International Journal of Engineering Trends and Technology

Displaying 1-40 of 469 results

  • White Papers // Oct 2014

    A Novel and Privacy Preserving Unsupervised Learning Approach between Data Holders

    In present days there are rapidly growing technology and knowledge discovery out of information and it becomes more prevalent. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is an important...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Supervised Learning Approach Over Firewall Log Data

    Firewall protection is local security policy in local networks. It will secure from unknown access of another nodes in the local network. Analyzing the firewall log data is always an interesting research area in the field of network traffic analysis. In this paper, the authors are proposing an efficient classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    A Novel and Optimal Cooperative Communication in MANET

    Cooperative communication is the one of the current interesting research issue in the field of wireless sensors, various cache based approaches proposed by various authors but cache individually cannot increase the performance over MANET. Topology architectures defined for data transmission and cooperative communication in MANET. In this paper, the authors...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Empirical Model of Secure Clustering Technique Over Decentralized Architecture

    In data mining there are so many databases connects with each other in large communication networks. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is an important factor while datasets...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Power Allocation Approach in Multi Carrier Wireless Communication System

    Wireless communication systems are tending towards progressive data transfer over a long range of transmission. With the raise in required quality of services, the allocation of the available resource is to be maintained efficiently. A load matrix approach for multi cellular architecture is proposed, which allocate the communication power based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Application of Wireless Power Transfer for Home Appliances Using Inductive Resonance Coupling

    Now-a-days, the need of wireless technology is increased because of mobility, low cost and easy to maintain. This technology is commonly used for transferring the digital information over the air medium. The wireless power transmission technology is well suited for transferring power to the home appliances without wires such as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Vehicle Tracking and Identifying Based on Android

    Now-a-days, vehicle thefts are huge problem in anywhere and to overcome that situation the authors design a project for providing protection and security based on embedded system technology. The main aim is to provide low cost device which is used monitor and track the exact location and intimate to mobile...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Android Based Robot Implementation for Pick and Retain of Objects

    Now-a-days, it is complicated about terrorists and their bomb attacks. Even though the user found a bomb it is much more complicated to remove the bomb safely. Many lives are depending on the bomb diffusion. Their project helps in diffusion of bombs with safe distance from the bomb. Bomb diffusion...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Cellular Based Domicile Mechanization Refuge Organization

    Entry of new trend brings many new appliances. One of the new applications is wireless home automation using smart phone. Here, the authors are to interface the A/C devices like BULB, FAN, etc with the smart phone. They need to design an android application which would be interfaced with the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Robust Performance of Cooperative Cache Wireless P2P Networks Architecture and Algorithm

    Mobile ad hoc networks have potential applications in civilian and military environments such as disaster recovery efforts, group conferences, wireless offices, mobile info-stations (in tourist centers, restaurants, and so on), and battle field maneuvers, making them a focus of current paper. Cooperative caching, which allows the sharing and coordination of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Multihop Dynamic Channel Assignment Scheme for W-CDMA Multi-hop Cellular Networks

    In 3G cellular networks, high data-rates can be achieved. However, fundamental capacity limitation still exists. Call requests are frequently blocked in hotspot areas. Load balancing among cells helps to solve this problem and to utilize the radio resources. A channel reassignment procedure to further enhance the performance is also investigated....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Integration of Big Data and Cloud Computing

    Big data is a new phenomenon which has been introduced due to the complex and vast data that the authors interact with, today. Big data and cloud computing are both emerging technologies whose rate of adoption by businesses has been increasing rapidly over the past decade. This paper stresses on...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Development of a Robotic Platform for Indoor Navigation System Using RFID

    In this paper, the authors present an indoor navigation system using RFID technology. In their project, they are implementing a robotic system for indoor navigation application. The robotic system is an embedded system including a RFID reader for locating and a sensor network which contains Ultrasonic sensors and IR sensors...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    Location Spotting System for Forest Rummage and Rescue Mission Using RFID

