International Journal of Engineering Research and Development (IJERD)

Displaying 1-40 of 90 results

  • White Papers // Oct 2012

    Fuzzy-Based Approach in Clustering Data Sources-A Case Study

    In order to improve the effectiveness of community-wide cooperation, the capability of extracting sharable knowledge from heterogeneous documents produced by multiple sources and in a timely fashion is therefore crucial. To this kind of demand is to supply a suite of tools for the end user and for the developer...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    Comparison of Different Modulation Techniques Using V-Blast Mimo System in Rayleigh Channel

    Multiple Input Multiple Output (MIMO) systems have been extensively studied in context of wireless communication system, which promising the both increased capacity and link level reliability. In this paper, the authors will present an analysis of the Vertical Bell Laboratories Layered Space-Time (V-BLAST) system at high Signal-to Noise Ratio (SNR)...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    New Algorithm and Indexing to Improve the Accuracy and Speed in Iris Recognition

    Among the traits used in biometrics, iris is more reliable and unique. The four modules of iris recognition system are Localisation, Normalization, Feature extraction and Matching. Localisation is the key module in iris recognition system. It includes inner boundary localisation, outer boundary point detection, and Eyelid and Eyelash detection. Though...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    Detection and Avoidance of Data Leakage

    A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    A Novel Method of Dynamic Self Reconfigurable Wireless Mesh Network

    Wireless Mesh Networks (MMNs) are an emerging technology right now. During their lifetime, multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive, manual network management for their real-time recovery....

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    Image Security Using Modified Advanced Encryption Standard Algorithm (MAES)

    Security in transmission storage of digital images has its importance in today's image communications and confidential video conferencing. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. In this paper, the authors present a...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Clustering Based Efficient Data Aggregation Protocol for Wireless Sensor Networks

    Wireless sensor network is special types of ad-hoc network which contain very tiny nodes in size and their cost is also not very high. They are deployed in any geographical region in a random fashion. During the process of data sensing, data gathering and data transmission, the charge of the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Metric Based Approach to Find Maintenance, Reengineering and Retirement Need of Software With a Case Study

    A significant collection of software assets are used in all high-tech organizations and software business. Today, the major concern is with the maintenance and reuse of software which can be further invested in such a manner that its value may increase with passage of time but not like accountability whose...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Performance Analysis of OFDM by Using Different Modulation Techniques

    This paper is to demonstrate the concept and feasibility of an OFDM system, and investigate how its performance is changed by varying some of its major parameters In a single carrier communication system, the symbol period must be much greater than the delay time in order to avoid Inter-Symbol Interference...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    IDS for Detection and Prevention of Dynamic Mobile Node Positioning Based on Logical Distance Measures

    Mobile network has a highest level of vulnerability since mobile networks are liable to attack due to its transparent location. The ad hoc nature posses structure less property due to its dynamic nature which paves way for multiple ways of attacks. Implementing IDS is a tedious process and one among...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Enhanced Recovery Scheme for TCP NewReno in MANET

    A mobile ad hoc network is a collection of mobile nodes without any infrastructure. Wireless links have issues like low bandwidth, node mobility multi-hop, channel competition and interference from other channels. Since TCP/IP is most popular and most widely used networking protocol on the Internet, therefore its use over ad...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Moving Target Estimation in Non-Homogeneous Clutter for MIMO Radar

    In this paper, the authors consider velocity estimation and detection for non-stationary target using MIMO radar in non-homogeneous clutter. In the case of non-homogeneous clutter due to the azimuth-selective backscattering the clutter power will vary from one test cell to another and also from one transmit-receive pair to another. In...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Analysis of Cloud Computing & Emergence of Linear Programming

    Cloud Computing provides robust computational power to the society at reduced cost that enables customers with minimum computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Tremendous...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Nonlinear Channel Characterization in OFDM Systems Using Signals With Spectral Notches

    The authors consider the problem of characterizing nonlinear channels in real baseband OFDM communication systems. A novel method is proposed to estimate the frequency domain Volterra kernels of nonlinear channels using OFDM signals with spectral notches. In this method, the OFDM signal is arranged in a way that each full-spectral...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Software Performance Testing Tools - A Comparative Analysis

