International Journal of Engineering Research and Applications (IJERA)

Displaying 41-80 of 814 results

  • White Papers // Jan 2015

    Performance Analysis and Prevention of Real Time Intrusion

    Intrusion detection and prevention system represents an essential line of defense against variety of web attacks that can compromise with the security and proper functioning of the entire security system. With the evolution of internet, possibilities and opportunities are limitless, unfortunately, so too are the risks and chances of malicious...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Seclusion-Preserving as Well as Substance-Protective Position Based Queries

    The recent technology drive in communications, positioning and geographical systems opens novel location based applications on current good phones. Good phone users need to disclose their identity to substance suppliers to accesses these position based services. In spite of tremendous edges offered by these apps, User Privacy is compromised. During...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Complete Tracking of Vehicles Using GPS Technology

    Now-a-days without transportation the people won't live in this world. May be the transport for personal use or for public use. In transportation most of time the users need information about vehicles for example: government transport vehicles for public service, college bus transportation, personal vehicles etc. Why is it necessary...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    An Enhanced Smart Wireless Sensor Network Based Intelligent Building Monitoring System

    In this paper, the authors describe an application of Wireless Sensor Network (WSN) in monitoring and controlling of energy in residential and commercial buildings. In this paper, the authors design two electronic nodes including sensor node, and coordinator node. In the application layer, user friendly software is designed to control...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    A Secured Approach for ID Authentication System Using RFID and Fingerprint Technology

    Authentication is a fundamental issue to any trust-oriented computing system and also a critical part in many security protocols. In addition, authentication also serves as the first step for many other security purposes, such as key management and secure group communication. Passwords or smartcards have been the most widely used...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Intelligent Vehicle Control Based on Identification of Road and Traffic Signal Operated RFID Transponders

    In this paper, the authors' deal with automatic detection of red light traffic signals or vehicle speed limit signs on roads by using RFID technology to control an automobile. In the present scenario traffic violations are increasing rapidly. It gives rise to major problems which are beyond human control directly...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Security Threat Prevention for Voip Networks

    With the development of computing technology, Voice over Internet Protocol (VoIP) has been established as an alternative to carry out a telephone conversation over a data network. VoIP products promise converged telecommunication and data services that are cheaper, more versatile and provide good quality and security as compared to traditional...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Gprs Webpage Based Industrial Automation and Monitoring

    Wireless packet data networks, such as GPRS, hold great promise for applications that rely on Machine-to-Machine (M2M) communication. The rapidly advancing mobile communication technology and the decrease in costs make it possible to incorporate mobile technology into home automation systems. Based on an SMS/GPRS (Short Message Service/General Packet Radio Service)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Smart Home Lighting System for High Efficiency by Using Wsn and Ethernet

    It is foreseen that service and personal care wireless mechatronic systems will become more and more ubiquitous at home in the near future and will be very useful in assistive healthcare particularly for the elderly and disabled people. This paper describes the design and implementation of the micro controller-based system...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Wireless Communications for Underground Mining Safety

    In this paper, the authors present a low power, cost-effective, and Zigbee protocol based wireless sensor network that provides an intelligent surveillance and safety system for underground coal mines. The system consists of wireless connection of several nodes. Sensor node mainly consists of Zigbee protocol based low power CC2530 transceiver...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Compensating and Monitoring of Environment Conditions Through Wireless Sensor Networks for Friendly Green Environment

    Greenhouse facilitates precise monitoring and controlling of various parameters, so as to cultivate quality conscience crops without slaying resources. The cabling laid for the sensors, deployed inside the greenhouse is not feasible. Hence the need for an automated system employing wireless communication and remote sensing is imperative. This paper proposes...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    High End Security Approach for Banking Transaction and Image Quality Assessment Through Iris and Face Recognition

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, the authors present a novel software-based fake detection method that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Optimization of Data Allocation in Of dm System

    Orthogonal Frequency Division Multiplexing (OFDM) systems in modern high data rate wireless communication are a very useful because of its multi carrier modulation technique. But one of the major disadvantages in OFDM systems is Inter-Carrier Interference (ICI) which may be cause for Doppler shift due to relative motion between transmitter...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Robust Encryption Algorithm for Zigbee Communication

