International Journal of Engineering Research and Applications (IJERA)

Displaying 161-200 of 697 results

  • White Papers // May 2014

    Emerging Trends in Embedded Processors

    In this paper, the authors provide a brief introduction to embedded systems, including their main components and application areas. An embedded processors is simply a processors that has been \"Embedded\" into a device. Embedded systems are important part of human life. For illustration, one cannot visualize life without mobile phones...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Novel Architecture of 17 Bit Address RISC CPU with Pipelining Technique Using Xilinx in VLSI Technology

    In this paper, the authors describe the design of a 17 bit 4 stage pipelined Reduced Instruction Set Computer (RISC) processor using Verilog HDL in Xilinx. The processor implements the Harvard memory architecture, so the instruction and data memory spaces are both physically and logically separate. There is 5 bit...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Modeling Level Wise Role-Based Access Control for Commercial Database Systems

    Now-a-days, database system is becoming more crucial as the scale of database is growing. Traditional access control policies have certain disadvantages. So as a promising alternative to traditional access control policy, Role-Based Access Control (RBAC) has received special attention for its unique flexibility. RBAC provides access control based on permissions...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    A Survey On Data Mining Techniques In Customer Churn Analysis For Telecom Industry

    Customer churn prediction in Telecom Industry is a core research topic in recent years. A huge amount of data is generated in Telecom Industry every minute. On the other hand, there is lots of development in data mining techniques. Customer churn has emerged as one of the major issues in...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Specialized Hardware Architecture for Smartphones

    The processor architecture of conventional processor is not suitable for Smartphone as conventional processor consumes very high energy. The authors need some specialized processor architecture to work with energy starved \"Smartphones\". Smartphone's provides them the capability of a typical computer with absolute mobility and small form factor. But the hardware,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // May 2014

    Smartphone's Hardware Architectures and Their Issues

    A Smartphone is a mobile phone built on a mobile computing platform, with more advanced computing ability and connectivity than a feature phone. The initial Smartphone were devices which mainly combined the functions of a Personal Digital Assistant (PDA) and a mobile phone or a camera phone. Today's models also...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Multi-functional High frequency DDS using HDL for Soft IP core

    A multi-functional high-efficiency generation of spectrally pure, wide-band, multi-carrier waveforms is a key objective in modern communication and radar applications. A high-efficiency signal generator is a device that can output various types of signal waveforms, such as sine wave, saw tooth wave, square wave, triangle wave, trapezoidal wave and so...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Hardware and Software Co-Design for Wireless Fire Fighting System

    Technological growth in modern era leads to varied protection against fire based disasters for people, property and business even though fire fighting still remains area of concern. Fire fighting though being a dangerous profession needs a fire extinguishing system that can be easily implemented, used and with minimum investment. This...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Building A Secure & Anti-Theft Web Application By Detecting And Preventing Owasp Critical Attacks- A Review

    Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Identity-Based Cryptosystem for Mobile Network

    There is a rapid development in the area of Information Communication Technology (ICT). Mobile devices (e.g., PDA, mobile phone, and notebook PC) become necessary for a modern life. Users can use them to access many applications, for example online shopping, mobile pay TV, internet banking, which have been deployed on...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review On-Implementation of Truthful Routing Path Generation in Wsns Through Tarf

    To face this problem, the authors propose a truthful routing protocol which adopts the routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbors. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review of Anonymization of Social Networks Concepts and Methods

    Now-a-days, the use of social networks website is growing at phenomenal rate. Social networks involve connections which allow individuals to get connected to their friends and family. The social networking websites like Face book, Twitter, Google+ etc are easily accessible to end users through mobile and any other Internet resources....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Palmprint Recognition System Using an Association Extraction Methodology of Principal Lines

    Biometric system uses technology of pattern recognition which makes identification by determining the authenticity of specific behavioral or physiological characteristics possessed by an individual. Human palm is used as biometric measure to identify an individual because of its unique, stable, discrete and multiple features such as principal lines, wrinkles, ridges,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Analysis of Graphical Based Password

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. For such authentication generally text (alphanumeric) is used. It is well-known, however, that passwords are susceptible to attack: users tend to choose passwords that are easy to remember, and often this means that they are also...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review on Packet Forwarding Using AOMDV and LEACH Algorithm for Wireless Networks

