International Journal of Engineering Trends and Technology

Displaying 1-40 of 645 results

  • White Papers // Apr 2015

    The Design of SET-CMOS Hybrid Logic Style of 1-Bit Comparator

    Single Electron Transistor (SET) is an ultra-low power consumption as well as ultra dense circuit formation is now possible with the help of mutual integration. These benefits have drawn the attraction of the future researchers to design the hybrid SET-CMOS style for future nano-scale low power VLSI design. In this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2015

    A High Resolution All Digital Duty Cycle Corrector Using Reversible Multiplexer Logic

    In low power design and high speed applications, a High Resolution All Digital Duty Cycle Corrector (HR-ADDCC) is proposed. It is used to correct the duty cycle error and to achieve an exact 50% output duty cycle. A reversible multiplexer logic is used to obtain a glitch free circuit, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2015

    Page Content Rank: An Approach to the Web Content Mining

    In this paper, the author proposed a new algorithm, based on Page Content Rank (PCR), based on structure and content. In the proposed paper, a new approach is introduced to rank the relevant pages based on the content and keywords. World Wide Web (WWW) is a system of inter-linked hypertext...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2015

    Performance Analysis of Trinary /Quaternary Multivalve Logic Digital Circuit

    The binary logic have two logic levels is input and output represented by 0, 1. Multi-valve logic carry more information on a single line. It minimizes the number of gates needed and largest number of gates in any path from input to output. Minimizing number of gates will reduce the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2015

    Performance Analysis of Parallel Prefix Adder Based on FPGA

    Parallel-prefix structures (also known as carry tree) are found to be common in high performance adders in Very Large Scale Integration (VLSI) designs because of the delay is logarithmically proportional to the adder width. Such structures can usually be classified into three basic stages which are pre-computation, prefix tree and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2015

    Detection Mechanism of Intermittent Faults on the Reliability of a RISC Microprocessor

    The reduction of transistors size has allowed the increase of microprocessors speed and the decrease of their size and supply voltage, but at the cost of augmenting the incidence of faults. This reduction causes a higher rate of transient faults, commonly provoked by temporary environmental conditions such as electromagnetic interference,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2015

    Design of Low Power L1 Cache Using CBF Based TOB Architecture in Embedded Processors

    In the embedded processor, a cache could consume 40% of the entire chip power. So, reduce the high power utilization of cache is very important. To reduce the high power utilization, a new cache method is used in the embedded processors. This is termed as an Early Tag Access (ETA)...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2015

    A Design of Low Power NAND Based Multiplexer Circuit in CMOS to DPL Converter for Smart Card Security System

    In the consumer market, the smart cards are frequently used as cryptographic device to provide security and storage of secret information. Security issues play a major role in smart cards. Now-a-days, a large amount of attacks have been developed to hack the secret information by leakage of such private data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2015

    Recursive CORDIC- Based Low Power DCT Architecture

    One of the maximum commonly used transform techniques is Discrete Cosine Transform (DCT). In the DCT algorithm, the inputs are in spatial domain and the outputs are in frequency domain and it is mostly used for image compression. DCT using CO-ordinate Rotation DIgital Computer (CORDIC) algorithm lessens the number of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2015

    An Approach to Semi-Supervised Co-Clustering with Side Information in Text Mining

    Now-a-days, in many text mining applications, eloquent quantity of information from document is present in the form of text. This text information contains various types of information such as side information or meta-data. This side information is easily attainable in the text document. Such side information may of distinct types...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2015

    Semantic RDF Based Integration Framework for Heterogeneous XML Data

    A significant amount of data on the web is in the XML format or may easily be converted to XML or to its variations. XML is still the most appropriate language for data inter-change and serialization. In this paper, a new framework which can integrate any heterogeneous XML data sources...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Efficient Intrusion Detection and Prevention System with Hybrid Approach

    In communication system there are many issues about intrusion detection and they are classified into two types such as ID based intrusion detection and Host based intrusion detection. The ID based intrusion detection mainly works on unique ID of the users which means this method track the intruders based on...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    DS-CDMA System with Multiuser Detection and MMSE Equalizer to Mitigate MAI

