International Journal of Engineering Trends and Technology

Displaying 1-40 of 823 results

  • White Papers // Jul 2015

    Performance Analysis of Big Data Using Outlier Detection Technique

    Clustering and classification methods used in data mining. The goal is to provide a self-contained review of the concepts and the mathematics underlying clustering techniques .This data can be stored and maintained to generate information and knowledge. This information and knowledge has to be disseminated to every stake holders for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2015

    Blockage Control for TCP in Data-Center Systems Using ICTCP Algorithm

    The few comparing servers may send the information simultaneously around way to a particular beneficiary. For illustration, server farm applications, for example, map-reduce and seek applications are utilizing numerous to-one TCP movement design i.e. parallel information conveyance. While TCP association is ease off the simultaneous information convey. The information conveyance...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2015

    A Review on Biometric System

    The most common approach for fingerprint analysis is using minutiae that identifies corresponding features and evaluates the resemblance between two fingerprint impressions. Although many minutiae point pattern matching algorithms have been proposed, reliable automatic fingerprint verification remains as a challenging problem. Finger print recognition can be done effectively using texture...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    Implementation of Fuzzy Logic Controller Using VHDL - A Review

    In this paper, the authors deal with the literary introduction and comparative study of Fuzzy Logic Controller (FLC). In this paper, initiates with the introduction to fuzzy logic controller and moving towards its comparison to conventional and modernized implemented FLC. The FLC can be implemented by using Very high speed...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    Improved NAND Flash Memories Storage Reliablity Using Nonlinear Multi Error Correction Codes

    Multi-Level Cell (MLC) NAND flash memories are popular storage media because of their power efficiency and large storage density. Conventional reliable MLC NAND flash memories based on BCH codes or Reed-Solomon (RS) codes have a large number of undetectable and miscorrected errors. In this paper, the authors propose two general...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    DDoS Mitigation Using Software Defined Network

    Software Defined Networking (SDN) is an archetype which decouples the control plane and data plane. Data plane is used to just forward the data and control plane is used to decide how data should be forwarded. Open networking Foundation (ONF) is a group that is used in the development of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    Identifying Misbehaving Nodes in Wireless Sensor Networks

    Dropping and modifying packets are common attacks that can be launched by way of an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, however very few can easily and successfully determine the intruders. To handle this obstacle, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    A Review on Denial of Service Attacks and Their Counter Measures Over MANETs

    Security and QoS in ad-hoc wireless networks have recently become very important and actively researched topics because of a growing demand to support live streaming audio and video in civilian as well as military applications. The wireless links between nodes are highly susceptible to link attacks, which include passive eavesdropping,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    A Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-Based MANETs

    In mobile wireless communication and computing technologies, Mobile Ad-hoc NETworks (MANETs) has growing demands in various applications which have also caused high and complicated security issues in transmission communication wireless networks are sensitive to problems like data tampering and dropping attacks less focused and addressed. This paper has enhanced the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    A Comparison of Routing Protocols for MANET Using NS-2 Simulator

    Wireless connections are used in mobiles for establishing connection to various networks. A MANET is a collection of mobile users communicate over wireless links. The mobile device in MANET not only performs abilities as a host, but also as a router. The destination node can be within range of a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2015

    Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network

    Wireless Sensor Network (WSN) is an application based and self-configuring type of network. All sensor nodes in WSN work cooperatively to serve the requests. The battery consumption, security, packet loss etc. are some of the major challenges of wireless sensor networks. In previous times, many techniques had been proposed to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    NFC Based Bank Locker System

    In today's world, security in the banks has become a question of safety among the people. Keeping this in view, in this paper, the authors have implemented bank locker security system by utilizing NFC devices. NFC is mostly used in credit and debit cards for swiping purposes and also for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Performance Enhancement of VLSI Circuits using CNTFETs

    In the world of integrated circuits, CMOS has lost its credential during scaling beyond 32nm. The main drawbacks of using CMOS transistors are high power consumption and high leakage current. Scaling causes severe Short Channel Effects (SCEs) which are difficult to suppress. As technology is scaled down, the importance of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Data Mining and Knowledge Discovery in Database