    In this paper, the authors focus on reducing the energy consumption and to avoid packet loss of wireless sensor networks. Therefore, a communication protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) is used. LEACH, a clustering-based protocol that utilizes randomized rotation of local cluster base stations (cluster heads) to evenly distribute the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Crime Mining From Crime Warehouse

    Historically solving crimes has been the prerogative of the criminal justice and law enforcement specialists. With the increasing use of the computerized systems to track crimes, computer data analysts have started helping the law enforcement officers and detectives. The manual method of keeping and maintaining records was found to be...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Jamming Aware Traffic Allocation in Wireless Mesh Network for Multiple Path Routing Using Portfolio Selection

    In wireless mesh network many problems encountered, the authors present a jamming aware traffic allocation in single path as well as multiple path routing. In this paper, they observed and consider jamming problem for traffic allocation from source to destination i.e. based on non experience traffic jammed on any network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    3D Game Design and Developmentof 3D Shooter Game Using XNA

    Gaming industry is one of the booming industries in today's world. Video games are becoming a huge sensation among people. This is basically due to innovations in technology such as high quality graphic cards and faster processors. This paper will mainly discuss the 3D game engine and various technologies involved...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Review of Energy Efficient In-Network Data Aggregation Protocols

    A Wireless Sensor Network (WSN) consists of hundreds or thousands of sensor nodes. The basic role of these nodes is to collect data from an environment and send it to sink node. This process generates huge amount of data. The communication among sensor nodes causes high power consumption. The main...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Search Engine for Personal Mobile

    A Personalized Mobile Search Engine (PMSE) that captures the users' preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users' locations (positioned by GPS) are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Mobile Search Browser

    Web service is a popular standard to publish services for users. However, diversified users need to access web service according to their particular preferences. Mobile search is quite different from standard PC-based web search in a number of ways: the user interfaces and I/O are limited by screen real state;...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Link Prediction in Temporal Mobile Database

    The rapid development of wireless and web technologies has allowed the mobile users to request various kinds of services by mobile devices at anytime and anywhere. The services which are provided to the wireless mobile devices (such as PDAs, cellular phones, and laptops) from anywhere, at any time using ISAP...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Secret Sharing Schemes: A Review

    The technique to hide a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Consider, the users...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks Using Identity-Based Short Signature Scheme

    Wireless reprogramming in a Wireless Sensor Network (WSN) is the process of uploading a new code image or relevant commands to sensor nodes or changing the functionality of existing code. As a WSN is usually deployed in hostile environments, so for security reasons every code update must be authenticate to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Analysis on MPTCP Combining Congestion Window Adaptation and Packet Scheduling for Multi-Homed Device

    Evolution of use of wireless technologies in laptops and mobile terminals, which are equipped with several network interfaces, has provided users to take advantage from multi-homing to access network services anywhere, at any time and from any network. Advantage with multi-homed host is that some of the traffic from more...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An Efficient Private Search Technique Using SADS Algorithm

    The ability to securely share sensitive information between untrusting parties is a prerequisite for many real-world applications. There exist many large collections of private data that must be protected on behalf of the entities that hold them or the clients they serve. For example, two intelligence agencies might be willing...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design an Algorithm for Vertical Handover In Heterogeneous Network

    A heterogeneous network is consisting of different wireless access standards. For seamless data transfer a Vertical Hand-Off (VHO) plays a major role. Vertical Hand-Off decision (VHO) is totally based upon Received Signal Strength (RSS) measurements. Hand-Off (HO) decision is made individually without considering other HO User Equipments (UE). User mobility...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Modeling and Detaining the Mobile Virus Proliferation Over Smartphone

    The Android operating system devices have been on the rise and the malware threat is expected to increase with the functionality enhancement of mobile phones. In a mobile network, viruses can cause privacy leakage, extra charges, battery power depletion, remote listening and accessing private short message and call history logs...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    To Design and Implement a Novel Method of Encryption Using Modified RSA Algorithm and Chinese Remainder Theorem

    RSA cryptosystem is the most attractive and popular security technique for many applications, such as electronic commerce and secure internet access. It has to perform modular exponentiation with large exponent and modulus for security consideration. The RSA cryptosystem takes great computational cost. In many RSA applications, user uses a small...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review paper on Security Mechanism for Supporting Routing Services on WANET

