International Journal of Engineering Research and Applications (IJERA)

Displaying 121-160 of 748 results

  • White Papers // Jul 2014

    Interfacing Of PIC 18F252 Microcontroller with Real Time Clock via I2C Protocol

    Now-a-days, electronic clocks have predominately replaced the mechanical clock. They are much reliable, accurate, maintenance free and portable. In general, there are two kinds of electronic clocks. They are analog clock and digital clock. But digital clocks are more common and independent of external source. It would need the controlled...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Web Page Recommendation Using Web Mining

    On World Wide Web various kind of content are generated in huge amount, so to give relevant result to user web recommendation become important part of web application. On web different kind of web recommendation are made available to user every day that includes image, video, audio, query suggestion and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Efficient Design of Ripple Carry Adder and Carry Skip Adder with Low Quantum Cost and Low Power Consumption

    The addition of two binary numbers is the important and most frequently used arithmetic process on microprocessors, Digital Signal Processors (DSP) and data-processing Application-Specific Integrated Circuits (ASIC). Therefore, binary adders are critical structure blocks in Very Large-Scale Integrated (VLSI) circuits. Their effective application is not trivial because a costly carry...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Data Mining Concepts with Customer Relationship Management

    In this paper, the authors are discussing about how the data mining influencing on CRM (Customer Relationship Management). Data mining is important in creating a great experience at e-business. Data mining is the systematic way of extracting information from data. Many of the companies are developing an online internet presence...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Comparative Study of CMOS Op-Amp in 45nm and 180 nm Technology

    In this paper, the authors have provided a method for designing a two stage CMOS operational amplifier which operates at 1.8V power supply using Cadence Virtuoso 45nm CMOS technology. Further, designing the two stage op-amp for the same power supply using Cadence Virtuoso 180nm CMOS technology, keeping the slew rate...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2014

    Performance Comparison of CMOS and Finfet Based Circuits at 45nm Technology Using SPICE

    According to the Moore's Law, the number of transistors in a unit chip area double every two years. But the existing technology of integrated circuit formation is posing limitations to this law. CMOS technology shows certain limitations as the device is reduced more and more in the nanometer regime out...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Backpressure-Based Packet-By-Packet Adaptive Routing For Traffic Management in Communication Networks

    Back pressure-based adaptive routing algorithms where each packet is routed along a possibly different path have been extensively studied in the literature. However, such algorithms typically result in poor delay performance and involve high implementation complexity. In this paper, the authors develop a new adaptive routing algorithm built upon the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Wireless Mesh Networks Path Planning, Power Control and Optimal Solutions

    Wireless mesh networks are considered as a potential attractive alternative to provide Broadband access to users. In this paper, the authors address the following two questions: given a set of nodes with arbitrary locations, and a set of data rows, what is the max-min achievable throughput? And how should the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Implementing Smart Antenna System in Mobile Ad Hoc Networks

    As the necessity of exchanging and sharing data increases, users demand easy connectivity, and fast networks whether they are at work, at home, or on the move. Now-a-days, users are interested in interconnecting all their Personal Electronic Devices (PEDs) in an ad hoc fashion on the move. This type of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Network Life Enhancement in Wireless Sensor Network

    In Wireless Sensor Network (WSN) the main focus is on developing a mechanism to extend the network lifetime by energy balancing. To achieve this, LEACH (Low Energy Adaptive Clustering Hierarchical) protocol and LEACH-CC (LEACH-Centralized with Chain) protocol is used. But LEACH and LEACH-CC have some limitations that are overcome by...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Battery-Bandwidth Based Handover Framework for 3G/WLAN Using Android Handheld Devices

    In a heterogeneous network environment, transparent horizontal and vertical handover is a much desired feature. Effective handover solution would allow mobile device users to stay steadily connected, seamlessly switching between different access networks. If it is consistently connected to networks which offers best Quality of Service (QoS) then that would...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Higher Throughput and Energy Efficiency Multi-Channel MAC Protocol for Ad Hoc Network