    Knowledge discovery and data mining have become areas of growing significance because of the recent increasing demand for KDD techniques, including those used in machine learning, databases, statistics, knowledge acquisition, data visualization, and high performance computing. The motive of mining is to find a new generation of computational theories and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Study of Various Architectures of Distributed Arithmetic

    Digital filters basically, FIR are used in many real-time and critical applications. And hence their implementation in FPGAs and ASICs is a tedious job to do. Various constraints in terms of area, power, critical path and etc. has to be solved. Distributed arithmetic is an efficient concept developed in the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Person Identification Based on Humming Using MFCC and Correlation Concept

    In this paper, an attempt is made to identify persons with the help of their hum. Normally, speech is used as an input to the biometric system for recognition of a person, but here, instead of using speech, hum of a particular person is used for the same task. Hum...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Sophisticated Method of Analysis of Voltage Stabilizers

    Power systems are subjected to low frequency oscillations due to disturbances. Such oscillations may sustain and grow to cause system separation if adequate damping is not available. To enhance system damping, generators are equipped with Power System Stabilizers (PSSs) that provide supplementary feedback stabilizing signals in the excitation channel. The...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    An Optimized Approach in Hiding Data

    Due to advancement in communication technology the data is exchanged digitally now days. At one hand, the communication technology is improving; on the other hand the technology is also helping the attackers as a tool for unauthorized access. Thus the focus is drawn on security of data to be transmitted...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Secure Clustering Mechanism in Outsourced Databases

    The necessity to concentrate information out of disseminated information, without a former unification of the information, made the somewhat new research zone of Distributed Knowledge Discovery in Databases (DKDDs). The data mining in large databases there is hard task to maintain the confidentiality over data mining in distributed networks or...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    UPQC: A Customized Device for Power Quality Improvement in Distribution System

    Modern power system comprises of complex networks, where many generating stations and load centers are interconnected through long power transmission and distribution networks. Today due the changing trends and restructuring of power systems, the consumers are looking forward to the quality and reliability of power supply at the load centers...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Design and Simulation of PI Controller for Double Output Luo Converter

    Mirror-symmetrical double-output voltages are specially required in industrial applications and computer periphery circuits. Double output DC-DC converters can convert the positive input source voltage to positive and negative output voltages by two conversion paths. Because of the effect of parasitic elements, the output voltage and power-transfer efficiency of DC-DC converters...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Low Power Layout Design of Priority Encoder Using 65nm Technology

    In this paper, the authors provide comparative performance analysis of power and area of 4-bit priority encoder using 65nm technology. Two priority encoder approaches are presented, one with semi-custom and the other with full custom. The main objective is to compare semi-custom and full custom designed layout on the basis...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Effect of Path Planning on Flying Measured Characteristics for Quadcopter Using APM2.6 Controller

    The effect of path planning for quadcopter flying robot on flying measured characteristics velocity and flying angles (roll, pitch and yaw) have been investigated. Ardupilot-Mega 2.6 autopilot system controller is used; this controller has the ability to run many multi-rotor or Unmanned Aerial Vehicle (UAV) capable of performing GPS missions...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Modelling of Photovoltaic Using MATLAB/SIMULINK

    Due to the increasing demand of energy there is a need of power generation using renewable energy. Solar energy is essential source of renewable energy available in abundance. In this paper, modelling of PV (Photo-Voltaic) array is developed which can be used by researchers who need a simple, accurate and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Design and Implementation of VLSI DHT Algorithm for Image Compression

    A new Very Large Scale Integration (VLSI) algorithm for a Discrete Hartley Transform (DHT) that can be efficiently implemented on a highly modular and parallel VLSI architecture having a regular structure is presented. The concurrent execution of the DHT algorithm can be achieved by splitting on several parallel parts efficiently....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Design and Implementation of High Throughput Memory Efficient Arithmetic Coder for Image Compression Using SPIHT

