurs frequently and those data should...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    16-Bit Arithmetic and Logic Unit Design Using Mixed Type of Modeling in VHDL

    In this paper, the authors explain the design and implementation of 16-bit ALU (Arithmetic and Logic Unit) using VHDL by using mixed style of modeling in Xilinx ISE 8.1i. The ALU takes two16-bits numbers and performs different principal arithmetic and logic operations like addition, multiplication, logical AND, OR, XOR, XNOR....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing

    Cloud computing has emerged as one of the most influential paradigms in the IT industry. In this, new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing Attribute-Based Encryption (ABE) have been proposed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Reliable Storage Services and Avoidance of Integrity Problems in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Although the cloud infrastructures are much more powerful and reliable than personal computing devices, broad range of internal and external threats for data integrity...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Efficient and Advance Routing Logic for Network on Chip

    VLSI technology has improved in integrating several Intellectual Properties (IP's) on the same chip. Connections between these IP's are the major issue and the Network-on-Chip (NoC) plays an important role in connecting these IP's. NoC has a high level of modularity, flexibility and throughput. The NoC comprises of routers, network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Secure Multiparty Computation and Privacy Preserving Data Sharing With Anonymous ID Assignment

    Sharing of private data among N parties was developed by using anonymous sharing. Each member in the group has specific anonymous id. Id received is unknown to the other members of the group. Anonymous ID Assignment algorithm (AIDA) is utilized for this approach. Serial number allows more complex data to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Dynamic Virtual Resource Management in Cloud Computing Environment

    Cloud computing is the latest technology used by many organizations in this competitive world. As many organizations are using this technology, the major issue is efficient resource provisioning and management because of the dynamic nature of the cloud and the need to satisfy heterogeneous resource requirements. In this paper, the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Private Data Transferring Among ~N~ Nodes in a Group by Using Anonymous ID Assignment

    To overcome the problems in privacy preserving data mining, collision in communications, distributed database access in the wireless communications, the secure sum algorithm is used. This algorithm is also used to provide secure data transmission among 'N' parties in a group by assigning ID numbers ranging from 1 to N....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Towards Secrecy on Public Auditability for Secure Storage in Cloud Computing

    Cloud storage helps the users to save their large amount of data remotely without any online burden. But there is no guarantee for the physical ownership of data to the users. This paper makes the data integrity protection a terrifying chore. Moreover, users have the rights to just use the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Congestion Control for Avoiding Packet Loss in Data Centric Network

    In TCP multiple synchronized servers send data to the same receiver in parallel, so the incast congestion will occur. Basically incast congestion happens in high-bandwidth and low latency networks. TCP incast congestion severely degrades the performances of the system.TCP incast congestion is studied by focusing the relationship between TCP throughputs,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Security and Privacy through Multiple Clouds in Cloud Computing

    Cloud computing are the latest technology that is used by many organizations and many cloud providers have been arise. Many organizations came forward to establish cloud providers for the users. The users have to trust the cloud provider to secure his data. Cloud providers should address privacy and security issues...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Numerical and Categorical Attributes Data Clustering Using K-Modes and Fuzzy K-Modes

    Most of the existing clustering approaches are applicable to purely numerical or categorical data only, but not the both. In general, it is a nontrivial task to perform clustering on mixed data composed of numerical and categorical attributes because there exist an awkward gap between the similarity metrics for categorical...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Scheduling to Minimize Time Staleness and Execute Job using Max Benefit Algorithm

    Streaming warehouse is to propagate new data across all the tables and views as quickly as possible. The new data can be loaded; the applications and triggers defined on the warehouse can take immediate action. This helps business field, may lead to increased profit, improved customer satisfaction and prevention of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Secure Data Retrieval Over Graph Structured Data in Cloud

    The main advantage of cloud computing is increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. For protecting data privacy, sensitive data has to be encrypted before outsourcing; it is a very challenging task. Here, the authors define and solve the problem of Privacy-Preserving...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Highly Secured and Effective Keyword Search Over Encrypted Cloud Data

    Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a very challenging task. Although traditional searchable encryption techniques allow users to securely search over...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Cloud Audit Service Outsourcing by Using KAC for Data Storage Security

    Cloud computing is recognized as an alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. Enterprises usually store data in internal storage and install firewalls to protect against intruders to access the data. With proven security relied on number theoretic assumptions are more desirable, whenever the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Privacy-Preserving Back Propagation Neural Network Learning In Signature Scheme

