International Journal of Engineering Trends and Technology

Displaying 1-40 of 522 results

  • White Papers // Dec 2014

    Implementation of Data Link Control Protocols in Wired Network

    Data link layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provides the means to rectify the errors and usually correct it that may occur in the physical layer. Study and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Extensible Location Dependent Spatial Object Search on Road Networks

    Extensible location-dependent spatial object that searches for spatial object on road networks. Here it provides distance indexing technique and providing a dynamic object mapping mechanism of spatial object search. It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Spatial Correlation Property of a 2x2 MIMO System for Different 3GPP Cases

    In this paper, the authors study and analyze the spatially correlated fading channel, its basic concepts, brief mathematical modeling and simulation of correlation function of a MIMO system. The review paper in presents the effect of antenna parameters on the correlation property of a MIMO system and hence the system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    STTC-OFDM Downlink Baseband Receiver for Mobile WMAN

    In this paper, the authors proposed a STTC-OFDM system which is based on IEEE 802.16e OFDMA specification and supports the distributed subcarrier allocation of Partial Usage of Sub Channels (PUSC) for DownLink (DL) transmission. The Fast Fourier Transforms (FFT) size 1048. The length of Cyclic Prefix (CP) is 128 sampling...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Energy Level Based Stable Election Protocol in Wireless Sensor Network

    In wireless sensor network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    ARM 9 Based Intelligent System for Biometric Finger Authentication

    Most of the universities are enforcing affiliated colleges to implement biometric fingerprint attendance system to monitor student attendance. Biometric fingerprint scanner need to be installed in college where the student studying and it is monitored by the university online. There is possibility of adding fake finger print into the scanner...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach of Image Encryption and Compression for Secure Transmission

    In addition to provide the security for data through image, the authors are using the concepts hybrid approach of encryption and compression techniques, before transmission of data they can encrypt it by using cryptographic technique. In this paper, they are using triple DES algorithm for data encryption and decryption, after...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient and Multi Keyword Search in Service Oriented Architecture

    Searching top k multi keywords from the out sourced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality. In this paper, the authors are proposing an efficient top k retrieval from out sourced file through service oriented application by computing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A High Performance Privacy Preserving Clustering Approach in Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of Knowledge and data engineering or community based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    High Coverage Area and Power Utilization (RF) in WPSN Using Modulated backscattering

    Sensor networks are highly sensitive to energy usage. They may, probably, be deployed in inhospitable or hostile environments, where it may not be possible to refresh energy sources. Hence, energy consumption is a major issue, and energy-aware protocols/applications are desirable. Energy consumption is observed at three stages, node communication, sensing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Minimization of Payment and Error Tolerent Resource Allocation for Cloud System

    Virtual Machine (VM) technology being greater and fully developed, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand, which contributes three technologies such as, formulating a deadline-driven resource allocation problem based on the cloud environment facilitated with VM resource isolation technology, and also to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Communication Protocol in Wireless Sensor Networks

    Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Channel Estimation of MIMO-OFDM System LTE Network

    Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has led to demand for higher network capacity and performance. Higher bandwidth, optimized modulation offer practically limited...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust Speech Recognitionfor Speaker and Speaking Environment

    The authors study a cohort selection technique to construct a space with good resolution in the online phase. The concept of cohort selection resembles that of the family of subset selection methods that find a subset of components from the entire set of components to model a signal of interest....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust RoF Systemwith DWDM Technique for High Speed Communication Networks

    In the recent trends in optical communication to overcome one of the major problems in the new generation of radio over fiber networks that requires being concentrated, is decreasing the quantity of bit error rate in the lowest power penalty. This paper also evaluates the results of down-link 40Gbps OOK...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Two End Point Verification of Secure Data Storage Over Cloud

    The authors are proposing an empirical model of out sourcing of information to multiple data owners with secure key generation and two level authentication process, one is over data owners and other is over key generation center. Initially data owner level authentication cane performed with secret key and random challenges...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Enhancement of Image Security Using Random Permutation

    In recent days transmitting digital media having large size data through the internet became simple task but providing security and security became big issue these days. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Image encryption has to be conducted prior to image...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Wireless Controller for Ultra Low Power CC430 Based Transceiver