    Zigbee Technology was developed for Wireless Personnel Area Networks (WPAN), aimed at control of military applications with high security. To provide the security in Zigbee networks cryptography technique is used. Cryptography performs encryption operation before transmitting the data. Zigbee networks use stream cipher encryption mechanism. Several new stream cipher cryptography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Enhancing the Security of Information Using Bit Plane Complexity Segmentation

    Security of secret information can be increased by hiding the data. Protecting the contents of the secret information from intruders is the main challenge. The old technique Steganography can be used to hide the data. In steganography the data can be hidden in the image and the authors can transmit...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Cluster Head Selection Scheme Using Fuzzy Based Prediction for Wireless Sensor Networks Based on Leach-Ere Algorithm

    Clustering, an energy efficient approach is used in Wireless Sensor Network (WSN). Clustering involves cluster formation and cluster head selection. As the cluster head is involved in carrying out the entire communication, a high energy node has to be selected as cluster head. Current clustering approaches often use two methods:...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Finger Vein Pattern Based Authentication (Some Investigations)

    The ability to identify the individuals uniquely will be crucial for security reasons. In the recent days, identification based on biometric features is widely used for authentication purposes. Finger vein is one of the biometric features which are unique even to the identical twins. An investigation on finger vein pattern...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Design of Simulink Model for OSTBC and Performance Evaluation of Ieee 802.16 OFDM Phy Link with and Without Space-Time Block Coding for Wireless Communication

    Because of the rapid growth of digital communication in recent years, the need for high speed data transmission is increased. Orthogonal Frequency Division Multiplexing (OFDM) technique is suitable for high speed communication because of its resistance to ISI (Inter-Symbol Interference) and it utilizes the bandwidth efficiently. OSTBCs are an attractive...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Low Power Wireless Sensor Network for Building Monitoring

    A wireless sensor network is proposed for monitoring buildings to assess earthquake damage. The sensor nodes use custom-developed capacitive micro electro mechanical systems strain and 3-D acceleration sensors and a low power readout application-specified integrated circuit for a battery life of up to 12 years. The strain sensors are mounted...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Implementation of Wireless Sensor Networks for Industrial Applications Using The Multi-Core Architecture

    Advancements in silicon technology, embedded systems, sensors, micro-electro-mechanical systems, and wireless communications have led to the emergence of Embedded Wireless Sensor Networks (EWSNs). EWSNs consist of sensor nodes with embedded sensors to sense data about a phenomenon and these sensor nodes communicate with neighboring sensor nodes over wireless links (The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Traffic Sign Recognition for Computer Vision Project-Based Learning

    The authors' system is designed by using ARM 32-bit micro controller which supports different features and algorithms for the development of automotive vision systems. Here, the camera is connected to ARM controller. The camera will capture traffic sign & colors and send the information to controller. While driving if any...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Compact Microstrip Patch Antenna for Dual Band WLAN

    Wireless Local Area Network (WLAN) is one of the most widely used technologies in today's world. It is recognized as a reliable and cost effective solution for wireless high speed data connectivity. THE Wireless Local Area Networks (WLANs) working at IEEE 802.11a employs the higher frequency band 5.15-5.35GHz band and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Extended Stable Election Protocol for Increasing Lifetime of the WSN

    Recently, Wireless Sensor Networks (WSN) became an interesting topic because of its increasing usage in many fields; medical systems, environment monitoring, military applications and video surveillance. Usually sensors are placed in the desired locations to gather information frequently and then transfer it to the observers. WSN consists of a collection...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Implementation of Efficient Security System

    The development of a low cost and efficient security system is discussed in this paper. The proposed system uses mainly PIR (Pyroelectric Infra-Red) sensor to detect presence of people in the premises, RFID reader for authentication purpose and a web cam for video monitoring. The proposed scheme can be used...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Packet Scheduling Mechanism Scheme for Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs) scheduling different types of packets, such as real time and non-real-time data packets, WSN have limited energy resource constraints to reduce sensors energy consumptions. The offered packet-scheduling mechanisms of WSN use First Come First Served (FCFS), These algorithm obtain a high processing overhead and high...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Performance Evaluation of Energy Efficient Routing Protocols in MANETS

