International Journal of Engineering Science and Technology (IJEST)

Displaying 1-40 of 349 results

  • White Papers // Sep 2014

    An Approach to Trace Semistructure for Process Mining Towards Software Reliability

    Process mining is a process management system that analyzes business processes built using event logs. The information is extracted from event logs by using knowledge recovery techniques. The process mining algorithms are capable of inevitably discover models to give details of all the events registered in some log traces provided...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2014

    A Combined Algorithm for Data Warehouse Fragmentation Selection

    Data warehouses are designed to handle the queries required to discover trends and critical factors for On-Line Analytical Processing (OLAP) systems. Such systems are composed of multiple dimension tables and fact tables (in the form of star schema). Queries running on such systems contain a large number of costlier joins,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Dec 2013

    Probability Spaces in Databases With Uncertainty

    Traditional databases store deterministic data in which there is no room for uncertainty. Uncertain or probabilistic data cannot be represented or stored in these databases. On the other hand, many modern applications require the need to capture and store data with uncertainty. In response to recent demand for the ability...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2013

    Telecom Voice Traffic Prediction for GSM Using Feed Forward Neural Network

    The prediction of the voice traffic and their accurate model is a challenge for telecom provider. It is important for the quality & service analysis of mobile network. The study in this paper concern predicting the voice traffic (Erlang) of mobile network at busy hour(5 to 7 pm) of a...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2013

    Wide Band Dual Frequency Circular Slot Anteena With Rectangular Stub at X and Ku Band

    The paper presents design and study of the performance of simple circular slot antenna, fed by microstrip line. The dual frequency response having center frequency of 10.58 GHz is observed by using 0.2m.m wide rectangular stub connected with microstrip line. The effect of bandwidth enhancement studies on the return loss...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2013

    Hard Network Lifetime Wireless Sensor Networks With High Energy First Clustering

    Wireless Sensor Network (WSN) requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by radio irregularity and fading in multi-hop WSN. A cluster-based scheme is proposed as a solution for...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2013

    Implementation of Aodv & Dsr Routing Protocols in Various Mobility Models Under Square Area

    Mobile Ad Hoc Networks are generally dynamic collections of self-organizing mobile nodes with links that are characterized by dynamic topology changes and with no fixed infrastructure. The academic communities have proposed many routing protocols for possible practical implementation of a MANET in military, commercial and governmental environments. In this paper,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2013

    Wideband Rectangular Microstrip Antenna With Directly Coupled and Two Gap Coupled Parasitic Patches

    In this paper, the conventional microstrip antenna is replaced by a configuration which consists of a rectangular microstrip antenna with a directly coupled patch and two gap coupled parasitic patches to achieve a wide bandwidth. The impedance BW determined is 15.8 % of the center frequency at 4.12 GHz. The...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2013

    Agile Software Methodologies: Strength and Weakness

    Software development is a complicated process to deliver products in more rapidly, enhanced and cheaper ways. There have been several studies and ideas on improving and enhancing the overall development process. Agile methodologies are great software development methodologies. No doubt that these methodologies have widespread reputation. The core of agile...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Feb 2013

    Cryptographic Protocol Depending on Biometric Authentication

    In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here, the same idea of cryptography is working (i.e. using key, conversion of plain text into cipher...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jan 2013

    Design and Parametric Evaluation of Rectangular Microstrip Patch Antenna for GSM Application

    In this paper, the authors discuss design and parametric evaluation of Rectangular MicroStrip Antenna (RMSA) for GSM Communication. A simple RMSA is designed using transmission line model and analyzed using Method of Moment (MoM) based software IE3D for studying its behaviour with various parameters such as, its length, width, height...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jan 2013

    A Millimeter Wave Microstrip Patch Antenna with CPW Feed

    In this paper a coplanar waveguide fed rectangular microstrip patch antenna with U slot at 40 GHz is designed and simulated. Simulated results are presented by using Ansoft HFSS 13 software, a full wave electromagnetic field simulator for arbitrary 3D volumetric passive device modeling that takes advantage of the familiar...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Dec 2012

    Implementation of Optimized 128-Point Pipeline FFT Processor Using Mixed Radix 4-2 for OFDM Applications

    The Fast Fourier Transformation (FFT) is one of the most frequently used Digital Signal Processing (DSP) algorithms for Orthogonal Frequency Division multiplexing (OFDM) applications. There are various types of FFT architectures used in OFDM systems. They can be categorized into three types-the parallel architecture, the pipeline architecture and the memory...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Dec 2012

