International Journal of Engineering Research and Applications (IJERA)

Displaying 81-120 of 814 results

  • White Papers // Jan 2015

    A Survey On: Enhancement of Minimum Spanning Tree

    A minimum spanning tree of a weighted graph is a spanning tree in which the sum of the weight of all its edges is a minimum of all such possible spanning tree of the graph. Minimum spanning tree can be obtained for connected weighted edges with no negative weight using...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2014

    A Simulated Behavioral Study of DSR Routing Protocol Using NS-2

    Mobile Ad hoc NETworks (MANETs) consists of wireless nodes communicating without any centralized administration. Thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2014

    Design of a Low Power Combinational Circuit by Using Adiabatic Logic

    A novel low power and Positive Feedback Adiabatic Logic (PFAL) combinational low power circuit is presented in this paper. The power consumption and general characteristics of the PFAL combination allow power circuit are then compared against two combinational low power circuit Efficient Charge Recovery Logic (ECRL), conventional CMOS. The proposed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2014

    High Speed Area Efficient 8-Point FFT Using Vedic Multiplier

    Digital Signal Processing (DSP) is the mathematical manipulation of an information signal to modify or improve it in some way. A high speed Fast Fourier Transform (FFT) design by using three algorithms is presented in this paper. In algorithm 3, 4-bit Vedic multiplier based technique are used in FFT. In...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Attacks Prevention and Detection Techniques In MANET: A Survey

    Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In wireless network MANET is a Mobile Ad-hoc NETworks which is a one self-configurable network. MANET is a collection of wireless mobile node which...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    A Review on Congestion Control Mechanisms in Wireless Sensor Networks

    Recently, Wireless Sensor Networks (WSNs) have been in many applications and systems with vastly varying requirements and characteristics. Due to this, it would be difficult to decide the requirements regarding hardware issues and software support. Heterogeneous applications can be integrated within the same wireless sensor network with the aid of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Distributed Framework for Data Mining as a Service on Private Cloud

    Data mining research faces two great challenges: automated mining and mining of distributed data. Conventional mining techniques are centralized and the data needs to be accumulated at central location. Mining tool needs to be installed on the computer before performing data mining. Thus, extra time is incurred in collecting the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Face and Expression Recognition in Real Time Biometric Systems

    Face recognition is a natural human ability and a widely accepted identification and verification technique. In current lawful situation, a lot of credibility is located on identifications made by observer. Accordingly these are supported on human awareness which is often flawed and can lead to situations where identity is disputed....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Design of High Speed 128 Bit Parallel Prefix Adders

    In this paper, the authors propose 128-bit Kogge-Stone, Ladner-Fischer, spanning tree parallel prefix adders and compare with ripple carry adder. In general, n-bit adders like ripple carry adders (slow adders compare to other adders) and carry look ahead adders (area consuming adders) are used in earlier days. But now, most...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Design of Low Voltage Low Power CMOS OP-AMP

    Operational amplifiers are an integral part of many analog and mixed signal systems. As the demand for mixed mode integrated circuits increases, the design of analog circuits such as operational amplifiers in CMOS technology becomes more critical. This paper presents a two stage CMOS operational amplifier, which operates at ±1.8V...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Controller Design and Load Frequency Control for Single Area Power System with Model Order Reduction Technique

    The performance of power systems gets worsening due to the presence of sudden load changes, uncertainties of parameters, etc. Therefore, the design of load frequency control is very important in the modern power systems. This paper presents LFC control technique to reject the typical disturbance as well as control the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Characterization of Switchable and Multilayered FSS Circuits Using the WCIP Method

    In this paper, the authors use the Wave Concept Iterative Procedure (WCIP) to study the switchable and multi-layered Frequency Selective Surface (FSS) circuits. The switchable part is used for the adjustment of the frequency of the HF electronics circuits. This adjustment is applied by the integration of RF-MEMS switches. This...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    An Efficient Fault Tolerance System Design for CMOS/Nanodevice Digital Memories

    Targeting on the future fault-prone hybrid CMOS/nano-device digital memories, this paper present two fault-tolerance design approaches the integrally address the tolerance for defect and transient faults. These two approaches share several key features, including the use of a group of BCH codes for both defect tolerance and transient fault tolerance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Mitigation of the Harmonics Under Reactive Power Compensation by SHPF-TCR Using PI & Fuzzy Logic Technique