    Cloud computing allows their clients to share data. Multiple parties may join through conducting joint Back propagation neural network learning on the union of their respective data sets. During this process no party wants to disclose the user private data to others. Existing schemes supporting this kind of collaborative learning...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Enhancing Downloading Time By Using Content Distribution Algorithm

    A traditional model in Peer-To-Peer (P2P) content distribution is that of a large community of intermittently connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P community must replicate and replace files as a function of their popularity to achieve satisfactory performance. In this paper, the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    An Enhanced Novel Approach For Distributed Document Clustering

    In an era of scientific progression, challenges in the field of Information Retrieval (IR) are wide spread and is so tedious to fathom, due to the increased usage of mass volumes of data. Hence, scalability and efficiency are the two main constraints when it pertains to IR from large complex...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    FAST: A New Novel Feature Selection Algorithm for Large Datasets

    In this paper, the author is to select the relevant features from the large data sets. Now-a-days, feature selection is one of the major problems in the learning algorithm, decision tree making, etc. for the efficient selection of relevant or redundant feature is done by the FAST algorithm. So many...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    Feature Based Data Stream Classification (FBDC) and Novel Class Detection

    Data stream classification poses many challenges to the data mining community. Here, this paper solves all the challenges such as infinite length, concept-drift, concept-evolution, and feature-evolution. Since, a data stream is theoretically infinite in length, it is impractical to store and use all the historical data for training. Concept-drift is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2014

    A Survey on Cloud Computing and Cloud Security Issues

    Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated managed and consumed. End-users are increasingly sensitive to the latency of services they consume. Service developers want the Service Providers to ensure or provide the capability to dynamically allocate and manage...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Data Sharing Using Cloud Information Accountability Framework

    Cloud computing is the use of computing resources(Hardware & Software) that are delivered as a service over a network (typically the internet). Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Unlike privacy protection technologies, information accountability focuses on keeping the data usage transparent and traceable. The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Providing Authentication in Wireless Network to Prevent Jamming Attacks

    Wireless and mobile networks represent an increasingly important segment of networking research as a whole, driven by the rapid growth of portable computing, communication and embedded devices connected to the internet. Goal of the process is to bring privacy in any conversation between nodes in a network and to provide...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    A Privacy Preserving Approach to Analyze Security in Voip System

    Pre-processing of Speech Signal serves various purposes in any speech processing application. It includes Noise Removal, Endpoint Detection, Pre-emphasis, Framing, Windowing, Echo Canceling etc. Out of these, silence portion removal along with endpoint detection is the fundamental step for applications like Speech and Speaker Recognition. The proposed method uses multi-layer...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Analysis of Process Mining Model Using Frequentgroup Based Noise Filtering Algorithm

    Process mining is a process management system used to analyze business processes based on event logs. The knowledge is extracted from event logs by using knowledge retrieval techniques. The process mining algorithms are capable of automatically discover models to give details of all the events registered in some log traces...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2014

    Association Rule Mining in Distributed Environment

    Association rule mining is an important term in data mining. Association rule mining generates important rules from the data. These rules are called frequent rules and the whole concept is known as frequent rule mining. Earlier this technique was used to be implemented at local machines to generate rule. But...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Intrusion Recognition System in Distributed Systems

    Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. One of the primary challenges in intrusion recognition is modeling typical application behavior, so that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Turbo Coding Based High Performance Technique to Minimise Privacy and Safety Issues in RFID

    Radio Frequency IDentification (RFID) technology is playing a very crucial role in tracking objects and their location, individuals, for the purpose of identification. The RFID system is an emerging technology widely used in various fields including the circulation, military affairs, health care, medicine etc. In this technology a RFID tag...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Implementation of an Algorithm to Identify a BPSK (Barker) Signal

    Modern radars use phase modulated signals to spread their spectrum to improve the processing gain. The Identification of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Implements of Booth and Robertson's Multipliers Algorithm on FPGA

    The Arithmetic and logical unit play an important role in digital systems. Particular, Multiplication is especially relevant instead of other arithmetic operators, such as division or exponentiation, which one is also utilized by multiplier as building blocks. Multipliers are key components of many high performance systems such as FIR filters,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design & Simulation of a CDMA Based Bidirectional Wireless Communication Data Link System for Airborne Applications

    Wireless communications is a rapidly growing segment of the communications industry, with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. The present project will focus on the design and simulation of a secured CDMA based bidirectional communication data link for airborne applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design of High Speed DDR3 SDRAM Controller

    In computing, DDR3 SDRAM or double-data-rate three synchronous dynamic random access memories is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Development of a Secured Routing Scheme for Wireless Sensor Networks