    Increases the dependence of people on critical applications in wireless networks, high level of reliability, security and availability to ensure secure and reliable service operation. The use of SAMNAR (Survivable Ad hoc and Mesh Network ARchitecture) to design a path selection scheme for WANET routing and using the concept of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An Energy Saving Approach in Wireless Sensor Network

    Wireless sensor networks consist of small battery powered devices with limited energy resources. Generally nodes are deployed in an area where human being cannot reach, therefore the small sensor nodes are usually not accessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Novel Approach to System Security Against Split Personality Malware

    The malware is known as malicious code and malicious software. Malware is fed into the victim's system in order to destroy the victim's data, applications or operating system or otherwise annoying or disrupting the victim. Malware analysts use virtual machines to determine any sample program and check them to detect...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Anti-Phishing Enabled Web Browser

    Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites and e-mail. Phishing is a security attack that involves obtaining sensitive or otherwise private data by presenting oneself as a trustworthy entity. Phishers often exploit users' trust on the appearance of a site by using...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Improving the Quality of Services in Wireless Sensor Network by Improving the Security

    Wireless Sensor Network (WSN) is been used very widely over the recent years in the various field such as defence, medical research, security and many more, because of its advantages such as WSN can pass through any physical partition, it can accommodate any new node at any time. Wireless sensor...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    IP Traceback Approaches for Detecting Origin of DDoS Cyber Attackers

    Investigating the sources of a Denial of Service (DoS) and Distributed Denial of Services (DDoS) attack is hardest in the internet security area, cyber-attackers often use incorrect source IP addresses in attack packets (spoofed IP packets) to achieve anonymity, reduce the risk of trace-back and avoid detection. IP traceback system...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review of Intrusion Detection Systems (IDS) and Agents Based IDS

    Since last decade in network security research area, security of mobile ad hoc networks and computer network is becoming important in every individual's day-to-day life. There are many tools and methods presented by various authors to protect wired and wireless networks from different kinds of security threats. These tools are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    GSM and GPS Based Vehicle Security and Controlling System

    Vehicle security is the major concern now-a-days. Vehicle manufacturers try to modify security system by implementing different technologies. Currently central locking system and also theft detection system is available in the vehicle these can alert vehicle owner for theft detection. But major problem with all these system having a major...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Implementation of Intrusion Detection Response System (IDRS) for Reliability of Cyber Physical Systems (CPS)

    In this paper, the authors are to design and validate Intrusion Detection Response System (IDRS) for a Cyber Physical System (CPS) comprising sensors, actuators, control units, and physical objects for controlling and protecting physical infrastructures. The design part includes host IDS, system IDS and IDS response designs. The validation part...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Implementation of Vertical Handover in Heterogeneous Networks

    One of the major design issues in heterogeneous wireless networks is the support of vertical handover. Vertical handover occurs when a mobile terminal switches from one network to another (e.g., from WLAN to CDMA 1xRTT). Seamless handover between different access technologies is a great challenge as it needs to obey...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Neural Network Color Classifier in HSV Color Space

    In this paper, a neural network approach for color classification in HSV color space based on color JND (Just Noticeable Difference) is presented. The HSV color samples are generated using an interactive tool based on JND concept and these samples are used for supervised training. A four layer feed forward...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Performance /Efficiency Enhancement of Dynamic Source Routing Protocol in Wireless Mesh Networks

    A Wireless Mesh Network (WMN) is a collection of wireless nodes that form a network connection. There are several routing protocols like TORA, HEAT, AODV and DSR etc. which have been designed for providing communication among all the nodes in the wireless network. DSR is a reactive routing protocol and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Combined Scheduling of Gps Signals in a Gsm Based Guidance System

    The bus arrival time at bus stops in urban traffic environment is highly unpredictable. This is due to random fluctuations in travel demands and interruptions caused by traffic system, incidents, and weather conditions. As the population is increasing in cities transportation has become difficult. In this paper, the authors present...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Design of Microstrip Antenna Using Artificial Neural Network

