International Journal of Engineering Sciences & Research Technology (IJESRT)

Displaying 1-40 of 373 results

  • White Papers // Sep 2014

    Elliptic Curve Cryptography-A New Approach to Public Key Cryptography

    Elliptic Curve Cryptography (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite field. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography. An elliptic curve in cryptography was suggested independently by the researchers in 1985....

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Data Mining: Exploring Big Data Analytics, Hadoop and Mapreduce

    Most internal auditors, especially those working in customer-focused industries, are aware of data mining and what it can do for an organization - reduce the cost of acquiring new customers and improve the sales rate of new products and services. However, whether the users are a beginner internal auditor or...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Implementation of Command Transfer Protocol for Cluster in Networking

    Computational cluster is used for heavy computation that emphasizes various requirements for network functionality. Most of the computing software uses TCP/IP for their computation. But it has lot of disadvantages. This paper proposes a specialized networking protocol based on cluster computation called Command Transfer Protocol (CTP) which is used for...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Efficient Energy Management System Using ZigBee Communication By Comparison of Energy of Energy Usage

    In this paper, the authors concern with efficient energy management using zigbee communication for reducing home energy usage. A technology is used for reducing and managing home energy usage is known as home energy management system. Their module supports with zigbee communication with an energy meter that enables bidirectional communication...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Design and Development of GPS based Station Name Announcement and Display System

    As the population of the India is growing predominantly, the need for fully technology oriented transportation is to be established. Because of the fewer trains and unreserved coaches, more densely passengers are being accommodated. Therefore the passengers can't able to know in which station they are and even it makes...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Review of Study and Design of Coding and Interleaving in a MIMO-OFDM Communication System

    In this paper, the authors present of the review performance analysis of four different channel coding and interleaving schemes for MIMO-OFDM communications systems. A comparison is done based on the BER, hardware implementation resources requirement, and power dissipation. It also presents a memory-efficient and low-latency interleaver implementation technique for the...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Privacy Preserving Multiparty Collaborative Data Mining for Multiple Service Providers

    The emergence of application service providers hosting Internet-based data mining services is being seen as available alternative for organizations that value their knowledge resources but are constrained by the high cost of data mining software in this paper, the authors present a new multiple service provider model of operation for...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    A New Hybrid Algorithm for Privacy Preserving Data Mining

    The collection of digital information by governments, corporations, and individuals has created tremendous opportunities for knowledge- and information-based decision making. Driven by mutual benefits, or by regulations that require certain data to be published, there is a demand for the exchange and publication of data among various parties. Data in...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Energy Efficient Ant Colony Optimization based Routing Protocol for Wireless Sensor Networks

    ACO (Ant Colony Optimization) is proved to be better technique for many applications. State of the art techniques about application of ACO for routing in Wireless Sensor Networks (WSN) have been published in many papers. This is proved to be energy efficient as well as better in performance. In this...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Vulnerable Security Aspects of Windows

    With the advancement in technology the people are having everything available on a single click. Instead of wasting a lot of time while standing in a queue for a task to be done now they just have to open their device and connect it to the internet and the task...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    BER Analysis of OFDM with Raised Cosine Window and Equalization using Rician Channel

    Wireless communications is emerging as the largest sectors of telecommunications industry. It is the one area that promises a lot of prospects for growth in the coming century. The major challenges for the future research and study in this field include utilizing the limited available spectrum efficiently and improved link...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Optimal Placement of Relay Nodes in Multi-pair Co-Operative Network to Increase System Capacity in WSN

    With the advancement of technology the usage of wireless sensor network are increasing day-by-day. There are two types of sensor networks: single tiered and multi-tiered. In single tired sensor network there is one sink and multiple sources and in multi-tiered sensor network there are multiple sources and multiple destination. For...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Design and Implementation of Intrusion Detection System (IDS) Sensor Deployment

    Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion detection systems have difficulty in handling high speed links. This paper describes the design and implementation of a high-performance network intrusion detection system...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Web Usage Mining and Internet User Behaviour in Web: A Survey

    In recent years the growth of the World Wide Web exceeded all expectations. Today, there are several billions of HTML documents, pictures and other multimedia files available via Internet and the number is still rising. In real problems, several studies have been conducted, presented and used on user behavior in...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Survey on Reactive Routing Protocols for Wireless Ad Hoc Networks

