International Journal of Innovations in Engineering and Technology (IJIET)

Displaying 1-40 of 106 results

  • White Papers // Feb 2015

    Design of SPI Flash Controller for Spartan6 FPGA

    In the world of communication protocols, SPI is often considered as "Little" communication protocol compared to Ethernet, USB and others. Ethernet and USB are meant for "Outside the box communications" and data exchanges between whole systems. While SPI, as well as I2C are well suited for communications between integrated circuits...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Recent Patterns and Trends of Data Mining for Web Management

    Data accept become an analytical ability in abounding organizations, and therefore, able admission to data, administration of data, extracting advice from the data and authoritative use of the advice has become a burning need. As a result, amalgam and extracting advice from the databases in the anatomy of patterns and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    An Efficient Design of Sum-Modified Booth Recoder for Fused Add-Multiply Operator

    This proposed method is purely based on modified recoding techniques for booth recoding in DSP application. The proposed method implements a newly designed recoding technique for modified booth recoding. This paper implements the direct recoding of the multiplier in its Sum Modified Booth (SMB) form. The proposed SMB algorithm is...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    An Energy Storage using Cascaded Multilevel Inverters by PMSM with Autonomous Power Regernarative Control System

    For the higher half of the twentieth century electrical(EVs) are through of designed developed to suit a spread of application from construct cars to advanced military vehicles. The energy storage devices are better in a motor drive system. The power distribution strategy for energy source, and energy storage, electric motor...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Multi-keyword Ranked Search over Encrypted Cloud Data

    Multi-keyword Ranked Search over Encrypted cloud data (MRSE) while preserving strict system-wise privacy in cloud computing paradigm. Among various multi-keyword semantics, the authors choose the efficient principle of "Coordinate matching", i.e., as many matches as possible, to capture the similarity between search query and data documents. Specifically, they use "Inner...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2014

    Mobile Commerce: Security Challenges and Technologies

    The term e-commerce (electronic commerce) denotes business processes on the Internet, such as the buying and selling of goods. There is a distinction between B2B (Business-To-Business) and B2C (Business-To-Consumer) markets. In the first case, the business processes are carried out between businesses; in the latter case, they are carried out...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2014

    Mobile Commerce: The New Era of Shopping

    Mobile commerce (also known as mobile e-commerce or m-commerce) is a new trend for online shopping that uses wireless devices such as mobile phones for online transactions including online shopping, bill payments etc. As the mobile developers are releasing interesting and useful apps every day, the use of mobile phones...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2014

    A Study of Historical Perspective and Practical Guidelines for Supply Chain Management

    Interest in supply chain management has steadily increased since the 1980s when firms saw the benefits of collaborative relationships within and beyond their own organization. Firms are finding that they can no longer compete effectively in isolation of their suppliers or other entities in the supply chain. A number of...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Design and Implementation of Low-Power and Area-Efficient for Carry Select Adder (CSLA)

    Design of area- and power-efficient high-speed systems are one of the most substantial areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to propagate a carry through the adder. The sum for each bit position in an elementary adder...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Implementation and use of Data Structures in Linux

    In this paper, the authors describe the abstract or conceptual software architecture of the Linux kernel. This level of architecture is concerned with the large-scale subsystems within the kernel, but not with particular procedures or variables. One of the purposes of such an abstract architecture is to form a mental...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Load Balancing using Genetic Algorithm in Mobile Cloud Computing

    Cloud computing has been involved at a very large scale in the outsourcing of computing resources of IT infrastructures, service platforms and software in the last few years. Mobile cloud computing is a fast developing technology today that faces the dominant problem of load imbalance due to the high demand...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Design and Simulation of Hybrid Modified Viterbi Decoder for Fast Communication

    Very Large Scale Integration (VLSI) technology highly recommends less power, less area and low delay design. For wireless communication applications low power encoder and decoders are highly beneficial. This paper presents hybrid method Viterbi decoder which consumes very less power, area and delay compared to trace back type and register...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    High Speed Low Power Viterbi Decoder Design for TCM

