International Journal of Engineering Research and Applications (IJERA)

Displaying 41-80 of 633 results

  • White Papers // Aug 2014

    A Case Study on Ip Based Cdma Ran by Controlling Router

    A typical communication system will input data, perform some form of processing and frequency translation, transmit the data, and perform the converse operations at the receiver. As communication plays an important role in day-to-day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Privacy Preservation and Restoration of Data Using Unrealized Data Sets

    In today's world, there is an improved advance in hardware technology which increases the capability to store and record personal data about consumers and individuals. Data mining extracts knowledge to support a variety of areas as marketing, medical diagnosis, weather forecasting, national security etc. successfully. Still there is a challenge...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Tri-State Buffer with Common Data Bus

    For the recent CMOS feature sizes power dissipation becomes an overriding concerns for VLSI circuit design. The authors propose a novel approach named tri-state buffer with common data bus which reduces the total power & delay of elastic buffer. The paper presents a design and implementation of tri-state buffer mechanism....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Detecting Aspect Intertype Declaration Interference at Aspect Oriented Design Models: A Database Approach

    Implementing cross-cutting concerns requires aspect oriented developers to be enabled to introduce some members to core concerns modules along with other. This may lead to a problem of interference among modules, either between classes and aspects or among aspects themselves. Such conflicts may cause program to crash at runtime. Interference...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    FPGA Based IP Core Initialization for Ps2-Vga Peripherals Using Microblaze Processor

    The microblaze processor is a soft core microprocessor that is used in FPGA with Xilinx EDK (embedded development kit) tool. Embedded Development Kit (EDK) is a suite of tools and Intellectual Property (IP) that enables the user to design a complete embedded processor system for implementation in a Xilinx Field...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Interestingness Measures In Rule Mining: A Valuation

    In data mining it is normally desirable that discovered knowledge should possess characteristics such as accuracy, comprehensibility and interestingness. The vast majority of data mining algorithms generate patterns that are accurate and reliable but they might not be interesting. Interestingness measures are used to find the truly interesting rules which...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Interfacing Of PIC 18F252 Microcontroller with Real Time Clock via I2C Protocol

    Now-a-days, electronic clocks have predominately replaced the mechanical clock. They are much reliable, accurate, maintenance free and portable. In general, there are two kinds of electronic clocks. They are analog clock and digital clock. But digital clocks are more common and independent of external source. It would need the controlled...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

    This is a very useful application of RFID (Radio-Frequency IDentification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Implementation of Face Recognition in Cloud Vision Using Eigen Faces

    Cloud computing comes in several different forms and this paper documents how service, face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Web Page Recommendation Using Web Mining

    On World Wide Web various kind of content are generated in huge amount, so to give relevant result to user web recommendation become important part of web application. On web different kind of web recommendation are made available to user every day that includes image, video, audio, query suggestion and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Software Based Traffic Separation at the Access Layer

    Access network is the subscriber part of the telecommunications network or the network connecting the subscribers to the Internet Service Providers (ISP). In many countries including Tanzania access network is still predominantly made up of the copper cable based or other point to point wireless connections. This has kept the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Cross-Cloud Testing Strategies Over Cloud Computing

    Cloud computing is the new paradigm to deliver all the hosted services over internet on demand. The ultimate goal of cloud computing paradigm is to realize computing as a utility. The cloud is rapidly maturing towards its goal to support a wide variety of enterprise and consumer services and real-world...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Privacy Preservation of Data in Data Mining

    For data privacy against an un-trusted party, anonymization is a widely used technique capable of preserving attribute values and supporting data mining algorithms. The technique deals with anonymization methods for users in a domain-driven data mining outsourcing. Several issues emerge when anonymization is applied in a real world outsourcing scenario....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm

    Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to reliability, scalability, high performance and low band width most of the organizations are running their applications in cloud....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Micro-Controller Based Obstacle Avoiding Autonomous Robot

    In this paper, the authors study development of the obstacle avoiding spy robot, which can be operated manually as per the operator wants to take control of the robot himself, it also can be autonomous in its actions while intelligently moving itself by detecting the obstacles in front of it...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Discrimination Discovery and Prevention in Data Mining: A Survey

    Data mining is the computation process of discovering knowledge or patterns in large data sets. But extract knowledge without violation such as privacy and non-discrimination is most difficult and challenging. This is mainly because of data mining techniques such as classification rules are actually learned by the system from the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Novel High Performance Implementation of 64 Bit MAC Units and Their Delay Comparison