    In this paper, a combined system of a Thyristor-Controlled Reactor (TCR) and a Shunt Hybrid Power Filter (SHPF) has been designed by MATLAB/SIMULINK approach for harmonic and reactive power compensation. The quality of the power is effected by many factors like harmonic contamination, due to the increment of non-linear loads,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    Utilizing Symbolic Programming in Analog Circuit Synthesis of Arbitrary Rational Transfer Functions

    The employment of symbolic programming in analog circuit design for system interfaces is proposed. Given a rational transfer function with a set of specifications and constraints, one may autonomously synthesize it into an analog circuit. First, a classification of the target transfer function polynomials into 14 classes is performed. The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2014

    A New Framework for Secure M-Commerce

    By combining the wireless network and e-commerce, suppliers can provide a more convenient and quicker service on a human scale for their customers. The main advantages of such services are their high availability, independence of physical location and time. Mobile commerce raises a number of security and privacy challenges. However,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    Quality of Service Improvement, Handoff Prioritization and Channel Utilization for Cellular Network

    In this paper, Call Admission Control (CAC) is a significant component in wireless networks to promise quality of service requirements and also to improve the network flexibility. The reliability is measured in terms of Quality of Service (QoS) and Grade of Service (GoS). GoS is a call-level factor, which comprises...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    Real Time Implementation Of Face Recognition System

    In this paper, the authors propose face recognition method using PCA for real time implementation. Now-a-days, security is gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such implementations however, are becoming less secure and practical, also is becoming more problematic...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    Security Attacks and its Countermeasures in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    Approaches for Keyword Query Routing

    The growing number of datasets published on the Web as linked data brings both opportunities for high data availability of data. As the data increases challenges for querying also increases. It is very difficult to search linked data using structured languages. Hence, the authors use Keyword Query searching for linked...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    Content Sharing Over Smartphone-Based Delay-Tolerant Networks

    With the growing number of Smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between Smartphone on the market....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    Design of a Current Mode Sample and Hold Circuit at Sampling Rate of 150 MS/s

    A current mode sample and hold circuit is presented in this paper at 180nm technology. The major concerns of VLSI are area, power, delay and speed. Hence, the authors have used a MOSFET in triode region in the proposed architecture for voltage to current conversion instead of a resistor being...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    An Empirical Study of the Applications of Classification Techniques in Students Database

    University servers and databases store a huge amount of data including personal details, registration details, evaluation assessment, performance profiles and many more for students and lecturers alike. main problem that faces any system administration or any users is data increasing per-second, which is stored in different type and format in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    A New Approach of Learning Hierarchy Construction based on Fuzzy Logic

    In recent years, adaptive learning systems rely increasingly on learning hierarchy to customize the educational logic developed in their courses. Most approaches do not consider that the relationships of prerequisites between the skills are fuzzy relationships. In this paper, the authors describe a new approach of a practical application of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2014

    The Application of Queue Theory in Cloud Computing to Reduce the Waiting Time

    Cloud computing is a new technology in computer field to provide on line service to the customers. Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the users has to be in queue until they is served. Each arriving Cloud...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET

    Mobile Ad hoc NETwork (MANET) is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication. Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node Density

    Mobile Ad hoc NETwork (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Security Issues Related with Cloud Computing

    The term cloud means common location independent online utility on demand. It's an emerging technology in IT industries. Cloud technologies are improving day-by-day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Wireless Reporting System for Accident Detection at Higher Speeds

    Speed is one of the basic reasons for vehicle accident. Many lives could have been saved if emergency service could get accident information and reach in time. Now-a-days, GPS has become an integral part of a vehicle system. This paper proposes to utilize the capability of a GPS receiver to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Design of Digital Predistortion Technique for RF Power Amplifier Using Memory Polynomial

    Linearization of power amplifier has been an area of intense research from the last many years. The various types of linearization techniques are available for linearising PA but Digital Predistortion technique has been observed as one of the most common and effective method. But due to the issues like memory...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Routing Enhancement of MANETs Using Hybrid Protocol Combined with PBO

    Mobile Ad hoc NETworks (MANETs) show an astonishing qualities in the concept of networks which are used without wires. MANETs experience numerous communication medium restrictions such as constrained storage of memory and development of effectual routing protocols. Furthermore, multi-hop routing mechanism employed in MANETs gives rise to the contention in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Using Data Mining Techniques in Customer Segmentation