    In this paper, the mobile ad-hoc networks where there is no fixed infrastructure the mobile nodes are highly dynamic mobility. Due to mobility of node cased increasing over head and also require more energy consumption, in mobile ad hoc network major challenging issue is energy and network overhead because of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Automated System Based on Android Cell Phone for Modernization of Irrigation

    To Develop Irrigation in farmland using recent day-to-day technology for Effectiveness in water saving and to minimize cost of water Irrigation. This paper is to investigate the sensor network nodes to achieve system hardware & software design, middleware & application of Android mobile phone, will include a variety of sensor...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Protected Mining of Association Rules In Parallel Circulated Database

    In recent years, association rule discovery has become a core topic in data mining. It attracts more attention because of its wide applicability. Association rule mining is normally perform generation of frequent item sets and rule generation in which many researchers presented several efficient algorithms. This paper aims at giving...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Comparative Study of Low Power Low Area Bypass Multipliers for Signal Processing Applications

    In this paper, the authors present a comparative study of 1-dimensional bypassing multipliers on basis of delay, area and power. If they can reduce the power consumption of the multiplier block, then they can reduce the power consumption of various digital signal processing chips and communication systems. In 2-dimensional bypass...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Multiband Microstrip Antenna for Wi-MAX Application-A study

    The wireless revolution is transforming the existing global telecommunications networks into an integrated system providing a broad class of communication services to customers anywhere, anytime in motion or fixed. An antenna is an important device in wireless communication system as its performance will have direct effect on the total system....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Challenges and Proposed Solutions for Cloud Forensic

    Cloud computing is a heavily evolving topic in Information Technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Microstrip Antenna for ISM Band (2.4GHz) Applications-A review

    The past decade has seen a rapid development of wireless communication systems. This continuous trend is bringing about a wave of new wireless devices placing several demands on the antenna such as size miniaturization, power consumption, simplicity, compatibility with printed-circuit technology, low profile, light weight, lower return loss and good...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    QoS Enabled Communication Support over Multicast Ad Hoc Networks: An Overview

    Multicasting routing in mobile ad hoc networks faces various issues related to Quality of Services (QoS) which suffer from behavior of routing protocols, topology, group management, security and group mobility. QoS constraints can be categorized by their application domains also i.e. for military, the authors need to maintain QoS for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast System

    Wireless data broadcast is a disseminating data into large number of mobile clients. In many information services, the users may query multiple data items at a time. The environment under consideration is asymmetric in that the information server has much more bandwidth available, as compared to the clients. To maximize...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Authentication of Secure Data Transmission In Wireless Routing

    In this paper, the authors explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. The message authentication is the main area to be considered in WSN's. Most of the wireless networks are attacked for detecting the data's that are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Fully Homomorphic Encryption Using Low Power Multiplier

    The design of a power and area efficient high speed 768 000-bit multiplier based on Fast Fourier Transform (FFT) multiplication for fully homomorphic encryption operations. Memory based in-place architecture is presented for the FFT processor that performs 64 000-point finite-field FFT operations using a radix-16 computing unit and 16 dual-port...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    A Survey on Threats and Security Schemes in Wireless Sensor Networks

    It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Transforming an Existing Distribution Network into Autonomous MICRO-GRID using Particle Swarm Optimization

    A distribution network with renewable and fossil-based resources can be operated as a micro-grid, in autonomous or non-autonomous modes. Autonomous operation of a distribution network requires cautious planning. In this context, a detailed methodology to develop a sustainable autonomous micro-grid is presented in this paper. The proposed methodology suggests novel...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Review: \"Implementation of Feedforward and Feedback Neural Network for Signal Processing Using Analog VLSI Technology\"

    Main focus of project is on implementation of Neural Network Architecture (NNA) with on chip learning on Analog VLSI technology for signal processing application. In the proposed paper the analog components like Gilbert Cell Multiplier (GCM), Neuron Activation Function (NAF) are used to implement artificial NNA. Analog components used comprises...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2015

