International Journal of Engineering Research and Applications (IJERA)

Displaying 81-120 of 633 results

  • White Papers // May 2014

    Anti-Phishing Technique to Detect URL Obfuscation

    Phishing is a criminal scheme to steal the user's personal data and other credential information. It is a fraud that acquires victim's confidential information such as password, bank account detail, credit card number, financial username and password etc. and later it can be misuse by attacker. In this paper, the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Meliorate Routing of Reactive Protocol with Clustering Technique in MANET

    The field of Mobile Ad hoc NETwork (MANET) has become very popular because of the deep research done in that area in last few years. MANET has advantage of operating without fixed infrastructure and also it can tolerate many changes in the network topology. The MANET uses different routing protocols...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Secure Routing and Identifying Hacking In P2p System

    Packet forwarding is the procedure to route the packet from source to destination via routers. Getting the systems IP address in a LAN and decides the source, destination and the intermediate systems for routing process. Using any database form the routing table with columns like source address, destination address and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Survey on Diverse Techniques of Encryption in Practice

    This converse will attend a perception on the contemporary state of play in the fallow of encryption algorithms in meticulous way (on private key block ciphers) what're comprehensively used for majority of data and link encryption. Primarily, survey of the more prevalent and thought-provoking algorithms at present in use were...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Design & Implementation of a Low Cost Based Wireless HCI System for Disabled Persons Using ARM7

    In this paper, the authors focus on design & development of a portable wireless Human Computer Interface (HCI) system to create a robust hands free interface for disabled peoples or peoples having upper limb motor paralysis. Early techniques mainly considered image processing, gaze tracking and cameras to synthesis the device....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Client-Assisted and Distributed Channel Assignment Scheme For Dense IEEE 802.11 WLAN

    Due to huge popularity, the WLANs (Wireless Local Area Networks) have gained in recent years, especially based on IEEE 802.11 family of standards; dense deployment of AP (Access Point) can be found in many places. However, these dense deployments can severely affect the aggregate throughput of the network due increased...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Design and Implementation of New Hybrid System for Anomaly Intrusion Detection System to Improve Efficiency

    All most all-existing intrusion detection systems focus on attacks at low-level, and only produced isolated alerts. It is known that existing IDS can't find any type of logical relations among alerts. In addition, they counted very low in accuracy; lots of alerts are false. Proposed research is a combination of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    TCP Variants Under WSN and MANET Environment & Their Analysis Using NS-2

    TCP provides reliability to data transferring in all end-to-end data stream services on the internet. This protocol is utilized by major internet applications. TCP was originally created to handle the problem of network congestion collapse. This paper is prepared on the performance of different TCP variants to identify the best...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Multiuser Detection in MIMO-OFDM Wireless Communication System Using Hybrid Firefly Algorithm

    In recent years, future generation wireless communication technologies are most the prominent fields in which many innovative techniques are used for effective communication. Orthogonal Frequency-Division Multiplexing (OFDM) is one of the important technologies used for communication in future generation technologies. Although it gives efficient results, it has some problems during...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Effect of Blackhole Attack on Single Hop and Multihop Leach Protocol

    Wireless micro sensor networks provide reliable monitoring of remote areas for data-gathering. Due to the limited battery capacity of sensor nodes, energy consumption plays an important role in the operation of WSN. This can be improved by using a protocol called Low Energy Adaptive Clustering Hierarchy (LEACH).Malicious attacks are generated...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Ee-LEACH(Low Energy Adaptive Clustering Hierarchy) Modified Protocol

    A Wireless Sensor Network (WSN) is made by many homogeneous and/or nodes which can sense data and communicate to each other. As energy is a scarce resource in WSN, the main issue is energy efficient routing. Many flat and hierarchical protocols have been projected to enhance the network lifetime. Low...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Survey of DOS Flooding Attacks over MANET Environment

    Mobile Ad hoc NETwork (MANET) is one of the most up-and-coming fields for research and review of wireless network. Essential requirement in MANET is security. In ad hoc network the communicating nodes sets new challenges for the security architecture because it doesn't necessarily feed on fixed infrastructure. The ad-hoc network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Study on Smart Antenna Systems and Implementation in Mobile Ad Hoc Networks