    Wireless communication has drastically shown evaluation mobile communication and its counterparts. Code Division Multiple Access (CDMA) is one of the reliable multiple access methods appropriate for sustaining lots of new services for ex ample speech, video, multimedia applications, which are becoming progressively more important for mobile communications. The multiple data...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Innovative Approach Towards Traffic Signal Control

    In this paper, the authors give information about traffic light control system based on wireless sensor network. Here the traffic lights changes according to the density of the traffic. To identify the traffic density, the authors are going to use IR sensors. If there is more density automatically the highest...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Life Saving Breaker System for Hasty Drivers

    The main concept of this proposed system is to avoid accidents. Accident happens mainly due to rash driving of vehicle or driving the vehicles with over speed. So accidents would be reduced when the vehicles will move with less speed. Firstly, the authors need to verify with which speed the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Implementation of Data Link Control Protocols in Wired Network

    Data link layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provides the means to rectify the errors and usually correct it that may occur in the physical layer. Study and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Spatial Correlation Property of a 2x2 MIMO System for Different 3GPP Cases

    In this paper, the authors study and analyze the spatially correlated fading channel, its basic concepts, brief mathematical modeling and simulation of correlation function of a MIMO system. The review paper in presents the effect of antenna parameters on the correlation property of a MIMO system and hence the system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Extensible Location Dependent Spatial Object Search on Road Networks

    Extensible location-dependent spatial object that searches for spatial object on road networks. Here it provides distance indexing technique and providing a dynamic object mapping mechanism of spatial object search. It is very efficient and flexible for various types of queries, namely, range search and nearest neighbor search, on objects over...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    STTC-OFDM Downlink Baseband Receiver for Mobile WMAN

    In this paper, the authors proposed a STTC-OFDM system which is based on IEEE 802.16e OFDMA specification and supports the distributed subcarrier allocation of Partial Usage of Sub Channels (PUSC) for DownLink (DL) transmission. The Fast Fourier Transforms (FFT) size 1048. The length of Cyclic Prefix (CP) is 128 sampling...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    An Empirical Model of High Dimensional Data Clustering Technique with Intra Cluster Mean

    Grouping the similar type objects is always an interesting research issue in the field of clustering in data mining or knowledge and data engineering, but raw data of high dimensional data cannot give the optimal results in terms of accuracy, so feature extraction is very important before clustering. In this...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Two Phase Utility Mining Algorithm Using P Tree and Inter-Intra Transaction Itemsets

    The instructions of high utility item sets is maintained in a tree-based data structure named utility pattern tree UP-tree, so that candidate item sets might be generated efficiently exclusively with two scans of database. Within this work time, consuming on each database scan is exponentially increasing just like the size...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Object Tracking System Using Mean Shift Algorithm and Implementation on FPGA

    Various attempts have been made to implement human vision in real-time computer vision. In most cases, however, this capability has been found to be too complex to implement on a practical systems. In short, human vision capability looks like a simple system but in reality it is difficult to model....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    High Speed Improved Decision Tree for Mining Streaming Data

    Decision tree construction is a well-studied problem in data mining. Recently, there was much interest in mining streaming data. For data stream classification, time is a major issue. However, these spatial datasets are too large to be classified effectively in a reasonable period of time using existing methods. Contained in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    High Efficient Carry Select Adder Using Zero Carry Look Ahead Adder

    Adders are used vastly in digital systems; carry select adder is a fast adder, which uses multiple narrow adders and results fast wide adders. Carry select adders have great scope by reducing area, power consumption and delay. The simple and efficient gate level modification helps to reduce the area and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    A 6X6 Multiplier Based on MCM Method

    The digit-based recoding technique does not exploit the sharing of common partial products, which allows great reductions in the number of operations and consequently in area and power dissipation of the MCM design at the gate level. Hence, the fundamental optimization problem called the MCM problem is defined as finding...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    A Survey: Classification of Huge Cloud Datasets with Efficient Map - Reduce Policy