    Trellis Coded Modulation (TCM) schemes are used in many bandwidth-efficient systems. Typically, a TCM system employs a high-rate convolutional code, which leads to a high complexity of the Viterbi Decoder (VD) for the TCM decoder, even if the constraint length of the convolutional code is moderate. For example, the rate-3/4...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    M-Partition Privacy Scheme to Anonymizing Set-Valued Data

    In distributed databases there is an increasing need for sharing data that contain personal information. The existing system presented collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. M-privacy guarantees that anonymized data satisfies a given privacy constraint against any group of up to m colluding...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Stabilizing the network in presence of agents using flow graph and Shapely value in B2B E-commerce

    B2B e-commerce is widely spread. One of problems is to identify the supplier who will manufacture sub product and send back to manufacturer for assembling it into a final product. After identifying the best supplier the authors want to transfer the information about the sub product to the supplier and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Packet Scheduling in Cloud by Employing Genetic Algorithm

    The problem of packet scheduling is a single-hop multichannel system, with the goal of minimizing the average message waiting time. The problem of finding a schedule with minimum message waiting time is NP-complete, by means of polynomial time reduction of the time table design problem to the authors' problem. They...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Fraud Detection using Data Mining Techniques

    Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud detection model by using this model. As e-commerce sales continue to grow, the associated...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (U.S. National Institute of Standards and Technology (NIST)). Cloud...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Efficient Resource Mapping by means of Storage Tiering using RAID in Cloud

    Recent technologies that reach end users are those which provide services for all their needs. Cloud computing is a technology where service is provided for all end user's needs and requests. As the authors move deeper into an era in which data usage and the storage capacity are increased double...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Performance Enhancement of Data Processing using Multiple Intelligent Cache in Hadoop

    Every day, the authors create 2.5 quintillion bytes of data, out of 2.5 quintillion data 90% of the data in the world today has been created in the last two years alone. This data comes from everywhere; sensors used to gather climate information, posts to social media sites, digital pictures...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Comparative Study on Context-Based Document Clustering

    Clustering is an automatic learning technique aimed at grouping a set of objects into subsets or clusters. Objects in the same cluster should be as similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in the other clusters. Document clustering has become an...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Managing Cluster-Based Trust Model for Peer to Peer Networks

    The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. Peer-to-peer network represents a large portion of internet traffic, and becomes fundamental data sources. Because of lacking the security mechanism from third-party, P2P network will face some...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Mobile Element Trajectory Control Scheme to Reduce Sensed Data Collection Delay against Obstacles

    Mobile elements usage created a new dimension to reduce and balance energy consumption in Wireless Sensor Networks (WSN). At the same point, due to the inherent and slower movement of mobile elements makes the data collection latency to become higher. Scheduling of mobile elements need to address traverse pattern through...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Document Clustering Approach Using Internal Criterion Function

    Document clustering is the act of collection of similar documents into bins. Fast and high quality document clustering is an important task in organizing information, search engine results obtaining results from user query, enhancing web crawling and information retrieval. With the large amount of data available and with a goal...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Proxy MSS based Synchronous Checkpointing Approach for Mobile Distributed Systems

    Mobile Distributed Systems (MDSs) are made up of Mobile Host (MH), Base Station (BS) and Mobile Support Station (MSS). Among which MSSs play a key role in mobile environment. This paper presents a low overhead proxy MSS based framework to handle the fault in mobile distributed systems. In the proposed...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    A Survey on Clustering Techniques and Load Balancing Algorithms

    In this paper, the authors present a detailed survey on various techniques used for cluster formation and load balancing algorithms to improve the lifetime of the WSN so that it can be extended to reasonable times. There are many reasons where energy will be drained rapidly. Some situations like improper...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Database Administration in Raspberry using A Server Machine

