International Journal of Engineering Trends and Technology

Displaying 1-40 of 527 results

  • White Papers // Dec 2014

    Implementation of Data Link Control Protocols in Wired Network

    Data link layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provides the means to rectify the errors and usually correct it that may occur in the physical layer. Study and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Extensible Location Dependent Spatial Object Search on Road Networks

    Extensible location-dependent spatial object that searches for spatial object on road networks. Here it provides distance indexing technique and providing a dynamic object mapping mechanism of spatial object search. It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Spatial Correlation Property of a 2x2 MIMO System for Different 3GPP Cases

    In this paper, the authors study and analyze the spatially correlated fading channel, its basic concepts, brief mathematical modeling and simulation of correlation function of a MIMO system. The review paper in presents the effect of antenna parameters on the correlation property of a MIMO system and hence the system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    STTC-OFDM Downlink Baseband Receiver for Mobile WMAN

    In this paper, the authors proposed a STTC-OFDM system which is based on IEEE 802.16e OFDMA specification and supports the distributed subcarrier allocation of Partial Usage of Sub Channels (PUSC) for DownLink (DL) transmission. The Fast Fourier Transforms (FFT) size 1048. The length of Cyclic Prefix (CP) is 128 sampling...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Life Saving Breaker System for Hasty Drivers

    The main concept of this proposed system is to avoid accidents. Accident happens mainly due to rash driving of vehicle or driving the vehicles with over speed. So accidents would be reduced when the vehicles will move with less speed. Firstly, the authors need to verify with which speed the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    DS-CDMA System with Multiuser Detection and MMSE Equalizer to Mitigate MAI

    Wireless communication has drastically shown evaluation mobile communication and its counterparts. Code Division Multiple Access (CDMA) is one of the reliable multiple access methods appropriate for sustaining lots of new services for ex ample speech, video, multimedia applications, which are becoming progressively more important for mobile communications. The multiple data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Innovative Approach Towards Traffic Signal Control

    In this paper, the authors give information about traffic light control system based on wireless sensor network. Here the traffic lights changes according to the density of the traffic. To identify the traffic density, the authors are going to use IR sensors. If there is more density automatically the highest...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Efficient Intrusion Detection and Prevention System with Hybrid Approach

    In communication system there are many issues about intrusion detection and they are classified into two types such as ID based intrusion detection and Host based intrusion detection. The ID based intrusion detection mainly works on unique ID of the users which means this method track the intruders based on...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    High Coverage Area and Power Utilization (RF) in WPSN Using Modulated backscattering

    Sensor networks are highly sensitive to energy usage. They may, probably, be deployed in inhospitable or hostile environments, where it may not be possible to refresh energy sources. Hence, energy consumption is a major issue, and energy-aware protocols/applications are desirable. Energy consumption is observed at three stages, node communication, sensing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust Speech Recognitionfor Speaker and Speaking Environment

    The authors study a cohort selection technique to construct a space with good resolution in the online phase. The concept of cohort selection resembles that of the family of subset selection methods that find a subset of components from the entire set of components to model a signal of interest....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust RoF Systemwith DWDM Technique for High Speed Communication Networks

    In the recent trends in optical communication to overcome one of the major problems in the new generation of radio over fiber networks that requires being concentrated, is decreasing the quantity of bit error rate in the lowest power penalty. This paper also evaluates the results of down-link 40Gbps OOK...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Minimization of Payment and Error Tolerent Resource Allocation for Cloud System

    Virtual Machine (VM) technology being greater and fully developed, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand, which contributes three technologies such as, formulating a deadline-driven resource allocation problem based on the cloud environment facilitated with VM resource isolation technology, and also to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Architecture for Efficient Search Results in Mobile

    Retrieval of user interesting results over mobile search engine is always an interesting and important research issue in now-a-days of information retrieval, due to there is a rapid growth of mobile usage of user. Even though various traditional approaches available, performance and time complexity issues are the primary factors while...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Model of Malicious Node Detection and Prevention with Data Rating

    Identification and prevention of malicious nodes is always an interesting research issue in wireless sensor networks. In this paper, the authors are proposing an efficient approach for identification of anonymous or malicious node with signature and data rating techniques. Initially every node can be verified genuine or malicious node with...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Privacy Preserving Data mining over Distributed Network for Data holders

    Using an unbounded number of rounds of communications, for each gate can be implemented in a way that requires only a constant number of rounds; the total number of rounds will still be linear in the depth of the underlying circuit. Secure mining in horizontal databases is a research issue...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    FDM Secure Mining of Association Rules in Horizontally Distributed Databases