    Performance Evaluation of Wormhole Attack in AODV

    The Mobile Ad hoc NETworks (MANETs) is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design & Implementation of 8 Bit Galois Encoder for on FPGA Secure Data Transmission

    Galois Field Theory deals with numbers that are binary in nature, have the properties of a mathematical "Field," and are finite in scope. Galois operations comprises of Addition, multiplication and logarithms. Galois Field multipliers have been used for coding theory and for cryptography. Both areas are complex, with similar needs,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Network Attack Path Identification and Packet Filtering With Traceback Mechanism

    Majority of the network host today are threatened by the network attacks like Denial-of-Service (DoS) attack, Distributed DoS (DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Performance of VoIP in WLANs

    The WLAN is the rapidly growing technology used for communication today. Integration of VoIP is the current area of research that is very lucrative as it would reduce the communication cost to a very large extent. Presently, the authors have high speed data networks available but, they have poor performance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Preventive Measures for MITM in 3G-WLAN Integrated System

    The 3G-WLAN integrated system provides communication with high bit rate and wide area coverage. On the other hand it is also susceptible to attack like non-repudiation, DoS, MITM etc. There can be many problems like data integrity, fraud in wireless communication. To avoid this various preventive measures can be taken...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Collaborative Spam Filtering

    In this paper, the authors fully deal about the concept of enormous spam e-mails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. Since e-mails may contain confidential information, any collaborative anti-spam approach has to guarantee strong privacy protection to the participating entities....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    A Study of DDOS Attacks, Tools and DDOS Defense Mechanisms

    This paper proposes a study of distributed denial-of service attacks and a study of the defense mechanism that strive to counter these attacks. The attack illustrate do using both known and potential attack mechanisms along with this classification the authors discuss important feature .So each attack category that in turn...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    A Comparative Performance Analysis of Clustering Algorithms

    Clustering is an adaptive procedure in which objects are clustered or grouped together, based on the principle of maximizing the intra-class similarity and minimizing the inter-class similarity. Various clustering algorithms have been developed which results to a good performance on datasets for cluster formation. This paper analyze the three major...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Elements of Dynamic Programming in Sorting

    Dynamic programming is an effective algorithm design method. Sorting is believed to be an unusual area for dynamic programming. The authors' finding is contrary to this conventional belief. Though it appears that classical sorting algorithms were designed using bottom up design approach, but they have found the evidence which suggests...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Secure Authentication & Key Exchange Technique for IEEE 802.16e by Using Cryptographic Properties

    Many sophisticated authentication and encryption techniques have been embedded into IEEE 802.16 but it still facing a lot of challenging situations. Authentication process is a key to secure access in wireless network ; the security sub layer of IEEE802.16 employs an authenticated client server key management protocol in which the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Implementation of Secure Master Using Modified Twofish Algorithm in FPGA Devices

    In this paper a novel VLSI architecture of the modified Twofish block cipher is presented. Twofish is one of the most secure cryptographic algorithms. The characteristic features of the Twofish Algorithm are good security margin, fast encryption/decryption in software, moderately fast in hardware and moderate flexibility. Designed Twofish cryptographic algorithm...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Modeling of Land Mobile Satellite Systems Using LCR and AFD

    In this paper a multi-state model is developed for land mobile satellite systems, based upon measurements in an urban environment at 1.8 GHz, using Nakagami distribution. Multi-state models can yield more accurate fading amplitude time series than can single state models. Here pdfs have been derived using the second order...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    A New Approach to Diffie-Hellman Key Exchange Algorithm

    Diffie-hellman was the first published public key algorithm that is used for secure key exchange mechanism. The purpose of algorithm is used to enable users to security exchange a key that can be used for subsequent encryption. This cryptographic problem ensure A (resp. B) that no other participants aside from...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Comparative Analysis of Fiber Optic Voice Link Using Intensity Modulation in Commercially Available Optical Fibers

    Communication is the method by which two persons can share any meaningful information with each other at an instant. It requires a sender who wants to communicate, message which is to be conveyed & receiver who receives this message at the receiver end. Now a days due to the advancements...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Analysis of System Errors in Real-Time Propagation of Signals in L - Band Phased Array Radar