    Power consumption is the main criteria now-a-days in any embedded application. The less the power consumed the more the durability of the product. This paper is to establish a ultra low power RF link between two CC430F6147 transceiver units, one control unit and the other application unit such that their...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Novel Message Integrity Code Based Authentication Protocol

    Now-a-days, wireless local area network rapidly increase of mobile device and more efficient of link setup mechanism. For the rapidly increase of WLAN the authors are also provide security of transferring data. For this purpose so many authentication protocol are proposed and one of the protocol is 802.11i. Through experiments...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Framework for Secure Data Sharing over Cloud Based on Group Key Management

    Now-a-days, cloud storage gaining more popularity for sharing of data. The sharing of data with more securely, efficiently and flexible through others in the cloud storage. So that by providing security of sharing data the authors using cryptography technique. In this paper, they are using new public key cryptography technique...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Simple and Efficient Unique Identity Based Verification in Networks

    In networks transferring data is critical issue for providing security of data. Before transferring data if it checks the sent user is authenticate user or not. By providing security of data and authentication of user the authors proposed a technique. In this paper, they are implement two concepts for performing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Privacy Data Sharing for a Group of Members in the Cloud

    Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the Cloud Service Providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharing of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Secure and Efficient Data Transaction over Cloud Based On Signature Generation Technique

    In cloud, transactional database provides authorization, it is one of most important for proof of authorization, it I the base for performance evaluation. In this paper, the authors are concentrating on mainly on three concepts i.e. one is the authorization of users in the cloud. For this they are using...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Novel and Secure Mining of Data in Distributed Architecture

    Data confidentiality over data mining in distributed networks is still an important and interesting research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is a basic factor while datasets or data integrates from different data holders or players for mining. Secure mining of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach for Identification of Malicious Nodes in Network Traffic

    Various traditional mechanisms available for identification of unauthorized behavior or malicious activities of the incoming nodes like with their trust measures like direct trust, mutual trust. Servers maintain firewall log data of in and out traffic for intrusion detection and prevention mechanisms. Even though various approaches available to detect and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Human Face Recognition using Elman Networks

    Face recognition from the images is challenging due to the unpredictability in face appearances and the complexity of the image background. This paper proposes a different approach in order to recognize human faces. The face recognition is done by comparing the characteristics of the captured face to that of known...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Architecture for Efficient Search Results in Mobile

    Retrieval of user interesting results over mobile search engine is always an interesting and important research issue in now-a-days of information retrieval, due to there is a rapid growth of mobile usage of user. Even though various traditional approaches available, performance and time complexity issues are the primary factors while...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Manageable Framework for Preserving Exclusive Data in Social Networks

    In social networks there are so many threats such as impersonation, data leakage. Most of the social networks are more worried about private data leakage. Some of them as intruders by deploying the security attacks like denial of service or hack the information. So the authors introduced a framework which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    The Use of Mobile Phones in University Exams Cheating: Proposed Solution

    Currently, instant communication is very possible all over the world due to a rapid growth in mobile phones technology. Each day, a number of mobile phones subscribers and cellular network coverage is escalating tremendously. Today's mobile phones are released with ability nearly to that of a desktop computer. The ubiquity...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Model of Malicious Node Detection and Prevention with Data Rating

    Identification and prevention of malicious nodes is always an interesting research issue in wireless sensor networks. In this paper, the authors are proposing an efficient approach for identification of anonymous or malicious node with signature and data rating techniques. Initially every node can be verified genuine or malicious node with...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Privacy Preserving Data mining over Distributed Network for Data holders

    Using an unbounded number of rounds of communications, for each gate can be implemented in a way that requires only a constant number of rounds; the total number of rounds will still be linear in the depth of the underlying circuit. Secure mining in horizontal databases is a research issue...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    FDM Secure Mining of Association Rules in Horizontally Distributed Databases

    The authors study the problem of privacy-preservation in social networks. They consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Performance Analysis of JPEG2000 Images Using UPA Algorithm & OFDM through Different Channel Models

    In this paper, the authors first build up a wireless communication simulator including gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, they test the effect of different channel models to the data and image in receiver with...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Model of Rank Oriented Search Goal in Mobile Search Engine

