International Journal of Engineering Trends and Technology

Displaying 1-40 of 647 results

  • White Papers // Apr 2015

    The Design of SET-CMOS Hybrid Logic Style of 1-Bit Comparator

    Single Electron Transistor (SET) is an ultra-low power consumption as well as ultra dense circuit formation is now possible with the help of mutual integration. These benefits have drawn the attraction of the future researchers to design the hybrid SET-CMOS style for future nano-scale low power VLSI design. In this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2015

    A High Resolution All Digital Duty Cycle Corrector Using Reversible Multiplexer Logic

    In low power design and high speed applications, a High Resolution All Digital Duty Cycle Corrector (HR-ADDCC) is proposed. It is used to correct the duty cycle error and to achieve an exact 50% output duty cycle. A reversible multiplexer logic is used to obtain a glitch free circuit, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2015

    Page Content Rank: An Approach to the Web Content Mining

    In this paper, the author proposed a new algorithm, based on Page Content Rank (PCR), based on structure and content. In the proposed paper, a new approach is introduced to rank the relevant pages based on the content and keywords. World Wide Web (WWW) is a system of inter-linked hypertext...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2015

    Performance Analysis of Parallel Prefix Adder Based on FPGA

    Parallel-prefix structures (also known as carry tree) are found to be common in high performance adders in Very Large Scale Integration (VLSI) designs because of the delay is logarithmically proportional to the adder width. Such structures can usually be classified into three basic stages which are pre-computation, prefix tree and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2015

    Performance Analysis of Trinary /Quaternary Multivalve Logic Digital Circuit

    The binary logic have two logic levels is input and output represented by 0, 1. Multi-valve logic carry more information on a single line. It minimizes the number of gates needed and largest number of gates in any path from input to output. Minimizing number of gates will reduce the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2015

    Detection Mechanism of Intermittent Faults on the Reliability of a RISC Microprocessor

    The reduction of transistors size has allowed the increase of microprocessors speed and the decrease of their size and supply voltage, but at the cost of augmenting the incidence of faults. This reduction causes a higher rate of transient faults, commonly provoked by temporary environmental conditions such as electromagnetic interference,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2015

    Design of Low Power L1 Cache Using CBF Based TOB Architecture in Embedded Processors

    In the embedded processor, a cache could consume 40% of the entire chip power. So, reduce the high power utilization of cache is very important. To reduce the high power utilization, a new cache method is used in the embedded processors. This is termed as an Early Tag Access (ETA)...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2015

    Recursive CORDIC- Based Low Power DCT Architecture

    One of the maximum commonly used transform techniques is Discrete Cosine Transform (DCT). In the DCT algorithm, the inputs are in spatial domain and the outputs are in frequency domain and it is mostly used for image compression. DCT using CO-ordinate Rotation DIgital Computer (CORDIC) algorithm lessens the number of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2015

    A Design of Low Power NAND Based Multiplexer Circuit in CMOS to DPL Converter for Smart Card Security System

    In the consumer market, the smart cards are frequently used as cryptographic device to provide security and storage of secret information. Security issues play a major role in smart cards. Now-a-days, a large amount of attacks have been developed to hack the secret information by leakage of such private data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2015

    Semantic RDF Based Integration Framework for Heterogeneous XML Data

    A significant amount of data on the web is in the XML format or may easily be converted to XML or to its variations. XML is still the most appropriate language for data inter-change and serialization. In this paper, a new framework which can integrate any heterogeneous XML data sources...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2015

    An Approach to Semi-Supervised Co-Clustering with Side Information in Text Mining

    Now-a-days, in many text mining applications, eloquent quantity of information from document is present in the form of text. This text information contains various types of information such as side information or meta-data. This side information is easily attainable in the text document. Such side information may of distinct types...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Efficient Intrusion Detection and Prevention System with Hybrid Approach

    In communication system there are many issues about intrusion detection and they are classified into two types such as ID based intrusion detection and Host based intrusion detection. The ID based intrusion detection mainly works on unique ID of the users which means this method track the intruders based on...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    DS-CDMA System with Multiuser Detection and MMSE Equalizer to Mitigate MAI

    Wireless communication has drastically shown evaluation mobile communication and its counterparts. Code Division Multiple Access (CDMA) is one of the reliable multiple access methods appropriate for sustaining lots of new services for ex ample speech, video, multimedia applications, which are becoming progressively more important for mobile communications. The multiple data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Innovative Approach Towards Traffic Signal Control

    In this paper, the authors give information about traffic light control system based on wireless sensor network. Here the traffic lights changes according to the density of the traffic. To identify the traffic density, the authors are going to use IR sensors. If there is more density automatically the highest...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Life Saving Breaker System for Hasty Drivers