    The development of Wireless Sensor Networks (WSN) advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, WSN do not rely on any fixed infrastructure. Instead, hosts rely on each...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Effective Integration of External Software Based on Trustworthiness at Selection Time

    In the present competitive environment most of the IT communities tend to go towards off-the - shelf softwares, in which the integration of those external software in project development is challenging, because the execution quality of the software and the trustworthiness of the software provider may be unknown at integration...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Bit Error Rate Performance in OFDM System Using MMSE & MLSE Equalizer Over Rayleigh Fading Channel Through the BPSK, QPSK,4 QAM & 16 QAM Modulation Technique

    In this paper Bit Error Rate performance of OFDM - BPSK, QPSK, 4-QAM, 16-QAM System over Rayleigh fading channel is analyzed. OFDM is a orthogonal frequency division multiplexing to reduce inter-symbol interference problem. Two of the most equalization algorithms are Minimum Mean Square Error (MMSE) equalizer and Maximum Likelihood Sequence...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Estimating the Power Quality Disturbance Caused by Personnel Computer

    Personal computers draw non-sinusoidal current with odd harmonics more significantly. Power Quality of distribution networks is severely affected due to the flow of these generated harmonics during the operation of electronic loads. Switch-Mode Power Supplies (SMPS) are one of the most vital part of PC, typically found in large numbers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Failure Assessment of CFRP Skinned Honeycomb Sandwich Beam With Delamination Using Cohesive Zone Model

    Cohesive zone model to capture the failure behaviour and strength of CFRP skinned cantilever sandwich beam with delamination is carried out and verified through test. The inputs required to represent the interfacial behaviour between the skin and honeycomb core in cohesive zone model are determined by standard tests. Acoustic emission...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    MATLAB/Simulink Versus Refined Real Time Simulation of an Alternative Electrical Energy System in Dynamic Aspects

    Dynamic behavior of alternative energy based Hybrid Power System (HPS) is commonly analyzed using Matlab/Simulink. This way of simulation has the limitation in interfacing the model with hardware for real time control, which in turn limits in span of the simulation and consumes more time for simulation. Besides, simulator choice...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Fault Tolerant Environment Using Hardware Failure Detection, Roll Forward Recovery Approach and Microrebooting for Distributed Systems

    Fault tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault tolerant distributed environment encompasses all aspects of modern fault tolerant distributed computing. The built-in user transparent error detection mechanism covers processor node crashes and hardware transient failures. The mechanism also integrates user-assisted error...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Data Leakage Detection

    In this paper, the authors present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. They formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimization problem and handle the constraint....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Efficient Reuse of Bandwidth for Throughput Enhancement in IEEE 802.16 Networks

    IEEE 802.16 is a standard supporting applications demanding bandwidth. Bandwidth reservation and usage depends on the type of the application. Transmission rate varies with respect to transmission medium and traffic. If the amount of bandwidth reserved is less and actual load is more then the data may be distorted or...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Fault Tolerant Mechanisms for Efficient Data Recovery in Grid Environment

    Large clusters, high availability clusters and grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programming models. Distributed systems today are ubiquitous and enable many applications, including client-server systems, transaction processing, World Wide Web, and scientific computing, among many others....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Hybrid IDS for Detecting Intrusions Based on Classification of Features and Complex Relations

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. A Intrusion Detection System (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Analyzing Trends in the Mean Resequencing Buffer Occupancy and the Mean Resequencing Delay

    Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, the authors derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Gilbert - Elliott model for each channel, they...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Based Variable - Point FFT Processor

    An efficient variable length FFT processor is required for the downlink module of Orthogonal Frequency Division Multiple Access (OFDMA) system. This system is used in the mobility mode of the IEEE 802.16 Wireless MAN standard, commonly referred as WiMAX .In OFDMA system the carrier space is constant across different channel...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Cooperative Proxy Caching for Peer-to-Peer Traffic

    This paper is improving the performers of P2P traffic. Mainly this paper is Decrease the burden of P2P traffic on Internet Service Providers. Cooperate proxy is design to connect to cache peer and connect to all other peers. This paper can increase bit rate of cooperative caching. Cooperate proxy supporting...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on Fast Handoff Mechanism in Mobile Adhoc Networks Using CSA-PHMIPv6

    In this paper, PHMIPv6 proposes to select the node with the highest signal strength as the partner node. and CSA- PHMIPv6 for which mobile hosts select partners with whom communication can last for a sufficiently long time by employing the Link Expiration Time (LET) parameter. The internet-based applications have transformed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A Novel Cellular Automata Based Real Time Path Planning Method for Mobile Robots