    Ipv4/Ipv6 Transition

    In this paper, the authors proposed a system that make incompatible nodes; the first based IP4 the other based IPv6, communicate together without increasing packets size, this system is called Bi-Directional Transition System (BDTS). This system depends on understanding of the two environment of transmission, that is, received the source...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Dec 2012

    Grouping Based User Demand Aware Job Scheduling Approach for Computational Grid

    Grid Computing is a high performance computing that solves complicated tasks and provides powerful computing abilities. Scheduler is very much responsible for effective utilization of resources and less processing time. Most of the scheduling algorithms failed to consider user satisfaction and resource utilization. This paper introduces a new grouping based...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Aug 2012

    Wireless Digital Stethoscope Using Bluetooth Technology

    Stethoscopes are used to listen to acoustic signals from the internal organs of the human body. Although stethoscopes play a very important role in the diagnosis process, the chest piece and the connecting cable are known to facilitate transmission of pathogens from patient to patient and from patient to the...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    A New Design Improvement of Microstrip U-Shape Antenna for Bandwidth Enhancement Using EBG Structure Deformation

    The purpose of this paper is to design a low profile, conformal, small size antenna with high bandwidth along with good compromise in other factors like gain, directivity, efficiency etc. A U-shape patch antenna with suitable geometry is taken to provide good response of bandwidth about 30 % at centre...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Biased Random Energyefficient Routing Algorithm (BREERA)

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous devices that depend on their sensors to monitor environmental or physical conditions and report to a base station. The topology of any network is important and Wireless Sensor Networks (WSNs) are no exception. In order to effectively model...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Security Checkpoints for Enterprise Applications on the Web

    The HTTP protocol was originally developed for communication between scientists spread across different locations. Eventually it became so famous that all the computers using World Wide Web use the HTTP protocol. The purpose of HTTP protocol was just communication it was never designed for various other purposes like e-commerce. Today...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Channel Capacity Estimation in MIMOOFDM System Using Water Filling Algorithm

    In this paper, the authors have implemented water filling algorithm for allocating the power in order to increase the channel capacity of MIMO-OFDM system .Channel is assumed as flat fading channel and the comparison is made for different 2x2, 2x3, 4x4 MIMO-OFDM system using water filling algorithm with allocated power....

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Performance Evaluation of Manet Routing Protocols GRP, DSR and Aodv Based on Packet Size

    Mobile Ad hoc Networks has become an essential part of interest of researchers in last couple of years. A Mobile Ad-Hoc Network is a collection of independent wireless mobile nodes having no any centralized access-point, infrastructure and any centralized administration. In order to communicate with other nodes inside the network,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Optimal Placement of Dstatcom and Load Flow Analysis of Radial Distribution Networks

    This paper presents the modeling of shunt Distribution FACT device in load flow analysis for the steady state voltage compensation and loss minimizations. For this purpose, Distribution STATCOM (D-STATCOM) is considered as shunt compensator. An accurate model for this device is derived to use in load flow analysis. The rating...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Low Level Object Oriented Language in Context of Comparative Study Between Two Low Level Languages Msil(microsoft Intermediate Language)or Cil and Java Byte Code

    Most of the software were developed using high level languages such as Java, C#.NET,VB.NET, etc. The main advantages of these languages are object oriented features. This helps to developer to develop software with graphical user interface, portable, ease of use, efficient and secure. Low level language like assembly language, machine...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Energy Management of Wireless Sensor Network With Mimo Techniques

    With recent advances in deployment of sensor nodes mounted on mobile platforms, node mobility is becoming an attractive alternative to improve network coverage dynamically in sensor networks. Mobile sensor networks deployed for surveillance applications, it is important to use an efficient energy management scheme that can empower nodes to make...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Database Security in Wireless Sensor Network Through PGP and ID3

    In the new era of this century, data is sent and receive in electronic form i.e. E-mail. So the risk of data hack and loss is increased. So, the security of data is the main requirement of any organization. This paper proposes an idea of using wireless sensor network for...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Optimizing Cycle Time of DVD-R Injection Moulding Machine

    This paper describes the cycle time reduction approach of injection moulding machine for DVD manufacturing. Optimizing the parameters of the injection moulding machine is critical to improve manufacturing processes. This research focuses on the optimization of injection moulding machine parameters. Suggestions for process improvements are made based on the results...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    An Approach to Design Advanced Standard Encryption Algorithm Using Hardware/Software Co-Design Methodology