    The main concept of this proposed system is to avoid accidents. Accident happens mainly due to rash driving of vehicle or driving the vehicles with over speed. So accidents would be reduced when the vehicles will move with less speed. Firstly, the authors need to verify with which speed the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Implementation of Data Link Control Protocols in Wired Network

    Data link layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provides the means to rectify the errors and usually correct it that may occur in the physical layer. Study and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Spatial Correlation Property of a 2x2 MIMO System for Different 3GPP Cases

    In this paper, the authors study and analyze the spatially correlated fading channel, its basic concepts, brief mathematical modeling and simulation of correlation function of a MIMO system. The review paper in presents the effect of antenna parameters on the correlation property of a MIMO system and hence the system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Extensible Location Dependent Spatial Object Search on Road Networks

    Extensible location-dependent spatial object that searches for spatial object on road networks. Here it provides distance indexing technique and providing a dynamic object mapping mechanism of spatial object search. It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    STTC-OFDM Downlink Baseband Receiver for Mobile WMAN

    In this paper, the authors proposed a STTC-OFDM system which is based on IEEE 802.16e OFDMA specification and supports the distributed subcarrier allocation of Partial Usage of Sub Channels (PUSC) for DownLink (DL) transmission. The Fast Fourier Transforms (FFT) size 1048. The length of Cyclic Prefix (CP) is 128 sampling...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Empirical Model of High Dimensional Data Clustering Technique with Intra Cluster Mean

    Grouping the similar type objects is always an interesting research issue in the field of clustering in data mining or knowledge and data engineering, but raw data of high dimensional data cannot give the optimal results in terms of accuracy, so feature extraction is very important before clustering. In this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Two Phase Utility Mining Algorithm Using P Tree and Inter-Intra Transaction Itemsets

    The instructions of high utility item sets is maintained in a tree-based data structure named utility pattern tree UP-tree, so that candidate item sets might be generated efficiently exclusively with two scans of database. Within this work time, consuming on each database scan is exponentially increasing just like the size...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Object Tracking System Using Mean Shift Algorithm and Implementation on FPGA

    Various attempts have been made to implement human vision in real-time computer vision. In most cases, however, this capability has been found to be too complex to implement on a practical systems. In short, human vision capability looks like a simple system but in reality it is difficult to model....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    High Speed Improved Decision Tree for Mining Streaming Data

    Decision tree construction is a well-studied problem in data mining. Recently, there was much interest in mining streaming data. For data stream classification, time is a major issue. However, these spatial datasets are too large to be classified effectively in a reasonable period of time using existing methods. Contained in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    High Efficient Carry Select Adder Using Zero Carry Look Ahead Adder

    Adders are used vastly in digital systems; carry select adder is a fast adder, which uses multiple narrow adders and results fast wide adders. Carry select adders have great scope by reducing area, power consumption and delay. The simple and efficient gate level modification helps to reduce the area and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    A 6X6 Multiplier Based on MCM Method

    The digit-based recoding technique does not exploit the sharing of common partial products, which allows great reductions in the number of operations and consequently in area and power dissipation of the MCM design at the gate level. Hence, the fundamental optimization problem called the MCM problem is defined as finding...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    A Survey: Classification of Huge Cloud Datasets with Efficient Map - Reduce Policy

    Cloud computing has become a feasible mainstream solution for data processing, storage and distribution. It assures on demand, scalable, pay-as-you-go compute and storage capacity. To analyze such huge data on clouds, it is very important to research data mining approach based on cloud computing model from both theoretical and practical...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Compression and Decompression of FPGA Bit Stream Using Bitmask Technique

    In this paper, the authors propose an efficient decoding aware compression technique for compressing FPGA configuration bit streams to improve compression ratio of the bits and decrease decompression ratio. This is accomplished by efficiently choosing decoding aware data such as (length of the word, dictionary size and number and bit-mask...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Optimization of the Performance of FFT Processor Using Vedic Algorithm

    Over the past few years, there has been increasing emphasis on extending the services available on wired public telecommunication networks to wireless telecommunications users. Demand for Wireless Broadband Multimedia Communication Systems (WBMCSs) is anticipated within both the public and private sectors. To overcome multi-path fading environment with low complexity and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Reduction of Ground Bounce Noise in 14T Full Adder by using Various Power Gating Techniques

    In this paper, the authors are to compare the existing full adders circuits and their performances to design a low power full adder having improved result as compared to existing full adders. The full adder circuit is a very important part in application like Digital Signal Process (DSP) design, chip...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach of Image Encryption and Compression for Secure Transmission