    A design is proposed based on the new coding scheme for a novel image compression algorithm SPIHT (Set Partitioning In Hierarchical tree) using wavelet transform and arithmetic coder that provide an embedded code word. Image compression using SPIHT attracts more interest due its low memory requirement to represent an image....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A CMOS Power Efficient Analog Integrated Circuits for Neural Signal Acquisition

    In this paper, design of a two stage fully differential-RC miller compensated CMOS operational amplifier and a low power low noise amplifier for neural signal recording systems is presented. In the proposed amplifiers high gain with an active feedback loop, smaller frequency noise and low power consumption is achieved by...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Hardware Realization of Single Axis Solar Tracking System by Using a Cost Effective Microcontroller

    Solar based energy harvesting techniques have been attaining enormous interest in recent years. There are basically two ways of extracting energy from solar PhotoVoltaic (PV) panels. One is by employing single axis or dual axis tracking technique and the other one is by Maximum Power Point Tracking (MPPT) methods. The...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Survey on "Energy Efficient and Secure Infrastructure for MANET Jamming Attack"

    Security is the mandatory requisition in the Mobile Ad-Hoc NETwork (MANET). Due to wireless nature, it can be easily venerable or jammed by any malicious network. But now-a-days, MANET is the most growing and very important part of the people's life system. MANET is used in various fields like military...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Efficient Algorithm for Resource Allocation with Carrier Aggregation in Downlink LTE-A Networks

    LTE-Advanced (LTE-A) is the latest set of mobile technology specifications and enhancement over LTE. Previously, submitted as candidate for 4G system to ITU-T and then upgraded in 3GPP's release 10 with specification of very high data rates. To achieve these data rates carrier aggregation technique is used in downlinks. Downlink...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Survey on Performance Factors in Wireless Sensor Networks

    The wireless sensor network has been an active research area over past few years. The diversity in the applications used in wireless sensor networks represents its great success. There are different characteristics of the topologies used in routing method. According to these characteristics, the parameters of the network are also...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Detection of Sybil Attack in Mobile Ad-Hoc Network (MANET) Using Routing Protocols: A Survey

    Mobile Ad-hoc NETwork (MANET) system is one of the broad and productive fields which have licensed exceptional criticalness. All wireless portable ad-hoc systems are described as systems with no physical associations. A MANET is a makeshift remote system made out of remote versatile hubs, with no altered framework. There are...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks

    Two novel energy-aware routing algorithms to be proposed for wireless ad-hoc networks, called Reliable Minimum Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing (RMER). RMECR addresses three important requirements of ad-hoc networks: energy-efficiency, reliability and prolonging network lifetime. It considers the energy consumption and the remaining battery energy of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach

    A wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving self-assertive in the spots that have no system foundation. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Security is one of the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Sophisticated Routing Protocols Survey in the Presence of Warm Whole Attack in MANET

    Mobile Ad hoc NETwork (MANET) is a commonly correspondence in light of a scattered organization. It has an element topology and there is not any main issue for system administration. The element topology character of MANET has created it helpless and exposed to distinctive security assaults. In this paper, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Design and Simulation of Capacitive Fed Microstrip Antenna for GPS Applications

    In this paper, a wideband circularly polarized capacitive fed microstrip patch antenna is proposed. It is a square patch antenna truncated in opposite corners, suspended above the ground plane. The antenna structure contains capacitive feed strip which is fed by coaxial probe. The proposed structure is designed and simulated to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Detail Review on Voice over Internet Protocol (VoIP)

    Voice over Internet Protocol (VoIP) is a new way of communicating. It is a technology that allows users to make telephone calls over an IP network. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows business concerns of implementing VoIP, components of a VoIP system....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Survey Security Threats in MANET

    The black hole trouble is one of the refuge attacks that occur in mobile ad hoc networks. The authors present two probable solutions. The primary is to discover more than one route to the purpose. The next is to develop the packet succession number included in any packet header. In...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    Pattern Synthesis of Linear Antenna Array Using Multiple Optimizaion Techiques for Wi-Max Technology