    Data mining plays important role in marketing and is quite new. Although this field expands rapidly, data mining is still foreign issue for many marketers who trust only their experiences. Data mining techniques cannot substitute the significant role of domain experts and their business knowledge. In the other words, data...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Data Security with Colors Using Rsa

    Data security with colors using RSA technique that integrates the RGB Color model with the well-known public key cryptographic algorithm RSA (Rivest, Shamir and Adleman). This model provides both confidentiality and authentication to the data sent across the network. RSA algorithm uses public key and private key to encrypt and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Enhancing Data Integrity in Multi Cloud Storage

    Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Agile Data: Automating Database Refactorings

    In this paper, the authors discuss an automated approach to database change management throughout the companies' development workflow. By using automated tools, companies can avoid common issues related to manual database deployments. This paper was motivated by analyzing usual problems within organizations, mostly originated from manual interventions that may result...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Overview on Symmetric Key Encryption Algorithms

    In today's digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Improving Data Storage Security in Cloud Using Hadoop

    The rising abuse of information stored on large data centers in cloud emphasizes the need to safe guard the data. Despite adopting strict authentication policies for cloud users data while transferred over to secure channel when reaches data centers is vulnerable to numerous attacks .The most widely adoptable methodology is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Design and Implementation of 16-Bit Arithmetic Logic Unit Using Quantum Dot Cellular Automata (QCA) Technique

    Quantum dot Cellular Automata (QCA) is an advanced nanotechnology that attempts to create general computational at the nano-scale by controlling the position of single electrons. Quantum dot Cellular Automata (QCA) defines a new device architecture that permits the innovative design of digital systems. QCA technology has large potential in terms...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Hack Recognition in Wireless Sensor Network

    A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a \"Cut\". In this paper, the authors consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. They propose an algorithm that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2014

    Energy Efficiency of MIMO-OFDM Communication System

    With the ever increasing number of subscribers and their seemingly \"Greedy\" demands for high-data-rate services, the next generation networks will have to provide global connectivity to ensure success. So the combination of Multiple-Input Multiple-Output (MIMO) signal processing with Orthogonal Frequency Division Multiplexing (OFDM) is regarded as a promising solution for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Design and Implementation of a Software Radio Based WiMAX Communication System

    This paper presents the design and implementation of a software defined radio for the physical layer implementation of WiMAX using MATLAB and Simulink. This work focuses on two important aspects of communications, WiMAX standard and the OFDM technique. OFDM is a spectrally efficient version of multicarrier modulation, where the subcarriers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on 3-Tier Multicasting Routing Protocol in Manets

    The growing interest in Mobile Ad Hoc Network techniques has resulted in many routing protocol proposals. Scalability issues in ad hoc networks are attracting increasing attention these days. In this paper, the authors will discuss the routing protocols that address scalability. The routing protocols they intend to include in the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on Fast Handoff Mechanism in Mobile Adhoc Networks Using CSA-PHMIPv6

    In this paper, PHMIPv6 proposes to select the node with the highest signal strength as the partner node. and CSA- PHMIPv6 for which mobile hosts select partners with whom communication can last for a sufficiently long time by employing the Link Expiration Time (LET) parameter. The internet-based applications have transformed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A Novel Cellular Automata Based Real Time Path Planning Method for Mobile Robots

    Path planning method for mobile robots based on two dimensional cellular automata is proposed. The method is appropriate for multi-robot problems as well as dynamic environments. In order to develop the planning method, environment of the robot discretized by a rectangular grid and the automata with four states is defined...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Synthesis of a Field Programmable CRC Circuit Architecture

    The design and implementation of a programmable Cyclic Redundancy Check (CRC) computation circuit architecture, suitable for deployment in network related System-on-Chips (SoCs) is presented. The architecture has been designed to be field reprogrammable so that it is fully flexible in terms of the polynomial deployed and the input port width....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of FS-DT Algorithm to Enhance the Performance of Decision Tree

    In recent days Data mining gained a large amount importance because it enables modeling and knowledge extraction from the abundance of data which is available. In which Decision trees are powerful and popular tools for categorization and predicting knowledge discovery. Due to drawback of sharp decision boundaries decision tree algorithms...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Explicit Crosstalk Aware Delay Modelling for On-Chip RLC Interconnect for Ramp Input With Skin Effect

    With the increase in frequency towards the Giga hertz range, the analysis of high frequency effects like skin effect etc. are becoming extensively predominant and important for high speed VLSI design. Skin effect attenuates the high frequency components of a signal more than that of the low frequency components. Noise...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Simulation of Three Phase-Four Wire Compensated System Using the H-Bridge VSI Topology-Based DSTATCOM