    In this paper, the authors describe the structure of a rescue robot using RFID for missing people in forest environment. The main design aspects include the cost, reliability and the sustainable to environment. To accomplish these factors the paper used the three wireless technologies GSM, GPS and RFID. The researchers...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Performance Evaluation of MMSE and LS Channel Estimation in OFDM System

    Since from last two decade Orthogonal Frequency Division Multiplexing (OFDM) got lots interest in mobile communication systems. In OFDM system, the radio channels which the people use are frequency selective and vary with time for wireless wideband mobile communication system. The transfer function of these radio channels is unequal in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    An Efficient and High Performance Based Cooperative Communication in WSN

    Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    An Empirical Model of Fault Prediction in Software Engineering

    Even though various approaches developed by the many researchers, they may not be optimal while predication of faults. In this paper, the authors are introducing the fault prediction approach with OO metrics along with cyclomatic complexity and nested block depth, in acceptance testing, each function specified in the design document...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    A Lagrange's Polynomial Based Secure Mining Over Distributed Databases

    In view of this brief description, it can be seen that all of these protocols for secure multiparty function evaluation run in unbounded \"Distributed time\" i.e. using an unbounded number of rounds of communications. Secure mining of association rule mining over horizontal databases is always an interesting research issue in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    An Efficient Web Service Based Mobile Search Engine

    Optimization of mobile search engine is an interesting research issue in the field of search engine optimization and information retrieval, although various traditional approaches of search engines proposed by various researchers, performance and time complexity are the prime concern factors to optimize the mobile search engine. The authors are proposing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Intelligent Spectrum Sensing Cognitive Radio Network using Median Filtering

    The cognitive radio network is intelligent network which has the capability to efficiently utilize the available spectrum using various spectrum sensing techniques, in addition with the intelligent energy consumption and bandwidth allocation. In this paper, the authors are simulating the cognitive radio network using Monte-Carlo simulation model. The proposed system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    OFDM using Chaotic Sequence for Adaptive Modulation

    In a present scenario more and more people started using the communication equipments, the demand for high data rate increased quickly. So here the authors are using OFDM systems that provide large data rates with sufficient robustness to radio channel impairments. In this they have used chaotic communication in OFDM...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Performance Evaluation of Conditional Active Rreq Flooding-Filter Based Prevention Method for AODV in Manet

    Without the management of centralized unit, Mobile Ad hoc NETworks (MANETs) are vulnerable to security threats from flooding attacks launched through compromised nodes or intruder. Whenever a source node needs a data session with a destination node, it disseminates a Route REQuest (RREQ) message to its neighbors in a hop-by-hop...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Channel Estimation in MIMO-OFDM Systems

    There is an increasing demand for the high data rates with effective utilization of available limited spectrum. To fulfill these requirements Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) techniques have been adopted. In this paper, various channel estimation algorithms of the Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Overview of Cyber Security

    Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. In the last decade, buffer overflows have been ubiquitous. Another type of attack that is becoming universal is remote client-side attack. It is very important...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Robust Navigation Scheme Using Radio Frequency Technology and Mobile Robot

    Indian railways are one of the largest railway networks of the world. Despite the huge size, the rampant negligence and lack of maintenance have created a number of problems. The main problem being that, frequent cracks are found in the rail lines which cause derailments leading to huge loss of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    An Enhanced Light-Weight Proactive Source Routing Protocol using BFS and DFS for MANET

    MANET is a self organized and self configurable network without existing infrastructure. It consists of several mobile wireless nodes. A routing protocol provides an efficient route between mobile nodes within the network. The discovery and maintenance of route should consume minimum overhead and bandwidth. In this paper, the authors introduce...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Localization and Control of Production Line Conveyer System by Using UHF-RFID Signals

    In this paper, the authors propose a technique that enables localization and control of production line conveyer system by utilizing Ultra High Frequency (UHF) passive Radio Frequency IDentification (RFID) tags. The proposed technique can be used in real-industries such as production conveyer systems and temperature chambers and many different goods...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    A Study of Routing Protocols for Vehicular Ad-Hoc Networks