    The authors study the problem of privacy-preservation in social networks. They consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Performance Analysis of JPEG2000 Images Using UPA Algorithm & OFDM through Different Channel Models

    In this paper, the authors first build up a wireless communication simulator including gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, they test the effect of different channel models to the data and image in receiver with...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Model of Rank Oriented Search Goal in Mobile Search Engine

    Searching for user interested query results is always complex task even though satisfying the user search goals because of various reasons. Optimizing the search engines in mobile phones is still an important research issue in the field of knowledge and data engineering, even though various approaches are available, performance and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    The Use of Mobile Phones in University Exams Cheating: Proposed Solution

    Currently, instant communication is very possible all over the world due to a rapid growth in mobile phones technology. Each day, a number of mobile phones subscribers and cellular network coverage is escalating tremendously. Today's mobile phones are released with ability nearly to that of a desktop computer. The ubiquity...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Communication Protocol in Wireless Sensor Networks

    Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Two End Point Verification of Secure Data Storage Over Cloud

    The authors are proposing an empirical model of out sourcing of information to multiple data owners with secure key generation and two level authentication process, one is over data owners and other is over key generation center. Initially data owner level authentication cane performed with secret key and random challenges...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Channel Estimation of MIMO-OFDM System LTE Network

    Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has led to demand for higher network capacity and performance. Higher bandwidth, optimized modulation offer practically limited...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Enhancement of Image Security Using Random Permutation

    In recent days transmitting digital media having large size data through the internet became simple task but providing security and security became big issue these days. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Image encryption has to be conducted prior to image...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Wireless Controller for Ultra Low Power CC430 Based Transceiver

    Power consumption is the main criteria now-a-days in any embedded application. The less the power consumed the more the durability of the product. This paper is to establish a ultra low power RF link between two CC430F6147 transceiver units, one control unit and the other application unit such that their...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Manageable Framework for Preserving Exclusive Data in Social Networks

    In social networks there are so many threats such as impersonation, data leakage. Most of the social networks are more worried about private data leakage. Some of them as intruders by deploying the security attacks like denial of service or hack the information. So the authors introduced a framework which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Novel Message Integrity Code Based Authentication Protocol

    Now-a-days, wireless local area network rapidly increase of mobile device and more efficient of link setup mechanism. For the rapidly increase of WLAN the authors are also provide security of transferring data. For this purpose so many authentication protocol are proposed and one of the protocol is 802.11i. Through experiments...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Framework for Secure Data Sharing over Cloud Based on Group Key Management

    Now-a-days, cloud storage gaining more popularity for sharing of data. The sharing of data with more securely, efficiently and flexible through others in the cloud storage. So that by providing security of sharing data the authors using cryptography technique. In this paper, they are using new public key cryptography technique...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Simple and Efficient Unique Identity Based Verification in Networks

    In networks transferring data is critical issue for providing security of data. Before transferring data if it checks the sent user is authenticate user or not. By providing security of data and authentication of user the authors proposed a technique. In this paper, they are implement two concepts for performing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Privacy Data Sharing for a Group of Members in the Cloud

    Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the Cloud Service Providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharing of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Secure and Efficient Data Transaction over Cloud Based On Signature Generation Technique

    In cloud, transactional database provides authorization, it is one of most important for proof of authorization, it I the base for performance evaluation. In this paper, the authors are concentrating on mainly on three concepts i.e. one is the authorization of users in the cloud. For this they are using...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Novel and Secure Mining of Data in Distributed Architecture

    Data confidentiality over data mining in distributed networks is still an important and interesting research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is a basic factor while datasets or data integrates from different data holders or players for mining. Secure mining of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach for Identification of Malicious Nodes in Network Traffic

    Various traditional mechanisms available for identification of unauthorized behavior or malicious activities of the incoming nodes like with their trust measures like direct trust, mutual trust. Servers maintain firewall log data of in and out traffic for intrusion detection and prevention mechanisms. Even though various approaches available to detect and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Human Face Recognition using Elman Networks

    Face recognition from the images is challenging due to the unpredictability in face appearances and the complexity of the image background. This paper proposes a different approach in order to recognize human faces. The face recognition is done by comparing the characteristics of the captured face to that of known...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient and Multi Keyword Search in Service Oriented Architecture