    Searching for user interested query results is always complex task even though satisfying the user search goals because of various reasons. Optimizing the search engines in mobile phones is still an important research issue in the field of knowledge and data engineering, even though various approaches are available, performance and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    A Novel and Privacy Preserving Unsupervised Learning Approach between Data Holders

    In present days there are rapidly growing technology and knowledge discovery out of information and it becomes more prevalent. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is an important...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Supervised Learning Approach Over Firewall Log Data

    Firewall protection is local security policy in local networks. It will secure from unknown access of another nodes in the local network. Analyzing the firewall log data is always an interesting research area in the field of network traffic analysis. In this paper, the authors are proposing an efficient classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    A Novel and Optimal Cooperative Communication in MANET

    Cooperative communication is the one of the current interesting research issue in the field of wireless sensors, various cache based approaches proposed by various authors but cache individually cannot increase the performance over MANET. Topology architectures defined for data transmission and cooperative communication in MANET. In this paper, the authors...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Empirical Model of Secure Clustering Technique Over Decentralized Architecture

    In data mining there are so many databases connects with each other in large communication networks. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is an important factor while datasets...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Power Allocation Approach in Multi Carrier Wireless Communication System

    Wireless communication systems are tending towards progressive data transfer over a long range of transmission. With the raise in required quality of services, the allocation of the available resource is to be maintained efficiently. A load matrix approach for multi cellular architecture is proposed, which allocate the communication power based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Application of Wireless Power Transfer for Home Appliances Using Inductive Resonance Coupling

    Now-a-days, the need of wireless technology is increased because of mobility, low cost and easy to maintain. This technology is commonly used for transferring the digital information over the air medium. The wireless power transmission technology is well suited for transferring power to the home appliances without wires such as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Performance of Ethernet Protocol Conversion on an Arm-7 Embedded Processor

    This paper designed a research on real web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a web page. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    An Enhanced Framework for Performing Pre-Processing On Web Server Logs

    Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files shows actual usage of web site under all circumstances and don't need to conduct external experimental labs to get this information. This paper describes the effective preprocessing of access stream...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    A Confidentiality Proof Wandering - Protocol in Mobile Networks

    This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Soft Handoff in Mobile Networks

    In power controlled CDMA systems soft handoff is preferred over hard handoff strategies. This is more pronounced when the IS-95 standard is considered wherein the transmitter power is adjusted dynamically during the operation. The previous and the new wide band channels occupy the same frequency band in order to make...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Performance Evaluation of Spectrum Sensing and Channel Access in Cognitive Radio Networks

    Spectrum sensing is an essential functionality of cognitive radio networks. In the existing Cognitive Radio spectrum detection techniques secondary nodes base their channel access decisions solely on the outcome of the spectrum sensor without taking into consideration the possibility that those outcomes are incorrect. To alleviate these negative effects a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Novel Approach of Multilevel Binary Image Encoding Using Walsh Table and Spiral Scanning

    In this paper, the authors proposed a method of image encoding technique in a new formulated way. During transmission image is encoded in two phases for the enhancement of security. In the first phase encoding is done using Walsh table and in the second phase by using spiral scanning based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2011

    A Review of Load Balanced Routing Protocols in Mobile Adhoc Networks

    A wireless Mobile Ad hoc NETwork (MANET) is an infrastructure-less mobile network which is based on radio to radio multi-hoping and has no centralized controller or a fixed router. All nodes are capable of movement and can be connected dynamically in an arbitrary manner. Due to the dynamic nature of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2013

    Desired EEG Signals for Detecting Brain Tumor Using LMS Algorithm and Feedforward Network

    In Brain tumor diagnostic EEG is the most relevant in assessing how basic functionality is affected by the lesion. EEG continues to be an attractive tool in clinical practice due to its non invasiveness and real time depication of brain function. But the EEG signal contains the useful information along...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Analysis of Blocking Probability in a GSM Based Cellular Network System

    In this paper the authors check the performance of a GSM cellular communication system by using FDMA - TDMA system. In the present paper they evaluate the performance of the blocking probability, spectral efficiency and the bit error rate by using the specific model. By using this they try to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Data-driven Link Estimation and Routing in Sensor Network

    Link properties in 802.11b mesh networks and dense wireless sensor networks have been well studied. They have observed that wireless links assume complex properties, such as wide range non-uniform packet delivery rate at different distances, loose correlation between distance and packet delivery rate, link asymmetry, and temporal variations. The authors'...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    Scalable and Distributed Mobile Underwater Wireless Sensor Networks for Oceanographic Applications