    In this paper, the authors present the general design of microstrip antennas using artificial neural networks for rectangular patch geometry. The design consists of synthesis in the forward side and then analyzed as the reverse side of the problem. In this paper, the neural network is employed as a tool...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Design and Simulation of Dual Band Rectangular Patch Antenna for Bluetooth & Wimax Applications

    In this paper, the authors present a dual band rectangular patch antenna. Here Neltec NX 9240 epoxy substrate material with dielectric constant 2.4 and tangent loss 0.0016 is used. The two bands produced are used for Bluetooth (2.4GHz-2.484GHz) and WiMax (3.2GHz-3.8GHz) applications. The frequency used to set design parameters is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Energy-Efficient Power Allocation and Performance Estimation for MIMO-MRC Systems

    Adaptive power allocation problem where it minimizes the Energy-Per-Good bit (EPG) of a system employing a Multiple-Input Multiple-Output Maximum Ratio Combining (MIMO-MRC) scheme is formulated. Closed-form results are obtained for the optimum transmits power and minimum EPG as a function of the number of antennas employed and the quality of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    A Novel Approach for Controlling Mobile Data Offloading Between 3GPP and Non-3GPP Access Networks

    Mobile network traffic is growing rapidly, and service providers must manage their networks efficiently to meet consumer demand. Mobile data offloading is the use of complementary network technologies for delivering data originally targeted for cellular networks. Access Network Discovery and Selection Function (ANDSF) is the most complete 3GPP approach to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Adaptive Modulation and Coding with Incremental Redundancy Hybrid ARQ in MIMO Systems: A Cross Layered Design

    In this paper, the authors present generation wireless systems has significant growth in the demand for reliable high-speed wireless communication links for multimedia applications like voice, video, e-mail and web browsing etc. Attaining highly reliable links is a challenging task in wireless environment. MIMO exploits space dimension to improve the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Reservation Based Vehicle Parking System Using GSM and RFID Technology

    In this paper, the authors are to develop a reservation based vehicle parking reservation system to overcome the problem of unnecessary time consumption in finding parking spot in commercial parking areas. In this proposed system, they reserve the parking slot in shopping malls, theatres and offices by using Short Message...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Casting Selfish Nodes Into Non Selfish in Replica Allocation Over Mobile Ad Hoc Network

    The nodes in Mobile Ad hoc NETwork (MANET) are resource constrained. This drawback and mobility nature of nodes can cause network partitioning and degradation of performance. Traditionally replica allocation techniques were used to overcome the drawback of performance degradation. It is assumed that all nodes in MANET share their memory...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    A Wireless Secured Direct Data Transmission Between Authenticated Portable Storage Devices Through GSM Network

    A secured data transmission has become a great challenge especially in education system. The question paper transmission during examinations needs a fast, highly secured with proper authenticated system. In this paper, a secure and fast way of direct end to end data transmission is proposed. This system acquires the data...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2013

    Early Detection of Forest Fire Using Wireless Sensor Network

    Wireless Sensor Networks (WSNs) have a broad range of applications in the category of environmental monitoring. In this paper, the problem of forest fire is considered and a comprehensive framework is proposed for the use of wireless sensor networks for real-time forest fire detection and monitoring. The wireless sensor network...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Impact of Variable Transmission Range and Scalability with Respect to Mobility and Zone Size on Zone Routing Protocol Over Manets

    A variety of protocols are used in ad hoc network but the most popular protocol one is Zone Routing Protocol (ZRP). ZRP is a hybrid routing protocol. Transmission power affects the design and performance of all the protocols in Mobile Ad hoc NETworks (MANETs). Mobility of nodes and selection of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Wages, Productivity and Optimal Payment in Efficient Software Projects

    In this paper, the authors will study the efficiency wages, productivity, optimal payment and employment. Managerial economics theory about these topics will be put in practice by research done on the software development department of a software company. Having several samples of input cost and output productivity over the last...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Effects of Jelly Fish Attack on Mobile Ad-Hoc Network's Routing Protocols

    MANET is Mobile Ad-hoc NETwork, which is a group of number of mobile nodes that forms ad-hoc network. Network nodes communicate with each other without the assistance of any centralized authority or management. This paper focuses on the effects of jelly fish attack on MANET's routing protocols. Here four protocols...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Biometric Cc Cam for Identifying a Particular Object or Person Initially