    Networks without fixed infrastructure are generally termed as ad hoc networks. Ad hoc networks find application in various areas including military, forestry where centralized base station is not feasible. Selecting an effective routing protocol is a major challenge in ad hoc networks. Reactive or on-demand routing protocols are more suitable...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    TLS: Improving Security for Ad-Hoc Networks using Three Level Security Mechanism

    A group of large autonomous wireless nodes are connected and communicating in a P2P method on a heterogeneous environment without defined infrastructure is named mobile ad-hoc network. Various mechanisms and techniques are applied for providing security for ad-hoc networks and a major problem MANON was analyzed in the existing system...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Performance Enhancement of MIMO OFDM for Higher Spectral Efficiency

    The multiple-input multiple-output based wireless system is a promising high data rate interface technology. Diversity methods provide the receiver with independently faded copies of the transmitted signal with the expectation that at least one of these replicas will be received data. This is ranges of techniques available through which these...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Apriori Algorithm for Vertical Association Rule Mining

    Association rule mining is one of the important concepts in data mining domain for analyzing customer's data. The association rule mining is a process of finding correlation among the items involved in different transactions. Traditionally association rule mining is implemented horizontally. For this the authors have plenty of different algorithms...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Recognition of Bimodal Biometric System using Transformation Techniques

    A wide variety of systems requires reliable personal recognition schemes to confirm or determine the identity of an individual requesting their services. In this paper, recognition of Iris and fingerprint provides easiest way of security and faster processing. It ensures data security and protection of system from unauthorized users as...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Performance Comparison Wireless Sensor Network Security Protocols : LLSP and Tiny SEC

    A sensor network is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it. Security protocols play an important role in the deployment of sensor networks in various environments however, many existing security protocols developed for WSNs are vulnerable...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    An Agent Based Analysis of Knowledge Discovery in Databases

    Discovering useful knowledge from database is referred as KDD. In the quest of knowledge possible interpretation of patterns and evaluation makes the decision of what is knowledge and what is not. It also includes the choice of programming schemes, systematic series of actions, sampling, and the state or fact of...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    A Study on Energy-Balanced Transmission Policies for Maximize Network Lifetime in Wireless Sensor Networks

    Unbalanced energy consumption is an inherent problem in wireless sensor networks characterized by multihop routing and many-to-one traffic pattern, and this uneven energy dissipation can significantly reduce network lifetime. Existing transmission policies, however, cause an extremely unbalanced energy usage that contributes to early demise of some sensors reducing overall network's...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    VEBEK-III: A Modified Technique of VEBEK to Save Energy in WSN

    In Wireless Sensor Network (WSN) energy rate of consumption is very important factor because once the energy of node is consumed it can't be regenerated and node becomes dead. It is nearly impossible to replace the dead node due to hostile environment. Each node has some initial energy. Energy of...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2014

    Risk Analysis and Mitigation Plan in Software Development

    Software development, often encounter many unanticipated problems, resulting in projects falling behind on deadlines, releases, exceeding budgets and result in sub-standard products due to its complex nature. Although these problems cannot be totally eliminated, they can however be controlled by applying risk management plan. This can help to deal with...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Image Segmentation using Enhanced K-means clustering with divide and Conquer Approach

    In this paper the authors present image segmentation using enhanced k-means clustering with divide and conquer approach. First they enhanced the k-means clustering and then segment the image using enhanced approach. K-means is one of the most popular clustering algorithms. The final clustering result of the k-means clustering algorithm greatly...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Secure and Efficient Data Transmission for Cluster-based Wireless Technology Networks

    Secure data transmission network is a decisive issue for Wireless Technology Networks (WTNs). Clustering is an effective and practical way to enhance the system performance & methods of WTNs. In this paper, the authors study a secure data transmitted for Cluster-based method of WTNs (CWTNs), where the clusters are formed...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    How Data Classification Helps Improve Data Leakage Prevention

    Data classification-most organizations the authors have met have had data classification policies in place but the challenge is that is it. They have very well drafted policies, classification levels etc. But it is major on a paper. From a DLP technology standpoint the information if properly identified and classified in...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    A Hybrid Algorithm for Document Clustrering Using Concept Factorization