    A novel high performance 64 bit Multiplier-and-ACcumulator (MAC) is implemented in this paper. MAC plays a vital role in most of the Digital Signal Processing (DSP). The MAC unit is designed using vedic, braun, dadda multiplier and carry save adder hence, compared with performance of MAC unit using Wallace multiplier...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    User Security in Cloud Using Password Authentication

    Cloud computing technology is an open standard, service-based, Internet-centric, safe, convenient data storage and network computing services. Cloud computing is an internet based model for enabling convenient, on demand network access to a shared pool of configurable computing resources. The software and data that the user access for their work...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Fpga Implementation of 8-Bit Vedic Multiplier by Using Complex Numbers

    In this paper, the authors describe the implementation of 8-bit vedic multiplier using complex numbers previous technique describes that 8-bit vedic multiplier using barrel shifter by FPGA implementation comparing the both technique in this paper propagation delay is reduced so that processing of speed will be high 8-bit vedic multiplier...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Backpressure-Based Packet-By-Packet Adaptive Routing For Traffic Management in Communication Networks

    Back pressure-based adaptive routing algorithms where each packet is routed along a possibly different path have been extensively studied in the literature. However, such algorithms typically result in poor delay performance and involve high implementation complexity. In this paper, the authors develop a new adaptive routing algorithm built upon the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Dual Stacked Wideband Microstrip Antenna Array for Ku-Band Applications

    A microstrip antenna possesses many advantages such as low profile, light weight, small volume, conformal and mass production in addition to low Cost. This paper presents design of dual stacked microstrip patch antenna for operating frequency of 12.5 GHz. Investigations show that the proposed antenna has wide bandwidth and for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Implementing Smart Antenna System in Mobile Ad Hoc Networks

    As the necessity of exchanging and sharing data increases, users demand easy connectivity, and fast networks whether they are at work, at home, or on the move. Now-a-days, users are interested in interconnecting all their Personal Electronic Devices (PEDs) in an ad hoc fashion on the move. This type of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Wireless Mesh Networks Path Planning, Power Control and Optimal Solutions

    Wireless mesh networks are considered as a potential attractive alternative to provide Broadband access to users. In this paper, the authors address the following two questions: given a set of nodes with arbitrary locations, and a set of data rows, what is the max-min achievable throughput? And how should the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Battery-Bandwidth Based Handover Framework for 3G/WLAN Using Android Handheld Devices

    In a heterogeneous network environment, transparent horizontal and vertical handover is a much desired feature. Effective handover solution would allow mobile device users to stay steadily connected, seamlessly switching between different access networks. If it is consistently connected to networks which offers best Quality of Service (QoS) then that would...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Network Life Enhancement in Wireless Sensor Network

    In Wireless Sensor Network (WSN) the main focus is on developing a mechanism to extend the network lifetime by energy balancing. To achieve this, LEACH (Low Energy Adaptive Clustering Hierarchical) protocol and LEACH-CC (LEACH-Centralized with Chain) protocol is used. But LEACH and LEACH-CC have some limitations that are overcome by...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Aggregation Mechanism for Reducing Schedule Length in Tree Based Wireless Sensor Networks

    To explore and evaluate different techniques using real simulation models under multilevel communication paradigm. Data packets are time scheduled on single frequency channel by minimizing the time slots to complete a CONVERGECAST. Scheduling with transmission power control will diminish the effects of interference. The power control helps in reducing the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Crack Identification in Reinforced Concrete Beams Using Ansys Software

    Analytical determination of displacements and stresses in reinforced concrete material was difficult task and engineers had to rely on empirical formulas because concrete consists of heterogeneous material and creep and shrinkage influenced deformations in it. Due to these complexities engineers in past had been facing difficulties in coping such problems,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Messaging and Voice Conferencing Through Wi-Fi Network

    The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Integration of JAM and JADE Architecture in Distributed Data Mining System

    Data mining systems is used to discover patterns and extract useful information from facts recorded in databases. Knowledge can be acquired from database by using machine learning algorithm which computes descriptive representations of the data as well as patterns that may be exhibited in the data. Most of the current...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Higher Throughput and Energy Efficiency Multi-Channel MAC Protocol for Ad Hoc Network