    Antenna arrays with high directivity, low side lobe levels and radiated power need to be designed for enhancement the efficiency of Wi-Max in communication systems. A new optimization algorithm Real Coded Genetic Algorithm (RCGA) is proposed for the synthesis of linear antenna arrays. The RCGA is a high performance computational...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2015

    A Comparative Review on IPv4/IPv6 Co-existence Technologies

    Internet Protocol version 4 (IPv4) addresses have been reported to be nearing exhaustion and the next generation Internet Protocol version 6 (IPv6) is gradually being deployed in the Internet. IPv6 provides a much larger address space, better address design and greater security, among other benefits. IPv6 deployment requires thorough and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    RFID-Based Mobile Robot Positioning - Sensors and Techniques

    Mobile robot navigation using analog signal strength of a Radio Frequency IDentification (RFID) device is a promising alternative of different types of robot navigation methods in the state of the art. Skilled navigation in mobile robotics usually requires solving two problems: the knowledge of the position of the robot, and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Study on Auto Theft Prevention Using GSM

    This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Analysis of Leakage Reduction Technique on Different SRAM Cells

    Leakage components is very important for estimation and reduction of leakage power, especially for low power applications. This provides the motivation to explore the design of low leakage SRAM cells. High leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    An Overview on Privacy Preserving Data Mining Methodologies

    Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For example, mining health care data for the detection of disease outbreaks may require analyzing clinical records and pharmacy transaction data of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    Model-Based Programming of Intelligent Embedded Systems Through Offline Compilation

    Many recent and future space missions point to the need for increased autonomy in spacecraft with an emphasis on more capable fault diagnostic systems. The most widely used fault diagnostic systems are rule-based. Rule-based systems have quick response to events and clearly present to engineers the predefined reactions to events....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    GPS User Position Using Extended Linearization Technique

    The position of a GPS receiver can be determined by obtaining pseudoranges from a minimum of four different GPS satellites. The measured ranges do not represent the true ranges as the signal coming from a GPS satellite will be contaminated by various errors like Ephemeris error; Propagation error in the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Model-Driven Performance for the Pattern and Advancement of Software Exhaustive Systems

    Model-Driven Engineering (MDE) is an advance to widen software systems by build models and pertaining robotic alteration to them to finally make the execution for a intention platform. Although the main focus of MDE is on the creation of code, it is also essential to bear the study of the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Power Quality Disturbances and Protective Relays on Transmission Lines

    Power quality concerns the effect of voltage disturbances on end-user equipment and of current disturbances on network components. Power system protection concerns the detection of faults in the system from measured voltages and currents. However, non-fault voltage and current disturbances may lead to the inadvertent detection of a fault in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2011

    A Review of Load Balanced Routing Protocols in Mobile Adhoc Networks

    A wireless Mobile Ad hoc NETwork (MANET) is an infrastructure-less mobile network which is based on radio to radio multi-hoping and has no centralized controller or a fixed router. All nodes are capable of movement and can be connected dynamically in an arbitrary manner. Due to the dynamic nature of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2013

    Desired EEG Signals for Detecting Brain Tumor Using LMS Algorithm and Feedforward Network

    In Brain tumor diagnostic EEG is the most relevant in assessing how basic functionality is affected by the lesion. EEG continues to be an attractive tool in clinical practice due to its non invasiveness and real time depication of brain function. But the EEG signal contains the useful information along...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Analysis of Blocking Probability in a GSM Based Cellular Network System

    In this paper the authors check the performance of a GSM cellular communication system by using FDMA - TDMA system. In the present paper they evaluate the performance of the blocking probability, spectral efficiency and the bit error rate by using the specific model. By using this they try to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Data-driven Link Estimation and Routing in Sensor Network

    Link properties in 802.11b mesh networks and dense wireless sensor networks have been well studied. They have observed that wireless links assume complex properties, such as wide range non-uniform packet delivery rate at different distances, loose correlation between distance and packet delivery rate, link asymmetry, and temporal variations. The authors'...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    Scalable and Distributed Mobile Underwater Wireless Sensor Networks for Oceanographic Applications