    The Transient response of the Distribution STAtic COMpensator (DSTATCOM) is very important while compensating rapidly varying unbalanced and nonlinear loads. Any change in the load affects the dc link voltage directly. The sudden removal of load would result in an increase in the dc link voltage above the reference value...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Communication B/w Mobile-Robots' and PC Controller Based on ZigBee Network

    Mobile robots using Zigbee protocol for the purpose of navigation using personal computer, implemented with wireless vision system for remote monitoring and control. Its main feature is its use of the Zigbee protocol as the communication medium between the mobile robot and the PC controller. The hardware system is based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

    Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Security Thread Analysis & Solution for NGN (Next Generation Network)

    Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper, the authors concern about different security vulnerabilities...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Software Reliability Using SPC and Weibull Order Statistics

    Control charts are widely used for process monitoring. Software reliability process can be monitored efficiently by using Statistical Process Control (SPC). It assists the software development team to identify failures and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    MATLAB/Simulink Versus Refined Real Time Simulation of an Alternative Electrical Energy System in Dynamic Aspects

    Dynamic behavior of alternative energy based Hybrid Power System (HPS) is commonly analyzed using Matlab/Simulink. This way of simulation has the limitation in interfacing the model with hardware for real time control, which in turn limits in span of the simulation and consumes more time for simulation. Besides, simulator choice...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Fault Tolerant Environment Using Hardware Failure Detection, Roll Forward Recovery Approach and Microrebooting for Distributed Systems

    Fault tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault tolerant distributed environment encompasses all aspects of modern fault tolerant distributed computing. The built-in user transparent error detection mechanism covers processor node crashes and hardware transient failures. The mechanism also integrates user-assisted error...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Data Leakage Detection

    In this paper, the authors present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. They formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimization problem and handle the constraint....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Efficient Reuse of Bandwidth for Throughput Enhancement in IEEE 802.16 Networks

    IEEE 802.16 is a standard supporting applications demanding bandwidth. Bandwidth reservation and usage depends on the type of the application. Transmission rate varies with respect to transmission medium and traffic. If the amount of bandwidth reserved is less and actual load is more then the data may be distorted or...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Fault Tolerant Mechanisms for Efficient Data Recovery in Grid Environment

    Large clusters, high availability clusters and grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programming models. Distributed systems today are ubiquitous and enable many applications, including client-server systems, transaction processing, World Wide Web, and scientific computing, among many others....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Hybrid IDS for Detecting Intrusions Based on Classification of Features and Complex Relations

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. A Intrusion Detection System (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Analyzing Trends in the Mean Resequencing Buffer Occupancy and the Mean Resequencing Delay

    Under the assumption that all channels have the same transmission rate but possibly different time-invariant error rates, the authors derive the probability generating function of the resequencing buffer occupancy and the probability mass function of the resequencing delay. Then, by assuming the Gilbert - Elliott model for each channel, they...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Based Variable - Point FFT Processor

    An efficient variable length FFT processor is required for the downlink module of Orthogonal Frequency Division Multiple Access (OFDMA) system. This system is used in the mobility mode of the IEEE 802.16 Wireless MAN standard, commonly referred as WiMAX .In OFDMA system the carrier space is constant across different channel...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Cooperative Proxy Caching for Peer-to-Peer Traffic

    This paper is improving the performers of P2P traffic. Mainly this paper is Decrease the burden of P2P traffic on Internet Service Providers. Cooperate proxy is design to connect to cache peer and connect to all other peers. This paper can increase bit rate of cooperative caching. Cooperate proxy supporting...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Survey Paper on Peer-to-Peer Information Exchange in Wireless Network Using Network Coding

    In this paper, the authors study how network coding is useful for information exchange to be scheduled among peers to achieve high network throughput and lower transmission delay in wireless network, which helps in the throughput improvement, energy efficiency and delay minimization of the network. Network coding is a technique...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Based Implementation of 32 Bit RISC Processor

    In this paper, a design of general purpose processor with a 5 stage pipeline, to incorporate programmable resources in to a processor. RISC processors have a CPI (clock per instruction) of one cycle. This is due to the optimization of each instruction on the CPU and a technique called pipelining....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Object Oriented Implementation of Concept-Based User Profiles From Search Engine Logs