    Performance is one of the most important aspects concerned with the quality of software. It indicates how well a software system or component meets its requirements for timeliness. Nearly everyone runs into performance problems at one time or the other. Today's software development organizations are being asked to do more...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Linux Based Implementation of MACSec Key Agreement (MKA)

    IEEE 802.1AE and IEEE 802.1AF are two IEEE 802.1X standards providing security to the data link layer. The IEEE 802.1AE is the IEEE MAC Security standard (also known as MACSec), it defines data confidentiality and integrity for media access independent protocols but lacks in providing key management and the establishment...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Improving the Efficiency of PV Generation System Using Soft-Switching Boost Converter With SARC

    In order to improve the efficiency of energy con-version for a PhotoVoltaic (PV) system, a soft-switching boost converter using a simple auxiliary resonant circuit, which is composed of an auxiliary switch, a diode, a resonant inductor, and a resonant capacitor, is adopted in this paper. The conventional boost converter decreases...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Implementing Quality Approach in E-Learning

    The aim of this paper is to prepare the National School of Applied Sciences (ENSA) of Agadir to implement a quality management approach in its online Master "Audit and environmental management." Throughout this paper, the authors will present the methodology used in e-learning process modeling, and they will assess online...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Design of Stabilizing PI Controller for Coupled Tank MIMO Process

    In this paper a new method is proposed for calculation of all stabilizing PI controllers for coupled tank Multi-Input Multi-Output (MIMO) process. By plotting the stability boundary locus in the (kp, ki) plane for coupled tank multivariable process after applying the decoupling technique, the stabilizing PI controller parameters are computed....

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Tracing Misbehaving Users by Utilizing Ticket-Based Protocols by Trusted Third Party in Anonymizing Networks

    Anonymizing networks provides network services to users without specific identity. Network administrator cannot identify user actions in anonymizing networks. Anonymizing networks such as The Onion Routing Networks (TOR) uses a layer structured encrypted message and series of routers each with a key to decrypt and forward the message. Which hide's...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Dropping the Transmission Rate Using Distributed Broadcasting Algorithm in Wireless Ad-Hoc Network

    In this paper, a distributed broadcast algorithm for wireless ad hoc network is proposed. In wireless ad hoc network which supports the application that enables the wireless communication among variety of devices. The communication in mobile ad hoc network that comprises two approaches and two broadcast algorithms those are stated...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    New Learning Methodology for Student of Java Programming Language

    This paper is about learning programming rather than professional practice. In order to have a reasonable focus, its scope is limited to learning computer programming, and centrally, coming to understand the concepts of Object-Oriented Programming (OOP) in Java. It is restricted to novices - students with little or no previous...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Information Represents About Model Based on Fingerprint's Text Corpus

    The Information Retrieval (IR) area, is responsibility, mainly to the study of systems and techniques to assign index, search and give back valuable data to user, i.e. is used to investigate documents that exhibited a greater similar to the issued query. In the research in IR, are currently in development...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Recognition Technique for ATM Based on IRIS Technology

    Iris recognition system has proven its capability in implementing reliable biometric security protocols in various high risk sectors like aviation, border patrol and defense. The banking and financial sector has to adopt this system because of its robustness and the advantages it provides in cutting costs and making processes more...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Detection of Intrusion Using an Agent Based Approach

    Intrusion detection is one of the high priority and challenging tasks for network administrators and security professionals. There is a need to safeguard the networks from known vulnerabilities and at the same time take steps to detect new and unseen, by developing more reliable and efficient intrusion detection systems. In...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Design a Reliable Cloud Computing Strategy for Efficient Data Accessibility and Resource Sharing

    Cloud computing is the modern day hymn. Efficient data accessibility in cloud is a tedious process in multi stored architecture. This architecture was used in most of Big B organization. The purpose of this architecture is to satisfy the user in the form of data accessibility and to access the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Dual Band and Broadband Rectangular Patch Mircostrip Antenna With T Shaped Slot for WiMax Application

    Microstrip antennas consist of a very thin metallic strip (patch) on a grounded substrate found extensive applications in different fields due to their attractive features. These antennas are low profile, light weight, compact and conformable structure and easy to fabricate. These antennas have drawn attentions of scientific community over the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    PAPR Reduction Using Combined LDPC and DCT With Companding Transform in OFDM System