    An Advanced Standard Encryption Algorithm (AES) is widely used in modern consumer electronic products for security. The IEEE 802.15.4 Low-Rate wireless sensor networks also use AES algorithm where low power consumption is the priority. To reduce the time taken for encryption of huge data, the algorithm has to be implemented...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Design of Simulink Model for OFDM and Comparison of FFT-OFDM and DWT-OFDM

    Growth in technology has led to unprecedented demand for high speed architectures for complex signal processing applications. In 4G wireless communication systems, bandwidth is a precious commodity, and service providers are continuously met with the challenge of accommodating more users within a limited allocated bandwidth. To increase data rate of...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Design Optimization by Using Particle Swarm Optimization in Matlab and Apdl in Ansys

    For optimization of real time problems it is difficult to generate equations which are to be optimized. Such problems can be optimized by using Design Optimization in ANSYS. But in many cases, it gives an optimum solution which is slightly infeasible which means it slightly violates the constraints. In this...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Low Power Implementation of Triple-Des Block 65nm Technology

    Power and delay are two main constraints in ASCI design. Trying to optimize the design with respect to power might result in an increase in the delay. This trade-off between power and delay are analyzed in this paper. In this design both mixed vt and clock gating techniques (mixed design)...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Performance Analysis of Nondirected Ir Wireless Channel in Indoor Environment Using Statistical Distribution

    The future short range wireless communication in an indoor environment includes the non-directed InfraRed (IR) Wireless communication. It is essential since there is a tremendous growth of bigger residential and commercial complexes. Also, now-a-days use of portable devices such as LAPTOP, PDA, etc. has been increased and the connectivity to...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Analysing the Impact of TTL Sequence-Based Expanding Ring Search on Energy Aware Routing Protocols for Manets

    In this paper, the authors analyze the impact of TTL Sequence-based expanding ring search on Energy Aware Routing protocols for MANETs. They compared the energy consumed in Transmit mode, Receive mode and Idle Mode for Low mobility and High mobility with different TTL values. From Simulation results they observe that...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    BER Performance of IEEE 802.11ad for Single Carrier and Multi Carrier

    In present scenario 802.11n is one of the fastest standards which is widely popular. It provides a theoretical maximum of 450 Megabits per second (Mbps), with a typical throughput of 100Mbps. As the authors know, there is high demand for higher speed due to an increasing of High Definition (HD)...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    Study on Recent Trends and Opportunities in Cloud Computing

    The emerging trend of cloud computing that delivers the computing as a service rather than a product whereby shared resources software and information that are provided to computers and other devices as the utility over the network. Cloud computing model is composed of three service models Software as a Service...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // May 2012

    A Comprehensive Study of Existing Multicast Routing Protocols Used in Mobile Ad Hoc Networks

    Mobile Ad-hoc Networks are collection of mobile hosts linked wirelessly with no fixed communications or central supervision. The mobile hosts are self-organized and can be deployed everywhere and at any time. One of the major applications of MANETs is military and disaster recovery. These applications demand for proper communication and...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Apr 2012

    SQL Injection Attack Detection and Prevention

    Now-a-days SQL Injection Attacks (SQLIAs) and cross scripting increased in real web applications very much, and the SQL injection attacks damages the databases through web applications. Injection queries are different type of way to attack the databases. This paper address the issue of SQLIA's and script in an efficient way....

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Apr 2012

    To Improve the TCP Performance Using Cross Layer in Wired Cum Wireless Network

    Recent development mostly based on the high speed internet access of large amount of data at any time over wireless network. Packets loss can also occur due to link failure in wired cum wireless environment. To reduce the loss rate, packet delay, retransmission time, WiMax is proposed with cross layer...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Apr 2012

    Power Conservation in Ad-Hoc Networks Using Dijkstra's Algorithm & Idle Nodes

    The energy conservation in a wireless ad-hoc network is of great importance and significance. The nodes in a wireless environment are subject to less transmission capabilities and limited battery resources. The battery of node is energy limited and is not convenient to be replaced by the restriction of circumstance. But,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Apr 2012

    Secure Storage of Data Using Cryptography for Network

    With the increasing rate of threats in the global environments; Information security engineers are continuously starving to develop a new secure algorithm to provide secure storage of information and at the same time, enabling the information to available to the authentic user easily. For this purpose, many efficient algorithms are...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Apr 2012

