International Journal of Engineering Research and Applications (IJERA)

Displaying 41-80 of 294 results

  • White Papers // Apr 2014

    VLSI Architecture for Neural Network

    In this paper, a hardware implementation of an artificial neural network on Field Programmable Gate Arrays (FPGA) is presented. For the neural network based instrument prototype in real time application, conventional specific VLSI neural chip design suffers the limitation in time and cost. With the low precision Artificial Neural Network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Multi-functional High frequency DDS using HDL for Soft IP core

    A multi-functional high-efficiency generation of spectrally pure, wide-band, multi-carrier waveforms is a key objective in modern communication and radar applications. A high-efficiency signal generator is a device that can output various types of signal waveforms, such as sine wave, saw tooth wave, square wave, triangle wave, trapezoidal wave and so...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An optimal Reconfigurable Cross Bar Switch for Network On Chip Applications

    In this paper, the authors present the technique and method to develop a Reconfigurable Crossbar Switch (RCS) architecture for network processors. The main purpose of this paper is to increase the performance and flexibility of crossbar and reduce the excess power consumption. The method they proposed to reduce the power...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Arithmetic Unit for High Speed Performance Using Vedic Mathematics

    As many of know that the Computation unit is main unit of any science and technology, which perform different arithmetic operation like as addition, subtraction and multiplication etc. also in some places it perform logical operation such as add, or, invert, x- or etc. Multiplexer are extensively used in microprocessor,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design and Development of Remote Monitoring and Controlling System Based on Embedded Web Technology

    The application of remote monitoring and controlling systems is used to implement a monitoring and controlling system using ARM intelligent monitoring and controlling center which uses Samsung's processor (S3C6410) as its major controller. The environmental circumstances present within laboratory can be monitored using sensors and other devices are connected to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    AIDA Technique for Privacy Protection in Cloud

    Cloud is a relatively new concept and emerging technology. The information assurance, data protection, network security and privacy concerns have yet to be fully resolved. Cloud is offering different services to its users. Data sharing between two organizations is common in many application areas. Current data sharing and integration among...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Novel Topological Approach Using Transferable Belief Model for Distributed Data-Static Version

    In this paper, the authors explain adds transferable belief model to a multiagent distributed context using tree topology. Agent acting as a node collects data independently using graph with cycles. The cyclic structure better describes interaction among mobile units. Static scenario is been considered where agents provide data that do...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Document Clustering with Feature Selection Using Dirichlet Process Mixture Model and Dirichlet Multinomial Allocation Model

    To find the appropriate number of clusters to which documents should be partitioned is crucial in document clustering. In this paper, the authors propose a novel approach, namely DPMFS, to address this issue. The proposed approach is designed firstly to group documents into a set of clusters while the number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Knowledge Acquisition Using Tree Based Machine Learning Model: A Survey

    Knowledge acquisition alone is not as good as when the authors combine it with machine learning, especially the tree based machine learning. The idea to use tree based machine learning is derived from the decision trees and connectionist approach. Knowledge acquisition is a well-known and upcoming field of computer science....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Querying XML Document using Relational Database System: A Survey

    XML is rapidly emerging being the eminent standard for representing data in the World Wide Web (WWW). High-level query engines that allow end users to effectively tap the data stored in XML documents will be crucial to exploiting the full power of XML. While there has been quite a lot...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Accelerating Product Time to Market Using PaaS and Automation Tool

    In today's product development environment, product and the technologies they're based on change rapidly, as do the number of competitors for market share. This means that time to market and finding ways of optimizing it are critical components that directly affect revenue. Organizations always make a systematic approach to reduce...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Survey on Performance Analysis for Optimization of Storage Reallocation Strategies in Cloud Environment

    In cloud computing environment, resource allocation strategies are used to improve overall system utilization and data replication is used to improve the data access this environment is used by most of IT industries to meet their high computational requirement with reduce cost. To achieve this, efficient resource allocation strategies are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Study of Clusterization Methods for Random Data

    Clustering is the process of grouping data object. Data sets within a cluster should be similar and data sets outside the cluster should be dissimilar. It is the commonest form of unsupervised learning i.e. learning from raw data. Data mining is a knowledge discovering process. Clusters are formed as a...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Impact on Mixed Attribute Data Set