    Cloud computing has become a feasible mainstream solution for data processing, storage and distribution. It assures on demand, scalable, pay-as-you-go compute and storage capacity. To analyze such huge data on clouds, it is very important to research data mining approach based on cloud computing model from both theoretical and practical...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Compression and Decompression of FPGA Bit Stream Using Bitmask Technique

    In this paper, the authors propose an efficient decoding aware compression technique for compressing FPGA configuration bit streams to improve compression ratio of the bits and decrease decompression ratio. This is accomplished by efficiently choosing decoding aware data such as (length of the word, dictionary size and number and bit-mask...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2014

    Optimization of the Performance of FFT Processor Using Vedic Algorithm

    Over the past few years, there has been increasing emphasis on extending the services available on wired public telecommunication networks to wireless telecommunications users. Demand for Wireless Broadband Multimedia Communication Systems (WBMCSs) is anticipated within both the public and private sectors. To overcome multi-path fading environment with low complexity and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Reduction of Ground Bounce Noise in 14T Full Adder by using Various Power Gating Techniques

    In this paper, the authors are to compare the existing full adders circuits and their performances to design a low power full adder having improved result as compared to existing full adders. The full adder circuit is a very important part in application like Digital Signal Process (DSP) design, chip...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A High Performance Privacy Preserving Clustering Approach in Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of Knowledge and data engineering or community based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient and Multi Keyword Search in Service Oriented Architecture

    Searching top k multi keywords from the out sourced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality. In this paper, the authors are proposing an efficient top k retrieval from out sourced file through service oriented application by computing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Energy Level Based Stable Election Protocol in Wireless Sensor Network

    In wireless sensor network, the energy efficiency is the key issue for designing the protocol because sensor nodes have one time battery backup. There are many modern protocols which extend the lifetime of the wireless sensor network by efficiently using battery power of the sensor node. In this paper, the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    ARM 9 Based Intelligent System for Biometric Finger Authentication

    Most of the universities are enforcing affiliated colleges to implement biometric fingerprint attendance system to monitor student attendance. Biometric fingerprint scanner need to be installed in college where the student studying and it is monitored by the university online. There is possibility of adding fake finger print into the scanner...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    A Hybrid Approach of Image Encryption and Compression for Secure Transmission

    In addition to provide the security for data through image, the authors are using the concepts hybrid approach of encryption and compression techniques, before transmission of data they can encrypt it by using cryptographic technique. In this paper, they are using triple DES algorithm for data encryption and decryption, after...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    High Coverage Area and Power Utilization (RF) in WPSN Using Modulated backscattering

    Sensor networks are highly sensitive to energy usage. They may, probably, be deployed in inhospitable or hostile environments, where it may not be possible to refresh energy sources. Hence, energy consumption is a major issue, and energy-aware protocols/applications are desirable. Energy consumption is observed at three stages, node communication, sensing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust RoF Systemwith DWDM Technique for High Speed Communication Networks

    In the recent trends in optical communication to overcome one of the major problems in the new generation of radio over fiber networks that requires being concentrated, is decreasing the quantity of bit error rate in the lowest power penalty. This paper also evaluates the results of down-link 40Gbps OOK...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Robust Speech Recognitionfor Speaker and Speaking Environment

    The authors study a cohort selection technique to construct a space with good resolution in the online phase. The concept of cohort selection resembles that of the family of subset selection methods that find a subset of components from the entire set of components to model a signal of interest....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Communication Protocol in Wireless Sensor Networks

    Cooperative communication over wireless sensor networks is a challenging task and an interesting research issue in recent trends of senor networks. Even though various approach available for cooperative communication, performance is always a main factor. In this paper, the authors are proposing an efficient and empirical model of cache implementation...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    Minimization of Payment and Error Tolerent Resource Allocation for Cloud System

    Virtual Machine (VM) technology being greater and fully developed, compute resources in cloud systems can be partitioned in fine granularity and allocated on demand, which contributes three technologies such as, formulating a deadline-driven resource allocation problem based on the cloud environment facilitated with VM resource isolation technology, and also to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Nov 2014