    Traditional single-channel MAC protocols for wireless ad hoc and sensor networks favor energy efficiency over throughput. More recent multi-channel MAC protocols display higher throughput but less energy efficiency. In this paper, the authors propose EMAC, a negotiator-based multi-channel MAC protocol in which specially designated nodes maintain the sleeping and communication...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Evaluation of Software Re-Usability Using Software Metrics Through Fuzzy Logic

    Flexibility and quality through reusability, replace-ability, efficient reusability and scalability are some additional benefits of Component based software development .Component Based Software Engineering (CBSE) is a paradigm that aims at constructing and designing systems using a pre-defined set of software components explicitly created for reuse. According to Clements, CBSE embodies...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Messaging and Voice Conferencing Through Wi-Fi Network

    The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Integration of JAM and JADE Architecture in Distributed Data Mining System

    Data mining systems is used to discover patterns and extract useful information from facts recorded in databases. Knowledge can be acquired from database by using machine learning algorithm which computes descriptive representations of the data as well as patterns that may be exhibited in the data. Most of the current...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Aggregation Mechanism for Reducing Schedule Length in Tree Based Wireless Sensor Networks

    To explore and evaluate different techniques using real simulation models under multilevel communication paradigm. Data packets are time scheduled on single frequency channel by minimizing the time slots to complete a CONVERGECAST. Scheduling with transmission power control will diminish the effects of interference. The power control helps in reducing the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Crack Identification in Reinforced Concrete Beams Using Ansys Software

    Analytical determination of displacements and stresses in reinforced concrete material was difficult task and engineers had to rely on empirical formulas because concrete consists of heterogeneous material and creep and shrinkage influenced deformations in it. Due to these complexities engineers in past had been facing difficulties in coping such problems,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Dual Stacked Wideband Microstrip Antenna Array for Ku-Band Applications

    A microstrip antenna possesses many advantages such as low profile, light weight, small volume, conformal and mass production in addition to low Cost. This paper presents design of dual stacked microstrip patch antenna for operating frequency of 12.5 GHz. Investigations show that the proposed antenna has wide bandwidth and for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Novel High Performance Implementation of 64 Bit MAC Units and Their Delay Comparison

    A novel high performance 64 bit Multiplier-and-ACcumulator (MAC) is implemented in this paper. MAC plays a vital role in most of the Digital Signal Processing (DSP). The MAC unit is designed using vedic, braun, dadda multiplier and carry save adder hence, compared with performance of MAC unit using Wallace multiplier...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm

    Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to reliability, scalability, high performance and low band width most of the organizations are running their applications in cloud....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Micro-Controller Based Obstacle Avoiding Autonomous Robot

    In this paper, the authors study development of the obstacle avoiding spy robot, which can be operated manually as per the operator wants to take control of the robot himself, it also can be autonomous in its actions while intelligently moving itself by detecting the obstacles in front of it...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Cross-Cloud Testing Strategies Over Cloud Computing

    Cloud computing is the new paradigm to deliver all the hosted services over internet on demand. The ultimate goal of cloud computing paradigm is to realize computing as a utility. The cloud is rapidly maturing towards its goal to support a wide variety of enterprise and consumer services and real-world...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Privacy Preservation of Data in Data Mining

    For data privacy against an un-trusted party, anonymization is a widely used technique capable of preserving attribute values and supporting data mining algorithms. The technique deals with anonymization methods for users in a domain-driven data mining outsourcing. Several issues emerge when anonymization is applied in a real world outsourcing scenario....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    User Security in Cloud Using Password Authentication

    Cloud computing technology is an open standard, service-based, Internet-centric, safe, convenient data storage and network computing services. Cloud computing is an internet based model for enabling convenient, on demand network access to a shared pool of configurable computing resources. The software and data that the user access for their work...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Fpga Implementation of 8-Bit Vedic Multiplier by Using Complex Numbers

    In this paper, the authors describe the implementation of 8-bit vedic multiplier using complex numbers previous technique describes that 8-bit vedic multiplier using barrel shifter by FPGA implementation comparing the both technique in this paper propagation delay is reduced so that processing of speed will be high 8-bit vedic multiplier...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Discrimination Discovery and Prevention in Data Mining: A Survey