    VANET (Vehicular Ad-hoc NETwork) is a classification of MANET in which vehicles act as mobile nodes and provide a different approach to Intelligent Transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in increased traffic safety, collision warning through exchange of messages through...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Simulation of New AODV-FH Routing Protocol Based On AODV in VANET

    In last three decade, enormous improvement is done in research area of wireless ad hoc network and now-a-days, one of the most attractive research topic is inter vehicle communication i.e. realization of mobile ad hoc network. VANET (Vehicular Ad-hoc NETwork) is a classification of MANET in which vehicles act as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Robust Semi-Random Backoff (RSRB) Method for Data Allocation in Mobile Networks

    In this paper, a well-known network is taken into the considerations. Now-a-days the wireless mobile networks like 3rd generation and 4th generation networks are briefly analyzed and it is one of the most significant networks in the mobile communication. In this paper, the authors propose a Robust Semi-Random Back off...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Split FFT Technique: A New Scheme for ICI Reduction in OFDM System

    OFDM is being widely used in many communication systems for its ability to enhance the data rate and reduce the bandwidth. When the system is placed in a multipath environment is undergoes inter-carrier interference. A new idea is proposed in the paper to reduce the inter-carrier interference produced due to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Analysis of Hybrid Intrusion Detection System Based on Data Mining Techniques

    The rapid growth of network based activities makes computer security is a more crucial issue. Many security methods are developed and used, but they are unfit to detect novel intrusions. Therefore, the authors propose a hybrid intrusion detection framework based on data mining classification and clustering techniques. In the proposed...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Enhancing the Life Time of a Wireless Sensor Network by Ranking and Recovering the Fault Nodes

    Wireless sensor networks consist of set of specially designed electronic devices called nodes. Each sensor node has an ability of collecting information from the environment it is used for. It will collect environmental conditions such as temperature, sound, pressure, vibration and motion from different locations. The performance of the wireless...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2014

    Routing in VANET's City Scenario Using Back-bone Node Hop Greedy Algorithm

    Using advanced WLAN technologies; Vehicular Ad hoc NETworks (VANETs) have become useful and valuable for their wide variety of unique applications, such as safety on roads, multimedia content sharing, etc. VANETs are constrained by the high mobility of vehicles and the frequent connectivity problems. Destination positions can be found using...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2014

    BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN

    Wireless sensor networks are always susceptible to attacks by malicious behavior of external adversary which could negatively affect the secured routing and QoS and hence, vital wireless applications. In recent times, a lot of severe attacks have been proposed which make such networks highly vulnerable. One such attack is black...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2014

    Feature Subset Selection Algorithm for High-Minded Dimensional Data by Using Fast Cluster

    Feature selection involves recognizing a subset of the majority helpful features that produces attuned results as the unique set of features. Feature selection algorithm can be evaluated from mutually efficiency and effectiveness points of vision. FAST algorithm is proposed and then experimentally evaluated in this paper. FAST algorithm mechanism considering...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2014

    Centralized Financial Networking System for Banking Applications through Data Mining Techniques

    Financial sector is the core sector to decide the country's GDP. The substantial and continuous development of any country is based on the financial health of the nation. Last few decades witnessed the proliferation of financial reforms, liberalization and globalization of Indian economy coupled with rapid revolution in Information Technology...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2014

    DW&C:Dollops Wise Curtail IPv4/IPv6 Transition Mechanism using NS2

    BD-SIIT and DSTM are widely deployed IPv4/IPv6 transition mechanism to improve the performance of the computer network in terms of throughput, End to End Delay (EED) and Packet Drop Rate (PDR). In this paper, the authors have implemented and compared the performance issues of their newly proposed Dollops Wise Curtail...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2014

    Determine and Checking Authentication of Adjacent Nodes in Mobile Ad hoc Networks