    Wireless carriers have begun to explore new ways to maximize the spectral efficiency of their networks. Research efforts investigating methods of improving wireless systems performance are currently being conducted worldwide by the deployment of Smart Antennas (SAs) along with impressive advances in the field of digital signal processing for achieving...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Gain and Bandwidth Enhancement of Electromagnetic Gap-Coupled Assembly of Various Patches Forming Rhombus Shaped Microstrip Patch Antenna for C-Band Applications

    The microstrip patch antenna has found extensive applications in wireless communication systems owing to their advantages such as low profile, conformability, low fabrication cost and ease of integration with feed network. In this paper, the authors enhance the gain and bandwidth of rhombus shaped microstrip patch antenna. For this purpose,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Broadband Electromagnetic Gap-Coupled Assembly of Patches Forming Trapezoidal Microstrip Antenna for S-Band Application

    In this paper, the authors' aim is to design an Electromagnetic Gap Coupled Trapezoidal Shaped Microstrip Patch Antenna (GCTSMPA) which is suitable for Microwave S-band applications. This antenna offers much improved impedance bandwidth 20%. The proposed antenna has achieved a suitable gain of 3.90 dBi and 0.99 dBi at resonating...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Review Paper on Route Maintenance in Stability Based Energy Aware Routing Protocol in MANET

    Mobile Ad hoc NETworks (MANETs) are temporary formed, infrastructure-less networks. Due to the mobility in nature of mobile nodes, limited battery, congestion, as well as noise, the problem of link failure causes. The performance metrics degrades due to the unstable channel conditions, network connectivity, and mobility and resource limitations. This...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Novel Design of Star-Shaped Fractal Slot Antenna for WLAN and X-Band Applications

    A wideband triangular microstrip antenna is proposed for wireless applications. The antenna has been modified into a star-shaped patch whose impedance bandwidth increases by using the fractal configuration. The design procedure is presented and characteristics of the antenna are analyzed. A 50-ohm microstrip line is used to excite the star-shaped...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Web Application Scanning and Identification of Vulnerabilities for Different Attacks

    Now-a-days there are lots of websites present in internet. And providing different services to the client is not only important task for website owner but also protecting their website from different attacks. Now-a-days identification of vulnerabilities in web application is becoming serious issue. Protecting website by identifying vulnerabilities and taking...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Enhancing Route Maintenance in RS-AODV

    Mobile Ad hoc NETworks (MANETs) are temporary formed, infrastructure-less networks. The performance metrics degrades due to the unstable channel conditions, network connectivity and mobility and resource limitations. To improve different performance metrics, various cross-layering techniques are used where different layers from protocol stack communications with each other via exchange of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Performance Evalution of Reactive & Proactive Routing Protocols for Vehicular Adhoc-Networks with Varying Speed of Nodes

    Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, Vehicular Ad-hoc NETworks (VANETs) are considered to be the special application of infrastructure-less wireless Mobile Ad-hoc NETwork (MANET). In VANET networks, vehicles are used as nodes. The main concern for establishment of communication...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Design and Implementation of Anti Lost Bluetooth Low Energy Mobile Device for Mobile Phone

    Today mobile phone like smart phone, tablet are very costly ranging from 300 USD to 600 USD, to avoid them to get forget at any social places, the authors can have mobile device (gadget) which will warn the user (beep) this device is left back .To make commercialize product which...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Performance Analysis of Turbo Coded OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) has become a popular modulation method in high speed wireless communication system. By partitioning a wideband fading channel into a flat narrowband channels, OFDM is able to mitigate the detrimental effects of multipath fading using a simple one-tap equalizer. There is a growing need to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Improving Bisecting K-Means by Applying Natural Language Processing

    Text clustering techniques usually used to structure the text documents into topic related groups which can facilitate users to get a comprehensive understanding on corpus or results from information retrieval system. Most of existing text clustering algorithm which derived from traditional formatted data clustering heavily rely on term analysis methods...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Low Latency, Area Optimized, High Throughput Double Precision Pipelined Floating Point Multiplier Using VHDL on FPGA