    Raspberry Pi is a credit-card-sized single-board computer which is invented to provide the basic features of a computer. It is built using ARM11 processor. This device does not include a built-in hard disk or solid-state drive, but uses an SD card for booting and long-term storage. This paper deals with...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Semantic Web Representation and Reasoning of Data using Ontology's

    To define what is the semantic web is very difficult as well as web itself. \"The semantic web is a mesh of information linked up in such a way as to be easily process able by machines, on a global scale.\" \"The semantic web approach develops languages for expressing information...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Cloud Storage With Improved Access Control and Assured Deletion

    Providing robust data to users is an important and difficult task for outsourced data providers. On the other hand, in some cases it is required for data to become unrecoverable in reliable manner after some time. For example, health records are required to destroy to protect patient privacy, or corporations...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Data Minining: A Path for Effective Counseling and Course Selection

    Data mining technologies are used to discover the hidden information from the varying data sets. Data mining methodologies are broadly used in various real life business applications like banking, insurance, medicine, fraud detection, product retailing, security systems etc. data mining methods are used in business process optimization and control. Data...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Text Extraction from Live Captured Image with Diversified Background using Edge Based & K-Means Clustering

    The proposed system highlights a novel approach of extracting a text from image using K-means clustering. Text extraction from image is concerned with extracting the relevant text data from a collection of images. Recent studies in the field of image processing show a great amount of interest in content retrieval...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Semantic-Based Web Mining Under the Framework of Agent

    To make automatic service discovery possible, the authors need to add semantics to the web service. A semantic-based web mining is mentioned by many people in order to improve web service levels and address the existing web services requested by the people. The backbone of this solution is clearly the...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Ontology Driven Focused Crawling of Web Documents

    In recent year dynamism of the World Wide Web (WWW), the issue of discovering relevant web pages has become an important challenge. Focused crawler aims at selectively seeking out pages that are relevant to a pre-defined set of topics. Most of the current approaches perform syntactic matching, that is, they...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Eliminating TCP Connection Failure in a Web Server Cluster

    Web server clustering is most widely used technology for large enterprise applications to host online web services. It has been widely used to improve the performance of the web servers. Moreover, as the web has become an important business service delivery infrastructure, the need for supporting TCP connection failure in...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Regression Method for Linear and Kernel Discriminant Learning

    In this paper, the authors are comparing the algorithms of Support Vector Machine (SVM) and Kernel Principal Component Analysis (KPCA) to improve the accuracy and performance of the numerical dataset. SVM fails to consider global information and has high computational complexity. Along with LDA, SVM overcomes the above disadvantages but...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Issues in Designing of Reliable Cloud Applications

    Software fault tolerance techniques prepare mechanisms to the software system to prevent system failure from fault occurring. Superfluity of resources in cloud environment makes these techniques as a good approach for developing highly reliable cloud applications. Developing a cloud application with all the critical and non critical components taking into...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Improving Security and Integrity of Data Storage in Cloud Computing by Using Homomorphic Authentication Technique

    As the authors seen that, today's generation of IT has widely use the cloud computing services, that means in future cloud computing will important part of IT enterprise. In which the application software and databases are stored at centralized large data storage. Now in cloud data center, management of data...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Security Issues and Solutions in Cloud & Grid Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost efficiency and flexibility. Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. However, despite the surge in activity...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules

    The discovery of association rules is an important task in data mining and knowledge discovery. Several algorithms have been developed for finding frequent itemsets and mining comprehensive association rules from the databases. The efficiency of these algorithms is a major issue since a long time and has captured the interest...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    An Efficient Carry Select Adder with Reduced Area and Low Power Consumption

    In VLSI system design the design of area and power efficient high speed logic systems are most essential. In digital adders, the speed of addition is limited by the time required to propagate a carry through the adder. The sum for each bit position in an elementary adder is generated...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2012