    FPGA Implementation of OFDM Transceiver Using FFT Algorithm

    Orthogonal Frequency Division Multiplexing (OFDM) is the most promising modulation technique. It has been adopted by most wireless and wired communication standards. The idea is to utilize a number of carriers, spread regularly over a frequency band, in such a way so that the available bandwidth is utilized to maximal...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Biased Random Energyefficient Routing Algorithm (BREERA)

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous devices that depend on their sensors to monitor environmental or physical conditions and report to a base station. The topology of any network is important and Wireless Sensor Networks (WSNs) are no exception. In order to effectively model...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Security Checkpoints for Enterprise Applications on the Web

    The HTTP protocol was originally developed for communication between scientists spread across different locations. Eventually it became so famous that all the computers using World Wide Web use the HTTP protocol. The purpose of HTTP protocol was just communication it was never designed for various other purposes like e-commerce. Today...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Channel Capacity Estimation in MIMOOFDM System Using Water Filling Algorithm

    In this paper, the authors have implemented water filling algorithm for allocating the power in order to increase the channel capacity of MIMO-OFDM system .Channel is assumed as flat fading channel and the comparison is made for different 2x2, 2x3, 4x4 MIMO-OFDM system using water filling algorithm with allocated power....

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Performance Evaluation of Manet Routing Protocols GRP, DSR and Aodv Based on Packet Size

    Mobile Ad hoc Networks has become an essential part of interest of researchers in last couple of years. A Mobile Ad-Hoc Network is a collection of independent wireless mobile nodes having no any centralized access-point, infrastructure and any centralized administration. In order to communicate with other nodes inside the network,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    A New Design Improvement of Microstrip U-Shape Antenna for Bandwidth Enhancement Using EBG Structure Deformation

    The purpose of this paper is to design a low profile, conformal, small size antenna with high bandwidth along with good compromise in other factors like gain, directivity, efficiency etc. A U-shape patch antenna with suitable geometry is taken to provide good response of bandwidth about 30 % at centre...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Optimal Placement of Dstatcom and Load Flow Analysis of Radial Distribution Networks

    This paper presents the modeling of shunt Distribution FACT device in load flow analysis for the steady state voltage compensation and loss minimizations. For this purpose, Distribution STATCOM (D-STATCOM) is considered as shunt compensator. An accurate model for this device is derived to use in load flow analysis. The rating...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2011

    Frame Detection for Synchronization in OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is a parallel transmission scheme for transmitting data at very high rates over time dispersive radio channels and sub carriers are used to carry that data. These subcarriers are orthogonal to each other. In an OFDM system, frame synchronization and frequency-offset estimation are extremely important...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Aug 2012

    Wireless Digital Stethoscope Using Bluetooth Technology

    Stethoscopes are used to listen to acoustic signals from the internal organs of the human body. Although stethoscopes play a very important role in the diagnosis process, the chest piece and the connecting cable are known to facilitate transmission of pathogens from patient to patient and from patient to the...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Feb 2012

    Impact of Software Metrics on Object-Oriented Software Development Life Cycle

    An attempt is made to implement software metrics with aid of GUI and several programs were developed to calculate the metrics, which can be used as a stand alone system. Further an emphasis is made on different relationships of metrics, which will help to determine quality and quantity of software...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Feb 2010

    Trustworthy Robust Routing Protocol for Mobile Ad Hoc Network

    A protocol called RMP (Route Management Protocol) is proposed; for making misbehavior effect eliminated on Adhoc network is proposed. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or reported routing and forwarding behavior...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2011

    An Introduction of Aperture Coupled Microstrip Slot Antenna

    A microstrip slot antenna is very small and lightweight still it has the problem of back radiation due to which power loss occurs and the SAR increases. To reduce the back lobe a technique introduces, i.e., aperture coupled microstrip slot antenna which reduces the back lobe as well as increases...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2011

    Review and Analysis of the Issues of Unified Modeling Language for Visualizing, Specifying, Constructing and Documenting the Artifacts of a Software-Intensive System

    The UML allows one to specify models in a precise, complete and unambiguous manner. In particular, the UML addresses the specification of all important decisions regarding analysis, design and implementation. Although UML is not a visual programming language, its models can be directly connected to a vast variety of programming...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2011

    Studying the Feasibility and Importance of Software Testing: An Analysis

    Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, and reliability...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2011