    Data mining is the computation process of discovering knowledge or patterns in large data sets. But extract knowledge without violation such as privacy and non-discrimination is most difficult and challenging. This is mainly because of data mining techniques such as classification rules are actually learned by the system from the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Performance Enhancement of Multi-Output Carry Look-Ahead CMOS CSA

    Carry Select Adder (CSA) is solitary of the best ever adders worn in numerous data-processing processors to complete speedy arithmetic functions. From the construction of the CSA, it is lucid that there is scope for sinking the vicinity and clout burning up in the CSA. This adder is based on...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2014

    Design and Analysis of a 32 Bit Linear Feedback Shift Register Using VHDL

    In this paper, the authors propose a 32 bit linear feedback shift register which generates pseudo-random test patterns as the input bit is a linear function of its previous state. The total number of random state generated on LFSR depends on the feedback polynomial. As it is simple counter so...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Performance Evalution of Reactive & Proactive Routing Protocols for Vehicular Adhoc-Networks with Varying Speed of Nodes

    Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, Vehicular Ad-hoc NETworks (VANETs) are considered to be the special application of infrastructure-less wireless Mobile Ad-hoc NETwork (MANET). In VANET networks, vehicles are used as nodes. The main concern for establishment of communication...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Enhancing Route Maintenance in RS-AODV

    Mobile Ad hoc NETworks (MANETs) are temporary formed, infrastructure-less networks. The performance metrics degrades due to the unstable channel conditions, network connectivity and mobility and resource limitations. To improve different performance metrics, various cross-layering techniques are used where different layers from protocol stack communications with each other via exchange of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Web Application Scanning and Identification of Vulnerabilities for Different Attacks

    Now-a-days there are lots of websites present in internet. And providing different services to the client is not only important task for website owner but also protecting their website from different attacks. Now-a-days identification of vulnerabilities in web application is becoming serious issue. Protecting website by identifying vulnerabilities and taking...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Novel Design of Star-Shaped Fractal Slot Antenna for WLAN and X-Band Applications

    A wideband triangular microstrip antenna is proposed for wireless applications. The antenna has been modified into a star-shaped patch whose impedance bandwidth increases by using the fractal configuration. The design procedure is presented and characteristics of the antenna are analyzed. A 50-ohm microstrip line is used to excite the star-shaped...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Review Paper on Route Maintenance in Stability Based Energy Aware Routing Protocol in MANET

    Mobile Ad hoc NETworks (MANETs) are temporary formed, infrastructure-less networks. Due to the mobility in nature of mobile nodes, limited battery, congestion, as well as noise, the problem of link failure causes. The performance metrics degrades due to the unstable channel conditions, network connectivity, and mobility and resource limitations. This...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Broadband Electromagnetic Gap-Coupled Assembly of Patches Forming Trapezoidal Microstrip Antenna for S-Band Application

    In this paper, the authors' aim is to design an Electromagnetic Gap Coupled Trapezoidal Shaped Microstrip Patch Antenna (GCTSMPA) which is suitable for Microwave S-band applications. This antenna offers much improved impedance bandwidth 20%. The proposed antenna has achieved a suitable gain of 3.90 dBi and 0.99 dBi at resonating...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Gain and Bandwidth Enhancement of Electromagnetic Gap-Coupled Assembly of Various Patches Forming Rhombus Shaped Microstrip Patch Antenna for C-Band Applications

    The microstrip patch antenna has found extensive applications in wireless communication systems owing to their advantages such as low profile, conformability, low fabrication cost and ease of integration with feed network. In this paper, the authors enhance the gain and bandwidth of rhombus shaped microstrip patch antenna. For this purpose,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Study on Smart Antenna Systems and Implementation in Mobile Ad Hoc Networks

    Wireless carriers have begun to explore new ways to maximize the spectral efficiency of their networks. Research efforts investigating methods of improving wireless systems performance are currently being conducted worldwide by the deployment of Smart Antennas (SAs) along with impressive advances in the field of digital signal processing for achieving...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Survey of DOS Flooding Attacks over MANET Environment

    Mobile Ad hoc NETwork (MANET) is one of the most up-and-coming fields for research and review of wireless network. Essential requirement in MANET is security. In ad hoc network the communicating nodes sets new challenges for the security architecture because it doesn't necessarily feed on fixed infrastructure. The ad-hoc network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Ee-LEACH(Low Energy Adaptive Clustering Hierarchy) Modified Protocol