    Performance Comparison of Various Routing Protocols with Varying Number of Source Nodes

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless network that can exchange information dynamically, instead of using a central base station (access point) to which all computers must communicate. The routing protocols i.e. proactive, reactive and hybrid in an ad hoc network should be able to deal...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2012

    Software Metrics and Maintainability Relationship with CK Matrix

    This paper presents the relation between software metrics and maintainability and the metrics which characterise the ease of the maintenance process when applied to a specific product. The criteria of maintainability and the methods through which these criteria are understood and interpreted by software programmers are analyzed. Surveys and examples...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2012

    Classification Algorithms for Data Mining: A Survey

    Data Mining or Knowledge Discovery is needed to make sense and use of data. Knowledge Discovery in Data is the non-trivial process of identifying valid, novel, potentially useful and ultimately understandable patterns in data. Data mining consists of more than collection and managing data; it also includes analysis and prediction....

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2012

    Design of an Effective Substitution Cipher Algorithm for Information Security Using Fuzzy Logic

    The combination of cryptography and fuzzy logic has emerged as a promising component of information security. Acknowledge based model is introduced in the information security. This method includes a substitution cipher known as polyalphabetic cipher. The information that is trying to send is including the text that is alphabets. The...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2012

    Beyond 3G: 4G Mobile Communication

    Based on the study, 4G mobile technologies is in a determining and Standardization stage. Since 4G is still in the cloud of the sensible standards creation, ITU and IEEE form several task forces to work on the possible completion for the 4G mobile standards as well. 3GPP LTE is an...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2012

    An Efficient Probability Based Broadcast Scheme for AODV Mobile Ad-Hoc Network Protocol

    Many routing protocols uses broadcasting technique to distribute control information, that send the control information from an origin node to all other nodes and leads to flooding. It initiates high number of unnecessary packet rebroadcasts, causing contention and packet collision. The basis of this paper is to use Probabilistic scheme...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2012

    A Proposed Efficient Architecture for OFDM MIMO Systems Using SVD

    This paper presents a technique for Antenna beam forming in high data rate OFDM-MIMO systems. The technique makes use of the Singular Value Decomposition (SVD) algorithm for matrix decomposition using Givens Rotation. In this paper a hardware oriented two-step diagonalization SVD scheme is derived from simple two-sided unitary transformations developed...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2012

    Transmission of Digital Information Using OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) as needed for the wireless communication system is proven. OFDM has already been applied in the wireless LAN and it is also used with the Multiple Input Multiple Output (MIMO) technique to improve the transmission performance in the multi-fading channel. There is now an increasing...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2012

    Design of Network Forensic System Based on Honeynet

    Network forensics deals with the capturing and analysis of the trace and logs of network intrusions from the multiple systems for providing the information to characterize intrusion or features. This paper demonstrates the internal working of implementation of server honeypot technology and network forensics. Honeypot based system is used to...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2012

    A Priority Based Round Robin CPU Scheduling Algorithm for Real Time Systems

    This paper is to develop a new approach for round robin CPU scheduling algorithm which improves the performance of CPU in real time operating system. The proposed Priority based Round-Robin CPU Scheduling algorithm is based on the integration of round-robin and priority scheduling algorithm. It retains the advantage of round...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2012

    Strengthening the Encryption Mechanism in WEP Protocol

    Wi-Fi is serving as a standard for broadband connectivity in homes, offices, and at many public locations. WEP is a security protocol for WLANs designed to give security equivalent to that provided on Wired Networks. It is a framework that uses RC4 encryption algorithm. Many flaws had been discovered in...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2012

    Quality of Service in MANET

    The current Internet architecture supports best-effort data delivery by default, which has provided satisfactory services for various applications, such as the email and file transfer, to a great extent. On the other hand, the increase in real-time multimedia applications such as Voice over IP, audio and video streaming in the...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    A Novel Approach for Re-Narrating Web Pages in Multicasting Networks