    Communication methods are increasing day by day. Orthogonal Frequency Division Multiplexing (OFDM) systems are one of the most recent emerging trends in wireless communication. However, the major drawback of OFDM is the high Peak-to-Average Power Ratio (PAPR) which results in the Bit Error Rate (BER) performance degradation. A number of...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Voltage Stability Enhancement in a Wind Generator Connected Electrical Network Using FACTS Devices

    This paper presents voltage stability in an electrical network when connected by wind generators. Due to several advantages wind energy is the growing renewable energy. Nowadays, wind energy is penetrating into the conventional power network. Due to random variations in wind speed, the output power and terminal voltage fluctuates continuously....

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Data Mining Based Online Intrusion Detection

    Now-a-days, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    REMO Cloud: Proxy Based Approaches in the Virtual Networking Infrastructure for Remote Monitoring Cloud

    The utility based computing environment which is on the sharing basis termed as cloud computing by utilizing the resources and other related issues. On the wide range of internet terms that supports sharing via web and on the whole is connectivity specified computing trends cloud plays the major role in...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Sep 2012

    Enhancement of Directivity of Rectangular MicroStrip Antenna Using Multilayer Multidielectric Structure

    In this paper the directivity of microstrip patch antenna is enhanced by using covered dielectric layer which is separated from feed patch by air as an another dielectric. Here two patches, one feed patch and one parasitic patch are used to enhance the directivity and bandwidth and whole structure resonates...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Processor Realization for Application of Convolution

    Convolution is very important in signal and image processing applications which is used in filter designing. Many algorithms have been proposed in order to accomplish an improved the performance of the filters by using the convolution design. The architecture of the proposed RISC CPU is a uniform 32-bit instruction format,...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Secured Query Registration and Searching for P2P Network

    Now-a-days large research groups and alike entities use P2P system for keeping track of research activities and downloading the files. But P2P is in secured as the communication takes place between the end pair of nodes and there is no control or security of the sessions. P2p is a system...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    An Efficient Group Key Management for Wireless Multicast Networks

    In a wireless multicast group, efficient key management is a big challenge due to constant changes in the network, limited processing capabilities and network constraints. Therefore continuously exchanging keys for peer authentication consumes tremendous bandwidth. Hence in this paper, the authors propose an efficient group key management technique which authenticates...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Strong Link Establishment in Wireless Ad Hoc Network Using Position Based Re-Configuration

    In this paper, the authors analyze the nature of links among various sensor nodes which is subjected to dynamic reconfiguration .This may arise due to occurrence of adverse constraints in the deployed environment. As a result the communication frame-work gets influenced and needs to be modified from time to time....

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Optimizing Search for Fast Query Retrieval in Object Oriented Databases Using Signature Declustering

    Indexing is always been an important question in the efficient information retrieval from the databases. One such approach is the Signature Declustering Tree (SD Tree) in Object Oriented Databases (OODB), which has been proved an efficient approach for the insertion and search operations.SD tree is used to represent 1s (set...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Digital Clock Frequency Multiplier Using Floating Point Arithmetic

    A digital clock frequency multiplier using floating point arithmetic, which generates the output clock with zero frequency error has been presented. The circuit has an unbounded multiplication factor range and low locks time. A low power mechanism has been incorporated to ensure that the overall power consumption of the circuit...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Microcontroller Based Anti-Theft Security System Using GSM Networks With Text Message as Feedback

    Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF) and a GSM to monitor and safeguard a car. It secures the car against theft. Upon activation, it automatically demobilizes the car by disconnecting the ignition key supply from the car battery. This now makes it...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Comparative Study of Different Honeypots System

    A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends and allow in-depth examination of adversaries during and after exploitation of a honeypot. The concept of honeypots was first...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    Fuzzy-Based Approach in Clustering Data Sources-A Case Study

    In order to improve the effectiveness of community-wide cooperation, the capability of extracting sharable knowledge from heterogeneous documents produced by multiple sources and in a timely fashion is therefore crucial. To this kind of demand is to supply a suite of tools for the end user and for the developer...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    Comparison of Different Modulation Techniques Using V-Blast Mimo System in Rayleigh Channel