    An Efficient Channel Estimation of MIMO-OFDM System LTE Network

    Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has led to demand for higher network capacity and performance. Higher bandwidth, optimized modulation offer practically limited...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Comparative Study of Enhanced Secure and Effective Relevance Keyword Search Over Public Cloud Data

    In the present world most recent computing achievement is cloud computing. But everyone can't enjoy this cloud service there are lot of issues cost, security and infrastructure. To overcome this problem they have introduced private cloud but an individual cant access private cloud the cost is too high. To provide...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Novel Session Based Mining Approach for User Search Goals

    Let the people consider seeing the whole things from the perspective of a search engine and their only view of user behavior would be the stream of queries users produce. The search engine designers adopt this perspective and them studying these query streams and trying to get optimize the engines...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    A Proxy Based Collaborated Cloud Computing Approach to Resolve Security and Privacy Issues in Multicloud Architectures

    When the users come to security and privacy aspects, they are still the biggest critical factors to adopt cloud services. This leads to lots of research proposals to address and mitigate the targeted security threats. Along with this, one who adopted the services of cloud should not face any kind...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Data Base Hacking: SQL Injection Method and its Prevention

    As the services of internet rapidly increases people are dependent on internet for different purposes. The applications which are developing using web applications i.e.; online shopping, train reservation, paying bills. These web applications require database which is used to retrieve the relevant data supplied by the user, here data base...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Effective Verification and Encryption of Data for Users Delegation Privacy

    Cloud computing provides storage facility and services in which users can store their data remotely and avail the on demand high quality applications, services. It is all done through the shared pool of configurable computing resources. But the important thing that need to be understood is, users no longer have...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Empirical Model of Data Integrity in Multi Cloud Data Storage

    In present cloud storage services integrity became major problem. For these traditional researchers implemented so many approaches, but still its facing major problem of security and data owners storing data in multiple clouds. The authors implemented the security of their scheme based on zero-knowledge proof system and which can satisfy...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Efficient Pattern Discovery Over Long Text Patterns

    There are several techniques are implemented for mining documents. In this text mining, still so many problems getting exact patterns in text mining. In this some of the techniques are adapted in text mining. In proposed system the temporal text mining approach is introduced. The system terms of its ability...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Fast Fourier Transform Implementation on FPGA Using Soft-Core Processor NIOS II

    FPGAs with soft-core processors offer the opportunity for testing & implementation various trade-offs between hardware and software implementations of the functions to implement. With the Altera NIOS II the processor can be customized through the addition of new instructions. Custom specific functions can be implemented as coprocessors. Altera has provided...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Job Scheduling Based on Virtual Abstractions in Cloud

    Cloud computing is a provisioning of services in a timely, on-demand manner, to allow the scaling up and down of resources. Job scheduling is one of the major issues in the public cloud which concerns availability of resources in the datacenter. Data center need to achieve certain level of utilization...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Privacy Preserving Heuristic Approach for Intermediate Data Sets in Cloud

    Cloud computing is the sharing of computing resources which lessen the upfront investment cost of IT infrastructure. So many organizations are moving their business into cloud. In data intensive applications, while processing original data set many intermediate data sets will be generated. The intermediate data sets are often stored in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A BI-Partite Graph Partition and Link Based Approach for Solving Categorical Data Clustering

    Link based approach to solve the problem of categorical data clustering through cluster ensembles. It consists of generating a set of clustering from the dataset and combining them into a final clustering. The combination process is to improve the quality of individual data clustering. The ensemble information matrix presents only...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Energetic Resource Allocation Framework Using Virtualization in Cloud

    Virtualization provides an efficient solution to the objectives of the cloud computing paradigm by facilitating creation of Virtual Machines (VMs) over the underlying physical servers, leading to improved resource utilization and abstraction. Virtualization refers to creating a virtual version of a device or a resource such as a server, a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Reliable Strong Cache and Security for the Domain Name System

    Effective caching in the Domain Name System (DNS) is critical to its performance and scalability to overcome the sudden and dramatic Internet failures, natural and human disasters, frequent changes of Internet Protocol (IP) addresses and fine-grain controls for balance load distributions. The strong DNS cache consistency improves the availability and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    32 Bit Parallel Multiplier Using VHDL