    Massive amount of assorted information is available on the web. Clustering is one of the techniques to deal with huge amount of information. Clustering partitions a data set into groups where data objects in each group should exhibit large measure of resemblance. Objects with high resemblance measure should be placed...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Subset Selection in High Dimensional Data by Using Fast Clustring Technique

    A feature subset selection is an effective method for reducing dimensionality, removing irrelevant data, increasing learning accuracy and improving results comprehensibility. This process enhanced by cluster based FAST algorithm using MST construction. With the aim of choosing a subset of good features with respect to the target concepts, feature subset...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Survey on Ethical Hacking Process in Network Security

    Hacking is a process in which, a person or team exploits the weakness in a system for self-proceeds or indulgence. Ethical hacking is an activity which focuses on the vulnerability in a system and discovers the weakness and try to rectify the security weakness of a system. In the emergent...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Detection of Misbehavior Nodes in Manets Using 2ACK Method

    A Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. The operation of MANETs does not depend on pre-existing infrastructure or base stations. Network nodes in MANETs are free to...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    A New Approach to System Design for Disaster Management and Monitoring using Wireless Sensor Network

    WSN are simple continuous monitoring system and it is now become new technologies for disaster management. In this paper, the authors propose the different model for the disaster scraps detection based on the energy efficient architecture which can successfully monitor any type of disaster situation. This model focus on sensor...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Performance Comparision and Design of different CSLA Archtecture using FPGA

    Carry SeLect Adder (CSLA) is the faster adder used in many computational systems to alleviate the problem of carry propagation delay. It consists of two Ripple Carry Adders (RCA) and multiplexer (mux). To reduce the power in the CSLA an efficient gate level modification is used. The comparison of results...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Comparative Analysis of IPV6 Based IS-IS and OSPF-V3 Protocols

    In this paper, the authors deal with the critical issues of OSPF V3 & IS-IS in IPV6. As IPV6 is becoming popular day-by-day; due to its wide range of applications; and great hierarchy of IPs. But selecting the best protocol among available is found to be critical task. Therefore this...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Design and Implementation of IPsec VPN's and its Configuration on ISP Network

    In this paper, the authors describe methods for implementing Virtual Private Networks (VPN) with IP Security (IPSec). A Virtual Private Network (VPN) is a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks. The Internet Protocol security (IPsec) standard provides a method...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Comparative Analysis of Wired and Wireless LAN Network QOS Using OPNET as Simulation Tool

    As already studied about wired LAN and wireless LAN networks. Both these types of networks have their own importance means own advantages and disadvantages. Wired LAN network has different hardware requirements and range and benefits are different. On the other hand wireless LAN takes in to consideration the range, mobility...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    A Noval Approach on Online Transaction Protocols

    The increase of wireless devices, offering connectivity and convenience, continues to exert marvelous demands on merchants to deploy secure wireless applications including electronic commerce. Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user's privacy when they sending data from a client...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Implementation of AOMDV, OLSR & ZRP Protocol for Analysis of Performance Matrices in VANET Scenario

    Vehicular Ad-hoc NETwork (VANET) is a wireless technology which is the sub class of the Mobile Ad-hoc NETworks (MANET). In the authors' paper they are trying to provide connectivity to vehicles for enabling Intelligent Transportation Systems (ITS). Previously they had preformed a survey to compare routing protocols based in their...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Cloud Databases: Future of Distributed Databases

    Hardware failures in current data centers are very frequently because of high volume data scales supported. Data replication is the better option for this condition. Distributed database is a concept of distribution data storage at different remote locations. Many of servers are used to store these databases; therefore many of...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2014

    Interactive Image Search and Retrieval Using Artificial Neural Network

    Human computer interaction is an immense field of computer studies to improve human interactions with machine with the influence of knowledge drawn from human and computers. An interactive method to search and retrieve images from databases through voice recognition system is proposed in this paper. Initially, the images are stored...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // May 2013

    Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog

    Advanced Encryption Standard (AES), has received significant interest over the past decade due to its performance and security level. In most of the previous works sub-bytes and inverse sub-bytes are implemented in separate modules using lookup table method. In this paper the authors used combinational logic which helps for making...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // May 2013