    Multiple Input Multiple Output (MIMO) systems have been extensively studied in context of wireless communication system, which promising the both increased capacity and link level reliability. In this paper, the authors will present an analysis of the Vertical Bell Laboratories Layered Space-Time (V-BLAST) system at high Signal-to Noise Ratio (SNR)...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Oct 2012

    New Algorithm and Indexing to Improve the Accuracy and Speed in Iris Recognition

    Among the traits used in biometrics, iris is more reliable and unique. The four modules of iris recognition system are Localisation, Normalization, Feature extraction and Matching. Localisation is the key module in iris recognition system. It includes inner boundary localisation, outer boundary point detection, and Eyelid and Eyelash detection. Though...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // May 2012

    Overview on Partial Image Encryption Approaches

    Image encryption is vital to ensure confidential transmission and storage of images over internet. However a real-time image encryption is still a challenge due to large amount of data involved. A traditional approach for content access control is to first encode data with a standard compressor and then perform full...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Improvement the Performance of Mobility Pattern in Mobile Ad-Hoc Sensor Network Using Qualnet 5.0

    A mobile ad-hoc sensor network usually consists of large number of sensor nodes (stationary or mobile) deployed over an area to be monitored. Each sensor node is a self-contained, battery-powered device that is capable of sensing, communication and some level of computation and data processing. Due to the large amount...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Performance Analysis of OFDMA/CDMA Based System Towards New Multiple Access Technique

    The paper is to study the effect of the variation of major parameters on OFDMA systems and to find channel estimation for CDMA/OFDMA communication systems, in which the bit/symbol error rate of a time varying channel has to be estimated in order to correct the channel interference prior to the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    MC CDMA PAPR Reduction Using Discrete Logarithmic Method

    High Peak to Average Power Ratio (PAPR) of the transmitted signal deteriorates Multi-Carrier Code Division Multiple Access (MC CDMA) system performance, due to large number of subcarriers. This paper proposes a new technique to reduce PAPR of MC CDMA signal using Discrete Logarithm Method (DLM). Simulation results indicate reduction of...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Performance of Smart and Flexible Parallel Concatenated Turbo Codes for Wireless Sensor Networks

    With the energy and size constraint involved with the wireless sensor nodes it is very hard to implement powerful Error control Coding (ECC) techniques like Turbo codes which have shown to be capable of performing near Shannon limit on every sensor node. In this article an adaptive approach for the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

    In this paper a routing algorithm is proposed that would divide the entire network area is into different subareas known as zone. Each zone will contain set of nodes. The Zone follows a square topology. Efficient Geographic Multicast Protocol (EGMP) supports scalable and reliable multicast forwarding through a two-tier virtual...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Research Method to Optimize Logger for a Telecom Application Running on Embedded System

    Most of the embedded telecom applications running on customized processor boards are needed to record their activities in the form of log messages. These messages help telecom application developers to troubleshoot virtually all kinds of system and application problems. The logger also provides valuable early warning signs and also provides...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    USB to USB Data Transfer Without PC

    The Computer has become an inseparable part of life for many people in the world. Its innumerable uses have changed the life of many, not only in technical field but also in non-technical field. Moreover, now-a-days, with increasing use of the computer, people are getting well aware of the peripherals...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Privacy Preserving Association Rule in Data Mining

    Privacy is an important issue in Data mining. The privacy field has seen speedy advances in current years because ability to store data has increased. Precisely, current advances in the data mining field have led to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Entry of Node in Cluster of MANET With Efficient Reliable Communication

    In this the authors introduce a decentralized node admission with essential and fundamental security service in Mobile Ad hoc NETworks (MANETs). It is required to securely strive with dynamic relationship and topology as well as to bootstrap other important security primitives. Efficient one-to-many dissemination, essential for consensus, now becomes a...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    The Study of Fraud Analysis & Securing Card Present Transactions

    Usage of payment cards such as credit cards, debit cards are growing rapidly in the modern age. Cashless payment system gained lot of popularity in the early 20s and more likely to grow in near future. Plastic money has made life much easier for all of them. But unless the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Remote Control of Electrical Appliances Using GSM Networks