    Traditional single-channel MAC protocols for wireless ad hoc and sensor networks favor energy efficiency over throughput. More recent multi-channel MAC protocols display higher throughput but less energy efficiency. In this paper, the authors propose EMAC, a negotiator-based multi-channel MAC protocol in which specially designated nodes maintain the sleeping and communication...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Evaluation of Software Re-Usability Using Software Metrics Through Fuzzy Logic

    Flexibility and quality through reusability, replace-ability, efficient reusability and scalability are some additional benefits of Component based software development .Component Based Software Engineering (CBSE) is a paradigm that aims at constructing and designing systems using a pre-defined set of software components explicitly created for reuse. According to Clements, CBSE embodies...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Emerging Trends in Embedded Processors

    In this paper, the authors provide a brief introduction to embedded systems, including their main components and application areas. An embedded processors is simply a processors that has been \"Embedded\" into a device. Embedded systems are important part of human life. For illustration, one cannot visualize life without mobile phones...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Novel Architecture of 17 Bit Address RISC CPU with Pipelining Technique Using Xilinx in VLSI Technology

    In this paper, the authors describe the design of a 17 bit 4 stage pipelined Reduced Instruction Set Computer (RISC) processor using Verilog HDL in Xilinx. The processor implements the Harvard memory architecture, so the instruction and data memory spaces are both physically and logically separate. There is 5 bit...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Modeling Level Wise Role-Based Access Control for Commercial Database Systems

    Now-a-days, database system is becoming more crucial as the scale of database is growing. Traditional access control policies have certain disadvantages. So as a promising alternative to traditional access control policy, Role-Based Access Control (RBAC) has received special attention for its unique flexibility. RBAC provides access control based on permissions...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Survey On Data Mining Techniques In Customer Churn Analysis For Telecom Industry

    Customer churn prediction in Telecom Industry is a core research topic in recent years. A huge amount of data is generated in Telecom Industry every minute. On the other hand, there is lots of development in data mining techniques. Customer churn has emerged as one of the major issues in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Specialized Hardware Architecture for Smartphones

    The processor architecture of conventional processor is not suitable for Smartphone as conventional processor consumes very high energy. The authors need some specialized processor architecture to work with energy starved \"Smartphones\". Smartphone's provides them the capability of a typical computer with absolute mobility and small form factor. But the hardware,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Smartphone's Hardware Architectures and Their Issues

    A Smartphone is a mobile phone built on a mobile computing platform, with more advanced computing ability and connectivity than a feature phone. The initial Smartphone were devices which mainly combined the functions of a Personal Digital Assistant (PDA) and a mobile phone or a camera phone. Today's models also...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Security Metrics and Software Development Progression

    The quantitative assessment of security can help to analyze security qualitatively. The phase-wise discussion of security metrics provides a roadmap to the developers to estimate software security during various stages of software development. In this paper, the authors suggest metrics based on security issues of software development process. Further, they...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Performance Analysis of IEEE 802.16e Wimax Physical Layer

    WiMAX (Worldwide interoperability for Microwave Access) is an emerging technology for global broadband wireless system offering high speed access to mobile and broadband services. It is based on IEEE 802.16e standard. This standard only deals with MAC and PHY layer specification of network architecture. Considerable research has been done on...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Real-Time GPS Receiver System Implementation for Providing Location Based Services and SMS Tracking

    In this paper, the authors describe the design of a real-time GPS receiver system in a very simple and efficient fashion for navigation, tracking and positioning. This system is designed to provide location based parameters in real time like latitude, longitude, altitude, current location name and altitude. The values of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

    Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Security Thread Analysis & Solution for NGN (Next Generation Network)

    Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper, the authors concern about different security vulnerabilities...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Software Reliability Using SPC and Weibull Order Statistics

    Control charts are widely used for process monitoring. Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Object Oriented Implementation of Concept-Based User Profiles From Search Engine Logs

    User profiling is a fundamental component of any personalization applications. Most existing user profiling strategies are based on objects that users are interested in (i.e., positive references), but not the objects that users dislike (i.e., negative preferences). In this paper, the authors focus on search engine personalization and develop several...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Wireless Power Transmission

    In this paper, the authors have presented the concept of cable less transmission i.e. power without the usage of any kind of the electrical conductor or wires. They present an idea discussed here, how energy can be transmitted as microwaves, so as to reduce the transmission and allocation losses, known...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Hierarchical Scheduling for Multiprocessor Systems