    Searching top k multi keywords from the out sourced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality. In this paper, the authors are proposing an efficient top k retrieval from out sourced file through service oriented application by computing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A High Performance Privacy Preserving Clustering Approach in Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of Knowledge and data engineering or community based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Energy Level Based Stable Election Protocol in Wireless Sensor Network

    In wireless sensor network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    ARM 9 Based Intelligent System for Biometric Finger Authentication

    Most of the universities are enforcing affiliated colleges to implement biometric fingerprint attendance system to monitor student attendance. Biometric fingerprint scanner need to be installed in college where the student studying and it is monitored by the university online. There is possibility of adding fake finger print into the scanner...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach of Image Encryption and Compression for Secure Transmission

    In addition to provide the security for data through image, the authors are using the concepts hybrid approach of encryption and compression techniques, before transmission of data they can encrypt it by using cryptographic technique. In this paper, they are using triple DES algorithm for data encryption and decryption, after...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Power Allocation Approach in Multi Carrier Wireless Communication System

    Wireless communication systems are tending towards progressive data transfer over a long range of transmission. With the raise in required quality of services, the allocation of the available resource is to be maintained efficiently. A load matrix approach for multi cellular architecture is proposed, which allocate the communication power based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Application of Wireless Power Transfer for Home Appliances Using Inductive Resonance Coupling

    Now-a-days, the need of wireless technology is increased because of mobility, low cost and easy to maintain. This technology is commonly used for transferring the digital information over the air medium. The wireless power transmission technology is well suited for transferring power to the home appliances without wires such as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Power Allocation Approach in Multi Carrier Wireless Communication System

    Wireless communication systems are tending towards progressive data transfer over a long range of transmission. With the raise in required quality of services, the allocation of the available resource is to be maintained efficiently. A load matrix approach for multi cellular architecture is proposed, which allocate the communication power based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Application of Wireless Power Transfer for Home Appliances Using Inductive Resonance Coupling

    Now-a-days, the need of wireless technology is increased because of mobility, low cost and easy to maintain. This technology is commonly used for transferring the digital information over the air medium. The wireless power transmission technology is well suited for transferring power to the home appliances without wires such as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Vehicle Tracking and Identifying Based on Android

    Now-a-days, vehicle thefts are huge problem in anywhere and to overcome that situation the authors design a project for providing protection and security based on embedded system technology. The main aim is to provide low cost device which is used monitor and track the exact location and intimate to mobile...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Android Based Robot Implementation for Pick and Retain of Objects

    Now-a-days, it is complicated about terrorists and their bomb attacks. Even though the user found a bomb it is much more complicated to remove the bomb safely. Many lives are depending on the bomb diffusion. Their project helps in diffusion of bombs with safe distance from the bomb. Bomb diffusion...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Cellular Based Domicile Mechanization Refuge Organization

    Entry of new trend brings many new appliances. One of the new applications is wireless home automation using smart phone. Here, the authors are to interface the A/C devices like BULB, FAN, etc with the smart phone. They need to design an android application which would be interfaced with the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Robust Performance of Cooperative Cache Wireless P2P Networks Architecture and Algorithm

    Mobile ad hoc networks have potential applications in civilian and military environments such as disaster recovery efforts, group conferences, wireless offices, mobile info-stations (in tourist centers, restaurants, and so on), and battle field maneuvers, making them a focus of current paper. Cooperative caching, which allows the sharing and coordination of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Multihop Dynamic Channel Assignment Scheme for W-CDMA Multi-hop Cellular Networks

    In 3G cellular networks, high data-rates can be achieved. However, fundamental capacity limitation still exists. Call requests are frequently blocked in hotspot areas. Load balancing among cells helps to solve this problem and to utilize the radio resources. A channel reassignment procedure to further enhance the performance is also investigated....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Integration of Big Data and Cloud Computing

    Big data is a new phenomenon which has been introduced due to the complex and vast data that the authors interact with, today. Big data and cloud computing are both emerging technologies whose rate of adoption by businesses has been increasing rapidly over the past decade. This paper stresses on...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Development of a Robotic Platform for Indoor Navigation System Using RFID

    In this paper, the authors present an indoor navigation system using RFID technology. In their project, they are implementing a robotic system for indoor navigation application. The robotic system is an embedded system including a RFID reader for locating and a sensor network which contains Ultrasonic sensors and IR sensors...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Location Spotting System for Forest Rummage and Rescue Mission Using RFID