    A Wireless Sensor Network (WSN) is made by many homogeneous and/or nodes which can sense data and communicate to each other. As energy is a scarce resource in WSN, the main issue is energy efficient routing. Many flat and hierarchical protocols have been projected to enhance the network lifetime. Low...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Effect of Blackhole Attack on Single Hop and Multihop Leach Protocol

    Wireless micro sensor networks provide reliable monitoring of remote areas for data-gathering. Due to the limited battery capacity of sensor nodes, energy consumption plays an important role in the operation of WSN. This can be improved by using a protocol called Low Energy Adaptive Clustering Hierarchy (LEACH).Malicious attacks are generated...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Multiuser Detection in MIMO-OFDM Wireless Communication System Using Hybrid Firefly Algorithm

    In recent years, future generation wireless communication technologies are most the prominent fields in which many innovative techniques are used for effective communication. Orthogonal Frequency-Division Multiplexing (OFDM) is one of the important technologies used for communication in future generation technologies. Although it gives efficient results, it has some problems during...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Fault Tolerant Environment Using Hardware Failure Detection, Roll Forward Recovery Approach and Microrebooting for Distributed Systems

    Fault tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault tolerant distributed environment encompasses all aspects of modern fault tolerant distributed computing. The built-in user transparent error detection mechanism covers processor node crashes and hardware transient failures. The mechanism also integrates user-assisted error...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Data Leakage Detection

    In this paper, the authors present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. They formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimization problem and handle the constraint....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Efficient Reuse of Bandwidth for Throughput Enhancement in IEEE 802.16 Networks

    IEEE 802.16 is a standard supporting applications demanding bandwidth. Bandwidth reservation and usage depends on the type of the application. Transmission rate varies with respect to transmission medium and traffic. If the amount of bandwidth reserved is less and actual load is more then the data may be distorted or...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Fault Tolerant Mechanisms for Efficient Data Recovery in Grid Environment

    Large clusters, high availability clusters and grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programming models. Distributed systems today are ubiquitous and enable many applications, including client-server systems, transaction processing, World Wide Web, and scientific computing, among many others....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Review on Efficient Requirements of Greedy, Face, and Combined Greedy-Face Routing

    Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery. This paper gives the brief...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Internet Based Material Selection for Quality Function Deployment

    The Internet, incorporating computers and multimedia, has provided tremendous potential for remote integration and collaboration in business and manufacturing applications. The Internet is making the manufacturing world truly global, connecting buyers and sellers from around the world in all aspects of their business. Material selection is one of the important...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on 3-Tier Multicasting Routing Protocol in Manets

    The growing interest in Mobile Ad Hoc Network techniques has resulted in many routing protocol proposals. Scalability issues in ad hoc networks are attracting increasing attention these days. In this paper, the authors will discuss the routing protocols that address scalability. The routing protocols they intend to include in the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    A Review on Fast Handoff Mechanism in Mobile Adhoc Networks Using CSA-PHMIPv6

    In this paper, PHMIPv6 proposes to select the node with the highest signal strength as the partner node. and CSA- PHMIPv6 for which mobile hosts select partners with whom communication can last for a sufficiently long time by employing the Link Expiration Time (LET) parameter. The internet-based applications have transformed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A Novel Cellular Automata Based Real Time Path Planning Method for Mobile Robots

    Path planning method for mobile robots based on two dimensional cellular automata is proposed. The method is appropriate for multi-robot problems as well as dynamic environments. In order to develop the planning method, environment of the robot discretized by a rectangular grid and the automata with four states is defined...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Synthesis of a Field Programmable CRC Circuit Architecture

    The design and implementation of a programmable Cyclic Redundancy Check (CRC) computation circuit architecture, suitable for deployment in network related System-on-Chips (SoCs) is presented. The architecture has been designed to be field reprogrammable so that it is fully flexible in terms of the polynomial deployed and the input port width....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of FS-DT Algorithm to Enhance the Performance of Decision Tree