    Heterogeneous computing changes a network of heterogeneous computers into a single computing resource entity. The central theme of heterogeneous computing is to utilize computing resources of different machine architectures. On one hand, many users find that the computers they use are not powerful enough to meet their purposes; on the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Automated Containment of Worms Based on Object Oriented Technologies

    After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to the people society. Facing this great security threat, the authors need to build an early detection system that can detect the presence of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Revolutionary Approach for Protecting the Software

    In this paper a revolutionary approach to protect the software were discussed. Software watermarking techniques was discussed. The various types of watermarking techniques such as static software watermarking and dynamic software watermarking were given. At the end, a more mathematical approach fro embedding a given watermark into software using logical...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Peer-to-Peer Information Exchange in Wireless Network Using Network Coding

    In this paper, the authors study how information exchange is scheduled among peers to achieve high network throughput and lower transmission delay in wireless network using network coding. Based on the study of these scheduling principles, they propose a Peer-to-peer Information Exchange (PIE) scheme with an efficient and light weight...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Review on Secure Data in Wireless Sensor Networks Using Randomized Multipath Routing

    Security in wireless sensor networks (wsn) is major issue recent years i.e., data confidentiality, authenticity, denial of service. In this paper, the authors present secure data delivery mechanism using security protocol. It can compute the same routes known to the source, hence, making all information sent over these routes vulnerable...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Spare Capacity Utilization for Restoration of Mesh Based Networks

    WDM optical networks provide enormous speed & capacity. In case of any failure event due to any physical damage to the network or any other reason, the network should have restoration capability. Restoration requires planning and resources. There are several approaches available to ensure fiber network survivability. But efficiency and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Study of Traditional Fairness Congestion Control Algorithm in Realistic WSN Scenarios

    Wireless Sensor Networks (WSNs) make possible many new emerging applications in a wide range of domains. WSN has large number of tiny sensor nodes densely distributed to produce high packet flow near the sink due to the convergent nature of upstream traffic. Congestion cause packet loss and due to this...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Global RWA Protocol for WDM Networks

    In this paper, the authors present the design of a Global RWA Protocol (GRP) consisting of 'N' sector networks, each with a Centralized Management System (CMS) and sectors acts as a node of a distributed system. As per the connection request it uses centralized or hybrid method (centralized and distributed)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Implementation of Skin Tone Based Steganography in Biometric Applications

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Efficient Key Generation for Multicast Groups Based on Secret Sharing

    Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, the authors propose a scalable, efficient, authenticated group key agreement scheme for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Classification and Prediction Techniques Using Machine Learning for Anomaly Detection

    Network traffic data can be classified into binary class (i.e. anomaly-free and all others) or multi-level classes (e.g., anomaly-free, likely to be anomaly-free, anomaly-free, anomaly, likely to be anomaly, and unable to determined). In this paper, the focus is on the common supervised learning algorithms and methods for binary classification....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Software Standard and Metric Based Framework for Evaluating Service Oriented Architecture

    The paper proposes a metric based framework for evaluating service oriented architecture. Different models and metrics have been proposed in different perspective for evaluating service oriented architecture, but it has been recognized that the available models and metrics are insufficient. This paper gives a software standard based way to identify...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Analysis of Cross Site Scripting Attack

    Web applications have become a dominant way to provide access to online services. Simultaneously, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is being embedded into web pages to support dynamic client-side behavior. This script code is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of P2P Reputation Management Scheme Based on Distributed Identities and Decentralized Recommendation Chains

    The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Approach for Location Privacy Framework for Continuously Moving Objects

    In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. Advances in sensing and tracking technologies create new opportunities for location-based applications but they also create significant privacy risks. According to the report by Computer Science and Telecommunications Board...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Optical Sensor Traffic Monitoring Using Analog Image Processing Techniques

    Governments worldwide are investing much time and effort into developing efficient traffic-management capabilities to overcome growing problems with traffic congestion, accident rates, long travel times, and air pollution from auto emissions. One approach is to use optical sensors to monitor traffic and establish a dynamic road traffic-management system that operates...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Privacy Issues for K-Anonymity Model

    K-anonymity is the approach used for preventing identity disclosure. Identity disclosure means an individual is linked to a particular record in the published data and individual's sensitive data is accessed. Some important information such as Name, Income details, Medical Status and Property details are considered as a sensitive data(or Attribute)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Performance Evaluation of Channel Capacity in MIMO System