    Designing for Inclusion is the slogan that captures the world-wide sort to make the web a valuable resource for all 7.2 billion humans, "Whatever of their abilities, age, economic situation, education, geographic location, languages". The authors present the motivation, architecture and prototype implementation of their work. Statistics is defined as...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Application Study on Cloud Computing Based Virtual Campus

    Cloud computing is growing rapidly, with applications in almost any area, including education and it's becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet on a flexible infrastructure. Cloud-based applications offer better alternative to academic...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2012

    Implementing OSPF Protocol in Cisco 2800 Series Router

    The routing information protocol is a distance vector protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2012

    Pattern Analysis of Rectangular Microstrip Antenna for 3G Frequency

    In high performance aircraft, spacecraft & missile applications, where size, weight, performance, ease of installation & aerodynamic profile are constraints, low profile antenna are required. Commercial applications such as wireless & mobile radio communication also have same specifications. To meet these requirements, MSA is used. These antennas are low profile,...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Interpretation of MPLS Enabled Network With QOS Model

    This paper presents the interpretation of simple IP network, MPLS enabled network, MPLS VPN network, MPLS VPN with QoS enabled network in the form of Delay, Jitter and Packet loss. The analysis shows that the network with simple IP network will have more delay, jitter and packet loss. Without QOS...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Demonstration of Hybrid Mechanism for 10- GPON Using Artificial Neural Network

    This research has been conducted to develop a mechanism to reduce power consumption during periods of various link utilization cases which helps to maintain the link status without quality degradation, by maintaining vital functions of network in order to support residual network traffic. This has been done by forming different...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    An Overview of Network of Data Aggregators by Query Planning for Continuous Aggregation Queries

    Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some aggregation function over distributed data items, for example, to know value of portfolio for a client; or the AVG of...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Evolution of 4G Communication Network Over 3G: Increasing Wireless Network Speed by Coded TCP

    Wireless network is an emerging technology that allows user to access information and services electronically, regardless of their geographical position. Wireless carriers try to up sell customers on the new, improved technology; 3G provides greater range and therefore greater reliability for users. Currently only certain cities, states and carriers offer...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Overview of Different Routing Techniques for Wireless Multimedia Sensor Network

    The area of Wireless Multimedia Sensor Networks (WMSNs) is one of the emerging and fast growing fields in the scientific world. This has brought about developing low cost, low-power and multi-function multimedia sensor nodes networks of wirelessly interconnected that are able to ubiquitously retrieve multimedia content such as video and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    An Optimal Key Management for MANET

    Mobile Ad hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Due to the nature of MANETs to design and maintaining security is challenging task for researcher in an...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Ultra Wide and Communication: Practical Applications and Future Aspects

    Wireless communication technology has given the user convenient ways to transfer information from one point to other anywhere in the world. The recent popularity of wireless networks results in many additional requirements of the system, especially the need of high data rates, demand for high quality multimedia services and the...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Efficient Security Architecture in WMN for Finding Anonymity and Traceability

    Wireless Mesh Network (WMN) is a promising technology and is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users. The nodes in the WMNs can configure automatically and re-configure dynamically to maintain the mesh connectivity....

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Secured and Efficient Authentication Scheme for Mobile Cloud

    Modern mobile architectures are architectures that support mobile device applications connected to decentralized infrastructure. Modern mobile architectures combine mobile technology and cloud computing. The biggest challenge in both cloud and mobile technologies right now is security; combine the two technologies and the authors have a security wormhole. In this paper,...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    UID Registration Via Cloud

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Trust Based Access Control for Social Networks (STBAC)

    The security of the user's personal information and sharing that information in the digital world has always been a major challenge for the ever-growing social networks. This paper proposes a trust access control called trust based access control for social network, or STBAC, which allows users to share data among...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Remote Desktop on Mobile

