International Journal of Engineering Trends and Technology

Displaying 1-40 of 539 results

  • White Papers // Dec 2014

    Implementation of Data Link Control Protocols in Wired Network

    Data link layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provides the means to rectify the errors and usually correct it that may occur in the physical layer. Study and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Spatial Correlation Property of a 2x2 MIMO System for Different 3GPP Cases

    In this paper, the authors study and analyze the spatially correlated fading channel, its basic concepts, brief mathematical modeling and simulation of correlation function of a MIMO system. The review paper in presents the effect of antenna parameters on the correlation property of a MIMO system and hence the system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Extensible Location Dependent Spatial Object Search on Road Networks

    Extensible location-dependent spatial object that searches for spatial object on road networks. Here it provides distance indexing technique and providing a dynamic object mapping mechanism of spatial object search. It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Efficient Intrusion Detection and Prevention System with Hybrid Approach

    In communication system there are many issues about intrusion detection and they are classified into two types such as ID based intrusion detection and Host based intrusion detection. The ID based intrusion detection mainly works on unique ID of the users which means this method track the intruders based on...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    DS-CDMA System with Multiuser Detection and MMSE Equalizer to Mitigate MAI

    Wireless communication has drastically shown evaluation mobile communication and its counterparts. Code Division Multiple Access (CDMA) is one of the reliable multiple access methods appropriate for sustaining lots of new services for ex ample speech, video, multimedia applications, which are becoming progressively more important for mobile communications. The multiple data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Innovative Approach Towards Traffic Signal Control

    In this paper, the authors give information about traffic light control system based on wireless sensor network. Here the traffic lights changes according to the density of the traffic. To identify the traffic density, the authors are going to use IR sensors. If there is more density automatically the highest...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Life Saving Breaker System for Hasty Drivers

    The main concept of this proposed system is to avoid accidents. Accident happens mainly due to rash driving of vehicle or driving the vehicles with over speed. So accidents would be reduced when the vehicles will move with less speed. Firstly, the authors need to verify with which speed the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    STTC-OFDM Downlink Baseband Receiver for Mobile WMAN

    In this paper, the authors proposed a STTC-OFDM system which is based on IEEE 802.16e OFDMA specification and supports the distributed subcarrier allocation of Partial Usage of Sub Channels (PUSC) for DownLink (DL) transmission. The Fast Fourier Transforms (FFT) size 1048. The length of Cyclic Prefix (CP) is 128 sampling...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A High Performance Privacy Preserving Clustering Approach in Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of Knowledge and data engineering or community based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient and Multi Keyword Search in Service Oriented Architecture

    Searching top k multi keywords from the out sourced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality. In this paper, the authors are proposing an efficient top k retrieval from out sourced file through service oriented application by computing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Energy Level Based Stable Election Protocol in Wireless Sensor Network

    In wireless sensor network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    ARM 9 Based Intelligent System for Biometric Finger Authentication

    Most of the universities are enforcing affiliated colleges to implement biometric fingerprint attendance system to monitor student attendance. Biometric fingerprint scanner need to be installed in college where the student studying and it is monitored by the university online. There is possibility of adding fake finger print into the scanner...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach of Image Encryption and Compression for Secure Transmission

    In addition to provide the security for data through image, the authors are using the concepts hybrid approach of encryption and compression techniques, before transmission of data they can encrypt it by using cryptographic technique. In this paper, they are using triple DES algorithm for data encryption and decryption, after...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Model of Rank Oriented Search Goal in Mobile Search Engine

    Searching for user interested query results is always complex task even though satisfying the user search goals because of various reasons. Optimizing the search engines in mobile phones is still an important research issue in the field of knowledge and data engineering, even though various approaches are available, performance and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    The Use of Mobile Phones in University Exams Cheating: Proposed Solution

    Currently, instant communication is very possible all over the world due to a rapid growth in mobile phones technology. Each day, a number of mobile phones subscribers and cellular network coverage is escalating tremendously. Today's mobile phones are released with ability nearly to that of a desktop computer. The ubiquity...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    High Coverage Area and Power Utilization (RF) in WPSN Using Modulated backscattering

    Sensor networks are highly sensitive to energy usage. They may, probably, be deployed in inhospitable or hostile environments, where it may not be possible to refresh energy sources. Hence, energy consumption is a major issue, and energy-aware protocols/applications are desirable. Energy consumption is observed at three stages, node communication, sensing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust RoF Systemwith DWDM Technique for High Speed Communication Networks

