International Journal of Engineering Trends and Technology

Displaying 1-40 of 319 results

  • White Papers // Jun 2014

    Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm

    Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data and services may not be fully trustworthy. This exceptional prototype brings about many new security challenges, which have not...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Public Auditing and Data Dynamics for Storage Security in Cloud Computing

    Cloud computing has been envisioned as the next generation architecture of IT Enterprise. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden local copy data storage and maintenance. It moves...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Implementation of Switching System for High Speed Data Transmission using VHDL

    Switching system is used for data transmission between two communicating Channels. This transmission can be done via trunks or it can be fully wireless, technically termed as Telephone Switching and Mobile switching, respectively. The implementation of the switching system using VHSIC hardware description language is more reliable and efficient than...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Improving Network I/O Virtualization Performance of Xen Hypervisor

    Virtualization technology is the backbone of Cloud Computing. Virtualization provides efficiency, flexibility and scalability in cloud computing. Virtualization in cloud computing can be done through different virtualization platform such as VMware, Kvm, UMLinux, VirtualBox, Xen. Xen is an open source hypervisor; a virtualization tool for cloud computing that is widely...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Removal of Data Vulnerability using SQL-An Approach

    Web Applications are applications that can be accessed over the Internet by using any web browser that runs on any operating system and architecture. They have become ubiquitous due to the convenience, flexibility, availability, and interoperability that they provide. Web Applications are vulnerable to a variety of new security threats....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    A Simple Analysis of Service Oriented Architecture for Mobile Cloud Computing

    Cloud-based Mobile Augmentation (CMA) is the state-of-the-art augmentation model that leverages proximate and distant clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of RMAs, which breeds Mobile Cloud Computing (MCC). This study analyzes impacts of mobile-cloud distance and number of intermediate hops as influential...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Fast Fourier Transform Implementation on FPGA Using Soft-Core Processor NIOS II

    FPGAs with soft-core processors offer the opportunity for testing & implementation various trade-offs between hardware and software implementations of the functions to implement. With the Altera NIOS II the processor can be customized through the addition of new instructions. Custom specific functions can be implemented as coprocessors. Altera has provided...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Job Scheduling Based on Virtual Abstractions in Cloud

    Cloud computing is a provisioning of services in a timely, on-demand manner, to allow the scaling up and down of resources. Job scheduling is one of the major issues in the public cloud which concerns availability of resources in the datacenter. Data center need to achieve certain level of utilization...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Performance Enhancement of XML Parsing By Using Artificial Neural Network

    XML is used for data representation and exchange. XML data processing becomes more and more important for server workloads like web servers and database servers. One of the most time consuming part is XML document parsing. Parsing is a core operation performed before an XML document can be navigated, queried,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Introduction to Internet Data Mining

    In this paper, the authors discuss mining with respect to web data referred here as web data mining. They have categorized web data mining into three areas; web content mining, web structure mining and web usage mining. They have highlighted and discussed various research issues involved in each of these...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System

    Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third party reference in cloud computing. Therefore the need of encrypting data stored at...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Efficient and Enhanced Approach for Spatial Search Results

    Optimizing the search engine is still an interesting research issue in the field of search engine optimization, Even though various approaches available for answering the spatial query, modern technology requires some enhancements for the optimality, the result based on the keywords, and usually spatial query is a combination of a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Ontology Based Text Mining

    Research project selection is important task for government and private research agencies. When a large number Of research proposals are received, it is common to group them according to their similarities in research discipline areas. The grouped proposals are then assigned to the appropriate experts for peer review. Current methods...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Enhanced Client-Server Assignment for Internet Distributed Systems

    Internet is a collection of several distributed systems consisting of various clients and servers. These clients communicate with each other with the help of intermediate servers. An optimized performance for such a system needs proper client-server assignment. Such a system can be achieved by mainly considering the factors like total...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Novel Data Hiding Technique with Hybrid Approach

    Even though Various approaches available for transferring the data over networks, data confidentiality and data sensitivity are still important factors. In this paper, the authors are proposing a novel hybrid mechanism for secure transmission of data through the images which are rotated by specific angles. Experimental results shoes efficient key...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Novel Model of Secure Mining with Decision Matrix Technique

    Security in data mining is an important research issue now-a-days. In this paper, the authors are proposing an efficient a novel model of privacy preserving association rule mining approach over data mining with Decision matrix approach and security consideration they are using RSA algorithm for Secure data transmission. In this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Review on: Web Mining Techniques