    User profiling is a fundamental component of any personalization applications. Most existing user profiling strategies are based on objects that users are interested in (i.e., positive references), but not the objects that users dislike (i.e., negative preferences). In this paper, the authors focus on search engine personalization and develop several...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Wireless Power Transmission

    In this paper, the authors have presented the concept of cable less transmission i.e. power without the usage of any kind of the electrical conductor or wires. They present an idea discussed here, how energy can be transmitted as microwaves, so as to reduce the transmission and allocation losses, known...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Hierarchical Scheduling for Multiprocessor Systems

    Heterogeneous computing changes a network of heterogeneous computers into a single computing resource entity. The central theme of heterogeneous computing is to utilize computing resources of different machine architectures. On one hand, many users find that the computers they use are not powerful enough to meet their purposes; on the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Automated Containment of Worms Based on Object Oriented Technologies

    After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to the people society. Facing this great security threat, the authors need to build an early detection system that can detect the presence of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Revolutionary Approach for Protecting the Software

    In this paper a revolutionary approach to protect the software were discussed. Software watermarking techniques was discussed. The various types of watermarking techniques such as static software watermarking and dynamic software watermarking were given. At the end, a more mathematical approach fro embedding a given watermark into software using logical...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Peer-to-Peer Information Exchange in Wireless Network Using Network Coding

    In this paper, the authors study how information exchange is scheduled among peers to achieve high network throughput and lower transmission delay in wireless network using network coding. Based on the study of these scheduling principles, they propose a Peer-to-peer Information Exchange (PIE) scheme with an efficient and light weight...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Review on Secure Data in Wireless Sensor Networks Using Randomized Multipath Routing

    Security in wireless sensor networks (wsn) is major issue recent years i.e., data confidentiality, authenticity, denial of service. In this paper, the authors present secure data delivery mechanism using security protocol. It can compute the same routes known to the source, hence, making all information sent over these routes vulnerable...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Spare Capacity Utilization for Restoration of Mesh Based Networks

    WDM optical networks provide enormous speed & capacity. In case of any failure event due to any physical damage to the network or any other reason, the network should have restoration capability. Restoration requires planning and resources. There are several approaches available to ensure fiber network survivability. But efficiency and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Study of Traditional Fairness Congestion Control Algorithm in Realistic WSN Scenarios

    Wireless Sensor Networks (WSNs) make possible many new emerging applications in a wide range of domains. WSN has large number of tiny sensor nodes densely distributed to produce high packet flow near the sink due to the convergent nature of upstream traffic. Congestion cause packet loss and due to this...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Global RWA Protocol for WDM Networks

    In this paper, the authors present the design of a Global RWA Protocol (GRP) consisting of 'N' sector networks, each with a Centralized Management System (CMS) and sectors acts as a node of a distributed system. As per the connection request it uses centralized or hybrid method (centralized and distributed)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Implementation of Skin Tone Based Steganography in Biometric Applications

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Efficient Key Generation for Multicast Groups Based on Secret Sharing

    Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main challenges for secure multicast is scalability, efficiency and authenticity. In this paper, the authors propose a scalable, efficient, authenticated group key agreement scheme for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Classification and Prediction Techniques Using Machine Learning for Anomaly Detection

    Network traffic data can be classified into binary class (i.e. anomaly-free and all others) or multi-level classes (e.g., anomaly-free, likely to be anomaly-free, anomaly-free, anomaly, likely to be anomaly, and unable to determined). In this paper, the focus is on the common supervised learning algorithms and methods for binary classification....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Software Standard and Metric Based Framework for Evaluating Service Oriented Architecture

    The paper proposes a metric based framework for evaluating service oriented architecture. Different models and metrics have been proposed in different perspective for evaluating service oriented architecture, but it has been recognized that the available models and metrics are insufficient. This paper gives a software standard based way to identify...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Analysis of Cross Site Scripting Attack

    Web applications have become a dominant way to provide access to online services. Simultaneously, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is being embedded into web pages to support dynamic client-side behavior. This script code is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of P2P Reputation Management Scheme Based on Distributed Identities and Decentralized Recommendation Chains

    The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Approach for Location Privacy Framework for Continuously Moving Objects

    In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. Advances in sensing and tracking technologies create new opportunities for location-based applications but they also create significant privacy risks. According to the report by Computer Science and Telecommunications Board...

    Provided By International Journal of Engineering Research and Applications (IJERA)