    Missing data are question without answer or variables without observation. Missing data can be treacherous because it is difficult to identify the problem. Numerous industrial and research database include missing values. It is not uncommon to encounter database that have up to half of the entries missing making it very...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Using K-Means and FCM in Cloud Environment

    Cloud computing provides large scale computing resource to each customers. Cloud systems can be threatened by numerous attacks as cloud provides services to no trustworthy system. Cloud needs to contain intrusion detection system for protecting system against threads. If IDS is having stronger security using more rules or patterns then...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Deploying an Application on Cloud and Its Security

    Cloud computing is a model of storing the data transmitted across the network. For all the Organization security of data is the serious concern in cloud computing. There is the number of services available in the cloud computing such as IaaS, PaaS, and SaaS. By using these services the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Deployment of Application and Review of Different Encryption Algorithm for Cloud Computing

    Security in the cloud computing is a vital issue and it is a most evolving area and it is very much accepted by most of the organization. There are number of services available in cloud computing with the help which the authors can develop and deploy their own application on...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Study and Implementation of Private Cloud

    In today's era everyone knows the importance of cloud computing. Everyone wants to access their system from anywhere, they want to access their important files and application efficiently whether they have access to their system or not. Millions of people are storing their files into cloud storage so they can...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Priority Based Assignment of Shared resources in RTOS

    A Real Time Operating System (RTOS) is a system that allows completing the task in predictable timing constraints. RTOS have several characteristics such as multitasking, preemption, priority, predictable task synchronization, priority inheritance and known behavior. The major problem of RTOS is critical section problem. In RTOS, it is difficult make...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Implementation of Low Cost VoIP Media Stream Encryption Device Using Linux

    Internet telephony refers to communications services like voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the Public Switched Telephone Network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Data Publishing in M-Privacy Using Anonymization and Randamization Method

    In this paper, the authors' focus is on the study of data mining is the extraction of interesting patterns or knowledge from huge amount of data. The goal of data mining is to extract knowledge from data. In recent years, with the explosive development in Internet, data storage and data...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Online Virtual App with Onion Routing

    Online shopping is a form of electronic commerce which allows consumers to directly buy goods from a seller over the internet using android phones. This paper deals with developing an e-commerce website for online different types of products. It provides the user with a catalog of different types of products...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Security Enhancement in Cloud Computing Using Triple DES Encryption Algorithm

    Cloud computing provides easy accessibility of the data from anywhere all the time. Due to the availability of the data over the cloud it is easy for every user to access the data. The user can also store the sensitive data so the security is the matter of concern of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Database Forensic Analysis Using Log Files

    Most organization and company maintain their business related data in database system. The misuse of data within database system may cause consequences for company. Intruders are both unauthorized user and insider privileged users. It is difficult to detect high privileged user's misuse of database within organization. Database contains the number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Cloud Based Collaboration Tool

    Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. It is a technology that uses the internet and central remote servers to maintain data and applications. It allows consumers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Ontology Based Approach for Domain Specific Semantic Information Retrieval System

    In today's era, there is rapid growth of resources in the Internet. Therefore, improving the information retrieval technology has become important. The existing information retrieval technique is based on the keywords search. In keyword based system most of the times, irrelevant information is retrieved. It consumes more time than required....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review of Semantic Web, Annotation Methods and Automatic Annotation for Web Search Results

    Now-a-days, the use of web search engines is very frequent and common worldwide over the internet by end users for different purposes. The basic aim of this web search engines is that to take the query request from the end user and execute that query on relational database used to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Modern Graph Databases Models

    Graph database models are increasingly a topic of interest the database area. The representation of data in the form of a graph lends itself well to structured data with a dynamic schema. This paper goes over current applications and implementations of graph databases, giving an overview of the different types...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

    Mobile cloud is a new emerging technology which can be used to enable users to enjoy abundant multimedia applications in a pervasive computing environment. Therefore, the scheduling of massive multimedia flows with heterogeneous QoS guarantees becomes an important issue for the mobile cloud. Generally, the predominant popular cloud-based scheduling algorithms...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Object Based Data Storage System for Cloud Using DHT and TPDSS With a Self-Destructing Data