    Floating-point numbers are widely adopted in many applications due their dynamic representation capabilities. Floating-point representation is able to retain its resolution and accuracy compared to fixed-point representations. Unfortunately, floating point operators require excessive area for conventional implementations. The creation of floating point units under a collection of area, latency, and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    The Analysis of Crucial Parameter Determining the Performance of Real Time Operating System VxWorks

    A remarkable rise has been seen in retrospect in the demand of the embedded systems in human affairs. It has made its mark almost in every field varying from domestic purposes to defense. The authors are very much familiar that the embedded system is the blend of software and hardware...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Leon Processor Architecture Implementation with LISA

    Recent advances & progress in the semiconductor technology has enabled the electronics industry with the dreams of realizing more ambitious design goal. With the tremendous progress in the fabrication technology & the Computer-Aided-Design (CAD) tools, there is an remarkable growth in the market of embedded processors & the Application Specific...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Nios II Based System for the Playing of Wave Files on Cyclone II FPGA

    Indicative of the popularity of being able to read wave files on SD (Secure Data) cards, there is no shortage of entries in the literature, on blogs and discussion boards, and postings of schematics. The motivation behind this study is the impact made on today's social media by music players,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL

    Security is the most important part in data communication system, where more randomization in secret keys increases the security as well as complexity of the cryptography algorithms. As a result in recent dates these algorithms are compensating with enormous memory spaces and large execution time on hardware platform. Field Programmable...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Web Page Suggestion in Web Mining

    The World Wide Web (WWW) is an interlinked collection of billions of documents formatted using HTML. The size of this collection has become difficult for information retrieval. The user has to shift through scores of pages to come upon the information customer desires. Internet has became an habitual part of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Analysis of Improvement in Accuracy for Information Retrieval Using Text Mining

    The Information Retrieval (IR) method is used to produce the traceability links between the source code and documentation. Here, the authors use a IR approach to establish a traceability links between these two. When they develop a software system and documentation for this system. After the delivery of the software...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An Energy Economical Resolution for Giant Computation Using EAAS Cloud

    In spite of the dramatic growth inside the variability of excellent phones in recent years, the challenge of restricted energy capability of these devices has not been resolved satisfactorily. However, inside the age of cloud computing, the limitation on energy capability is mitigated off in a cheap manner by offloading...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Data Mining for Mobile Devices Using Web Services

    The market of mobile devices such as smart phones and PDAs is expanding very fast, with new technologies and functionalities appearing every day. Even if such devices share a common set of functionalities, they run on many different platforms, which makes integration with server applications problematic. Data mining for mobile...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Load Balancing Mechanism with Mobile Based Cloud Environment

    Cloud computing is a type of parallel and distributed system which enables on demand network access to shared pool of computing resources such as storage, servers and applications. These resources can be accessed by the user on pay per basis. In cloud computing private cloud is provisioned for the users...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Virtualized Cloud for storing Mobile data with Location\" - A Review

    Cloud computing is one of the latest developments in the IT industry also known as on demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. National institute of standard and technology defines as a model for enabling convenient,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    On The Role of Log Based Metadata in Forensic Analysis of Database Attacks

    From the past few years the use of databases has increased exponentially. Almost all o f applications in world's largest organizations use database to manage their data. But with the increasing use of database, security and privacy issues are at the peak with respect to their significance. Large numbers of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Survey on Cluster Ensemble Approach for Categorical Data Clustering

    Data mining corresponds to extracting or mining knowledge from large amounts of data. The most important feature of data mining is that it deals with high dimensional data set. Clustering is a powerful technique in data mining; it is useful to determine structure the original data. Many well-established clustering algorithms,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    VLSI Design of Multichannel AMBA AHB

    The on chip bus plays key role in the system on chip design by enabling the efficient integration of heterogeneous system component like CPUs, DSPs, application specific cores, memories, custom logic. As the level of design complexity has become higher, soc design requires a system bus with high bandwidth to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    USB to USB and Mobile Data Transfer Without Connecting to PC Using Arm Processor

    In this paper, a data transfer between pen drive to pen drive without using a computer or laptop is discussed. A data transfer is done by using a computer or laptop means it consumes more power and it is not a handy device to carry to particular locations. To overcome...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design and Implementation of Cloud Based DRM Framework on Android Platform