    For over two decades the need for an improved method for transferring dialing information for control purpose through the telephone network was recognized. The traditional method of Dial Pulse signaling was not only slow and susceptible to distortion over long wire loops but also requires a Direct Current (DC) path...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jun 2012

    Modeling and Simulation of SRF and P-Q Based Control DSTATCOM

    With the widespread use of harmonic generating devices, the control of harmonic currents to maintain a high level of power quality is becoming increasingly important. An effective way for harmonic suppression is the harmonic compensation by using active power filter. This paper presents a comprehensive survey of DSTATCOM control strategies...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    A Novel Distributed Network for Ensuring Highly Secure Proposed Enterprise Network Integrated Firewall

    A study on the current network enabled vulnerability checking software was made. It was found that most of the available solutions had a some defect or the other in implementation of the applications as there was a large delay in the assessment cycle. This was due to the inherent fact...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Implementation of Back Channel Using Visual Interface

    Micro blogging communities like 'Twitter' are being used heavily by the people in now a days to share their views on globally happening issues. Blogs like 'Twitter' are being used only as digital back channels where information will be displayed in the form of lists only. From digital back channel,...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Performance Evaluation of Wired and Wireless Local Area Networks

    Very large scale integration of complex circuits on to a smaller chip demands for the evolution of high speed computer networks. The traditional wired network constraints like mobility and expensive cabling. But wireless communication is a flexible data communication system implemented as an extension to or as an alternative for...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Object Oriented Approach to Continuous Neighbor Discovery in Asynchronous Sensor Networks

    Sensor nodes can be used for a wide variety of applications such as social networks and location tracking. An important requirement for all such applications is that the nodes need to actively discover their neighbors with minimal energy and latency. Nodes in networks are not necessarily synchronized with each other,...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Comparative Analysis of Different Topologies Based on Network-on-Chip Architectures

    As the integration density and complexity of the System-On-Chip (SOC) increases, the conventional interconnects are not suitable to fulfill the demands. The application of traditional network technologies in the form of Network-on-Chip is a possible solution. NoC design space has numerous variables. As an improved topology is selected complexities decrease...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Design Analysis of Slotted Diagonal Shape Patch Antenna With Hybrid Coupler

    In this paper hybrid coupler connected diagonal shaped patch antenna with slot is examined. Theoretical performance is carried out using Advanced System Design (ADS) software. Measurement of antenna parameters like return loss, standing wave ratio also have been presented in this article. The measured values for the antenna are taken...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    XML Tree Pattern Matching Algorithms

    In the present day digital world, it is imperative that all organizations and enterprises facilitate efficient processing of queries on XML data. XML queries typically specify patterns of selection predicates on multiple elements that have specified tree structured relationships. The primitive tree-structured relationships are parent-child and ancestor-descendant. Finding all occurrences...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Real Time Data Acquisition and Actuation Via Network for Different Hand Gestures Using Cyber Glove

    Real time data acquisition from a cyber glove based hand gesture recognition system and data transmission through internet is proposed in this paper. The joint angles of the fingers are recognized for different gestures using a Cyber glove. Data from cyber glove is obtained in real time by a Client...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Network Intrusion Detection Types and Analysis of Their Tools

    Every hacker in the world is one's neighbor on the Internet, which results in attack defense and detection being pervasive both at home and work. Although hundreds of papers have been written on a large variety of methods of intrusion detection - from log analysis, to packet analysis, statistics, data...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Low Power and Improved Read Stability Cache Design in 45nm Technology

    Cache is fastest memory which is played vital role in the present trend. Cache is achieved by SRAM. The scaling of CMOS technology has significant impact on SRAM cell - random fluctuation of electrical characteristics and substantial leakage current. In this paper, the authors proposed dynamic column based power supply...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Multimedia Data Compression by Dynamic Dictationary Approach With Stenography Facility

    This paper presents a proposal for communication which is major part of daily life of today. The authors are living an age of science.. With the increasing communication traffic demand, data security has become very important field. Lots of data security and data hiding algorithms have been developed in the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    ACO Based Mining of a Cloud Data Center