    Now-a-days, cloud computing the every user having personal data stored in the cloud may contain account numbers, passwords, notes, and other important personal or official information that could be used or misused by a hacker, a competitor or a wrong person. These types of data or information of user are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Load Rebalancing in Clouds

    In distributed file systems, nodes simultaneously serve computing and storage functions, a file is partitioned into a number of chunks allocated in distinct nodes so that application data processing tasks can be performed in parallel over the multiple nodes. Here, every node plays the same role and perform same computation...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Comparative Analysis of Pattern Taxonomy Model used in Text Mining with respect to different Application Domains

    In the last decade, many data processing techniques are planned for mining helpful patterns in text documents. However, how effectively use associate degreed update discovered patterns remains an open analysis issue, particularly within the domain of text mining. Existing system is used term-based approach for extracting the text. Pattern evolution...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Creating Materialized View over the Integration of Heterogeneous Databases

    In E-Business, distributed information needs to be integrated or interoperated to provide the unique view of information from disparate sources. When the authors design the relevant databases dependently, it does not create heterogeneity problems to integrate the data sources. However, when databases have been designed independently, there are heterogeneity problems...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Approach by Applying Clustering Algorithm for Document Clustering

    Document clustering is the process of partitioning a collection of texts into subgroups including content based similar ones. The process of document clustering is used for searching information and understanding by the human. In today era, all the documents are in electronic format, because of smaller storage and quick access....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Mobile Relay in Data-Rigorous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are widely used in variety of data rigorous application like traffic monitoring, agriculture, network centric warfare, forest area monitoring. The challenging task in WSN is to transmit the gathered data to the base station within the application's life time. In this paper, the authors are proposing...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Implementation of Spyware Detection Using Data Mining With Decision Tree Algorithm

    Any software that monitors user behavior, or gathers information about the user without adequate notice, consent, or control from the user, \"Spyware\" represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Hardware Solution to Motion Object Detection Using Morphological Filtering and FPGA

    Moving object detection applications popularly uses background subtraction method where the stable background image is subtracted from each frame to detect the moving object. Most of these applications are software based applications which are relatively slower and inaccurate. This paper presents an innovative and unique hardware solution using morphological filtering...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Warm Server

    Educational organization is largest growing industries in India and all over the world. The advent of modern technologies at the beginning of the last century has brought in development of various technologies, which has substantially increased computer uses in educational organization. This system is used monitor and track organizations resources...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Microcontroller Protocol for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Mineral Detection using K-Means Clustering Technique

    In this paper, the authors explain about a novel algorithm formulated with k-means clustering performed on remote sensing images. The fields of remote sensing are very wide and its techniques and applications are used both in the data acquisition method and data processing procedures. It is also a fast developing...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

    Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Security Thread Analysis & Solution for NGN (Next Generation Network)

    Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper, the authors concern about different security vulnerabilities...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Software Reliability Using SPC and Weibull Order Statistics

    Control charts are widely used for process monitoring. Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Object Oriented Implementation of Concept-Based User Profiles From Search Engine Logs

    User profiling is a fundamental component of any personalization applications. Most existing user profiling strategies are based on objects that users are interested in (i.e., positive references), but not the objects that users dislike (i.e., negative preferences). In this paper, the authors focus on search engine personalization and develop several...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Wireless Power Transmission

    In this paper, the authors have presented the concept of cable less transmission i.e. power without the usage of any kind of the electrical conductor or wires. They present an idea discussed here, how energy can be transmitted as microwaves, so as to reduce the transmission and allocation losses, known...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Hierarchical Scheduling for Multiprocessor Systems

    Heterogeneous computing changes a network of heterogeneous computers into a single computing resource entity. The central theme of heterogeneous computing is to utilize computing resources of different machine architectures. On one hand, many users find that the computers they use are not powerful enough to meet their purposes; on the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Automated Containment of Worms Based on Object Oriented Technologies

    After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to the people society. Facing this great security threat, the authors need to build an early detection system that can detect the presence of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Revolutionary Approach for Protecting the Software