    Power Efficient On-Data Collection Using Mobile Robot in WSN

    The power efficient on data collection is to increase the energy efficiency condition even when there is problem in the failure of the main parent node. The on data collection is the concept, the power efficient data transfer in a network of nodes. The main concept that is used here...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2013

    A Verilog Design in FPGA Implementation Of Quadrature Phase Shift Keying (QPSK) Digital Modulator

    In this paper the authors deal with the design & implementation of a verilog design of QPSK digital modulator based on the FPGA Quartus-II simulator. Digital modulation is less complex, more secure and more efficient in long distance transmission. The noise detection and correction in digital is more efficient than...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jun 2013

    Performance Comparison of Wavelet Packet Modulation and OFDM over Mobile

    Success of Orthogonal Frequency Division Multiplexing (OFDM) has proved that multi carrier modulation is an efficient solution for mobile communication. Wavelet Packet based Multi-Carrier Modulation (WPMCM) offers an alternative to the well-established OFDM as an efficient multicarrier modulation technique. Wavelet Packet Modulation (WPM) is a new type of modulation for...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Aug 2013

    Survey on Postion based Routing Algorithms and Reliable Data Delivery in MANET

    The vision of itinerant computing with its ubiquitous access has stimulated much attention in the Mobile Ad hoc NETworking (MANET) technology. Mobile Ad hoc NETworks called as MANET is a self reliant system comprising of self organizing and self configuring nodes connected by wireless links. However, its promulgation sturdily depends...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Dec 2013

    Frequent Pattern Mining Algorithm for Crime Dataset: An Analysis

    The mining of frequent item set from uncertain data is the great task and it consumes more time. One of the frequent pattern mining algorithm called apriori algorithm can be used to mine the data from bulk of uncertain dataset. But it can give only minimum support constraint in mining...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Oct 2013

    3D Tri-Gate Transistor Technology and Next Generation FPGAs

    The 3D tri-gate transistors are a remarkable breakthrough in the realm of CMOS technology. These transistors can be considered as a reinvention of the transistor, in a way that they have supplanted the conventional \"Flat\" 2D planar gate with an incredibly thin 3D silicon fin that rises up vertically from...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Dec 2013

    Efficient Implementation of 64-Point FFT/IFFT for OFDM on FPGA

    Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier modulation technique which divides the available spectrum into many carriers. OFDM uses the spectrum efficiently compared to FDMA. With the rapid growth of digital wireless communication in recent years, the need for high-speed mobile data transmission has increased. FPGAs have become key...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Dec 2013

    Research on Friendly ARM Board for Data Transfer between Two USB Devices without Computer

    In this paper the authors aim to develop a device that allows file transfers between two USB memory devices without the need for a personal computer. It is designed as a standalone application which allows for the backup of files from a digital camera or any USB device to another...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Dec 2013

    Design of High Speed Based On Parallel Prefix Adders Using In FPGA

    The binary adder is the critical element in most digital circuit designs including Digital Signal Processors (DSP) and microprocessor data path units. As such, extensive research continues to be focused on improving the power-delay performance of the adder. In VLSI implementations, parallel-prefix adders (also known as carry-tree adders) are known...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Dec 2013

    Design and Analysis of Routing Algorithm for 3D Network on Chip

    Three Dimensional Network on Chip (3D NoC) is the most thriving on chip connection architecture. According to mesh on-chip conceive approach, investigator favors mesh conceive expertise to analyzed SOCs. That is network on chip mesh architecture has been suggested as solution to address international communication trials in System On Chip...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // May 2013

    Reconfigured Low Power FPGA Architecture

    Field-Programmable Gate Array (FPGA) based on lookup table level fine-grain power gating with small overheads is presented in this paper. A low power asynchronous FPGA with LEDR encoding and 4-phase dual rail encoding is designed in this paper. The power gating technique implemented in the proposed architecture can directly detect...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jul 2012

    An Approach Using Association Rule Mining Technique for Frequently Matched Pattern of an Organization's Web Log Data

    Web mining allows the user to check for patterns in data through content mining, structure mining, and usage mining Two dynamic areas of today's research are data mining and the WWW. A combination of the two areas sometimes referred to as web mining. Association rule mining is a very important...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jan 2014