    Optimization of Multiple Vehicle Routing Problems Using Approximation Algorithms

    This paper deals with generating of an optimized route for multiple Vehicle Routing Problems (mVRP). The authors used a methodology of clustering the given cities depending upon the number of vehicles and each cluster is allotted to a vehicle. K-Means clustering algorithm has been used for easy clustering of the...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2011

    Comparative Study of Protocols Used for Establishing VPN

    This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also becoming very popular and organizations benefit financially by utilizing less office space, and reducing total expenses incurred by having office workers on...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Mar 2011

    Identification of Crosscutting Concerns: A Survey

    Modularization of concerns is important for software development. Object oriented programming paradigm provides an ease of modularization of basic concerns. There are some concerns whose implementation cannot be modularized using object oriented paradigm like profiling, logging, etc. The implementation of such concerns remains scattered throughout the source code. Such concerns...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Low Level Object Oriented Language in Context of Comparative Study Between Two Low Level Languages Msil(microsoft Intermediate Language)or Cil and Java Byte Code

    Most of the software were developed using high level languages such as Java, C#.NET,VB.NET, etc. The main advantages of these languages are object oriented features. This helps to developer to develop software with graphical user interface, portable, ease of use, efficient and secure. Low level language like assembly language, machine...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2012

    Energy Management of Wireless Sensor Network With Mimo Techniques

    With recent advances in deployment of sensor nodes mounted on mobile platforms, node mobility is becoming an attractive alternative to improve network coverage dynamically in sensor networks. Mobile sensor networks deployed for surveillance applications, it is important to use an efficient energy management scheme that can empower nodes to make...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    Fingerprint Identification System Combined With "Cryptography" for Authentication

    Biometrics technology, which uses physical or behavioral characteristics to identify users, has come to attract increased attention as a means of reliable personal authentication that helps the identity of an actual user. Among various modalities of Biometrics, Fingerprints are known to have the longest history of actual use in law...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    The Modified Security Scheme for Data Integrity in MANET

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors previous work established a network consisting confidentiality and authentication of packets in both routing and link layers. As an extension to their previous work,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    An Adaptive Power Allocation Scheme for Robust Transmission of JPEG Compressed Images Over MIMO-OFDM Systems

    Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal Frequency Division Multiplexing (OFDM) is a promising solution for implementing efficient next-generation Wireless Local Area Networks (WLANs) and fourth-generation mobile cellular wireless systems. This paper explores the advantages of using the combined effects of MIMO and OFDM for the transmission of...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    Low Overhead Checkpointing Protocols for Mobile Distributed Systems: A Comparative Study

    In mobile distributed systems, the authors come across some issues like: mobility, low bandwidth of wireless channels and lack of stable storage on mobile nodes, disconnections, limited battery power and high failure rate of mobile nodes. Fault Tolerance Techniques enable systems to perform tasks in the presence of faults. The...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    Mean Acquistion Time Performance Analysis for DC and NC Code Acquistion for MIMO Assisted DS-CDMA Wireless Systems

    Recent research on wireless communication systems has shown that using multiple antennas at both transmitter and receiver offers the possibility of wireless communication at higher data rates compared to single antenna systems. This paper discuss at developing a MIMO system which maintains the Mean Acquisition Time (MAT) with increase of...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    LSP Networks - A Mechanism for Loop Free and Loss Less Convergence and Implementation

    When using Link-State Protocols such as OSPF or IS-IS used in the networks, As a response to a topological change forwarding loops can occur transiently when the routers adapt their forwarding tables. In this paper, the authors proposed and simulate a mechanism that lets the network converge to its optimal...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Dual Band U- Shaped Microstrip Antenna for Wireless Communication

    This paper presents novel coaxial feed, microstrip antenna with wide bandwidth. This U-shaped microstrip antenna offers a dual band. Low profile, light weight, easily mounted and broad bandwidth are the principle characteristics for antenna designed for wireless applications. The microstrip antenna is suitable for wireless applications except for its narrow...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Design and Implementation of EAR Algorithm for Detecting Routing Attacks in WSN

    The paper proposes an ant-based method for detecting congestion and various routing attacks in Wireless Sensor Network. The prime parameters under consideration are Energy, Age and Reliability (EAR). Although researchers have proposed number of mechanisms for detecting congestion and routing attacks in WSN but very few of them have thought...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Spring Web MVC Framework for Rapid Open Source J2EE Application Development: A Case Study