    In addition to provide the security for data through image, the authors are using the concepts hybrid approach of encryption and compression techniques, before transmission of data they can encrypt it by using cryptographic technique. In this paper, they are using triple DES algorithm for data encryption and decryption, after...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A High Performance Privacy Preserving Clustering Approach in Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of Knowledge and data engineering or community based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient and Multi Keyword Search in Service Oriented Architecture

    Searching top k multi keywords from the out sourced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality. In this paper, the authors are proposing an efficient top k retrieval from out sourced file through service oriented application by computing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Energy Level Based Stable Election Protocol in Wireless Sensor Network

    In wireless sensor network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    ARM 9 Based Intelligent System for Biometric Finger Authentication

    Most of the universities are enforcing affiliated colleges to implement biometric fingerprint attendance system to monitor student attendance. Biometric fingerprint scanner need to be installed in college where the student studying and it is monitored by the university online. There is possibility of adding fake finger print into the scanner...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    High Coverage Area and Power Utilization (RF) in WPSN Using Modulated backscattering

    Sensor networks are highly sensitive to energy usage. They may, probably, be deployed in inhospitable or hostile environments, where it may not be possible to refresh energy sources. Hence, energy consumption is a major issue, and energy-aware protocols/applications are desirable. Energy consumption is observed at three stages, node communication, sensing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust RoF Systemwith DWDM Technique for High Speed Communication Networks

    In the recent trends in optical communication to overcome one of the major problems in the new generation of radio over fiber networks that requires being concentrated, is decreasing the quantity of bit error rate in the lowest power penalty. This paper also evaluates the results of down-link 40Gbps OOK...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust Speech Recognitionfor Speaker and Speaking Environment

    The authors study a cohort selection technique to construct a space with good resolution in the online phase. The concept of cohort selection resembles that of the family of subset selection methods that find a subset of components from the entire set of components to model a signal of interest....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Communication Protocol in Wireless Sensor Networks

    Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Minimization of Payment and Error Tolerent Resource Allocation for Cloud System

    Virtual Machine (VM) technology being greater and fully developed, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand, which contributes three technologies such as, formulating a deadline-driven resource allocation problem based on the cloud environment facilitated with VM resource isolation technology, and also to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach for Identification of Malicious Nodes in Network Traffic

    Various traditional mechanisms available for identification of unauthorized behavior or malicious activities of the incoming nodes like with their trust measures like direct trust, mutual trust. Servers maintain firewall log data of in and out traffic for intrusion detection and prevention mechanisms. Even though various approaches available to detect and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    RFID-Based Mobile Robot Positioning - Sensors and Techniques

    Mobile robot navigation using analog signal strength of a Radio Frequency IDentification (RFID) device is a promising alternative of different types of robot navigation methods in the state of the art. Skilled navigation in mobile robotics usually requires solving two problems: the knowledge of the position of the robot, and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Study on Auto Theft Prevention Using GSM

    This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Analysis of Leakage Reduction Technique on Different SRAM Cells

    Leakage components is very important for estimation and reduction of leakage power, especially for low power applications. This provides the motivation to explore the design of low leakage SRAM cells. High leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    An Overview on Privacy Preserving Data Mining Methodologies

    Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For example, mining health care data for the detection of disease outbreaks may require analyzing clinical records and pharmacy transaction data of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    Model-Based Programming of Intelligent Embedded Systems Through Offline Compilation

    Many recent and future space missions point to the need for increased autonomy in spacecraft with an emphasis on more capable fault diagnostic systems. The most widely used fault diagnostic systems are rule-based. Rule-based systems have quick response to events and clearly present to engineers the predefined reactions to events....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    GPS User Position Using Extended Linearization Technique

    The position of a GPS receiver can be determined by obtaining pseudoranges from a minimum of four different GPS satellites. The measured ranges do not represent the true ranges as the signal coming from a GPS satellite will be contaminated by various errors like Ephemeris error; Propagation error in the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Model-Driven Performance for the Pattern and Advancement of Software Exhaustive Systems

    Model-Driven Engineering (MDE) is an advance to widen software systems by build models and pertaining robotic alteration to them to finally make the execution for a intention platform. Although the main focus of MDE is on the creation of code, it is also essential to bear the study of the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Power Quality Disturbances and Protective Relays on Transmission Lines

    Power quality concerns the effect of voltage disturbances on end-user equipment and of current disturbances on network components. Power system protection concerns the detection of faults in the system from measured voltages and currents. However, non-fault voltage and current disturbances may lead to the inadvertent detection of a fault in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm

    Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data and services may not be fully trustworthy. This exceptional prototype brings about many new security challenges, which have not...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2014

    Design a Dynamic Resource Allocation Scheme in Virtual Environment by Implementing a Load Balancer for Session Management

    Cloud computing means the dynamic allocation of resources and by which the business customers can increase or decrease the usage of their resource based on their demands. Through virtualization technology by multiplexing resource many of the laud gains in the cloud model can be achieves. A load balancer has the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Public Auditing and Data Dynamics for Storage Security in Cloud Computing

    Cloud computing has been envisioned as the next generation architecture of IT Enterprise. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden local copy data storage and maintenance. It moves...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Implementation of Switching System for High Speed Data Transmission using VHDL

    Switching system is used for data transmission between two communicating Channels. This transmission can be done via trunks or it can be fully wireless, technically termed as Telephone Switching and Mobile switching, respectively. The implementation of the switching system using VHSIC hardware description language is more reliable and efficient than...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Improving Network I/O Virtualization Performance of Xen Hypervisor

    Virtualization technology is the backbone of Cloud Computing. Virtualization provides efficiency, flexibility and scalability in cloud computing. Virtualization in cloud computing can be done through different virtualization platform such as VMware, Kvm, UMLinux, VirtualBox, Xen. Xen is an open source hypervisor; a virtualization tool for cloud computing that is widely...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Removal of Data Vulnerability using SQL-An Approach

    Web Applications are applications that can be accessed over the Internet by using any web browser that runs on any operating system and architecture. They have become ubiquitous due to the convenience, flexibility, availability, and interoperability that they provide. Web Applications are vulnerable to a variety of new security threats....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    A Simple Analysis of Service Oriented Architecture for Mobile Cloud Computing

    Cloud-based Mobile Augmentation (CMA) is the state-of-the-art augmentation model that leverages proximate and distant clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of RMAs, which breeds Mobile Cloud Computing (MCC). This study analyzes impacts of mobile-cloud distance and number of intermediate hops as influential...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Managing Privacy Retaining Entrust Admission in Public Clouds

    The data stored in the cloud is very confidential. So before storing the data in cloud platform high secured encryption technologies are used. Present day's data owner plays a major role in maintaining privacy of data. They performs encryption of data, Uploading of data and re-encrypting the data if any...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Novel Session Based Mining Approach for User Search Goals

    Let the people consider seeing the whole things from the perspective of a search engine and their only view of user behavior would be the stream of queries users produce. The search engine designers adopt this perspective and them studying these query streams and trying to get optimize the engines...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Proxy Based Collaborated Cloud Computing Approach to Resolve Security and Privacy Issues in Multicloud Architectures

    When the users come to security and privacy aspects, they are still the biggest critical factors to adopt cloud services. This leads to lots of research proposals to address and mitigate the targeted security threats. Along with this, one who adopted the services of cloud should not face any kind...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Data Base Hacking: SQL Injection Method and its Prevention

    As the services of internet rapidly increases people are dependent on internet for different purposes. The applications which are developing using web applications i.e.; online shopping, train reservation, paying bills. These web applications require database which is used to retrieve the relevant data supplied by the user, here data base...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Effective Verification and Encryption of Data for Users Delegation Privacy

    Cloud computing provides storage facility and services in which users can store their data remotely and avail the on demand high quality applications, services. It is all done through the shared pool of configurable computing resources. But the important thing that need to be understood is, users no longer have...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Empirical Model of Data Integrity in Multi Cloud Data Storage

    In present cloud storage services integrity became major problem. For these traditional researchers implemented so many approaches, but still its facing major problem of security and data owners storing data in multiple clouds. The authors implemented the security of their scheme based on zero-knowledge proof system and which can satisfy...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Efficient Pattern Discovery Over Long Text Patterns

    There are several techniques are implemented for mining documents. In this text mining, still so many problems getting exact patterns in text mining. In this some of the techniques are adapted in text mining. In proposed system the temporal text mining approach is introduced. The system terms of its ability...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Fast Fourier Transform Implementation on FPGA Using Soft-Core Processor NIOS II

    FPGAs with soft-core processors offer the opportunity for testing & implementation various trade-offs between hardware and software implementations of the functions to implement. With the Altera NIOS II the processor can be customized through the addition of new instructions. Custom specific functions can be implemented as coprocessors. Altera has provided...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Improved Metadata Management & Scalability in Dynamic Distributed Web Caching

    The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently running on the Internet, the size of World Wide Web is of an exponential growth, which results in network congestion and server...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Web Data Mining: Survey