    NARL has active array radar which has been designed, developed and tested at 1280 MHz. This system comprises of planar microstrip patch antenna array fed by solid-state TransReceiver (TR) modules, Two-Dimensional (2- D) passive Beam Forming Network (BFN) and direct IF Digital Receiver (DRx). Errors are the common factors that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    GSM and GPS Based Vehicle Location and Tracking System

    A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a third party to track the vehicle's location, collecting data in the process. Modern vehicle tracking systems commonly use Global Positioning System (GPS)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Double Slot Coupled Microstrip Antenna

    To improve the radiation performance a double slot coupled microstrip antenna has been proposed .The proposed antenna is based on the adjustment of the phase distribution in such a way that the phases should be added in one direction and cancelled out in the other direction. In upper half plane...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A New Technique of Call Forwarding Using Remote Mobile

    In conventional call forwarding a subscriber can forward his call to another subscriber by configuring his mobile. This paper presents a new approach in which a subscriber can forward his call to another subscriber by configuring his mobile using some available mobile. Call forwarding (or call diverting), in telephony, is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Combination of Nonlinear Dimensionality Reduction Techniques for Face Recognition System

    A face recognition System is used to automatically identify or verify a person from digital image. Since capturing of face image is not very difficult process and does not require too much cooperation of the subject, it keeps the interest of researchers alive. In this paper, combination of linear and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Amalgamation of VLSI & Signal Processing Technologies for the Implementation and Enhancement in Wireless Communication

    Wireless communication system is a heavy dense composition of signal processing techniques with semiconductor technologies. With the ever increasing system capacity and data rate, VLSI design and implementation method for wireless communications becomes more challenging, which urges researchers in signal processing to provide new architectures and efficient algorithms to meet...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Wimax Technology and Its Applications

    This paper presents the features of the Worldwide Interoperability for Microwave Access (WiMAX) technology and future applications of WiMAX. A discussion is given by comparing WIMAX with DSL(Digital subscriber line) & Cable and Wireless Fidelity (Wi-Fi). Several references have been included at the end of this paper for those willing...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Privacy Providing Solution for Vehicular Communication

    Intelligent Transportation System (ITS) demands secure communication in Vehicular Networks is that allows vehicles to communicate. Immense amount of research is going on both in academia and by industry. Frequent handovers are realized in vehicular communication because of the high speed of vehicles and hence there is always a requirement...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Improvement of Key Performance Indicators and QoS Evaluation in Operational GSM Network

    All GSM operators use Key Performance Indicators (KPIs) to judge their network performance and evaluate the Quality of Service (QoS) regarding end user perspective. All the events being occurred over air interface are triggering different counters in the Base Station Controller (BSC). The KPIs are derived with the help of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Intrusion Recognition System in Distributed Systems

    Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. One of the primary challenges in intrusion recognition is modeling typical application behavior, so that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Turbo Coding Based High Performance Technique to Minimise Privacy and Safety Issues in RFID

    Radio Frequency IDentification (RFID) technology is playing a very crucial role in tracking objects and their location, individuals, for the purpose of identification. The RFID system is an emerging technology widely used in various fields including the circulation, military affairs, health care, medicine etc. In this technology a RFID tag...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Implementation of an Algorithm to Identify a BPSK (Barker) Signal

    Modern radars use phase modulated signals to spread their spectrum to improve the processing gain. The Identification of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Implements of Booth and Robertson's Multipliers Algorithm on FPGA

    The Arithmetic and logical unit play an important role in digital systems. Particular, Multiplication is especially relevant instead of other arithmetic operators, such as division or exponentiation, which one is also utilized by multiplier as building blocks. Multipliers are key components of many high performance systems such as FIR filters,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design & Simulation of a CDMA Based Bidirectional Wireless Communication Data Link System for Airborne Applications

    Wireless communications is a rapidly growing segment of the communications industry, with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. The present project will focus on the design and simulation of a secured CDMA based bidirectional communication data link for airborne applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design of High Speed DDR3 SDRAM Controller