    In this paper, design of 32-bit parallel multiplier is presented, by introducing Carry Save Adder (CSA) in partial product lines. The multiplier given in this paper is modeled using VHDL (Very High Speed Integration Hardware Description Language) for 32-bit unsigned data. Here comparison is done between Carry Save Adder (CSA)...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A Business Intelligence Network Design for Service-Oriented Architectures

    A modern Business organism is impression of the service-oriented approach, specializing in its business strategic problems similarly as on its technical foundations victimization net Services. Supported business situations, the potential of this rising technology is made public with relevancy open systems business integration, dynamic binding, and versatile management of distributed...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    ARM 7 Based Controller Area Network for Accident Avoidance in Automobiles

    Based on requirements of modern vehicle, in-vehicle Controller Area Network (CAN) architecture has been implemented. In order to reduce point to point wiring harness in vehicle automation, CAN is suggested as a means for data communication within the vehicle environment. The benefits of CAN bus based network over traditional point...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Ontology Learning for Semantic Web using Lexical-Semantic Method

    In recent years, web has evolved from global information space where data has linked well. Linking Open Data project has enabled a large number of semantic datasets to be published on the web. Due to the open and distributed nature of the web both schema and instances of published datasets...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A Novel Approach of Horizontal Aggregation in SQL for Data Mining

    In data mining, an important goal is to generate efficient data. To analyze data efficiently data mining uses horizontal tabular layout. There are three fundamental methods to evaluate horizontal layout, they are SPJ, CASE and PIVOT which has its own advantages. Preparing datasets in data mining requires many SQL queries...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2014

    Optimal Top-K Query Processing: Sampling and Dynamic Approach

    An effective query processing plays an important role in the uncertain data streams. Specifically, multiple top-k queries processing on uncertain data streams obtained from large applications of several fields such as sensor network monitoring and internet traffic control requires periodic execution of queries and sharing results among them. The system...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2014

    Extraction of Core Contents from Web Pages

    The information available on web pages mostly contains semi-structured text documents which are represented either in XML, or HTML, or XHTML format that lacks formatted document structure. The document does not discriminate between the text and the schema that represent the text. Also the amount of structure used to represent...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2014

    Hybrid Feature Selection Algorithm for High Dimensional Database

    Feature subset selection is mainly applied to select the most important features from the original set of features. Feature subset selection is mainly calculated from the efficiency and effectiveness point of view. Feature subset selection is important in removing irrelevant and redundant features which reduces the dimensionality of data and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Public Auditing and Data Dynamics for Storage Security in Cloud Computing

    Cloud computing has been envisioned as the next generation architecture of IT Enterprise. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden local copy data storage and maintenance. It moves...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Implementation of Switching System for High Speed Data Transmission using VHDL

    Switching system is used for data transmission between two communicating Channels. This transmission can be done via trunks or it can be fully wireless, technically termed as Telephone Switching and Mobile switching, respectively. The implementation of the switching system using VHSIC hardware description language is more reliable and efficient than...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Improving Network I/O Virtualization Performance of Xen Hypervisor

    Virtualization technology is the backbone of Cloud Computing. Virtualization provides efficiency, flexibility and scalability in cloud computing. Virtualization in cloud computing can be done through different virtualization platform such as VMware, Kvm, UMLinux, VirtualBox, Xen. Xen is an open source hypervisor; a virtualization tool for cloud computing that is widely...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    Removal of Data Vulnerability using SQL-An Approach

    Web Applications are applications that can be accessed over the Internet by using any web browser that runs on any operating system and architecture. They have become ubiquitous due to the convenience, flexibility, availability, and interoperability that they provide. Web Applications are vulnerable to a variety of new security threats....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2014

    A Simple Analysis of Service Oriented Architecture for Mobile Cloud Computing

    Cloud-based Mobile Augmentation (CMA) is the state-of-the-art augmentation model that leverages proximate and distant clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of RMAs, which breeds Mobile Cloud Computing (MCC). This study analyzes impacts of mobile-cloud distance and number of intermediate hops as influential...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Managing Privacy Retaining Entrust Admission in Public Clouds