    Large-scale mobile Underwater Wireless Sensor Network (UWSN) is a novel networking paradigm to explore aqueous environments. However, the characteristics of mobile UWSNs, such as low communication bandwidth, large propagation delay, floating node mobility, and high error probability, are significantly different from ground-based wireless sensor networks. The novel networking paradigm poses...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Efficient Signature Schemes Based on MABS (Multicast Authnetcation Based On Batch Signature)

    In traditional multicast is an internet work service that provides efficient delivery of data from a source to multiple receivers. It reduces the bandwidth requirements of the network and the computational overhead of the host devices. Digital signature provides authenticity, integrity and non-repudiation to many kinds of applications in everywhere...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2012

    A Perspective Missing Values in Data Mining Applications

    In large database there may be some values missing in some of the attributes. These missing values are calculated first by identifying it either discrete/continuous and then the values are calculated by mean, median. In this paper the calculated missing set values are utilized to estimate the imputation of missing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2012

    Image Security Using Steganography and Cryptographic Techniques

    Steganography is the art of hiding the fact communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. This paper introduces two new methods where in cryptography and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2012

    Data Acquisition and Control System Using Embedded Web Server

    This paper realizes an embedded web server, which enables data acquisition and status monitoring with the help of any standard web browser. User can monitor and control remote temperature and video information The platform used is Linux and ARM 9 processor. Biggest advantage of this web server is embedding a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2012

    Performance Analysis and Enhancement in IPSec VPN to Reduce Connection Establishment Overhead and Transmission Delay: Part-1

    In this paper, the authors are discussing various encryption and authentication algorithms and foreseeing the effect of these algorithms over network performance HMSC-MD5 and AES (authentication encryption) gives the optimum network performance parameter. Beside Local Area Networks (LAN) or Wide Area Networks (WAN), networks can be generally cut into public...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    Implementation Strategy for Optical Fiber Modbus-TCP Based Nuclear Radiation Detection Instrument for Nuclear Emergency

    Any detection of Nuclear emergency is prone to the EMP generated by the blast. Hence use of conventional wireless & wired sensor networks in such scenarios becomes very difficult. Thus an effective sensor network scheme is needed which effectively senses and communicates in such scenarios over an existing protocol. The...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    A Novel Method for Detecting Triple JPEG Compression With the Same Quantization Matrix

    The detection of JPEG compression plays an important role in digital forensics. The JPEG image can be compressed one, two, three or n times. But if the number of times of the compression of a same JPEG image increases, the process of detection of the JPEG compression will be difficult....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    Framework for Testing Web Services Through SOA (Service Oriented Architecture)

    In today's connected e-world Web Services is arguably the most popular and powerful software technology. This paper focuses on web services and also the various standards that have evolved over the years, such as XML, SOAP, WSDL, and UDDI. This paper advocates the need for testing web services as testing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    GPS - GSM Based Tracking System

    This paper proposed is an attempt to design a tracking unit that uses the global positioning system to determine the precise location of a object, person or other asset to which it is attached and using GSM modem this information can be transmit to remote user. It can provide tele-monitoring...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Manycast Multiple QoS Constraints Based Routing Algorithms Over Optical Burst Switched Networks

    Distributed applications such as video conferencing require data to be transmitted to a group of destinations from a single source. Such applications can be implemented using multicasting. However, in multicasting, if any one of the fixed members in the group can not satisfy the service requirement of the application, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Performance of Ethernet Protocol Conversion on an Arm-7 Embedded Processor

    This paper designed a research on real web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a web page. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    An Enhanced Framework for Performing Pre-Processing On Web Server Logs

    Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files shows actual usage of web site under all circumstances and don't need to conduct external experimental labs to get this information. This paper describes the effective preprocessing of access stream...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    A Confidentiality Proof Wandering - Protocol in Mobile Networks

    This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Soft Handoff in Mobile Networks