    In this paper, the authors describe the structure of a rescue robot using RFID for missing people in forest environment. The main design aspects include the cost, reliability and the sustainable to environment. To accomplish these factors the paper used the three wireless technologies GSM, GPS and RFID. The researchers...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Advanced Reversible Data Hiding With Encrypted Data

    The advanced RDH work focuses on both data encryption and image encryption which makes it more secure and free of errors. All previous methods embed data without encrypting the data which may subject to errors on the data extraction or image recovery. The proposed paper provides a novel RDH scheme...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    A Review Paper on Channel Estimation Techniques Used in OFDM System

    In this paper, the authors review the work already done related to channel estimation technique in OFDM system. Pilot base channel estimation algorithm i.e. block type, comb type etc. are discussed and also compared in terms of their simplicity, computational cost and suitability conditions. After comparison with known techniques i.e....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    A Novel Text to Image Encryption Technique by AES Rijndael Algorithm with Color Code Conversion

    Transmission of secure data through the communication spectrum is major issue in current scenario. To ensure the security of the data, many techniques and algorithms were evolved in which the cryptographic techniques are most powerful. Through cryptographic algorithms, the conversion of plain text into the unintelligible form made it more...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    BER Performance of OFDM System in AWGN and Rayleigh Fading Channel

    The ever remaining demand of enhanced data rate along with increased reliability and reduced bandwidth in a communication system requires robustness against fast frequency selective multipath fading. OFDM is being widely used in many communication systems for its ability to enhance the data rate and reduce the bandwidth. The paper...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Compressive Modulation in Digital Communication Using OFDM

    In digital communication, the bandwidth efficiency is one of the most important parameter to measure different modulation schemes, while the separation of waveforms in time domain of existing modulation schemes make it difficult to improve their bandwidth efficiency. Hence, in past decade researchers and engineers continuously try to find out...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Genetic Algorithm in Audio Steganography

    With the advancement of communication technology, data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Discovering Patterns in Text Mining: A Survey

    There are many approaches which search the text documents based on the term provided to them, text mining is a branch of data mining that deals with searching of useful information from large amounts of text documents but these approaches suffer from polysemy and synonymy thus the authors use pattern...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Wireless Power Transmission for Charging Mobiles

    Wireless power transmission holds a promise able future for generating a small amount of electrical power for charge mobile wirelessly. Growing importance in wireless field which has numerous benefits such as it would completely eliminate the need of carrying charger along with mobiles, no more need of keeping mobiles nearer...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    News Recommendation Systems Using Web Mining: A Study

    News reading has changed with the advance of the World Wide Web (WWW), from the traditional model of news consumption via physical newspaper subscription to access to thousands of sources via the internet. Online news reading has become very popular as the web provides access to news articles from millions...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Development on Gas Leak Detection and Location System Based on Wireless Sensor Networks: A Review

    Gas leakage detection and monitoring may cause heavy economic: losses and serious environmental pollution, through wireless sensor network is considered to be more economical for industries gas leakage. Main purpose of this system model is to avoid damages and locate the leakage point. These problems can be solved with the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Analysis of Hybrid Intrusion Detection System Based on Data Mining Techniques

    The rapid growth of network based activities makes computer security is a more crucial issue. Many security methods are developed and used, but they are unfit to detect novel intrusions. Therefore, the authors propose a hybrid intrusion detection framework based on data mining classification and clustering techniques. In the proposed...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    A Novel and Privacy Preserving Unsupervised Learning Approach between Data Holders

    In present days there are rapidly growing technology and knowledge discovery out of information and it becomes more prevalent. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is an important...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Enhancing the Life Time of a Wireless Sensor Network by Ranking and Recovering the Fault Nodes

    Wireless sensor networks consist of set of specially designed electronic devices called nodes. Each sensor node has an ability of collecting information from the environment it is used for. It will collect environmental conditions such as temperature, sound, pressure, vibration and motion from different locations. The performance of the wireless...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Routing in VANET's City Scenario Using Back-bone Node Hop Greedy Algorithm

    Using advanced WLAN technologies; Vehicular Ad hoc NETworks (VANETs) have become useful and valuable for their wide variety of unique applications, such as safety on roads, multimedia content sharing, etc. VANETs are constrained by the high mobility of vehicles and the frequent connectivity problems. Destination positions can be found using...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Supervised Learning Approach Over Firewall Log Data

    Firewall protection is local security policy in local networks. It will secure from unknown access of another nodes in the local network. Analyzing the firewall log data is always an interesting research area in the field of network traffic analysis. In this paper, the authors are proposing an efficient classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    A Novel and Optimal Cooperative Communication in MANET