    The ACO algorithms belong to Swarm family of Intelligent Systems in Artificial Intelligence domain. They are natural choice for the task of data mining when the source can be logically partitioned. A cloud host data center is seen partitioned as such amongst the clouds. As clouds are deployed as per...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Implementation of Enhanced Data Encryption Standard on MANET With Less Energy Consumption Through Limited Computation

    A Mobile Ad hoc NETwork (MANET) is a self-organizing system of mobile nodes. The nodes in MANET are free to move arbitrarily. The nature of the Mobile Ad hoc NETworks (MANETs) makes them very vulnerable to an adversary's security threats. Providing security through cryptographic algorithms in these networks is very...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Forecasting Stream Flow Using Support Vector Regression and M5 Model Trees

    The paper presents use of two recent data driven techniques namely model tree and support vector regression to forecast stream flow at two different locations one in Narmada river basin and the other location in Krishna river basin of India. The stream flow models are developed using the previous values...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Multimodal Image Fusion Biometric System

    In the real world applications, unimodal biometric systems often face limitations because of sensitivity to noise, intra class invariability, data quality, and other factors. Improving the performance of individual matchers in the aforementioned situation may not be effective. Multi biometric systems are used to overcome this problem by providing multiple...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Improving Utilization Infrastructure Management in Private and Hybrid Clouds

    A key advantage of Infrastructure-As-A-Service (IAAS) clouds is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly overprovision their infrastructure (and pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Implementation of a Turbo Encoder and Turbo Decoder on DSP Processor-TMS320C6713

    Turbo codes are used for error protection, especially in wireless systems (e.g., in the cdma2000 standard) and in joint source-channel coding. An example of joint source-channel coding is the use of turbo codes in conjunction with JPEG2000 for image communication over noisy channels. A turbo encoder consists of two recursive...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Wearable Wireless Sensor Network for Human Limbs Motion

    Most of the existing systems require wiring that restrains the natural movement. To overcome this limitation, a wearable wireless sensor network using accelerometers have been developed in this project. In this paper, a wearable wireless sensor system is proposed to overcome this limitation. The wireless feature enables the unrestrained motion...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Jul 2012

    Significance of Hash Value Generation in Digital Forensic: A Case Study

    Digital forensics tools frequently use to calculate the hash value of digital evidence drive. MD5 and SHA hash function is used in digital forensic tools to calculate and verify that a data set has not been altered, due to the application of various evidence collection and analysis tools and procedures....

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Processor Realization for Application of Convolution

    Convolution is very important in signal and image processing applications which is used in filter designing. Many algorithms have been proposed in order to accomplish an improved the performance of the filters by using the convolution design. The architecture of the proposed RISC CPU is a uniform 32-bit instruction format,...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Secured Query Registration and Searching for P2P Network

    Now-a-days large research groups and alike entities use P2P system for keeping track of research activities and downloading the files. But P2P is in secured as the communication takes place between the end pair of nodes and there is no control or security of the sessions. P2p is a system...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    An Efficient Group Key Management for Wireless Multicast Networks

    In a wireless multicast group, efficient key management is a big challenge due to constant changes in the network, limited processing capabilities and network constraints. Therefore continuously exchanging keys for peer authentication consumes tremendous bandwidth. Hence in this paper, the authors propose an efficient group key management technique which authenticates...

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Strong Link Establishment in Wireless Ad Hoc Network Using Position Based Re-Configuration

    In this paper, the authors analyze the nature of links among various sensor nodes which is subjected to dynamic reconfiguration .This may arise due to occurrence of adverse constraints in the deployed environment. As a result the communication frame-work gets influenced and needs to be modified from time to time....

    Provided By International Journal of Engineering Research and Development (IJERD)

  • White Papers // Aug 2012

    Optimizing Search for Fast Query Retrieval in Object Oriented Databases Using Signature Declustering

    Indexing is always been an important question in the efficient information retrieval from the databases. One such approach is the Signature Declustering Tree (SD Tree) in Object Oriented Databases (OODB), which has been proved an efficient approach for the insertion and search operations.SD tree is used to represent 1s (set...

    Provided By International Journal of Engineering Research and Development (IJERD)