    In the recent trends in optical communication to overcome one of the major problems in the new generation of radio over fiber networks that requires being concentrated, is decreasing the quantity of bit error rate in the lowest power penalty. This paper also evaluates the results of down-link 40Gbps OOK...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust Speech Recognitionfor Speaker and Speaking Environment

    The authors study a cohort selection technique to construct a space with good resolution in the online phase. The concept of cohort selection resembles that of the family of subset selection methods that find a subset of components from the entire set of components to model a signal of interest....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Communication Protocol in Wireless Sensor Networks

    Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Minimization of Payment and Error Tolerent Resource Allocation for Cloud System

    Virtual Machine (VM) technology being greater and fully developed, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand, which contributes three technologies such as, formulating a deadline-driven resource allocation problem based on the cloud environment facilitated with VM resource isolation technology, and also to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Channel Estimation of MIMO-OFDM System LTE Network

    Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has led to demand for higher network capacity and performance. Higher bandwidth, optimized modulation offer practically limited...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Two End Point Verification of Secure Data Storage Over Cloud

    The authors are proposing an empirical model of out sourcing of information to multiple data owners with secure key generation and two level authentication process, one is over data owners and other is over key generation center. Initially data owner level authentication cane performed with secret key and random challenges...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Wireless Controller for Ultra Low Power CC430 Based Transceiver

    Power consumption is the main criteria now-a-days in any embedded application. The less the power consumed the more the durability of the product. This paper is to establish a ultra low power RF link between two CC430F6147 transceiver units, one control unit and the other application unit such that their...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Enhancement of Image Security Using Random Permutation

    In recent days transmitting digital media having large size data through the internet became simple task but providing security and security became big issue these days. Using pseudorandom permutation, image encryption is obtained. Confidentiality and access control is done by encryption. Image encryption has to be conducted prior to image...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Novel Message Integrity Code Based Authentication Protocol

    Now-a-days, wireless local area network rapidly increase of mobile device and more efficient of link setup mechanism. For the rapidly increase of WLAN the authors are also provide security of transferring data. For this purpose so many authentication protocol are proposed and one of the protocol is 802.11i. Through experiments...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Manageable Framework for Preserving Exclusive Data in Social Networks

    In social networks there are so many threats such as impersonation, data leakage. Most of the social networks are more worried about private data leakage. Some of them as intruders by deploying the security attacks like denial of service or hack the information. So the authors introduced a framework which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Privacy Data Sharing for a Group of Members in the Cloud

    Cloud computing is recognized as one of the alternative to traditional information technology due to its intrinsic resource-sharing and low-maintenance characteristics. In cloud computing, the Cloud Service Providers (CSPs) are able to deliver various services to cloud users with the help of powerful data centers, So that the sharing of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Secure and Efficient Data Transaction over Cloud Based On Signature Generation Technique

    In cloud, transactional database provides authorization, it is one of most important for proof of authorization, it I the base for performance evaluation. In this paper, the authors are concentrating on mainly on three concepts i.e. one is the authorization of users in the cloud. For this they are using...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Framework for Secure Data Sharing over Cloud Based on Group Key Management

    Now-a-days, cloud storage gaining more popularity for sharing of data. The sharing of data with more securely, efficiently and flexible through others in the cloud storage. So that by providing security of sharing data the authors using cryptography technique. In this paper, they are using new public key cryptography technique...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Simple and Efficient Unique Identity Based Verification in Networks

    In networks transferring data is critical issue for providing security of data. Before transferring data if it checks the sent user is authenticate user or not. By providing security of data and authentication of user the authors proposed a technique. In this paper, they are implement two concepts for performing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Human Face Recognition using Elman Networks

    Face recognition from the images is challenging due to the unpredictability in face appearances and the complexity of the image background. This paper proposes a different approach in order to recognize human faces. The face recognition is done by comparing the characteristics of the captured face to that of known...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Architecture for Efficient Search Results in Mobile

    Retrieval of user interesting results over mobile search engine is always an interesting and important research issue in now-a-days of information retrieval, due to there is a rapid growth of mobile usage of user. Even though various traditional approaches available, performance and time complexity issues are the primary factors while...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Novel and Secure Mining of Data in Distributed Architecture

    Data confidentiality over data mining in distributed networks is still an important and interesting research issue in the field of knowledge and data engineering or community based clustering approaches, privacy is a basic factor while datasets or data integrates from different data holders or players for mining. Secure mining of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach for Identification of Malicious Nodes in Network Traffic