    These days, the development of World Wide Web has surpassed a considerable measure with additional desires. Vast measure of content archives, sight and sound records and pictures were accessible in the web and it is even now expanding in its structures. So with a specific end goal to give better...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Improved Metadata Management & Scalability in Dynamic Distributed Web Caching

    The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently running on the Internet, the size of World Wide Web is of an exponential growth, which results in network congestion and server...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Web Data Mining: Survey

    The use of World Wide Web increases day-by-day, with this rapid growth it becomes a biggest database. Most of the people publicly access the web services on daily basis and generate a huge amount of data like:-text, images, multimedia, queries, and user logs and blogs data. When it concerns to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    High Prioritized Data Region Ranking Technique and Multiple Clustered Tags Analyzing Method for Extracting and Aligning Requisite Data

    High prioritized ranking technique and multiple clustered tags analyzing method for extracting and aligning requisite data. Web data extraction plays a vital role in extracting requisite data in order to compare and align. Multiple Clustering of tagged data mining technique used to place data elements into related groups without advance...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Review on Reserving Room Before Encryption for Reversible Data Hiding

    Now-a-days there is very big problem of data hacking. There are number of techniques available in the industry to maintain security of data. So, data hiding in the encrypted image is comes into the picture, but the problem is the occurrence of distortion in original cover at the time of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Automotive Software Domain-Combining Runnables Sequencing with Task Scheduling on Multicore ECU's

    The aim of ECU group is to research the Multicore architecture for automotive safety applications to meet hard real-time embedded systems timing and reliability constraints. The automotive industry needs to change its architectural approach in developing vehicle electronics systems. By integrating more number of functions in a limited set of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Managing Privacy Retaining Entrust Admission in Public Clouds

    The data stored in the cloud is very confidential. So before storing the data in cloud platform high secured encryption technologies are used. Present day's data owner plays a major role in maintaining privacy of data. They performs encryption of data, Uploading of data and re-encrypting the data if any...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Novel Session Based Mining Approach for User Search Goals

    Let the people consider seeing the whole things from the perspective of a search engine and their only view of user behavior would be the stream of queries users produce. The search engine designers adopt this perspective and them studying these query streams and trying to get optimize the engines...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Proxy Based Collaborated Cloud Computing Approach to Resolve Security and Privacy Issues in Multicloud Architectures

    When the users come to security and privacy aspects, they are still the biggest critical factors to adopt cloud services. This leads to lots of research proposals to address and mitigate the targeted security threats. Along with this, one who adopted the services of cloud should not face any kind...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Data Base Hacking: SQL Injection Method and its Prevention

    As the services of internet rapidly increases people are dependent on internet for different purposes. The applications which are developing using web applications i.e.; online shopping, train reservation, paying bills. These web applications require database which is used to retrieve the relevant data supplied by the user, here data base...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Effective Verification and Encryption of Data for Users Delegation Privacy

    Cloud computing provides storage facility and services in which users can store their data remotely and avail the on demand high quality applications, services. It is all done through the shared pool of configurable computing resources. But the important thing that need to be understood is, users no longer have...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Empirical Model of Data Integrity in Multi Cloud Data Storage

    In present cloud storage services integrity became major problem. For these traditional researchers implemented so many approaches, but still its facing major problem of security and data owners storing data in multiple clouds. The authors implemented the security of their scheme based on zero-knowledge proof system and which can satisfy...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Efficient Pattern Discovery Over Long Text Patterns

    There are several techniques are implemented for mining documents. In this text mining, still so many problems getting exact patterns in text mining. In this some of the techniques are adapted in text mining. In proposed system the temporal text mining approach is introduced. The system terms of its ability...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Comparative Study of Enhanced Secure and Effective Relevance Keyword Search Over Public Cloud Data

    In the present world most recent computing achievement is cloud computing. But everyone can't enjoy this cloud service there are lot of issues cost, security and infrastructure. To overcome this problem they have introduced private cloud but an individual cant access private cloud the cost is too high. To provide...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Mining Frequent Item and Item Sets Using Fuzzy Slices

    Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. The proposed work presents the design of mining frequent items from dataset. The mining approach is hybrid, that is, frequent items are calculated with a single pass, while frequent item sets are calculated...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Various Database Attacks and its Prevention Techniques

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Extracting Large Data using Big Data Mining

    Innovations in technology and greater affordability of digital devices have presided over today's age of big data, in the quantity and diversity of high frequency digital data. These data hold the potential to allow decision makers to track development progress, improve social protection, and understand where existing policies and programmes...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Relevant Feature Selection Model Using Data Mining for Intrusion Detection System