    In power controlled CDMA systems soft handoff is preferred over hard handoff strategies. This is more pronounced when the IS-95 standard is considered wherein the transmitter power is adjusted dynamically during the operation. The previous and the new wide band channels occupy the same frequency band in order to make...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Performance Evaluation of Spectrum Sensing and Channel Access in Cognitive Radio Networks

    Spectrum sensing is an essential functionality of cognitive radio networks. In the existing Cognitive Radio spectrum detection techniques secondary nodes base their channel access decisions solely on the outcome of the spectrum sensor without taking into consideration the possibility that those outcomes are incorrect. To alleviate these negative effects a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Novel Approach of Multilevel Binary Image Encoding Using Walsh Table and Spiral Scanning

    In this paper, the authors proposed a method of image encoding technique in a new formulated way. During transmission image is encoded in two phases for the enhancement of security. In the first phase encoding is done using Walsh table and in the second phase by using spiral scanning based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    SNTP Driven Event Management to Control Audio/Video/Buzzer Events by Using Streaming Media Player

    This paper proposes a compact time sharing system for home use applying the simple Network Time Protocol. The compact SNTP server/client system for home appliances like audio, video buzzer controls, etc., has been developed as an extension of an SNTP client application. The newly developed system can obtain the time...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Effective Placement and Selection Approaches for Network Services

    Network services are provided by means of dedicated service gateways, through which traffic flows are directed service placement problem, which takes into account traffic engineering considerations. Rather than trying to minimize the Length of the traffic flow routes, the authors take advantage of these routes in order to enhance the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Improved Apriori and KNN Approach for Virtual Machine Based Intrusion Detection

    Now-a-days, as information systems are usually more accessible to the world wide web, the advantage of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) that based on sophisticated algorithms as an alternative to current signature-base detections are really in demand. Intrusion detection is one of network security...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Web Application Vulnerability Analysis Using Robust SQL Injection Attacks

    SQL Injection Attacks is one of the most serious threats in the security of database driven applications. An SQL injection attack focuses on interactive web applications that employ database services. These applications accept user inputs and use them into form SQL statements at runtime. In the SQL injection attack, an...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

    This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads. In wireless ad hoc networks, it is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Various issues including security, legitimacy and node concurrency still persist in mobile...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Analysing an Industrial Automation Pyramid and Providing Service Oriented Architecture

    Industrial automation platforms are experiencing a paradigm shift. New technologies are making their way in the area, including embedded real-time systems, standard local area networks like Ethernet, Wi-Fi and ZigBee, IP-based communication protocols, standard Service Oriented Architectures (SOAs) and Web Services. The introduction of these new technologies raises important problems...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Adaptive Classifier and Associative Algorithms for Phishing Detection

    Phishing serves as a social engineering crime generally known as impersonating a trusted third party to gain access to private data. Data Mining (DM) Techniques might be a very useful methodology for identifying and detecting phishtank phishing websites. Using this proposed system, the authors present a novel approach to overcome...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    An Advanced Honeypot System for Efficient Capture and Analysis of Network Attack Traffic

    A honeypot is an information system resource used to divert attackers and hackers away from critical resources as well as a tool to study an attacker's methods. One of the most widely used tools is honeyd for creating honeypots. The logs generated by honeyd can grow very large in size...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Encryption Technique With Data- In-Motion for Hybrid Database

    Rapid growth in the automation gives rise to emergence of the database having different flavors. Taking consideration of various domains; Database is the most important component in the world of software. As today's world is moving on the factors of dependant on the other technology or with other organization which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    Network Intrusion Detection System Based on Feature Selection and Triangle Area Support Vector Machine

    As the cost of the data processing and Internet accessibility increases, more and more organizations are becoming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    A Secured Requirement Engineering Approach in Online Shopping System

    Requirement engineering has always occupied a primal position in software engineering."If one get the requirement correct, the people are very close to getting the software correct", has been an accepted fact. Many principles and techniques have been proposed for efficient requirement gathering and these have been validated and applied in...

    Provided By International Journal of Engineering Trends and Technology