    Various traditional mechanisms available for identification of unauthorized behavior or malicious activities of the incoming nodes like with their trust measures like direct trust, mutual trust. Servers maintain firewall log data of in and out traffic for intrusion detection and prevention mechanisms. Even though various approaches available to detect and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    FDM Secure Mining of Association Rules in Horizontally Distributed Databases

    The authors study the problem of privacy-preservation in social networks. They consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Performance Analysis of JPEG2000 Images Using UPA Algorithm & OFDM through Different Channel Models

    In this paper, the authors first build up a wireless communication simulator including gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, they test the effect of different channel models to the data and image in receiver with...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Empirical Model of Malicious Node Detection and Prevention with Data Rating

    Identification and prevention of malicious nodes is always an interesting research issue in wireless sensor networks. In this paper, the authors are proposing an efficient approach for identification of anonymous or malicious node with signature and data rating techniques. Initially every node can be verified genuine or malicious node with...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Privacy Preserving Data mining over Distributed Network for Data holders

    Using an unbounded number of rounds of communications, for each gate can be implemented in a way that requires only a constant number of rounds; the total number of rounds will still be linear in the depth of the underlying circuit. Secure mining in horizontal databases is a research issue...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Reduction of Ground Bounce Noise in 14T Full Adder by using Various Power Gating Techniques

    In this paper, the authors are to compare the existing full adders circuits and their performances to design a low power full adder having improved result as compared to existing full adders. The full adder circuit is a very important part in application like Digital Signal Process (DSP) design, chip...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2014

    An Efficient Supervised Learning Approach Over Firewall Log Data

    Firewall protection is local security policy in local networks. It will secure from unknown access of another nodes in the local network. Analyzing the firewall log data is always an interesting research area in the field of network traffic analysis. In this paper, the authors are proposing an efficient classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Web Interface Using HTML5 for Interaction Between Mobile Device & Cloud-Services

    Mobile cloud computing brings new types of services and facilities for mobile users to take full advantages of cloud computing. Interoperability becomes an important issue when mobile users need to interact and communicate with the cloud. The current interface between mobile users and cloud are mostly based on the web...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Dynamic Distributed Broadcasting in Mobile Ad Hoc Networks with Secure Data Transmission

    In Mobile Ad-hoc networks, local broadcast algorithms can be differentiated with respect to the forwarding nodes. A forwarding node can either be statically or dynamically determined. If it is static then it is based on local topology information alone. If dynamic, it is based on both local topology and broadcast...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    An Empirical Data Cleaning Technique for CFDs

    Data cleaning is a basic data preprocessing technique for before forwarding the data to data mining approach, but it leads to an intresting research area in the field of data mining. Data cleaning is the process of finding and deleting noisy data/records from the database. The simplest technique used for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Disaster Prediction System Using IBM SPSS Data Mining Tool

    Data mining, or knowledge discovery in databases, refers to the discovery of interesting, implicit, and previously unknown knowledge from large databases. Spatial data mining presents new challenges due to the large size of spatial data, the complexity of spatial data types, and the special nature of spatial access methods. Spatial...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    Performance Transaction's Assessment of Real Time Database System in Distributed Environment

    Database performance is a very important aspect of database usability. The objective of this paper is to proposed policy to forecast the performance of transaction under real time database system in distributed environment. A real time database system in distributed environment is a transaction processing system design to handle the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Fast and Simple Method for Maintaining Staleness of Database

    In data warehousing when dealing with large amount of database, there are so many problems of updating of the database. In data-warehousing there is large amount of data can store in the database. For maintaining the updated database it takes more time. For more scalability it can take more processing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Cryptography in Ultra-Low Power Microcontroller MSP430

    In this paper the authors describe an implementation for the method from texas instruments for a random number generator in the ultra-low power microcontroller MSP430x5xx families and the analysis of this generator in the concrete microcontroller MSP430f5438A. The generator may be used to generate numbers for cryptography security methods (for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Evaluations of Map Reduce-Inspired Processing Jobs on an IAAS Cloud System

    Major cloud computing companies have begun to integrate frameworks for parallel data processing in their product portfolio, creating it simple for customers to access these services and to deploy their programs. However, the process frameworks that are presently used are designed for static, homogeneous cluster setups and disrespect the actual...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Complete Study on Unipath Routing Protocols in MANETs

    Mobile ad hoc network is a cluster of wireless mobile nodes making a network with dynamically changing topology without using any permanent access point as a base station. To create connectivity among nodes more than single hop is needed due to low transmission range. Increasing of mobile nodes enhances this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    A Novel Process to Cluster Data in Distributed Resources