    In this paper a revolutionary approach to protect the software were discussed. Software watermarking techniques was discussed. The various types of watermarking techniques such as static software watermarking and dynamic software watermarking were given. At the end, a more mathematical approach fro embedding a given watermark into software using logical...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Peer-to-Peer Information Exchange in Wireless Network Using Network Coding

    In this paper, the authors study how information exchange is scheduled among peers to achieve high network throughput and lower transmission delay in wireless network using network coding. Based on the study of these scheduling principles, they propose a Peer-to-peer Information Exchange (PIE) scheme with an efficient and light weight...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Review on Secure Data in Wireless Sensor Networks Using Randomized Multipath Routing

    Security in wireless sensor networks (wsn) is major issue recent years i.e., data confidentiality, authenticity, denial of service. In this paper, the authors present secure data delivery mechanism using security protocol. It can compute the same routes known to the source, hence, making all information sent over these routes vulnerable...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Spare Capacity Utilization for Restoration of Mesh Based Networks

    WDM optical networks provide enormous speed & capacity. In case of any failure event due to any physical damage to the network or any other reason, the network should have restoration capability. Restoration requires planning and resources. There are several approaches available to ensure fiber network survivability. But efficiency and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Study of Traditional Fairness Congestion Control Algorithm in Realistic WSN Scenarios

    Wireless Sensor Networks (WSNs) make possible many new emerging applications in a wide range of domains. WSN has large number of tiny sensor nodes densely distributed to produce high packet flow near the sink due to the convergent nature of upstream traffic. Congestion cause packet loss and due to this...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Global RWA Protocol for WDM Networks

    In this paper, the authors present the design of a Global RWA Protocol (GRP) consisting of 'N' sector networks, each with a Centralized Management System (CMS) and sectors acts as a node of a distributed system. As per the connection request it uses centralized or hybrid method (centralized and distributed)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Implementation of Skin Tone Based Steganography in Biometric Applications

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Efficient Key Generation for Multicast Groups Based on Secret Sharing

    Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, the authors propose a scalable, efficient, authenticated group key agreement scheme for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Classification and Prediction Techniques Using Machine Learning for Anomaly Detection

    Network traffic data can be classified into binary class (i.e. anomaly-free and all others) or multi-level classes (e.g., anomaly-free, likely to be anomaly-free, anomaly-free, anomaly, likely to be anomaly, and unable to determined). In this paper, the focus is on the common supervised learning algorithms and methods for binary classification....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Software Standard and Metric Based Framework for Evaluating Service Oriented Architecture

    The paper proposes a metric based framework for evaluating service oriented architecture. Different models and metrics have been proposed in different perspective for evaluating service oriented architecture, but it has been recognized that the available models and metrics are insufficient. This paper gives a software standard based way to identify...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Analysis of Cross Site Scripting Attack

    Web applications have become a dominant way to provide access to online services. Simultaneously, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is being embedded into web pages to support dynamic client-side behavior. This script code is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of P2P Reputation Management Scheme Based on Distributed Identities and Decentralized Recommendation Chains

    The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Approach for Location Privacy Framework for Continuously Moving Objects

    In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. Advances in sensing and tracking technologies create new opportunities for location-based applications but they also create significant privacy risks. According to the report by Computer Science and Telecommunications Board...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Optical Sensor Traffic Monitoring Using Analog Image Processing Techniques

    Governments worldwide are investing much time and effort into developing efficient traffic-management capabilities to overcome growing problems with traffic congestion, accident rates, long travel times, and air pollution from auto emissions. One approach is to use optical sensors to monitor traffic and establish a dynamic road traffic-management system that operates...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Privacy Issues for K-Anonymity Model

    K-anonymity is the approach used for preventing identity disclosure. Identity disclosure means an individual is linked to a particular record in the published data and individual's sensitive data is accessed. Some important information such as Name, Income details, Medical Status and Property details are considered as a sensitive data(or Attribute)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Performance Evaluation of Channel Capacity in MIMO System

    The demand for Multiple-Input Multiple-Output (MIMO) system is growing at an explosive rate with the anticipation that communication to a end user anywhere on the globe at all times will be available in the near future. Water-Filling Algorithm (WFA) is presented for MIMO Rayleigh fading environment under Channel Side Information...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Hilbert Matrix Based Cryptosystem Using a Session Key

    Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Study of Network File System(NFS) and Its Variations

    A file system is the way in which files are named and where they are placed logically for storage and retrieval. The different operating systems have file systems in which files are placed somewhere in a hierarchical (tree) structure. Network file system is any file system that allows access to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Implementation of MIMO-OFDM System in Mobile AD-Hoc Networks

    Spatial multiplexing is required to configure MIMO antenna. Spatial multiplexing require a high data rate to split into multiple lower data rate stream is transmitted from different transmit antenna in the same frequency channel. If these signals arrive at the receiver antenna array with sufficiently different spatial signature, the receiver...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    A Review on Border Gateway Protocol and Internet Routing Registry

    The strength of the Internet relies heavily on the strength of BGP routing. BGP is the glue that holds the Internet together: it is the common language of the routers (hat interconnects networks or Autonomous Systems (AS). The robustness of BGP and the authors' ability to manage it effectively is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design and Implementation of Built-in-Self Test and Repair

    Survey of ITRS in 2001,the System-on-Chips (SoCs) is moving from logic dominant chips to memory dominant chips in order to deal with today's and future application requirements. The dominating logic (about 64% in 1999) is changing to dominating memory (approaching 90% by 2011). These shrinking technologies give rise to new...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Security Mechanisms for MANET Routing Protocols Using Random Waypoint Models in Cryptography Analysis

    Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, transmitting the data from source to destination in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design & Implementation of 8 Bit Galois Encoder for on FPGA Secure Data Transmission

    Galois Field Theory deals with numbers that are binary in nature, have the properties of a mathematical "Field," and are finite in scope. Galois operations comprises of Addition, multiplication and logarithms. Galois Field multipliers have been used for coding theory and for cryptography. Both areas are complex, with similar needs,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Network Attack Path Identification and Packet Filtering With Traceback Mechanism

    Majority of the network host today are threatened by the network attacks like Denial-of-Service (DoS) attack, Distributed DoS (DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Performance of VoIP in WLANs

    The WLAN is the rapidly growing technology used for communication today. Integration of VoIP is the current area of research that is very lucrative as it would reduce the communication cost to a very large extent. Presently, the authors have high speed data networks available but, they have poor performance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Preventive Measures for MITM in 3G-WLAN Integrated System

    The 3G-WLAN integrated system provides communication with high bit rate and wide area coverage. On the other hand it is also susceptible to attack like non-repudiation, DoS, MITM etc. There can be many problems like data integrity, fraud in wireless communication. To avoid this various preventive measures can be taken...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Intrusion Recognition System in Distributed Systems

    Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. One of the primary challenges in intrusion recognition is modeling typical application behavior, so that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Turbo Coding Based High Performance Technique to Minimise Privacy and Safety Issues in RFID

    Radio Frequency IDentification (RFID) technology is playing a very crucial role in tracking objects and their location, individuals, for the purpose of identification. The RFID system is an emerging technology widely used in various fields including the circulation, military affairs, health care, medicine etc. In this technology a RFID tag...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Implementation of an Algorithm to Identify a BPSK (Barker) Signal

    Modern radars use phase modulated signals to spread their spectrum to improve the processing gain. The Identification of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Implements of Booth and Robertson's Multipliers Algorithm on FPGA

    The Arithmetic and logical unit play an important role in digital systems. Particular, Multiplication is especially relevant instead of other arithmetic operators, such as division or exponentiation, which one is also utilized by multiplier as building blocks. Multipliers are key components of many high performance systems such as FIR filters,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design & Simulation of a CDMA Based Bidirectional Wireless Communication Data Link System for Airborne Applications

    Wireless communications is a rapidly growing segment of the communications industry, with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. The present project will focus on the design and simulation of a secured CDMA based bidirectional communication data link for airborne applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design of High Speed DDR3 SDRAM Controller

    In computing, DDR3 SDRAM or double-data-rate three synchronous dynamic random access memories is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Development of a Secured Routing Scheme for Wireless Sensor Networks

    The development of Wireless Sensor Networks (WSN) advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, WSN do not rely on any fixed infrastructure. Instead, hosts rely on each...

    Provided By International Journal of Engineering Research and Applications (IJERA)