    Network intrusions have become a significant threat in recent years as a result of the increased demand of computer networks for critical systems. Intrusion Detection System (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A Mining Method to Create Knowledge Map by Analysing the Data Resource

    The fundamental step in measuring the robustness of a system is the synthesis of the so-called Process Map. This is generally based on the user's raw data material. Process Maps are of fundamental importance towards the understanding of the nature of a system in that they indicate which variables are...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Nested Clustering Based Rotation using Radial Basis Function for PPDM

    Privacy preserving in data mining is most needed technique in the current world. The people they don't want to share their sensitive information with unauthorized user, So they want to hide the information from unauthorized person. In data mining there are lot of domains are used for preserving the data's...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Advanced Technology of Automated Storage and Retrieval System Using PLC Integration

    In this paper, the author proposes an highly developed fully automatic ASRS (Automatic Storage and Retrieval System). This main material management support system is generally used for storing and retrieving the unprocessed materials in the manufacturing unit. The necessities of ASRS are increasingly of a more dynamic nature for which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Enhancing the Scalability of Virtual Machines in Cloud

    Cloud computing has become an increasingly popular model in which computing resources are made available on-demand to the user as required. In cloud computing, the overloaded hosts are managed by allocating the Virtual Machines from that host to another. This increases the resource utilization. The proposed model introduces a load...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Ranking Components using FTCloud for Fault- Tolerant Cloud Applications

    Building highly reliable cloud applications is a challenging and critical research problem. FTCloud framework is introduced to solve this issue in cloud environment. FTCloud is a component ranking based framework for building fault-tolerant cloud applications. It consists of two algorithms. FTCloud1 uses component invocation structures and invocation frequencies for finding...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Privacy Preserving Heuristic Approach for Intermediate Data Sets in Cloud

    Cloud computing is the sharing of computing resources which lessen the upfront investment cost of IT infrastructure. So many organizations are moving their business into cloud. In data intensive applications, while processing original data set many intermediate data sets will be generated. The intermediate data sets are often stored in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Analization and Comparison of Selective Encryption Algorithms with Full Encryption for Wireless Networks

    Cryptography has been widely accepted as a traditional platform of data protection for decades. The most significant and efficient cryptosystems these days are the Symmetric key algorithms for cryptography. Hence, they have a very wide range of applications in many realms. Ad-hoc networks are the most commonly used type in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    A Framework for Revising The Emerging Data Warehouses

    In streaming data-warehousing there are so many problems during the manipulations in the resources and so many of them updating and this is because of the scalability usage of the resources means number of times the resource utilized. This method leads to the refreshing problem of the resource systems. In...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2013

    Dynamic Pricing Model for a Cloud Cache Environment

    Cloud computing is an emerging innovative IT-based business model which catches the attention of practitioners, for its potentiality of industry adoption, as well as of academicians, for research undertaking in different dimensions. Cloud data management services are prevailing to proffer quality query services via cloud cache environment. The clients can...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Analysis of Cloud Services

    Cloud computing is expected to become a common solution for deploying applications. It has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning and allows enterprises...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2013

    Cloud Service Reservation Using PTN Mechanism in Ontology Enhanced Agent-Based System

    The relationship between the cloud provider and the cloud consumer must be described with a Service Level Agreement (SLA). To establish SLA for utilizing a cloud service, there are two issues which are the following: determining when to use the service (time slot); determining the price of the service. This...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2013

    Use of Modeling Language to Deploy Applications in Clouds

    Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this model are ease-of-use and cost-effectiveness. Cloud computing also offers vast amount of resources available for end users. The opportunity to choose between several cloud...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    A Semantic Based Scheduling Algorithm for Data Intensive Applications on Global Cloud

    Due to the increasing size of data intensive applications, the datasets are need to be stored in a distributed manner and multiple copies of data sets has to be replicated to provide easier access to the cloud applications. In these kinds of systems, scheduling is a key challenge because of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Web Interface Using HTML5 for Interaction Between Mobile Device & Cloud-Services

    Mobile cloud computing brings new types of services and facilities for mobile users to take full advantages of cloud computing. Interoperability becomes an important issue when mobile users need to interact and communicate with the cloud. The current interface between mobile users and cloud are mostly based on the web...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Dynamic Distributed Broadcasting in Mobile Ad Hoc Networks with Secure Data Transmission