    Searching is more frequently using task for information gathering or browsing information from web. In this paper the authors can users search in different resources. Due to more scalability this searching process takes more time to process. So by using grouping similar data they can reduce the process time. This...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Optimizing the Cost for Resource Subscription Policy in IaaS Cloud

    Cloud computing allow the users to efficiently and dynamically provision computing resource to meet their IT needs. Cloud provider offers two subscription plan to the customer namely reservation and on-demand. The reservation plan is typically cheaper than on-demand plan. If the actual computing demand is known in advance reserving the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    An Approach to Build Software Based on Fault Tolerance Computing Using Uncertainty Factor

    In this paper, the authors have started with an overview on fault tolerance based system. In case of design diversity based software fault tolerance system, they observed that uncertainty remains an important factor. Keeping this factor, they have discussed about implementing bayes' theorem and probabilistic mathematical model to handle the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2013

    Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

    Building high quality cloud applications becomes an urgently required research problem. Non functional performance of cloud services is usually described by Quality-of-Service (QoS). In cloud applications, cloud services are invoked remotely by internet connections. The QoS ranking of cloud services for a user cannot be transferred directly to another user,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    Efficient Field Programmable Gate Array Implementation of Advanced Encryption Standard Algorithm Using VHDL

    For the security of data, various solutions algorithms were proposed. The AES also known as the Rijndael algorithm was selected as a standard by National Institute of Standards and Technology (NIST). Encryption algorithms are used to ensure security of transmission channels. This paper presents an efficient FPGA implementation approach of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    Reconfigurable Correlator Module for Satellite Data Pattern Recognition

    In this paper realizes a reconfigurable correlator module can be utilized to data pattern recognition in remote sensing applications. Enhancement of data is one of the essential parts of the data processing in remote sensing applications. Enhancement of data possible electronically and effectively by reconfiguration computing. HDL code is used...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    An Online Examination System Using Wireless Security Application

    In this paper the authors implemented for online examination security system. Here the authors are using finger print module for identification of each student and a web cam for taking the image of each student, all the finger prints and images will be stored in the data base using zigbee...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    Design of Vehicle Bus Data Acquisition and Fault Diagnosis System Using CAN

    The vehicle bus data acquisition and fault diagnosis system, focusing on its lower computer system and the upper computer system is designed. This system is based on the widely used CAN bus technology, to extract the vehicle's status or fault information. When the vehicle breaks down, the status of vehicle...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    To Study and Analyze to Foresee Market Using Data Mining Technique

    In every field there is huge growth and demand in knowledge and information over the internet. The automation using data mining and predictive technologies are doing an advance amount of deals in the markets. Data mining is all based on the theory that the historic data holds the essential memory...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Encapsulated Visual Cryptography Strategies for Data Sharing

    A (k, n)-threshold visual cryptography strategy is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k-1 or fewer of them gain no information about it. The decoding process of a visual cryptography strategy,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    A Cluster Based Intrusion Detection System in Mobile Ad Hoc Network

    Mobile Adhoc NETwork (MANET) provides a superb chance to watch environments, and have lots of fascinating applications in warfare. The matter is that security mechanisms used for wired networks don't transfer on to sensing element networks. A number of this can be as a result of the very fact that...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    An Ethnography Survey on Visual Cryptography Schemes

    Visual Cryptography Scheme (VCS) is an encryption method that uses combinatorial techniques to encode secret written materials. The idea is to convert the written material into an image and encode this image into n shadow images. The decoding only requires only selecting some subset of these n images, making transparencies...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Improvement of Fault Tolerance Using Checkpoint Optimization Technique in Grid Computing Environment

    Grid is an association of computer resources from several administrative domains to reach a mutual goal with an abstraction of service origination to the user. Fault tolerance is an important property in grid computing as the dependability of individual grid resources may not be guaranteed. Fault tolerant approach is useful...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2013

    A Cryptographic Privacy Preserving Approach Over Classification

    The authors proposed an efficient privacy preserving technique during the classification of data. They introduce a cryptographic based approach that protects centralized sample data sets utilized for decision tree mining of data. Preservation of privacy is applied to sanitize the samples prior to their release to third parties in order...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2013

    Design of Dual Cryptography Encoder

    Data hiding has been used for thousands of years to transmit data without being intercepted by unwanted viewers, therefore security becomes increasingly important for many applications, such as video surveillance, confidential transmission, military and medical etc. In November 2001 NIST published Rijndael as the proposed algorithm for AES (Advanced Encryption...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2013