    Biometrics is not novel to everyone. But the authors are eager to follow the features provided by biometrics for their security in offices and in any other security required areas. But they are not bothering about the nation security. Today the biometric cc cam is not completely available for their...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    A Novel Approach of Performance Analysis of a Novel ICI Through ICI Self-Cancellation-Scheme in OFDM Systems Using BER

    OFDM is a multicarrier modulation technique in which a high rate bit stream is split into N parallel bit-streams of lower rate and each of these are modulated using one of N orthogonal sub-carriers. In a basic communication system, the date is modulated onto a single carrier frequency. The available...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Performance Analysis of MC-CDMA Based Fixed Wimax Technology by RS Encoder for Different Modulation

    WiMAX (Worldwide interoperability for Microwave Access) is next generation high speed wireless technology provides long distance transmission. Generally WIMAX is OFDM based architecture standardized by IEEE 802.16. The authors' aim to analyze the performance of WiMAX in MC-CDMA (Multi-Carrier Code Division Multiple Access) for RS encoder under various modulation techniques....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Advancements in GSM Technology Using Smart Antenna: An Overview

    The performance of GSM is limited mainly by four major problems. First is the multipath fading. In this the information signal propagates through different paths. One signal arrives as a direct signal whiles other signals as multipath signals. In this paper, the authors discuss about the problems facing by GSM...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    A Closer Look at SMS-Based E-Banking Services Using Elliptic Curves

    With the ushering in of cell phone technology in the country, many financial institutions have launched SMS-based e-banking services. However, the transmission of SMS in cell phone networks is not secure as the message is sent in plaintext form. So, the content of the message may be exposed to anybody....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Performance Evaluation of WIMAX System Using QPSK Simulation and Rayleigh (NLOS) Multipath with Added AWGN

    In modern world, wireless communication systems are involved in every part of life. WiMAX is the upcoming wireless system which uses IEEE standard 802.16.By using WiMAX technology the authors can overcome the limitations of the existing wireless communication like short coverage area, lack of security and low data rate. In...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Design and Implementation of Secured Power Line Communication with Enhanced Rfid Applications

    Evaluation of any communication technology is only relevant in the context of the operating environment. This seemingly obvious point, frequently bypassed in general analysis, cannot be overlooked in the field of power line communications. The conditions required for superposition to be applicable (i.e., linearity and time invariance) are not met...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Congestion Control Load Balancing Techniques in MANET: A Survey

    In Mobile Ad hoc NETwork (MANET), there is no pre-existing communication infrastructure (no access points, no base stations) and the nodes can freely move and self-organize into a network topology. Such a network can contain two or more nodes. Hence, balancing the load in a MANET is important because the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Performance Evaluation of Wimax Network Based On Probability Transition Matrix

    Although operating on the same general principles as Wi-Fi; sending data from one computer to another via radio signals, WiMAX is much faster (70 megabits per second) and covers more distance (blanket a radius of 50km) than Wi-Fi. As fourth generation wireless mobile communications, WiMAX provides group of users with...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Machine Learning Techniques for Mobile Devices: A Review

    Machine learning in a very broad sense denotes the acquisition of knowledge, skill and understanding by machine from guidance, experience or reflection. Machine learning is the study of computer algorithms, applying these algorithms machines improve automatically with experience. In other words it is the ability of the computer or mobile...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Ant Colony Optimization Techniques in MANET for Efficient Routing: A Survey

    All networks tend to become a lot of and a lot of difficult. They will be wired, with several routers, or wireless, with several mobile nodes, the matter remains the same: so as to induce the best from the network, there's a requirement to search out the shortest path. The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Novel Approach for Dynamic Data Collection in Tree Based Wireless Sensor Networks

    In the wireless sensor networks the energy of the nodes present in the network is limited. Due to the low manufacturing costs of sensor nodes, they can be organized in large numbers and containing more challenges in routing, topology and data management protocols. These challenges are complicated by severe energy...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Implementation of Low Cost RF Based Attendance Management System Using PSOC 5 and GSM Module

    In this paper, the authors are to manage the student's attendance by using RF ID cards and updating it to the student or parent through SMS by using GSM module. An Attendance Management System (AMS) based on TCP/IP protocol is designed and realized. This paper expounds the principle of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Swarm Intelligence Based Ant Colony Optimization (ACO) Approach for Maximizing the Lifetime of Heterogeneous Wireless Sensor Networks