    A large number of temporary nodes consisting of set of rules and destination based services require that mobile nodes learn the nearest places. A process can be easily improper usage or interrupt by opposition nodes. In being away of fixed nodes discovered and verifying of nearest places that have been...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2014

    Justification of Rayleigh Faded Channel for Data Transmission in Wireless Environment

    An accurate assessment of the performance of a newly developed radio system can be done through repeated tests of the system over an actual channel. When comparison is to be made between two or more systems over a real channel, they must all be tested simultaneously. The channel characteristics and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Performance of Ethernet Protocol Conversion on an Arm-7 Embedded Processor

    This paper designed a research on real web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a web page. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    An Enhanced Framework for Performing Pre-Processing On Web Server Logs

    Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files shows actual usage of web site under all circumstances and don't need to conduct external experimental labs to get this information. This paper describes the effective preprocessing of access stream...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    A Confidentiality Proof Wandering - Protocol in Mobile Networks

    This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Soft Handoff in Mobile Networks

    In power controlled CDMA systems soft handoff is preferred over hard handoff strategies. This is more pronounced when the IS-95 standard is considered wherein the transmitter power is adjusted dynamically during the operation. The previous and the new wide band channels occupy the same frequency band in order to make...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Performance Evaluation of Spectrum Sensing and Channel Access in Cognitive Radio Networks

    Spectrum sensing is an essential functionality of cognitive radio networks. In the existing Cognitive Radio spectrum detection techniques secondary nodes base their channel access decisions solely on the outcome of the spectrum sensor without taking into consideration the possibility that those outcomes are incorrect. To alleviate these negative effects a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Novel Approach of Multilevel Binary Image Encoding Using Walsh Table and Spiral Scanning

    In this paper, the authors proposed a method of image encoding technique in a new formulated way. During transmission image is encoded in two phases for the enhancement of security. In the first phase encoding is done using Walsh table and in the second phase by using spiral scanning based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2011

    A Review of Load Balanced Routing Protocols in Mobile Adhoc Networks

    A wireless Mobile Ad hoc NETwork (MANET) is an infrastructure-less mobile network which is based on radio to radio multi-hoping and has no centralized controller or a fixed router. All nodes are capable of movement and can be connected dynamically in an arbitrary manner. Due to the dynamic nature of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2013

    Desired EEG Signals for Detecting Brain Tumor Using LMS Algorithm and Feedforward Network

    In Brain tumor diagnostic EEG is the most relevant in assessing how basic functionality is affected by the lesion. EEG continues to be an attractive tool in clinical practice due to its non invasiveness and real time depication of brain function. But the EEG signal contains the useful information along...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Analysis of Blocking Probability in a GSM Based Cellular Network System

    In this paper the authors check the performance of a GSM cellular communication system by using FDMA - TDMA system. In the present paper they evaluate the performance of the blocking probability, spectral efficiency and the bit error rate by using the specific model. By using this they try to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Data-driven Link Estimation and Routing in Sensor Network

    Link properties in 802.11b mesh networks and dense wireless sensor networks have been well studied. They have observed that wireless links assume complex properties, such as wide range non-uniform packet delivery rate at different distances, loose correlation between distance and packet delivery rate, link asymmetry, and temporal variations. The authors'...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    Scalable and Distributed Mobile Underwater Wireless Sensor Networks for Oceanographic Applications

    Large-scale mobile Underwater Wireless Sensor Network (UWSN) is a novel networking paradigm to explore aqueous environments. However, the characteristics of mobile UWSNs, such as low communication bandwidth, large propagation delay, floating node mobility, and high error probability, are significantly different from ground-based wireless sensor networks. The novel networking paradigm poses...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    RFID-Based Mobile Robot Positioning - Sensors and Techniques