    Path planning method for mobile robots based on two dimensional cellular automata is proposed. The method is appropriate for multi-robot problems as well as dynamic environments. In order to develop the planning method, environment of the robot discretized by a rectangular grid and the automata with four states is defined...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Synthesis of a Field Programmable CRC Circuit Architecture

    The design and implementation of a programmable Cyclic Redundancy Check (CRC) computation circuit architecture, suitable for deployment in network related System-on-Chips (SoCs) is presented. The architecture has been designed to be field reprogrammable so that it is fully flexible in terms of the polynomial deployed and the input port width....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of FS-DT Algorithm to Enhance the Performance of Decision Tree

    In recent days Data mining gained a large amount importance because it enables modeling and knowledge extraction from the abundance of data which is available. In which Decision trees are powerful and popular tools for categorization and predicting knowledge discovery. Due to drawback of sharp decision boundaries decision tree algorithms...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Explicit Crosstalk Aware Delay Modelling for On-Chip RLC Interconnect for Ramp Input With Skin Effect

    With the increase in frequency towards the Giga hertz range, the analysis of high frequency effects like skin effect etc. are becoming extensively predominant and important for high speed VLSI design. Skin effect attenuates the high frequency components of a signal more than that of the low frequency components. Noise...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Simulation of Three Phase-Four Wire Compensated System Using the H-Bridge VSI Topology-Based DSTATCOM

    The Transient response of the Distribution STAtic COMpensator (DSTATCOM) is very important while compensating rapidly varying unbalanced and nonlinear loads. Any change in the load affects the dc link voltage directly. The sudden removal of load would result in an increase in the dc link voltage above the reference value...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Communication B/w Mobile-Robots' and PC Controller Based on ZigBee Network

    Mobile robots using Zigbee protocol for the purpose of navigation using personal computer, implemented with wireless vision system for remote monitoring and control. Its main feature is its use of the Zigbee protocol as the communication medium between the mobile robot and the PC controller. The hardware system is based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

    Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Security Thread Analysis & Solution for NGN (Next Generation Network)

    Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper, the authors concern about different security vulnerabilities...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Software Reliability Using SPC and Weibull Order Statistics

    Control charts are widely used for process monitoring. Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Implementation of Skin Tone Based Steganography in Biometric Applications

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Efficient Key Generation for Multicast Groups Based on Secret Sharing

    Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, the authors propose a scalable, efficient, authenticated group key agreement scheme for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Classification and Prediction Techniques Using Machine Learning for Anomaly Detection

    Network traffic data can be classified into binary class (i.e. anomaly-free and all others) or multi-level classes (e.g., anomaly-free, likely to be anomaly-free, anomaly-free, anomaly, likely to be anomaly, and unable to determined). In this paper, the focus is on the common supervised learning algorithms and methods for binary classification....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Software Standard and Metric Based Framework for Evaluating Service Oriented Architecture

    The paper proposes a metric based framework for evaluating service oriented architecture. Different models and metrics have been proposed in different perspective for evaluating service oriented architecture, but it has been recognized that the available models and metrics are insufficient. This paper gives a software standard based way to identify...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Analysis of Cross Site Scripting Attack

    Web applications have become a dominant way to provide access to online services. Simultaneously, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is being embedded into web pages to support dynamic client-side behavior. This script code is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of P2P Reputation Management Scheme Based on Distributed Identities and Decentralized Recommendation Chains

    The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Approach for Location Privacy Framework for Continuously Moving Objects

    In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. Advances in sensing and tracking technologies create new opportunities for location-based applications but they also create significant privacy risks. According to the report by Computer Science and Telecommunications Board...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Optical Sensor Traffic Monitoring Using Analog Image Processing Techniques

    Governments worldwide are investing much time and effort into developing efficient traffic-management capabilities to overcome growing problems with traffic congestion, accident rates, long travel times, and air pollution from auto emissions. One approach is to use optical sensors to monitor traffic and establish a dynamic road traffic-management system that operates...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Privacy Issues for K-Anonymity Model

    K-anonymity is the approach used for preventing identity disclosure. Identity disclosure means an individual is linked to a particular record in the published data and individual's sensitive data is accessed. Some important information such as Name, Income details, Medical Status and Property details are considered as a sensitive data(or Attribute)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Performance Evaluation of Channel Capacity in MIMO System

    The demand for Multiple-Input Multiple-Output (MIMO) system is growing at an explosive rate with the anticipation that communication to a end user anywhere on the globe at all times will be available in the near future. Water-Filling Algorithm (WFA) is presented for MIMO Rayleigh fading environment under Channel Side Information...

    Provided By International Journal of Engineering Research and Applications (IJERA)