    In recent days Data mining gained a large amount importance because it enables modeling and knowledge extraction from the abundance of data which is available. In which Decision trees are powerful and popular tools for categorization and predicting knowledge discovery. Due to drawback of sharp decision boundaries decision tree algorithms...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    An Explicit Crosstalk Aware Delay Modelling for On-Chip RLC Interconnect for Ramp Input With Skin Effect

    With the increase in frequency towards the Giga hertz range, the analysis of high frequency effects like skin effect etc. are becoming extensively predominant and important for high speed VLSI design. Skin effect attenuates the high frequency components of a signal more than that of the low frequency components. Noise...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Modeling and Simulation of Three Phase-Four Wire Compensated System Using the H-Bridge VSI Topology-Based DSTATCOM

    The Transient response of the Distribution STAtic COMpensator (DSTATCOM) is very important while compensating rapidly varying unbalanced and nonlinear loads. Any change in the load affects the dc link voltage directly. The sudden removal of load would result in an increase in the dc link voltage above the reference value...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Communication B/w Mobile-Robots' and PC Controller Based on ZigBee Network

    Mobile robots using Zigbee protocol for the purpose of navigation using personal computer, implemented with wireless vision system for remote monitoring and control. Its main feature is its use of the Zigbee protocol as the communication medium between the mobile robot and the PC controller. The hardware system is based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    A Novel Approach for Secured Symmetric Key Distribution in Dynamic Multicast Networks

    Multicasting is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The communication and storage complexity of multicast...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Security Thread Analysis & Solution for NGN (Next Generation Network)

    Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper, the authors concern about different security vulnerabilities...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Feb 2015

    Development of User-Friendly Software to Design Dairy Heat Exchanger and Performance Evaluation

    In this paper, the authors propose a calculation algorithm and development of a software in Visual Basic (Visual Studio 2012 express desktop) used in heat transfer studies when different heat exchangers are involved (e.g. helical type triple tube heat exchanger, plate type heat exchanger). It includes the easy calculation of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    A Fuzzy Logic Based Network Dependent Routing Algorithm for Ad Hoc Wireless Networks

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2011

    Low Voltage Low Power Gilbert Cell Based Multiplier Circuit

    In this paper a low voltage low power multiplier circuit based on the Gilbert Cell is presented. Spice simulation using 180nm technology is carried out to demonstrate the working of the proposed circuit. Power dissipation of the circuit is 0.0755mW. The -3dB bandwidth of this multiplier is 26.73GHz. Analog multipliers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    Performance Evaluation & Comparison of Routing Protocols for Ad Hoc Wireless Networks

    The recent advances and the convergence of micro electro-mechanical systems technology, integrated circuit technologies, microprocessor hardware and nano technology, wireless communications, ad-hoc networking routing protocols, distributed signal processing, and embedded systems have made the concept of wireless networks. Wireless network nodes are limited with respect to energy supply, restricted computational...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    Strict 2 Phase Locking in Organizational Data Protection

    Privacy and data security have been issues since the advent of paper and pencil. But with the emergence of networked computing and the Internet, controls that worked effectively for the last 20 or 30 years have to be reevaluated. This paper addresses first the protection of organizational data that has...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Optimal Capacitor Sizing for Power Loss Minimization in Distribution Networks

    Power sectors are currently facing power shortage due to high distribution losses and the efforts are concentrated on increasing generation capabilities resulting in increased capital cost. But power savings are also possible by improving operating strategy for distribution system such as distribution reconfiguration, capacitor placement and Facts devices etc. In...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jun 2011

    The Architecture of Data Storage System for a Digital Library

    Today's society is the information society and the libraries are moving from traditional towards digitalization. The digitalization is the result of the need of modern information society. The paper explains the concept and architecture of a digital library. Problems, challenges and issues involved in design and development of standard digital...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Hiding the Text and Image Message of Variable Size Using Encryption and Compression Algorithms in Video Steganography

    Steganography is a science that focuses on hiding specific messages using specialized techniques in such a way as only the sender and the intended receiver are able to disclose it. There are many different protocols and embedding techniques that enable one to hide data in a given object. However, all...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    High Performance Cluster Architecture