    Mobile robot navigation using analog signal strength of a Radio Frequency IDentification (RFID) device is a promising alternative of different types of robot navigation methods in the state of the art. Skilled navigation in mobile robotics usually requires solving two problems: the knowledge of the position of the robot, and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Study on Auto Theft Prevention Using GSM

    This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Analysis of Leakage Reduction Technique on Different SRAM Cells

    Leakage components is very important for estimation and reduction of leakage power, especially for low power applications. This provides the motivation to explore the design of low leakage SRAM cells. High leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    An Overview on Privacy Preserving Data Mining Methodologies

    Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For example, mining health care data for the detection of disease outbreaks may require analyzing clinical records and pharmacy transaction data of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    Model-Based Programming of Intelligent Embedded Systems Through Offline Compilation

    Many recent and future space missions point to the need for increased autonomy in spacecraft with an emphasis on more capable fault diagnostic systems. The most widely used fault diagnostic systems are rule-based. Rule-based systems have quick response to events and clearly present to engineers the predefined reactions to events....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    GPS User Position Using Extended Linearization Technique

    The position of a GPS receiver can be determined by obtaining pseudoranges from a minimum of four different GPS satellites. The measured ranges do not represent the true ranges as the signal coming from a GPS satellite will be contaminated by various errors like Ephemeris error; Propagation error in the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Model-Driven Performance for the Pattern and Advancement of Software Exhaustive Systems

    Model-Driven Engineering (MDE) is an advance to widen software systems by build models and pertaining robotic alteration to them to finally make the execution for a intention platform. Although the main focus of MDE is on the creation of code, it is also essential to bear the study of the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Power Quality Disturbances and Protective Relays on Transmission Lines

    Power quality concerns the effect of voltage disturbances on end-user equipment and of current disturbances on network components. Power system protection concerns the detection of faults in the system from measured voltages and currents. However, non-fault voltage and current disturbances may lead to the inadvertent detection of a fault in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    SNTP Driven Event Management to Control Audio/Video/Buzzer Events by Using Streaming Media Player

    This paper proposes a compact time sharing system for home use applying the simple Network Time Protocol. The compact SNTP server/client system for home appliances like audio, video buzzer controls, etc., has been developed as an extension of an SNTP client application. The newly developed system can obtain the time...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Effective Placement and Selection Approaches for Network Services

    Network services are provided by means of dedicated service gateways, through which traffic flows are directed service placement problem, which takes into account traffic engineering considerations. Rather than trying to minimize the Length of the traffic flow routes, the authors take advantage of these routes in order to enhance the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Improved Apriori and KNN Approach for Virtual Machine Based Intrusion Detection

    Now-a-days, as information systems are usually more accessible to the world wide web, the advantage of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) that based on sophisticated algorithms as an alternative to current signature-base detections are really in demand. Intrusion detection is one of network security...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Web Application Vulnerability Analysis Using Robust SQL Injection Attacks

    SQL Injection Attacks is one of the most serious threats in the security of database driven applications. An SQL injection attack focuses on interactive web applications that employ database services. These applications accept user inputs and use them into form SQL statements at runtime. In the SQL injection attack, an...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

    This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads. In wireless ad hoc networks, it is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Various issues including security, legitimacy and node concurrency still persist in mobile...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Analysing an Industrial Automation Pyramid and Providing Service Oriented Architecture

    Industrial automation platforms are experiencing a paradigm shift. New technologies are making their way in the area, including embedded real-time systems, standard local area networks like Ethernet, Wi-Fi and ZigBee, IP-based communication protocols, standard Service Oriented Architectures (SOAs) and Web Services. The introduction of these new technologies raises important problems...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Adaptive Classifier and Associative Algorithms for Phishing Detection

    Phishing serves as a social engineering crime generally known as impersonating a trusted third party to gain access to private data. Data Mining (DM) Techniques might be a very useful methodology for identifying and detecting phishtank phishing websites. Using this proposed system, the authors present a novel approach to overcome...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    An Advanced Honeypot System for Efficient Capture and Analysis of Network Attack Traffic