    A Survey about Power Reduction in Intergated Circuits Using Multi-Bit Flip-Flops

    Power has become a burning issue in modern VLSI design. In modern integrated circuits, the power consumed by clocking gradually takes a dominant part. Given a design, the authors can reduce its power consumption by replacing some flip-flops with fewer multi-bit flip-flops. However, this procedure may affect the performance of...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Feb 2014

    Multi-Step Verification Environment for a Chip Design using SoC platform

    In this paper the authors presented an efficient verification strategy for the platform based design. A goal of the verification task is to detect all design faults and provide with full verification coverage at the earlier design. The proposed verification strategy employed iterative verification stages. For a case study, this...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Feb 2014

    One Time Mining by Multi-Core Preprocessing on Generalized Dataset

    One of the important problems in data mining is discovering association rules from databases of transactions where each transaction consists of a set of items. Many industries are interested in developing the association rules from their databases due to continuous retrieval and storage of huge amount of data. The discovery...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Feb 2014

    Design of a Photovoltaic Grid-Tied Inverter Employing a Dual-Stage Boost Converter and a Transformer-Less Step-Down Circuit

    In this paper the authors propose a topology for a transformer-less, pure sine wave Grid-Tie Inverter (GTI) for PhotoVoltaic (PV) application. The proposed GTI employs a dual-stage boost converter, a transformer-less step down circuit, an H-bridge inverter and a T-LCL Immittance conversion circuit. The switching technique of the proposed inverter...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Feb 2014

    Security Challenge in Cloud Computing

    Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting to customer on a pay - as - the user -use basis. Users can access these services available on \"Internet cloud\" without having any previous known how on managing...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Feb 2014

    E-Commerce Applications Security Aspects in Cloud Computing

    Cloud computing is a new practice mode applied to e-commerce. The integration of cloud computing and ecommerce has not yet reached a mature stage and still needs the test of practice. At present, there are still many problems that need to be solved. Cloud computing has attracted the IT enterprise...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Sep 2013

    Comparative Analysis of MRAFC Controller MRAC Controller

    In this paper model reference adaptive based fuzzy controller is presented. Model reference adaptive controller is very common approach to control linear systems, as it is simple to apply. However, the performance of the linear model reference adaptive control weakens up when the system becomes nonlinear. In this paper, the...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Sep 2013

    Design and Implementation of BISR for 3d Multiple SRAMS with Redundancies in a SOC

    Embedded memories contain several hundreds of memory cores which constitute a significant portion of the chip area for typical System-On-Chip (SOC) designs. With the shrinking transistor size and aggressive design rules, memory cores are easily prone to manufacturing defects and reliability problems. As these circuits have higher complexity and more...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jan 2014

    An Efficient Pricing Mechanism for Mobile Video Streaming in Cloud Computing

    Among the most popular consumer devices, the mobile phones are the one whose usage has increased in a rapid manner and along with the development of 3G networks and smart phones, enabled users to use them in an efficient manner and also to watch video programs by subscribing data plans...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jan 2014

    Microcontroller Based Advanced Triggering Circuit for Converters/Inverters

    In this paper the authors present an advanced method of generating triggering pulse using microcontroller (8051) whose delay angle is controlled by the feedback signal given by Analog to Digital Converter (ADC) to microcontroller (8051). The use of microcontroller based control circuit provides the users large number of advantages. It...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Jan 2014

    A Survey of Fast Analog Circuit Analysis Algorithm using SPICE

    In this paper the authors present a fast analog circuit analysis algorithm, fundamental circuit-based circuit analysis, for circuits being repeatedly modified and verified in product development. The algorithm reuses previous circuit simulation result on successive changed circuit analysis to achieve simulation operation reduction. The algorithm is implemented with SPICE simulator...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Leakage Current Reduction Techniques for CMOS Circuits

    Most of the portable systems, such as cellular communication devices, and laptop computers operate from a limited power supply. Devices like cell phones have long idle times and operate in standby mode when not in use. Consequently, the extension of battery-based operation time is a significant design goal which can...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Design and Implementation of 1-bit Pipeline ADC in 0.18um CMOS Technology

    In this paper the authors present the design of a single bit pipeline Analog-to-Digital Converter (ADC) which is realize using CMOS technology. In this paper, a 1-bit pipeline ADC is implemented in a standard TSMC 0.18um CMOS technology using mentor graphics tool. 1-bit pipeline ADC is design using

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    VHTD Mechanism for Secure Data Transfer in Manets

    In MANETs, nodes move freely and so the topology of the nodes is highly dynamic. The process of routing the data packets to the destination is a challenging task. Most existing ad hoc routing protocols are proposed but these protocols are susceptible to node mobility, especially for the large-scale networks....