    In Mobile Ad-hoc networks, local broadcast algorithms can be differentiated with respect to the forwarding nodes. A forwarding node can either be statically or dynamically determined. If it is static then it is based on local topology information alone. If dynamic, it is based on both local topology and broadcast...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    An Empirical Data Cleaning Technique for CFDs

    Data cleaning is a basic data preprocessing technique for before forwarding the data to data mining approach, but it leads to an intresting research area in the field of data mining. Data cleaning is the process of finding and deleting noisy data/records from the database. The simplest technique used for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Disaster Prediction System Using IBM SPSS Data Mining Tool

    Data mining, or knowledge discovery in databases, refers to the discovery of interesting, implicit, and previously unknown knowledge from large databases. Spatial data mining presents new challenges due to the large size of spatial data, the complexity of spatial data types, and the special nature of spatial access methods. Spatial...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    Performance Transaction's Assessment of Real Time Database System in Distributed Environment

    Database performance is a very important aspect of database usability. The objective of this paper is to proposed policy to forecast the performance of transaction under real time database system in distributed environment. A real time database system in distributed environment is a transaction processing system design to handle the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Fast and Simple Method for Maintaining Staleness of Database

    In data warehousing when dealing with large amount of database, there are so many problems of updating of the database. In data-warehousing there is large amount of data can store in the database. For maintaining the updated database it takes more time. For more scalability it can take more processing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Cryptography in Ultra-Low Power Microcontroller MSP430

    In this paper the authors describe an implementation for the method from texas instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Evaluations of Map Reduce-Inspired Processing Jobs on an IAAS Cloud System

    Major cloud computing companies have begun to integrate frameworks for parallel data processing in their product portfolio, creating it simple for customers to access these services and to deploy their programs. However, the process frameworks that are presently used are designed for static, homogeneous cluster setups and disrespect the actual...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Complete Study on Unipath Routing Protocols in MANETs

    Mobile ad hoc network is a cluster of wireless mobile nodes making a network with dynamically changing topology without using any permanent access point as a base station. To create connectivity among nodes more than single hop is needed due to low transmission range. Increasing of mobile nodes enhances this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Novel Process to Cluster Data in Distributed Resources

    Searching is more frequently using task for information gathering or browsing information from web. In this paper the authors can users search in different resources. Due to more scalability this searching process takes more time to process. So by using grouping similar data they can reduce the process time. This...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Optimizing the Cost for Resource Subscription Policy in IaaS Cloud

    Cloud computing allow the users to efficiently and dynamically provision computing resource to meet their IT needs. Cloud provider offers two subscription plan to the customer namely reservation and on-demand. The reservation plan is typically cheaper than on-demand plan. If the actual computing demand is known in advance reserving the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    An Approach to Build Software Based on Fault Tolerance Computing Using Uncertainty Factor

    In this paper, the authors have started with an overview on fault tolerance based system. In case of design diversity based software fault tolerance system, they observed that uncertainty remains an important factor. Keeping this factor, they have discussed about implementing bayes' theorem and probabilistic mathematical model to handle the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

    Building high quality cloud applications becomes an urgently required research problem. Non functional performance of cloud services is usually described by Quality-of-Service (QoS). In cloud applications, cloud services are invoked remotely by internet connections. The QoS ranking of cloud services for a user cannot be transferred directly to another user,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    In-Memory Database Systems - A Paradigm Shift

    In today's world, organizations like Google, Yahoo, Amazon, Facebook etc. are facing drastic increase in data. This leads to the problem of capturing, storing, managing and analyzing terabytes or petabytes of data, stored in multiple formats, from different internal and external sources. Moreover, new applications scenarios like weather forecasting, trading,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2014

    An Analysis of Routing Protocols in MANETs

    An ad hoc network is a collection of autonomous mobile nodes forming an instant multi hop radio infrastructureless network in a dynamic topology. Each node in ad hoc network, functions as host and router at the same time. It maintains connectivity in a decentralized manner by distributing the network control...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks

    Although of the widespread use of the WLANs, it is still vulnerable for the availability security issues. This paper presents a proposal Wireless Network Intrusion Detection System (WNIDS) which is use misuse and anomaly techniques in intrusion detection. The proposal depend on data mining is a DM-based WNIDS since mining...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Implementing High Secured and Fault Tolerant Baud Rate Synchronizer for NANO Applications