    A honeypot is an information system resource used to divert attackers and hackers away from critical resources as well as a tool to study an attacker's methods. One of the most widely used tools is honeyd for creating honeypots. The logs generated by honeyd can grow very large in size...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Encryption Technique With Data- In-Motion for Hybrid Database

    Rapid growth in the automation gives rise to emergence of the database having different flavors. Taking consideration of various domains; Database is the most important component in the world of software. As today's world is moving on the factors of dependant on the other technology or with other organization which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    Network Intrusion Detection System Based on Feature Selection and Triangle Area Support Vector Machine

    As the cost of the data processing and Internet accessibility increases, more and more organizations are becoming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    A Secured Requirement Engineering Approach in Online Shopping System

    Requirement engineering has always occupied a primal position in software engineering."If one get the requirement correct, the people are very close to getting the software correct", has been an accepted fact. Many principles and techniques have been proposed for efficient requirement gathering and these have been validated and applied in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2012

    Collaborative Filtering and Random Forest Classification Algorithm for PROBE Attacks Detection in a Network Classification

    During the past few years huge amount of network attacks have been increased the requirement of efficient network intrusion detection techniques for detecting attacks. In the existing approach, different classification techniques are used for identifying various real time network attacks using data mining. However, most of the algorithms fail to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2012

    A Traceability Approach in Software Creation by DM

    In present environment software engineering integrates with data mining. Data Mining(DM) works as good decision support system in software tools. Now, the authors discuss about navigation patterns source code tracing design. Static navigation shows constant navigation patterns. Through Static navigation every time execution flow takes same time and identifies same...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Processor Technological Advancement

    During the last decade Intel has introduced several technologies for different generation processors. Different architectures are added featuring enhanced energy efficiency, power management, affordable performance, fast execution, multitasking demands, optimized multithreading, CPU performance boost, higher data throughput, improved virtualization performance, smart security. This paper provides insight into recently added technologies...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Performance Analysis of Weighted Load Balanced Routing Protocol With Ad Hoc On-Demand Distance Vector

    This paper describes about WLBR (Weighted Load Balanced Routing Protocol) and its performances are analyzed with AODV. The simulation results shows that this proposed protocol outperforms well than the AODV. The main performance metrics used here are throughput, node remaining energy, packet delivery ratio, energy consumed and routing delay. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Application Layer Based Packet Analysis and Intrusion Detection

    Network forensics is basically a new approach when it comes to the network information security, because the IDS and firewall cannot always discover and stop the misuse in the whole network. This proposed work is used to capture and analyze the data exchanged among the many different IP traceback techniques...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    False Data Detection Using Trusted Group Membership Service

    Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. The transmission of false data depletes the constrained battery power and degrades...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Detection of Explosives Using Wireless Sensor Networks

    Automatic detection of explosives using wireless sensor networks monitors and tracks the IEDs that are placed by terrorists at public environments. The area under study is monitored in real time, collect data by the sensor and send to the processor which process the data and compares with the database and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Detection and Prevention of Congestion Attacks and Packet Loss Using Piggyback Methods in Wireless Network

    Network security involves the authorization of access to data in a network, which is controlled by the network administrator. In this paper, the authors investigate the problem of packet loss over the wireless communication and the congestions that are taken place. To prevent the packet loss, they propose the idea...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A Hybrid Biometric Authentication Algorithm

    A facial recognition system is a computer based application for automatically identifying or verifying a person from a digital image. One of the ways to do this is by comparing the selected facial features from the image and a facial database. Some facial recognition algorithms identify faces by extracting landmarks,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A New Entropy Encoding Algorithm for Image Compression Using DCT

    Digital images contain large amount of information that need evolving effective techniques for storing and transmitting the ever increasing volumes of data. Image compression addresses the problem by reducing the amount of data required to represent a digital image. Image compression is achieved by removing data redundancy while preserving information...

    Provided By International Journal of Engineering Trends and Technology