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    RLE Compander for Wireless Sensor Data Processing

    RLE data compression is effective when the measured signals are expected to be slow and repeatable. The task of this unit is crucial to the system power performance. RLE is a conceptually simple form of compression. RLE consists of the process of searching for repeated runs of a single symbol...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Performance Analysis of an NoC for Multiprocessor SoC

    In this paper the authors focus on 'Network on chip' and \"Multiprocessor system on chip\" applications it's a guaranteed supporting for network process to reducing the circuit area, lower power consumption, low cost, and increases the performance. Network employs multi-stage network approaches on packet switching and pipelined circuit switching. Based...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    A Review on Data Warehouse Management

    Data warehouse management is a crucial part of industry and business that have been adopted and put into practice with increased complexity of managing pools of data. The architectural layout of data warehousing is composed of a centralized warehouse from which views are generated for needy users. The convention in...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Environmental Data Monitoring Using Wireless Sensor Network and Transmission of Data Via Internet

    In this paper the authors effectively monitoring of environment by using Wireless Sensor Network (WSN) and the collection of data will be transmitted through the server through Internet. Before that it was done manually which is not accurate and also the immediate updation of information is not so easy. In...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Design Round Robin and Interleaving Arbitration algorithm for NOC

    NOCs (Network On Chip) are increasing in popularity because of their advantages: larger bandwidth, and lower power dissipation through shorter wire segments. Communications in large SOCs are so important that many designers have adopted the NOC approach. The challenges consist in offering the best connectivity and throughput with the simplest...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    A Study on Data Grid Middlewares

    Grid computing is one of the fastest emerging technologies within the high performance computing environment. Grid deployments that require access and processing of data are called data grids. They are optimized for data oriented operation. In a data grid environment, data replication is an effective way to improve data accessibility....

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    FPGA Implementation of International Data Encryption Algorithm

    Cryptography is the art of keeping data secure from unauthorized access so as to guarantee that only the intended users can access it. Data security is an important issue in computer networks and cryptographic algorithms are essential parts in network security. This paper covers the implementation of the International Data...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Data Warehouse in E-Governance

    With many computer applications in place, large quantities of data have been collected over a period of years. Private organizations recognized that there is value in the historical data of their own organizations and have undertaken projects to build data warehouses to make the data accessible in a meaningful and...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Study on Secure Data Transmission through Dual-Path Rating Mechanism

    In this paper, the authors propose a mechanism which would work on real time network environment and split the data before making transmission and merge the data before presenting to the user. The main objective of this paper is to study and analyze information security problem while the data is...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    ATMEL AVR Based 32-BITS Data

    In embedded web technology a smart devices are controlled from a remote location via internet, through a web server. A client which may be a desktop computer or a mobile phone with the web browser, connected to the internet can control and monitor all actions of the smart device with...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Private Information Retrieval from Cloud in a Distributed Location

    Cloud computing a big buzzword now-a-days and IT industry talks about it a lot and they started to move to cloud. Cloud is mainly for storage, elasticity, sharing, and fast access. Mainly for storage purpose private Cloud (pCloud) is preferable to store secure information. In this paper the authors work...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Software Effort Estimation with Data Mining Techniques- A Review

    Effort estimation is an important task in cost prediction of the software. This task comes under the planning phase of software project management. In this paper, a review of different data mining techniques used for effort estimation has been presented. The techniques taken into consideration are clustered techniques (K-Means, and...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)

  • White Papers // Mar 2014

    Hardware Design of A ZIGBEE Smart Energy Implementation for Energy Efficient Building

    In this paper the authors give the brief information regarding the implementation of a smart system for energy efficient building. The hardware design of the proposed system is mainly focused in this paper. The proposed system is elaborated along with the associated software, schematics, implementation logic and few snapshots. This...

    Provided By International Journal of Engineering Sciences & Research Technology (IJESRT)