    Fault-tolerance is crucial for the realization of practical nanoscale devices. Memory cells have been protected from soft errors for more than a decade; due to the increase in soft error rate in logic circuits, the encoder and decoder circuitry around the memory blocks have become susceptible to soft errors as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Research and Development of Remote Input and Output Data Acquisition System Based on Embedded Arm Platform

    Design of online embedded web server is a challenging part of many embedded and real time data acquisition and control system applications. The World Wide Web is a global system of interconnected computer networks that use standard Internet Protocol suite(TCP/IP) to serve billion of users worldwide and allows the user...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Secure Communication in Mobile Agent System

    A mobile agent is a software code with mobility which can be move from a computer into other computers through network. The mobile agent paradigm provides many benefits in developments of distributed application at the same time introduce new requirements for security issues with these systems. In this paper the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Security Aspects in Cloud Computing

    Cloud computing, sometime known as on-demand computing is one of the newest developments in the computer technology. Security in cloud computing is a significant and critical aspect, associated with many issues and problems to use or deployment of it. This paper contribution is to focus on various security issues occurs...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Area Optimized Design for Data Archival to SD Card

    In this paper the authors present the design of an efficient, real-time data archival system to a secure digital flash memory card via softcore. The data access from the SD card is implemented completely using Verilog and hence there is no use of any microcontroller or on-chip general purpose processors....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    An Analytical Study of Object-Oriented Metrics (A Survey)

    The OO metrics are plays an important role in the software development. In this paper the authors are mostly focus on a set of OO metrics that can be used to measure the quality and effectiveness of an OO design. The metrics for OO design focus on measurements that are...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Improved Methodology for Mining Datasets

    In the preparation of the datasets or database the authors use joins, aggregations of the columns. In this, traditional methods transforming the retrieved rows are called horizontal aggregations. In these aggregations all sql aggregations are performed but they don't apply aggregation methods on file or image data. For this problem...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Performance of Ethernet Protocol Conversion on an Arm-7 Embedded Processor

    This paper designed a research on real web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a web page. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    An Enhanced Framework for Performing Pre-Processing On Web Server Logs

    Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files shows actual usage of web site under all circumstances and don't need to conduct external experimental labs to get this information. This paper describes the effective preprocessing of access stream...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    A Confidentiality Proof Wandering - Protocol in Mobile Networks

    This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Soft Handoff in Mobile Networks

    In power controlled CDMA systems soft handoff is preferred over hard handoff strategies. This is more pronounced when the IS-95 standard is considered wherein the transmitter power is adjusted dynamically during the operation. The previous and the new wide band channels occupy the same frequency band in order to make...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Performance Evaluation of Spectrum Sensing and Channel Access in Cognitive Radio Networks

    Spectrum sensing is an essential functionality of cognitive radio networks. In the existing Cognitive Radio spectrum detection techniques secondary nodes base their channel access decisions solely on the outcome of the spectrum sensor without taking into consideration the possibility that those outcomes are incorrect. To alleviate these negative effects a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Novel Approach of Multilevel Binary Image Encoding Using Walsh Table and Spiral Scanning

    In this paper, the authors proposed a method of image encoding technique in a new formulated way. During transmission image is encoded in two phases for the enhancement of security. In the first phase encoding is done using Walsh table and in the second phase by using spiral scanning based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Energy-Efficient Localized Routing in Wireless Sensor Networks

    Every sensor node is essential to know their location in the sensor network, even in the presence of malicious adversaries. In that the energy conservation and scalability are critical issues in wireless sensor network. In existing algorithm combines iterative gradient descent with selective pruning of inconsistent measurements to achieve high...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Network Intrusion Detection Evading System using Frequent Pattern Matching

    Signature based NIDS are efficient at detecting attacks for what they are prepared for. This makes an intruder to focus on the new evasion technique to remain undetected. Emergence of new evasion technique may cause NIDS to fail. Unfortunately, most of these techniques are based on network protocols ambiguities, so...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A New Method for Encryption Using Fuzzy Set Theory

    Security of data is important factor in data transmission through network. In this paper, the authors propose a new method using fuzzy set theory to enhance the security. The data in the form of text to be transmitted is encrypted by using the AES Rijndael algorithm. The encryption algorithm is...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Topographical Panoramic Imageproduction using Mobile Cloud

    Increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems. The main problems are resource scarcity, frequent disconnections, battery problems and mobility. Mobile cloud computing can address the above problems by executing mobile applications on resource providers external to the mobile device. Mobile cloud...

    Provided By International Journal of Engineering Trends and Technology