    Today it is the highly competitive for the development of Web application, it is the need of the time to develop the application accurately, economically, and efficiently. The authors are interested to increase productivity and decrease complexity. This has been an underlying theme in a movement to change the way...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Processor Architecture Design Practices: Survey & Issues

    The paper explores the recent architecture evaluations and related issues and compares NISC (No Instruction Set Computer) features to those of CISC (Complex Instruction Set Computer) and RISC (Reduced Instruction Set Computer) processors. It has been observed that the complexities with embedded systems have increased manifold and the design community...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

    This paper proposes a query driven routing strategy that aims to in-correlate diverse sensor input generated beneath the earth. The proposed communication strategy behaves as a multistage data collection system that clubs the data from various sensors and the same can be used to detect and track comprehensive events that...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    Biometric Authentication Using ElGamal Cryptosystem and DNA Sequence

    Biometrics are automated methods of identifying a person or verifying the identity of a person based on a Physiological or behavioral characteristic. Physiological characteristics include hand or finger images, facial characteristics and iris recognition. Behavioral characteristics include dynamic signature verification, speaker verification and keystroke dynamics. DNA is unique feature among...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    A New Visual Cryptography Scheme for Color Images

    Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this paper, the authors proposed a visual cryptographic system which can be used to hide the original image information from an intruder or an unwanted user. The images can be in any standard format....

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Comparative Analysis of Propagation Path Loss Models With Field Measured Data

    The propagation path loss models may give different results if they are used in different environment other than in which they were designed. In this paper, the authors compare the different path loss propagation models with measured field data. For comparative analysis they use the log distance path loss model,...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jul 2010

    Agile Modeling for Security Requirements - Embedded Application Case Study

    For a Software project to run in an incremental cycles it has to implement predecessor activities which are defined as "Project Initiation". After the process of initiation the concept of agility is applied on project with different phases defined as Agile Analysis, Agile Design, and Agile Testing. The project which...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Performance Analysis and Design of a Wireless Networks

    Business rules have been defined as "Declarations" of policy or conditions that must be satisfied to determine how operational decisions and the organization must be made. In other words, business rules specify action on the occurrence of particular business events, including "State of being" changes concerning individuals and groups of...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Open Shortest Path First Simulator by Using Java RMI

    In essence, internet protocol is the most essential component of communication system for data transfer and routing. Routing is achieved by routing protocols. Researchers have defined different protocols to make routing more reliable. In this paper main focus of research is to explore the Open Shortest Path First protocol and...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Efficient Distributed Authentication Key Scheme for Multi-Hop Relay in IEEE 802.16j Network

    Relaying and cooperation have re-emerged as important research topic in the wireless communication over the past decade. IEEE 802.16j Multihop relay network is assiduously developing to accomplish high capacity services with large cell coverage. Considerable interest currently exists in the exploitation of Relay based Wimax. This is mainly the result...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Modeling of Mobile Adhoc Networks Using Distributed Spanning Tree Approach

    Mobile Ad hoc NETworks (MANETs) are a collection of distributed nodes which communicate using multi-hop wireless links with frequent node mobility. The frequent mobility of nodes leads network partition and futile communication. So, there need an interconnection technique that should guarantee network connectivity, efficient routing and maintain network performance in...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Jun 2010

    Fingerprint Matching System Using Level 3 Features

    Fingerprint biometric security system identifies the unique property in human being and matching with template stored in database. Fingerprint details are generally defined in three levels, i.e., Level 1 (Pattern), Level 2(Minutiae points) and Level 3 (pores and contour ridges). Level 3 features are barely used by automated fingerprint verification...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Sep 2010

    Digital Up Converter for Wimax System

    In the recent times, mobile communication needs not only a high data rate transmission but also a relatively fast mobility. The mobile WiMAX based on Orthogonal Frequency Division Multiple Access (OFDMA) can addresses both of these requirements. To implement the mobile WiMAX (IEEE 802.16e) system, one must address a number...

    Provided By International Journal of Engineering Science and Technology (IJEST)

  • White Papers // Sep 2010

    Implementation of SVPWM in FPGA Through MATLAB/SIMULNK Environment

    Control of AC induction machines using the vector control techniques is becoming more popular nowadays. The need for extensive computations has no more become an objection to the vector control implementation. This is due to the wide availability of high speed digital processors.. The objective of vector control of induction...

    Provided By International Journal of Engineering Science and Technology (IJEST)