    In this paper, the authors will see how the remote Desktop with static IP can be accessed using Android based mobile phones, to develop this application they used Virtual Network Computing architecture (VNC). And for this the VNC Server must be installed in a person's computer which is connected via...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    High Speed Booth Encoded Multiplier by Minimising the Computation Time

    Two's complement multipliers are used in most of the applications. The computation time is important in two's complement multiplier. The computation time gets decreased by reducing the number of gates. The reduction can be achieved by modified booth encoded multiplier technique. Two's complement multipliers are used in wide range of...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    MANET-Evaluation of DSDV, AODV and DSR Routing Protocol

    A mobile ad-hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. It is an autonomous system in which mobile hosts connected by wireless links are free to move randomly and often act as routers at the...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Digital Video Broadcasting-Satellite to Handheld Services

    Universal education is the dream of India and more so with the passing of 'Right to Education bill' in the country. Looking to the diverse culture and vividity in the country it is not possible to take education to the last mile in the country with prevailing chalk-blackboard technique. An...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Text Extraction from Live Captured Image with Diversified Background using Edge Based & K-Means Clustering

    The proposed system highlights a novel approach of extracting a text from image using K-means clustering. Text extraction from image is concerned with extracting the relevant text data from a collection of images. Recent studies in the field of image processing show a great amount of interest in content retrieval...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Mobile Element Trajectory Control Scheme to Reduce Sensed Data Collection Delay against Obstacles

    Mobile elements usage created a new dimension to reduce and balance energy consumption in Wireless Sensor Networks (WSN). At the same point, due to the inherent and slower movement of mobile elements makes the data collection latency to become higher. Scheduling of mobile elements need to address traverse pattern through...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Document Clustering Approach Using Internal Criterion Function

    Document clustering is the act of collection of similar documents into bins. Fast and high quality document clustering is an important task in organizing information, search engine results obtaining results from user query, enhancing web crawling and information retrieval. With the large amount of data available and with a goal...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Proxy MSS based Synchronous Checkpointing Approach for Mobile Distributed Systems

    Mobile Distributed Systems (MDSs) are made up of Mobile Host (MH), Base Station (BS) and Mobile Support Station (MSS). Among which MSSs play a key role in mobile environment. This paper presents a low overhead proxy MSS based framework to handle the fault in mobile distributed systems. In the proposed...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2013

    FPGA Implementation of Fast Error Correction and Detection for Memories

    The higher integration technologies made it possible for accessing any device so fast that within a fraction of seconds the job can be performed. Now-a-days fast memories exists everywhere during accessing if any error happens that has to be detected and corrected within a fraction of microseconds that is made...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2013

    A Survey of Classification Techniques in Data Mining

    Data mining involves the use of sophisticated data analysis tools to discover previously unknown, valid patterns and relationships in large data set. These tools can include statistical models, mathematical algorithm and machine learning methods. This paper provides a survey of numerous data mining classification techniques for innovative database applications. Classification...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2013

    Effective and Efficient Data Retrieval System

    The authors consider the problem of parameter estimation in statistical models in the case where data are uncertain and represented as belief functions. The proposed method is based on the maximization of a generalized likelihood criterion, which can be interpreted as a degree of agreement between the statistical model and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2013

    Two-Step Approach for Acquiring Semantic Relations from Textual Web Content

    Semantic, is one of the most important & wide spread category of Natural Language Processing, related to study of meanings of a particular word in different context. With a vast growth of a World Wide Web (WWW), the authors face an increasing amount of information resources. Mining semantic relations from...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2013

    Performance Analysis of Classification Methods for Opinion Mining

    Opinion mining extracts opinions expressed by a specified target from a set of documents. Opinion mining determines sentiment orientation positive, negative, or neutral of a (short) text and is a text understanding technology assisting people locate relevant opinions in a review collection of large volumes, quickly. A search engine based...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)