    The data stored in the cloud is very confidential. So before storing the data in cloud platform high secured encryption technologies are used. Present day's data owner plays a major role in maintaining privacy of data. They performs encryption of data, Uploading of data and re-encrypting the data if any...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Feb 2014

    Floating Point Engine using VHDL

    Floating Point arithmetic is by far the most used way of approximating real number arithmetic for performing numerical calculations on modern computers. Each computer had a different arithmetic for long time: bases, significant and exponents' sizes, formats, etc. Each company implemented its own model and it hindered the portability between...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2014

    High Speed Matrix Multiplication Implementation Using Field Programmable Gate Array

    Matrix operations are commonly used in almost all areas of scientific research. Matrix multiplication has significant application in the areas of graph theory, numerical algorithms, signal processing, and digital control. Matrix multiplication is a computationally intensive problem, especially the design and efficient implementation on an FPGA where resources are very...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    Review on Reserving Room Before Encryption for Reversible Data Hiding

    Now-a-days there is very big problem of data hacking. There are number of techniques available in the industry to maintain security of data. So, data hiding in the encrypted image is comes into the picture, but the problem is the occurrence of distortion in original cover at the time of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2014

    An Automotive Software Domain-Combining Runnables Sequencing with Task Scheduling on Multicore ECU's

    The aim of ECU group is to research the Multicore architecture for automotive safety applications to meet hard real-time embedded systems timing and reliability constraints. The automotive industry needs to change its architectural approach in developing vehicle electronics systems. By integrating more number of functions in a limited set of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Mining Frequent Item and Item Sets Using Fuzzy Slices

    Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. The proposed work presents the design of mining frequent items from dataset. The mining approach is hybrid, that is, frequent items are calculated with a single pass, while frequent item sets are calculated...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Various Database Attacks and its Prevention Techniques

    Increasing in the popularity of internet, the application of database also widely spread. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection, Cross site scripting may change the information in the databases which decreases the truthfulness...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Extracting Large Data using Big Data Mining

    Innovations in technology and greater affordability of digital devices have presided over today's age of big data, in the quantity and diversity of high frequency digital data. These data hold the potential to allow decision makers to track development progress, improve social protection, and understand where existing policies and programmes...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Relevant Feature Selection Model Using Data Mining for Intrusion Detection System

    Network intrusions have become a significant threat in recent years as a result of the increased demand of computer networks for critical systems. Intrusion Detection System (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    A Mining Method to Create Knowledge Map by Analysing the Data Resource

    The fundamental step in measuring the robustness of a system is the synthesis of the so-called Process Map. This is generally based on the user's raw data material. Process Maps are of fundamental importance towards the understanding of the nature of a system in that they indicate which variables are...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Nested Clustering Based Rotation using Radial Basis Function for PPDM

    Privacy preserving in data mining is most needed technique in the current world. The people they don't want to share their sensitive information with unauthorized user, So they want to hide the information from unauthorized person. In data mining there are lot of domains are used for preserving the data's...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Advanced Technology of Automated Storage and Retrieval System Using PLC Integration

    In this paper, the author proposes an highly developed fully automatic ASRS (Automatic Storage and Retrieval System). This main material management support system is generally used for storing and retrieving the unprocessed materials in the manufacturing unit. The necessities of ASRS are increasingly of a more dynamic nature for which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Enhancing the Scalability of Virtual Machines in Cloud

    Cloud computing has become an increasingly popular model in which computing resources are made available on-demand to the user as required. In cloud computing, the overloaded hosts are managed by allocating the Virtual Machines from that host to another. This increases the resource utilization. The proposed model introduces a load...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2014

    Ranking Components using FTCloud for Fault- Tolerant Cloud Applications

    Building highly reliable cloud applications is a challenging and critical research problem. FTCloud framework is introduced to solve this issue in cloud environment. FTCloud is a component ranking based framework for building fault-tolerant cloud applications. It consists of two algorithms. FTCloud1 uses component invocation structures and invocation frequencies for finding...

    Provided By International Journal of Engineering Trends and Technology