    The use of World Wide Web increases day-by-day, with this rapid growth it becomes a biggest database. Most of the people publicly access the web services on daily basis and generate a huge amount of data like:-text, images, multimedia, queries, and user logs and blogs data. When it concerns to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    High Prioritized Data Region Ranking Technique and Multiple Clustered Tags Analyzing Method for Extracting and Aligning Requisite Data

    High prioritized ranking technique and multiple clustered tags analyzing method for extracting and aligning requisite data. Web data extraction plays a vital role in extracting requisite data in order to compare and align. Multiple Clustering of tagged data mining technique used to place data elements into related groups without advance...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Review on Reserving Room Before Encryption for Reversible Data Hiding

    Now-a-days there is very big problem of data hacking. There are number of techniques available in the industry to maintain security of data. So, data hiding in the encrypted image is comes into the picture, but the problem is the occurrence of distortion in original cover at the time of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Automotive Software Domain-Combining Runnables Sequencing with Task Scheduling on Multicore ECU's

    The aim of ECU group is to research the Multicore architecture for automotive safety applications to meet hard real-time embedded systems timing and reliability constraints. The automotive industry needs to change its architectural approach in developing vehicle electronics systems. By integrating more number of functions in a limited set of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Mining Frequent Item and Item Sets Using Fuzzy Slices

    Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. The proposed work presents the design of mining frequent items from dataset. The mining approach is hybrid, that is, frequent items are calculated with a single pass, while frequent item sets are calculated...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Various Database Attacks and its Prevention Techniques

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Extracting Large Data using Big Data Mining

    Innovations in technology and greater affordability of digital devices have presided over today's age of big data, in the quantity and diversity of high frequency digital data. These data hold the potential to allow decision makers to track development progress, improve social protection, and understand where existing policies and programmes...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Relevant Feature Selection Model Using Data Mining for Intrusion Detection System

    Network intrusions have become a significant threat in recent years as a result of the increased demand of computer networks for critical systems. Intrusion Detection System (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A Mining Method to Create Knowledge Map by Analysing the Data Resource

    The fundamental step in measuring the robustness of a system is the synthesis of the so-called Process Map. This is generally based on the user's raw data material. Process Maps are of fundamental importance towards the understanding of the nature of a system in that they indicate which variables are...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Nested Clustering Based Rotation using Radial Basis Function for PPDM

    Privacy preserving in data mining is most needed technique in the current world. The people they don't want to share their sensitive information with unauthorized user, So they want to hide the information from unauthorized person. In data mining there are lot of domains are used for preserving the data's...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Advanced Technology of Automated Storage and Retrieval System Using PLC Integration

    In this paper, the author proposes an highly developed fully automatic ASRS (Automatic Storage and Retrieval System). This main material management support system is generally used for storing and retrieving the unprocessed materials in the manufacturing unit. The necessities of ASRS are increasingly of a more dynamic nature for which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Enhancing the Scalability of Virtual Machines in Cloud

    Cloud computing has become an increasingly popular model in which computing resources are made available on-demand to the user as required. In cloud computing, the overloaded hosts are managed by allocating the Virtual Machines from that host to another. This increases the resource utilization. The proposed model introduces a load...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Ranking Components using FTCloud for Fault- Tolerant Cloud Applications

    Building highly reliable cloud applications is a challenging and critical research problem. FTCloud framework is introduced to solve this issue in cloud environment. FTCloud is a component ranking based framework for building fault-tolerant cloud applications. It consists of two algorithms. FTCloud1 uses component invocation structures and invocation frequencies for finding...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Privacy Preserving Heuristic Approach for Intermediate Data Sets in Cloud

    Cloud computing is the sharing of computing resources which lessen the upfront investment cost of IT infrastructure. So many organizations are moving their business into cloud. In data intensive applications, while processing original data set many intermediate data sets will be generated. The intermediate data sets are often stored in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A BI-Partite Graph Partition and Link Based Approach for Solving Categorical Data Clustering

    Link based approach to solve the problem of categorical data clustering through cluster ensembles. It consists of generating a set of clustering from the dataset and combining them into a final clustering. The combination process is to improve the quality of individual data clustering. The ensemble information matrix presents only...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Energetic Resource Allocation Framework Using Virtualization in Cloud

    Virtualization provides an efficient solution to the objectives of the cloud computing paradigm by facilitating creation of Virtual Machines (VMs) over the underlying physical servers, leading to improved resource utilization and abstraction. Virtualization refers to creating a virtual version of a device or a resource such as a server, a...

    Provided By International Journal of Engineering Trends and Technology