    The Digital Rights Management (DRM) systems can be used for any content in a wide variety of environments, services, and devices. With the fast development and growth in the mobile industry, the acceptable amount of mobile applications and services are offered, which engage Internet scale data collections. Digital Rights Management...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    VLSI Architecture for Neural Network

    In this paper, a hardware implementation of an artificial neural network on Field Programmable Gate Arrays (FPGA) is presented. For the neural network based instrument prototype in real time application, conventional specific VLSI neural chip design suffers the limitation in time and cost. With the low precision Artificial Neural Network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Effective Integration of External Software Based on Trustworthiness at Selection Time

    In the present competitive environment most of the IT communities tend to go towards off-the - shelf softwares, in which the integration of those external software in project development is challenging, because the execution quality of the software and the trustworthiness of the software provider may be unknown at integration...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Bit Error Rate Performance in OFDM System Using MMSE & MLSE Equalizer Over Rayleigh Fading Channel Through the BPSK, QPSK,4 QAM & 16 QAM Modulation Technique

    In this paper Bit Error Rate performance of OFDM - BPSK, QPSK, 4-QAM, 16-QAM System over Rayleigh fading channel is analyzed. OFDM is a orthogonal frequency division multiplexing to reduce inter-symbol interference problem. Two of the most equalization algorithms are Minimum Mean Square Error (MMSE) equalizer and Maximum Likelihood Sequence...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Estimating the Power Quality Disturbance Caused by Personnel Computer

    Personal computers draw non-sinusoidal current with odd harmonics more significantly. Power Quality of distribution networks is severely affected due to the flow of these generated harmonics during the operation of electronic loads. Switch-Mode Power Supplies (SMPS) are one of the most vital part of PC, typically found in large numbers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Failure Assessment of CFRP Skinned Honeycomb Sandwich Beam With Delamination Using Cohesive Zone Model

    Cohesive zone model to capture the failure behaviour and strength of CFRP skinned cantilever sandwich beam with delamination is carried out and verified through test. The inputs required to represent the interfacial behaviour between the skin and honeycomb core in cohesive zone model are determined by standard tests. Acoustic emission...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    MATLAB/Simulink Versus Refined Real Time Simulation of an Alternative Electrical Energy System in Dynamic Aspects

    Dynamic behavior of alternative energy based Hybrid Power System (HPS) is commonly analyzed using Matlab/Simulink. This way of simulation has the limitation in interfacing the model with hardware for real time control, which in turn limits in span of the simulation and consumes more time for simulation. Besides, simulator choice...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Fault Tolerant Environment Using Hardware Failure Detection, Roll Forward Recovery Approach and Microrebooting for Distributed Systems

    Fault tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault tolerant distributed environment encompasses all aspects of modern fault tolerant distributed computing. The built-in user transparent error detection mechanism covers processor node crashes and hardware transient failures. The mechanism also integrates user-assisted error...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Data Leakage Detection

    In this paper, the authors present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. They formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimization problem and handle the constraint....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Efficient Reuse of Bandwidth for Throughput Enhancement in IEEE 802.16 Networks

    IEEE 802.16 is a standard supporting applications demanding bandwidth. Bandwidth reservation and usage depends on the type of the application. Transmission rate varies with respect to transmission medium and traffic. If the amount of bandwidth reserved is less and actual load is more then the data may be distorted or...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Fault Tolerant Mechanisms for Efficient Data Recovery in Grid Environment

    Large clusters, high availability clusters and grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programming models. Distributed systems today are ubiquitous and enable many applications, including client-server systems, transaction processing, World Wide Web, and scientific computing, among many others....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Hybrid IDS for Detecting Intrusions Based on Classification of Features and Complex Relations

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. A Intrusion Detection System (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Analyzing Trends in the Mean Resequencing Buffer Occupancy and the Mean Resequencing Delay

    Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, the authors derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Gilbert - Elliott model for each channel, they...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Based Variable - Point FFT Processor

    An efficient variable length FFT processor is required for the downlink module of Orthogonal Frequency Division Multiple Access (OFDMA) system. This system is used in the mobility mode of the IEEE 802.16 Wireless MAN standard, commonly referred as WiMAX .In OFDMA system the carrier space is constant across different channel...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Cooperative Proxy Caching for Peer-to-Peer Traffic