    Large-scale mobile Underwater Wireless Sensor Network (UWSN) is a novel networking paradigm to explore aqueous environments. However, the characteristics of mobile UWSNs, such as low communication bandwidth, large propagation delay, floating node mobility, and high error probability, are significantly different from ground-based wireless sensor networks. The novel networking paradigm poses...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    RFID-Based Mobile Robot Positioning - Sensors and Techniques

    Mobile robot navigation using analog signal strength of a Radio Frequency IDentification (RFID) device is a promising alternative of different types of robot navigation methods in the state of the art. Skilled navigation in mobile robotics usually requires solving two problems: the knowledge of the position of the robot, and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Study on Auto Theft Prevention Using GSM

    This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Analysis of Leakage Reduction Technique on Different SRAM Cells

    Leakage components is very important for estimation and reduction of leakage power, especially for low power applications. This provides the motivation to explore the design of low leakage SRAM cells. High leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    An Overview on Privacy Preserving Data Mining Methodologies

    Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For example, mining health care data for the detection of disease outbreaks may require analyzing clinical records and pharmacy transaction data of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    Model-Based Programming of Intelligent Embedded Systems Through Offline Compilation

    Many recent and future space missions point to the need for increased autonomy in spacecraft with an emphasis on more capable fault diagnostic systems. The most widely used fault diagnostic systems are rule-based. Rule-based systems have quick response to events and clearly present to engineers the predefined reactions to events....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    GPS User Position Using Extended Linearization Technique

    The position of a GPS receiver can be determined by obtaining pseudoranges from a minimum of four different GPS satellites. The measured ranges do not represent the true ranges as the signal coming from a GPS satellite will be contaminated by various errors like Ephemeris error; Propagation error in the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Model-Driven Performance for the Pattern and Advancement of Software Exhaustive Systems

    Model-Driven Engineering (MDE) is an advance to widen software systems by build models and pertaining robotic alteration to them to finally make the execution for a intention platform. Although the main focus of MDE is on the creation of code, it is also essential to bear the study of the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Power Quality Disturbances and Protective Relays on Transmission Lines

    Power quality concerns the effect of voltage disturbances on end-user equipment and of current disturbances on network components. Power system protection concerns the detection of faults in the system from measured voltages and currents. However, non-fault voltage and current disturbances may lead to the inadvertent detection of a fault in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    SNTP Driven Event Management to Control Audio/Video/Buzzer Events by Using Streaming Media Player

    This paper proposes a compact time sharing system for home use applying the simple Network Time Protocol. The compact SNTP server/client system for home appliances like audio, video buzzer controls, etc., has been developed as an extension of an SNTP client application. The newly developed system can obtain the time...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Effective Placement and Selection Approaches for Network Services

    Network services are provided by means of dedicated service gateways, through which traffic flows are directed service placement problem, which takes into account traffic engineering considerations. Rather than trying to minimize the Length of the traffic flow routes, the authors take advantage of these routes in order to enhance the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Improved Apriori and KNN Approach for Virtual Machine Based Intrusion Detection

    Now-a-days, as information systems are usually more accessible to the world wide web, the advantage of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) that based on sophisticated algorithms as an alternative to current signature-base detections are really in demand. Intrusion detection is one of network security...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Web Application Vulnerability Analysis Using Robust SQL Injection Attacks

    SQL Injection Attacks is one of the most serious threats in the security of database driven applications. An SQL injection attack focuses on interactive web applications that employ database services. These applications accept user inputs and use them into form SQL statements at runtime. In the SQL injection attack, an...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

    This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads. In wireless ad hoc networks, it is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Various issues including security, legitimacy and node concurrency still persist in mobile...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Analysing an Industrial Automation Pyramid and Providing Service Oriented Architecture

    Industrial automation platforms are experiencing a paradigm shift. New technologies are making their way in the area, including embedded real-time systems, standard local area networks like Ethernet, Wi-Fi and ZigBee, IP-based communication protocols, standard Service Oriented Architectures (SOAs) and Web Services. The introduction of these new technologies raises important problems...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Adaptive Classifier and Associative Algorithms for Phishing Detection