    In this paper, the authors attempt to undertake the study of maximizing the lifetime of Heterogeneous Wireless Sensor Networks (WSNs). In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and thus it is necessary to know how long the network sustains its networking operations. Heterogeneous WSNs consists...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Identification and Forensic Investigation of Network Intruders Based on Honeynet

    In current modern world, internet is becoming the part of everyone's life and the use of internet is growing day-by-day. Thereby the security is becoming the main important aspect to protect the internet from unauthorized users and to protect the innocent end user of the internet. Cybercrime and network attacks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Distributed Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    A Denial of Service attack (DoS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Various Correlation Properties of Orthogonal Spreading Codes for CDMA Technique

    Spread spectrum a means of signal modulation, in which the signal frequency is spread over a very wide bandwidth. Spread spectrum technology, which was initially used in military applications, is another approach to achieve multiple accesses. An important multiple-access technique in wireless networks and other common channel communication systems is...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Energy and Comfort Management in Energy Efficient Buildings Using RETSCREEN Software-A Case Study Analysis

    Smart and energy-efficient buildings have recently become a trend for future building industry. The major challenge in the control system design for such a building is to minimize the power consumption without compromising the customers comfort. Buildings have the physical potential to harness diluted and sometimes unpredictable renewable energy. The...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Analysis of LEACH and Its Variants for Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have revolutionized many segments of the users' economy as well as their lives. Various modern devices require sensory data from the real world around them. This data is provided by WSNs, which consists of several tiny sensor nodes. Different routing protocols govern the movement of this...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Mobile Platforms and Apps Cross-Platforms Development Tools

    Apps are the new model of application software that originally developed for the software distribution to mobile devices, is emerging also in the other categories of devices. User finds the apps in a custom website called the store, whereas apps in the form of an auto-installing software package can be...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2014

    Design of FFT Algorithm in OFDM Communication System

    The present communication system is limited by three major factors. Those are System capacity, higher data rates and interference. To meet these requirements, 802.11-based wireless LANs has fascinated interest in providing higher data rates and greater system capacities. Among them, the 802.11a standard based on OFDM (Orthogonal Frequency Division Multiplexing)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2014

    Paper on Proposed System for Placing Free Call over Wi-Fi Network Using Voip and SIP

    The Wi-Fi, also known as 802.11b, has become the preferred technology for wireless local area networking in both business and home environments. Even though it was designed primarily for private applications, Wi-Fi is also being deployed in public places to create so-called hotspots, where Wi-Fi-capable users can obtain internet access....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2014

    Remote Control of Android Phones Using VNC

    Virtual Network Computing (VNC) is a graphical desktop sharing system to remotely control another computer. It makes use of remote frame buffer protocol which is a simple protocol for remote access to Graphical User Interface (GUI). VNC allows users to access graphical displays quickly and easily. This paper proposes a...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2014

    A Smart Wireless Electronic Energy Meter Reading Using Embedded Technology

    The AMR (Automatic Meter Reading) system is a system used for reading energy consumption remotely. This wireless AMR system is based on wireless network and embedded technology to solve the problems in existing AMR system. This paper presents the simple low cost wireless GSM energy meter and it has remote...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2014

    Impact of Vehicle Mobility on Performance of Vehicular Ad Hoc Network IEEE 1609.4

    Vehicular Ad hoc NETwork (VANET) is a new communications system for moving vehicles at high speed, which are equipped with wireless communication devices, together with additional wireless roadside units, enabling communications among nearby vehicles (vehicle-to-vehicle communication) as well as between vehicles and nearby fixed equipment (vehicle-to-infrastructure communication). Inter-vehicular communications aim...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jan 2014

    Analysis on Energy Efficient Approaches for Routing In Mobile Adhoc Network

    A Mobile Ad hoc NETwork (MANET) is a self-organizing and dynamically configurable wireless network without having fixed infrastructures. Mobile Ad hoc NETworks (MANETs) consist of nodes which move arbitrarily and form dynamic topologies. MANETs exhibit characteristics like limited bandwidth, energy constraints, mobility, scalability and limited security. The main issue is...

    Provided By International Journal of Engineering Research and Applications (IJERA)