    This paper is improving the performers of P2P traffic. Mainly this paper is Decrease the burden of P2P traffic on Internet Service Providers. Cooperate proxy is design to connect to cache peer and connect to all other peers. This paper can increase bit rate of cooperative caching. Cooperate proxy supporting...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Survey Paper on Peer-to-Peer Information Exchange in Wireless Network Using Network Coding

    In this paper, the authors study how network coding is useful for information exchange to be scheduled among peers to achieve high network throughput and lower transmission delay in wireless network, which helps in the throughput improvement, energy efficiency and delay minimization of the network. Network coding is a technique...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Based Implementation of 32 Bit RISC Processor

    In this paper, a design of general purpose processor with a 5 stage pipeline, to incorporate programmable resources in to a processor. RISC processors have a CPI (clock per instruction) of one cycle. This is due to the optimization of each instruction on the CPU and a technique called pipelining....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Secure Data in Wireless Sensor Networks Using Randomized Multi Path Routing

    Security in Wireless Sensor Networks (WSN) is major issue recent years i.e., data confidentiality, authenticity, denial of service. In this paper, the authors present secure data delivery mechanism using security protocol. It can compute the same routes known to the source, hence, making all information sent over these routes vulnerable...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Survey on Collaborative Methods of Image Transmission in WSN

    Image transmission applications of WSN such as monitoring and surveillance may require image sensor array to conduct collaborative image transmissions. The large size image transmissions cause bottlenecks in WSN due to the limited energy resources and network capacity. In this paper, the authors have explored different image transmission methodologies that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Fast Query-Processing With Clustering Algorithm

    Clustering, in data mining, is useful for discovering groups and identifying interesting distributions in the underlying data and to fast query processing. Traditional clustering algorithms either favor clusters with spherical shapes and similar sizes, or are very fragile in the presence of outliers. The authors propose a new clustering algorithm...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Performance Analysis of Odd-Even Merge Sort by Using Openmp, MPI and Concurrent Java

    In recent years with the advent of programming techniques, parallel programming consumes less execution time as compared to sequential. The odd-even merge sort algorithm was developed by K.E. Batcher. It takes two sorted array and merge them into a single sorted array. In this paper, the authors have implemented this...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Intrusion Detection System in Mobile Adhoc NETworks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Additionally, the limited processing power and battery life of the devices used in a MANET...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Efficient Requirements of Greedy, Face, and Combined Greedy-Face Routing

    Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery. This paper gives the brief...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Internet Based Material Selection for Quality Function Deployment

    The Internet, incorporating computers and multimedia, has provided tremendous potential for remote integration and collaboration in business and manufacturing applications. The Internet is making the manufacturing world truly global, connecting buyers and sellers from around the world in all aspects of their business. Material selection is one of the important...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on 3-Tier Multicasting Routing Protocol in Manets

    The growing interest in Mobile Ad Hoc Network techniques has resulted in many routing protocol proposals. Scalability issues in ad hoc networks are attracting increasing attention these days. In this paper, the authors will discuss the routing protocols that address scalability. The routing protocols they intend to include in the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    A Fuzzy Logic Based Network Dependent Routing Algorithm for Ad Hoc Wireless Networks

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2011

    Low Voltage Low Power Gilbert Cell Based Multiplier Circuit

    In this paper a low voltage low power multiplier circuit based on the Gilbert Cell is presented. Spice simulation using 180nm technology is carried out to demonstrate the working of the proposed circuit. Power dissipation of the circuit is 0.0755mW. The -3dB bandwidth of this multiplier is 26.73GHz. Analog multipliers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    Performance Evaluation & Comparison of Routing Protocols for Ad Hoc Wireless Networks

    The recent advances and the convergence of micro electro-mechanical systems technology, integrated circuit technologies, microprocessor hardware and nano technology, wireless communications, ad-hoc networking routing protocols, distributed signal processing, and embedded systems have made the concept of wireless networks. Wireless network nodes are limited with respect to energy supply, restricted computational...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    Strict 2 Phase Locking in Organizational Data Protection