    Design of Virtual Backbone Path Transmission for Wireless Sensor Network

    The increase in the demand for wireless sensor networks has intensified studies which aim to obtain energy efficient solutions using backbone networks. But the backbone networks are very susceptible due to various reasons and posses the grand challenge in efficient wireless communication. Hence the new design scheme of energy efficient...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2013

    Design of FPGA Based Encryption Algorithm Using KECCAK Hashing Functions

    Security makes the people to stay in the sense of vital modern technological improvements, especially focused in cryptography process. The authors have to consider the high level of security, the speed of encryption and the level of hardware which decides the cost in trade basis. This paper concentrates on KECCAK...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2013

    Detection of Asynchronous Traffic Attack

    Now-a-days it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions and misuses. So intrusion detection systems have become a needful component in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2013

    An Efficient Data Correctness Approach over Cloud Architectures

    Now-a-day's secure data storage over cloud servers is an important research issue in the field of cloud computing, Even though various traditional approaches are there for cloud storage, but they are not optimal, because many of the traditional mechanisms are not optimal for data correctness, integrity and dynamic data support....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Controlling Various Network Based ADoS Attacks in Cloud Computing Environment: By Using Port Hopping Technique

    Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, applications, and the associated infrastructure resources of cloud computing. There are a number of security issues/concerns associated with cloud computing....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    A Novel Data Authentication and Monitoring Approach Over Cloud

    Security is one of the important and interesting factors in the field of cloud computing, during the usage of cloud resources, Even though various traditional approaches are there for cloud storage, but they are not optimal providing optimal services because many of the traditional mechanisms are not optimal for data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    A Review: Attacks and Its Solution over Mobile Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET), a new form of Ad-hoc Network has gained the attention of today's research efforts and automotive industries to improve road safety and enable a wide variety of value added services. It needs security to implement the wireless environment and serves users with safety and non safety...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2013

    FPGA Based Real Time Implementation of Modified Tollgate System

    Toll gates are usually considered an inconvenience by travelers not only for the cost of the toll, but also for the delays at toll booths, toll roads and bridges. In order to ensure a steady flow of traffic, both staff and drivers require easy access to an efficient communication system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2013

    Optimized Technique to Minimize Packet Loss for Network Suffering From Blackhole Attack

    MANET being a self configuring and self changing network becomes unpredictable in nature poses number of challenges like network attacks including blackholes, wormholes, and gray holes along with problems like routing efficiency, distribution of load, energy consumption and security issues. Attacks like blackholes causes the delays in communication by their...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Detection of Energy Draining Attack Using EWMA in Wireless Ad Hoc Sensor Networks

    Wireless sensor networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed in large numbers over an area to monitor different phenomenon. The sole motivation of a large portion of research efforts has been to maximize the lifetime...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2013

    A Review on Network Intrusion Detection System

    Internet and computer networks are exposed to an increasing number of security threats. For new types of attacks are emerging constantly, developing flexibility and adaptability safety-oriented approaches is a serious problem. In this context, the anomaly based network Intrusion detection techniques are valuable technology to protect the target systems and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2013

    Unsupervised Network Anomaly Detection

    In this paper, the authors present a completely unsupervised approach to detect attacks, without relying on signatures, labeled traffic, or training. The unsupervised detection of network attacks represents an extremely challenging goal. The structure of the anomaly identified by the clustering algorithms is used to automatically construct specific filtering rules...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Energy-Efficient Localized Routing in Wireless Sensor Networks

    Every sensor node is essential to know their location in the sensor network, even in the presence of malicious adversaries. In that the energy conservation and scalability are critical issues in wireless sensor network. In existing algorithm combines iterative gradient descent with selective pruning of inconsistent measurements to achieve high...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2013

    Network Intrusion Detection Evading System using Frequent Pattern Matching

    Signature based NIDS are efficient at detecting attacks for what they are prepared for. This makes an intruder to focus on the new evasion technique to remain undetected. Emergence of new evasion technique may cause NIDS to fail. Unfortunately, most of these techniques are based on network protocols ambiguities, so...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A New Method for Encryption Using Fuzzy Set Theory

    Security of data is important factor in data transmission through network. In this paper, the authors propose a new method using fuzzy set theory to enhance the security. The data in the form of text to be transmitted is encrypted by using the AES Rijndael algorithm. The encryption algorithm is...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2013

    Topographical Panoramic Imageproduction using Mobile Cloud

    Increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems. The main problems are resource scarcity, frequent disconnections, battery problems and mobility. Mobile cloud computing can address the above problems by executing mobile applications on resource providers external to the mobile device. Mobile cloud...

    Provided By International Journal of Engineering Trends and Technology