    The demand for Multiple-Input Multiple-Output (MIMO) system is growing at an explosive rate with the anticipation that communication to a end user anywhere on the globe at all times will be available in the near future. Water-Filling Algorithm (WFA) is presented for MIMO Rayleigh fading environment under Channel Side Information...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Hilbert Matrix Based Cryptosystem Using a Session Key

    Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Study of Network File System(NFS) and Its Variations

    A file system is the way in which files are named and where they are placed logically for storage and retrieval. The different operating systems have file systems in which files are placed somewhere in a hierarchical (tree) structure. Network file system is any file system that allows access to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Implementation of MIMO-OFDM System in Mobile AD-Hoc Networks

    Spatial multiplexing is required to configure MIMO antenna. Spatial multiplexing require a high data rate to split into multiple lower data rate stream is transmitted from different transmit antenna in the same frequency channel. If these signals arrive at the receiver antenna array with sufficiently different spatial signature, the receiver...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    A Review on Border Gateway Protocol and Internet Routing Registry

    The strength of the Internet relies heavily on the strength of BGP routing. BGP is the glue that holds the Internet together: it is the common language of the routers (hat interconnects networks or Autonomous Systems (AS). The robustness of BGP and the authors' ability to manage it effectively is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design and Implementation of Built-in-Self Test and Repair

    Survey of ITRS in 2001,the System-on-Chips (SoCs) is moving from logic dominant chips to memory dominant chips in order to deal with today's and future application requirements. The dominating logic (about 64% in 1999) is changing to dominating memory (approaching 90% by 2011). These shrinking technologies give rise to new...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Security Mechanisms for MANET Routing Protocols Using Random Waypoint Models in Cryptography Analysis

    Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, transmitting the data from source to destination in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design & Implementation of 8 Bit Galois Encoder for on FPGA Secure Data Transmission

    Galois Field Theory deals with numbers that are binary in nature, have the properties of a mathematical "Field," and are finite in scope. Galois operations comprises of Addition, multiplication and logarithms. Galois Field multipliers have been used for coding theory and for cryptography. Both areas are complex, with similar needs,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Network Attack Path Identification and Packet Filtering With Traceback Mechanism

    Majority of the network host today are threatened by the network attacks like Denial-of-Service (DoS) attack, Distributed DoS (DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Performance of VoIP in WLANs

    The WLAN is the rapidly growing technology used for communication today. Integration of VoIP is the current area of research that is very lucrative as it would reduce the communication cost to a very large extent. Presently, the authors have high speed data networks available but, they have poor performance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Preventive Measures for MITM in 3G-WLAN Integrated System

    The 3G-WLAN integrated system provides communication with high bit rate and wide area coverage. On the other hand it is also susceptible to attack like non-repudiation, DoS, MITM etc. There can be many problems like data integrity, fraud in wireless communication. To avoid this various preventive measures can be taken...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Intrusion Recognition System in Distributed Systems

    Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. One of the primary challenges in intrusion recognition is modeling typical application behavior, so that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Turbo Coding Based High Performance Technique to Minimise Privacy and Safety Issues in RFID

    Radio Frequency IDentification (RFID) technology is playing a very crucial role in tracking objects and their location, individuals, for the purpose of identification. The RFID system is an emerging technology widely used in various fields including the circulation, military affairs, health care, medicine etc. In this technology a RFID tag...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Implementation of an Algorithm to Identify a BPSK (Barker) Signal

    Modern radars use phase modulated signals to spread their spectrum to improve the processing gain. The Identification of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Implements of Booth and Robertson's Multipliers Algorithm on FPGA

    The Arithmetic and logical unit play an important role in digital systems. Particular, Multiplication is especially relevant instead of other arithmetic operators, such as division or exponentiation, which one is also utilized by multiplier as building blocks. Multipliers are key components of many high performance systems such as FIR filters,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design & Simulation of a CDMA Based Bidirectional Wireless Communication Data Link System for Airborne Applications

    Wireless communications is a rapidly growing segment of the communications industry, with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. The present project will focus on the design and simulation of a secured CDMA based bidirectional communication data link for airborne applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design of High Speed DDR3 SDRAM Controller

    In computing, DDR3 SDRAM or double-data-rate three synchronous dynamic random access memories is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Development of a Secured Routing Scheme for Wireless Sensor Networks

    The development of Wireless Sensor Networks (WSN) advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, WSN do not rely on any fixed infrastructure. Instead, hosts rely on each...

    Provided By International Journal of Engineering Research and Applications (IJERA)