    In computing, DDR3 SDRAM or double-data-rate three synchronous dynamic random access memories is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Development of a Secured Routing Scheme for Wireless Sensor Networks

    The development of Wireless Sensor Networks (WSN) advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, WSN do not rely on any fixed infrastructure. Instead, hosts rely on each...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Effective Integration of External Software Based on Trustworthiness at Selection Time

    In the present competitive environment most of the IT communities tend to go towards off-the - shelf softwares, in which the integration of those external software in project development is challenging, because the execution quality of the software and the trustworthiness of the software provider may be unknown at integration...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Bit Error Rate Performance in OFDM System Using MMSE & MLSE Equalizer Over Rayleigh Fading Channel Through the BPSK, QPSK,4 QAM & 16 QAM Modulation Technique

    In this paper Bit Error Rate performance of OFDM - BPSK, QPSK, 4-QAM, 16-QAM System over Rayleigh fading channel is analyzed. OFDM is a orthogonal frequency division multiplexing to reduce inter-symbol interference problem. Two of the most equalization algorithms are Minimum Mean Square Error (MMSE) equalizer and Maximum Likelihood Sequence...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Estimating the Power Quality Disturbance Caused by Personnel Computer

    Personal computers draw non-sinusoidal current with odd harmonics more significantly. Power Quality of distribution networks is severely affected due to the flow of these generated harmonics during the operation of electronic loads. Switch-Mode Power Supplies (SMPS) are one of the most vital part of PC, typically found in large numbers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Failure Assessment of CFRP Skinned Honeycomb Sandwich Beam With Delamination Using Cohesive Zone Model

    Cohesive zone model to capture the failure behaviour and strength of CFRP skinned cantilever sandwich beam with delamination is carried out and verified through test. The inputs required to represent the interfacial behaviour between the skin and honeycomb core in cohesive zone model are determined by standard tests. Acoustic emission...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Flip-Flop Circuit Families: Comparison of Layout and Topology for Low Power VLSI Circuits

    The pertinent choice of flip-flop topologies is an essential importance in the design of VLSI integrated circuits for high speed and high performance CMOS circuits. Understanding the suitability of flip-flops and selecting the best topology for a given application is an important issue to fulfill the need of the design...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Review: Identifying the Behaviour of Vulnerabities by Attacking Server's Using Aject Tool

    Today's networked computer systems yield great value to businesses and governments, but also create risks. Vulnerabilities in computer systems lead to security and privacy risks. The authors are going to present how automatically they can detect the vulnerabilities in a software system which is similar to how hackers and security...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Performance Analysis of MCCDMA System in Rayleigh Channel and AWGN Channel Using BPSK Modulation Technique

    Multi-Carrier Code Division Multiple Access (MCCDMA) is an attractive choice for high speed wireless communication as it avoids the problem of Inter Symbol Interference (lSI) and also exploits frequency diversity. In order to support multiple users with high speed data communications, the MC-CDMA technique is used to address these challenges....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on Awareness of Decentralized QOS Using Wireless Checkpointing in MoG

    Wireless communication is nothing but a host that can communicate with the other host in the form of a base station the need of the base station is nothing but the authors are going to save the data in the base station by using this if any failure or any...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Comparison of Performance Characterization in 2X2, 3X3 and 4X4 Array Antennas

    The best way of gain enhancement can be obtained is from the array models, but there are some problems associated with array antennas. Mutual coupling losses, element spacing and design complexity are major concerns in the array antennas. The present paper deals with the performance characterization among the 2X2, 3X3,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Evaluating the Impact of Guard Period on the Performance of MIMO-OFDM System

    The Orthogonal Frequency-Division Multiplexing (OFDM) is a technique of choice in the modern digital communication system, which divides a channel with a higher relative data rate into several orthogonal sub-channels with a lower data rate. This very special & unique feature of the technique attracts the new generation of communication,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Framework for Modeling Internet Topology Dynamics and Discovering Missing Links in the Internet Topology

    The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-domain routing protocols. In this paper, the authors design and implement a framework for identifying AS links that are missing from the...

    Provided By International Journal of Engineering Research and Applications (IJERA)