    A computer cluster is a group of loosely coupled computers that work together closely so that in many respects they can be viewed as though they are a single computer. Clusters are commonly, but not always, connected through fast local area networks. Clusters are usually deployed to improve speed and/or...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    An Improved Application Package for Mobile Devices on Symbian Platform

    This paper focuses on the growing trends in the processor speed of mobile devices, which has already touched 2GHz and the huge internal and external memory available in the form of Micro SD cards, with supportable communication technology like 3rd Generation Mobile Telephony. The mobile devices shall be out casting...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Double Slot Coupled Microstrip Antenna

    To improve the radiation performance a double slot coupled microstrip antenna has been proposed .The proposed antenna is based on the adjustment of the phase distribution in such a way that the phases should be added in one direction and cancelled out in the other direction. In upper half plane...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A New Technique of Call Forwarding Using Remote Mobile

    In conventional call forwarding a subscriber can forward his call to another subscriber by configuring his mobile. This paper presents a new approach in which a subscriber can forward his call to another subscriber by configuring his mobile using some available mobile. Call forwarding (or call diverting), in telephony, is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design and Implementation of Built-in-Self Test and Repair

    Survey of ITRS in 2001,the System-on-Chips (SoCs) is moving from logic dominant chips to memory dominant chips in order to deal with today's and future application requirements. The dominating logic (about 64% in 1999) is changing to dominating memory (approaching 90% by 2011). These shrinking technologies give rise to new...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Security Mechanisms for MANET Routing Protocols Using Random Waypoint Models in Cryptography Analysis

    Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, transmitting the data from source to destination in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design & Implementation of 8 Bit Galois Encoder for on FPGA Secure Data Transmission

    Galois Field Theory deals with numbers that are binary in nature, have the properties of a mathematical "Field," and are finite in scope. Galois operations comprises of Addition, multiplication and logarithms. Galois Field multipliers have been used for coding theory and for cryptography. Both areas are complex, with similar needs,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Network Attack Path Identification and Packet Filtering With Traceback Mechanism

    Majority of the network host today are threatened by the network attacks like Denial-of-Service (DoS) attack, Distributed DoS (DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Performance of VoIP in WLANs

    The WLAN is the rapidly growing technology used for communication today. Integration of VoIP is the current area of research that is very lucrative as it would reduce the communication cost to a very large extent. Presently, the authors have high speed data networks available but, they have poor performance...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Preventive Measures for MITM in 3G-WLAN Integrated System

    The 3G-WLAN integrated system provides communication with high bit rate and wide area coverage. On the other hand it is also susceptible to attack like non-repudiation, DoS, MITM etc. There can be many problems like data integrity, fraud in wireless communication. To avoid this various preventive measures can be taken...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Nov 2011

    Implementation of Intrusion Recognition System in Distributed Systems

    Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. One of the primary challenges in intrusion recognition is modeling typical application behavior, so that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Turbo Coding Based High Performance Technique to Minimise Privacy and Safety Issues in RFID

    Radio Frequency IDentification (RFID) technology is playing a very crucial role in tracking objects and their location, individuals, for the purpose of identification. The RFID system is an emerging technology widely used in various fields including the circulation, military affairs, health care, medicine etc. In this technology a RFID tag...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    FPGA Implementation of an Algorithm to Identify a BPSK (Barker) Signal

    Modern radars use phase modulated signals to spread their spectrum to improve the processing gain. The Identification of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design and Implements of Booth and Robertson's Multipliers Algorithm on FPGA

    The Arithmetic and logical unit play an important role in digital systems. Particular, Multiplication is especially relevant instead of other arithmetic operators, such as division or exponentiation, which one is also utilized by multiplier as building blocks. Multipliers are key components of many high performance systems such as FIR filters,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    Design & Simulation of a CDMA Based Bidirectional Wireless Communication Data Link System for Airborne Applications

    Wireless communications is a rapidly growing segment of the communications industry, with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. The present project will focus on the design and simulation of a secured CDMA based bidirectional communication data link for airborne applications....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2011

    Implementation of Skin Tone Based Steganography in Biometric Applications

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By International Journal of Engineering Research and Applications (IJERA)