    Privacy and data security have been issues since the advent of paper and pencil. But with the emergence of networked computing and the Internet, controls that worked effectively for the last 20 or 30 years have to be reevaluated. This paper addresses first the protection of organizational data that has...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Optimal Capacitor Sizing for Power Loss Minimization in Distribution Networks

    Power sectors are currently facing power shortage due to high distribution losses and the efforts are concentrated on increasing generation capabilities resulting in increased capital cost. But power savings are also possible by improving operating strategy for distribution system such as distribution reconfiguration, capacitor placement and Facts devices etc. In...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    The Architecture of Data Storage System for a Digital Library

    Today's society is the information society and the libraries are moving from traditional towards digitalization. The digitalization is the result of the need of modern information society. The paper explains the concept and architecture of a digital library. Problems, challenges and issues involved in design and development of standard digital...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Hiding the Text and Image Message of Variable Size Using Encryption and Compression Algorithms in Video Steganography

    Steganography is a science that focuses on hiding specific messages using specialized techniques in such a way as only the sender and the intended receiver are able to disclose it. There are many different protocols and embedding techniques that enable one to hide data in a given object. However, all...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    High Performance Cluster Architecture

    A computer cluster is a group of loosely coupled computers that work together closely so that in many respects they can be viewed as though they are a single computer. Clusters are commonly, but not always, connected through fast local area networks. Clusters are usually deployed to improve speed and/or...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    An Improved Application Package for Mobile Devices on Symbian Platform

    This paper focuses on the growing trends in the processor speed of mobile devices, which has already touched 2GHz and the huge internal and external memory available in the form of Micro SD cards, with supportable communication technology like 3rd Generation Mobile Telephony. The mobile devices shall be out casting...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Double Slot Coupled Microstrip Antenna

    To improve the radiation performance a double slot coupled microstrip antenna has been proposed .The proposed antenna is based on the adjustment of the phase distribution in such a way that the phases should be added in one direction and cancelled out in the other direction. In upper half plane...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A New Technique of Call Forwarding Using Remote Mobile

    In conventional call forwarding a subscriber can forward his call to another subscriber by configuring his mobile. This paper presents a new approach in which a subscriber can forward his call to another subscriber by configuring his mobile using some available mobile. Call forwarding (or call diverting), in telephony, is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Combination of Nonlinear Dimensionality Reduction Techniques for Face Recognition System

    A face recognition System is used to automatically identify or verify a person from digital image. Since capturing of face image is not very difficult process and does not require too much cooperation of the subject, it keeps the interest of researchers alive. In this paper, combination of linear and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Amalgamation of VLSI & Signal Processing Technologies for the Implementation and Enhancement in Wireless Communication

    Wireless communication system is a heavy dense composition of signal processing techniques with semiconductor technologies. With the ever increasing system capacity and data rate, VLSI design and implementation method for wireless communications becomes more challenging, which urges researchers in signal processing to provide new architectures and efficient algorithms to meet...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Wimax Technology and Its Applications

    This paper presents the features of the Worldwide Interoperability for Microwave Access (WiMAX) technology and future applications of WiMAX. A discussion is given by comparing WIMAX with DSL(Digital subscriber line) & Cable and Wireless Fidelity (Wi-Fi). Several references have been included at the end of this paper for those willing...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Privacy Providing Solution for Vehicular Communication

    Intelligent Transportation System (ITS) demands secure communication in Vehicular Networks is that allows vehicles to communicate. Immense amount of research is going on both in academia and by industry. Frequent handovers are realized in vehicular communication because of the high speed of vehicles and hence there is always a requirement...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Improvement of Key Performance Indicators and QoS Evaluation in Operational GSM Network

    All GSM operators use Key Performance Indicators (KPIs) to judge their network performance and evaluate the Quality of Service (QoS) regarding end user perspective. All the events being occurred over air interface are triggering different counters in the Base Station Controller (BSC). The KPIs are derived with the help of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Collaborative Spam Filtering

    In this paper, the authors fully deal about the concept of enormous spam e-mails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. Since e-mails may contain confidential information, any collaborative anti-spam approach has to guarantee strong privacy protection to the participating entities....

    Provided By International Journal of Engineering Research and Applications (IJERA)