    Phishing serves as a social engineering crime generally known as impersonating a trusted third party to gain access to private data. Data Mining (DM) Techniques might be a very useful methodology for identifying and detecting phishtank phishing websites. Using this proposed system, the authors present a novel approach to overcome...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    An Advanced Honeypot System for Efficient Capture and Analysis of Network Attack Traffic

    A honeypot is an information system resource used to divert attackers and hackers away from critical resources as well as a tool to study an attacker's methods. One of the most widely used tools is honeyd for creating honeypots. The logs generated by honeyd can grow very large in size...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Encryption Technique With Data- In-Motion for Hybrid Database

    Rapid growth in the automation gives rise to emergence of the database having different flavors. Taking consideration of various domains; Database is the most important component in the world of software. As today's world is moving on the factors of dependant on the other technology or with other organization which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    Network Intrusion Detection System Based on Feature Selection and Triangle Area Support Vector Machine

    As the cost of the data processing and Internet accessibility increases, more and more organizations are becoming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    A Secured Requirement Engineering Approach in Online Shopping System

    Requirement engineering has always occupied a primal position in software engineering."If one get the requirement correct, the people are very close to getting the software correct", has been an accepted fact. Many principles and techniques have been proposed for efficient requirement gathering and these have been validated and applied in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2012

    Collaborative Filtering and Random Forest Classification Algorithm for PROBE Attacks Detection in a Network Classification

    During the past few years huge amount of network attacks have been increased the requirement of efficient network intrusion detection techniques for detecting attacks. In the existing approach, different classification techniques are used for identifying various real time network attacks using data mining. However, most of the algorithms fail to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2012

    A Traceability Approach in Software Creation by DM

    In present environment software engineering integrates with data mining. Data Mining(DM) works as good decision support system in software tools. Now, the authors discuss about navigation patterns source code tracing design. Static navigation shows constant navigation patterns. Through Static navigation every time execution flow takes same time and identifies same...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Processor Technological Advancement

    During the last decade Intel has introduced several technologies for different generation processors. Different architectures are added featuring enhanced energy efficiency, power management, affordable performance, fast execution, multitasking demands, optimized multithreading, CPU performance boost, higher data throughput, improved virtualization performance, smart security. This paper provides insight into recently added technologies...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Performance Analysis of Weighted Load Balanced Routing Protocol With Ad Hoc On-Demand Distance Vector

    This paper describes about WLBR (Weighted Load Balanced Routing Protocol) and its performances are analyzed with AODV. The simulation results shows that this proposed protocol outperforms well than the AODV. The main performance metrics used here are throughput, node remaining energy, packet delivery ratio, energy consumed and routing delay. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Application Layer Based Packet Analysis and Intrusion Detection

    Network forensics is basically a new approach when it comes to the network information security, because the IDS and firewall cannot always discover and stop the misuse in the whole network. This proposed work is used to capture and analyze the data exchanged among the many different IP traceback techniques...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    False Data Detection Using Trusted Group Membership Service

    Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. The transmission of false data depletes the constrained battery power and degrades...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Detection of Explosives Using Wireless Sensor Networks

    Automatic detection of explosives using wireless sensor networks monitors and tracks the IEDs that are placed by terrorists at public environments. The area under study is monitored in real time, collect data by the sensor and send to the processor which process the data and compares with the database and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Detection and Prevention of Congestion Attacks and Packet Loss Using Piggyback Methods in Wireless Network

    Network security involves the authorization of access to data in a network, which is controlled by the network administrator. In this paper, the authors investigate the problem of packet loss over the wireless communication and the congestions that are taken place. To prevent the packet loss, they propose the idea...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A Hybrid Biometric Authentication Algorithm

    A facial recognition system is a computer based application for automatically identifying or verifying a person from a digital image. One of the ways to do this is by comparing the selected facial features from the image and a facial database. Some facial recognition algorithms identify faces by extracting landmarks,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A New Entropy Encoding Algorithm for Image Compression Using DCT

    Digital images contain large amount of information that need evolving effective techniques for storing and transmitting the ever increasing volumes of data. Image compression addresses the problem by reducing the amount of data required to represent a digital image. Image compression is achieved by removing data redundancy while preserving information...

    Provided By International Journal of Engineering Trends and Technology