    Cooperative communication is the one of the current interesting research issue in the field of wireless sensors, various cache based approaches proposed by various authors but cache individually cannot increase the performance over MANET. Topology architectures defined for data transmission and cooperative communication in MANET. In this paper, the authors...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Empirical Model of Secure Clustering Technique Over Decentralized Architecture

    In data mining there are so many databases connects with each other in large communication networks. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is an important factor while datasets...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    An Efficient Web Service Based Mobile Search Engine

    Optimization of mobile search engine is an interesting research issue in the field of search engine optimization and information retrieval, although various traditional approaches of search engines proposed by various researchers, performance and time complexity are the prime concern factors to optimize the mobile search engine. The authors are proposing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Intelligent Spectrum Sensing Cognitive Radio Network using Median Filtering

    The cognitive radio network is intelligent network which has the capability to efficiently utilize the available spectrum using various spectrum sensing techniques, in addition with the intelligent energy consumption and bandwidth allocation. In this paper, the authors are simulating the cognitive radio network using Monte-Carlo simulation model. The proposed system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    OFDM using Chaotic Sequence for Adaptive Modulation

    In a present scenario more and more people started using the communication equipments, the demand for high data rate increased quickly. So here the authors are using OFDM systems that provide large data rates with sufficient robustness to radio channel impairments. In this they have used chaotic communication in OFDM...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Performance Evaluation of Conditional Active Rreq Flooding-Filter Based Prevention Method for AODV in Manet

    Without the management of centralized unit, Mobile Ad hoc NETworks (MANETs) are vulnerable to security threats from flooding attacks launched through compromised nodes or intruder. Whenever a source node needs a data session with a destination node, it disseminates a Route REQuest (RREQ) message to its neighbors in a hop-by-hop...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Channel Estimation in MIMO-OFDM Systems

    There is an increasing demand for the high data rates with effective utilization of available limited spectrum. To fulfill these requirements Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) techniques have been adopted. In this paper, various channel estimation algorithms of the Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Overview of Cyber Security

    Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. In the last decade, buffer overflows have been ubiquitous. Another type of attack that is becoming universal is remote client-side attack. It is very important...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Robust Navigation Scheme Using Radio Frequency Technology and Mobile Robot

    Indian railways are one of the largest railway networks of the world. Despite the huge size, the rampant negligence and lack of maintenance have created a number of problems. The main problem being that, frequent cracks are found in the rail lines which cause derailments leading to huge loss of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    An Enhanced Light-Weight Proactive Source Routing Protocol using BFS and DFS for MANET

    MANET is a self organized and self configurable network without existing infrastructure. It consists of several mobile wireless nodes. A routing protocol provides an efficient route between mobile nodes within the network. The discovery and maintenance of route should consume minimum overhead and bandwidth. In this paper, the authors introduce...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Localization and Control of Production Line Conveyer System by Using UHF-RFID Signals

    In this paper, the authors propose a technique that enables localization and control of production line conveyer system by utilizing Ultra High Frequency (UHF) passive Radio Frequency IDentification (RFID) tags. The proposed technique can be used in real-industries such as production conveyer systems and temperature chambers and many different goods...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    A Study of Routing Protocols for Vehicular Ad-Hoc Networks

    VANET (Vehicular Ad-hoc NETwork) is a classification of MANET in which vehicles act as mobile nodes and provide a different approach to Intelligent Transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Simulation of New AODV-FH Routing Protocol Based On AODV in VANET

    In last three decade, enormous improvement is done in research area of wireless ad hoc network and now-a-days, one of the most attractive research topic is inter vehicle communication i.e. realization of mobile ad hoc network. VANET (Vehicular Ad-hoc NETwork) is a classification of MANET in which vehicles act as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Robust Semi-Random Backoff (RSRB) Method for Data Allocation in Mobile Networks

    In this paper, a well-known network is taken into the considerations. Now-a-days the wireless mobile networks like 3rd generation and 4th generation networks are briefly analyzed and it is one of the most significant networks in the mobile communication. In this paper, the authors propose a Robust Semi-Random Back off...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Split FFT Technique: A New Scheme for ICI Reduction in OFDM System

    OFDM is being widely used in many communication systems for its ability to enhance the data rate and reduce the bandwidth. When the system is placed in a multipath environment is undergoes inter-carrier interference. A new idea is proposed in the paper to reduce the inter-carrier interference produced due to...

    Provided By International Journal of Engineering Trends and Technology