International Journal of Innovations in Engineering and Technology (IJIET)

Displaying 1-40 of 122 results

  • White Papers // Apr 2015

    An Analysis of Cloud Computing and its Security Issues

    Cloud computing is a versatile technology for providing computing services by the internet on demand and pay per use access to a pool of shared resources like networks, servers, services, storage and applications, without acquiring physically. Cloud computing begins from the development of parallel computing, distributed computing, shared computing and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    Survey of Algorithm for Software Components Reusability Using Clustering and Neural Network

    Information retrieval systems are the systems that are combination of the tools and techniques which provide relevant information to the users regarding their query which is useful to the user. Information system's goal is to provide information that matches to their input query. Information system may work on the ranking...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    A Survey of Text Mining Concepts

    The explosive growth of databases in almost every area of human activity has created a great demand for new, powerful tools for turning data into useful knowledge. Text mining has become an important research area. Text mining is the discovery by computer of new, previously unknown information, by automatically extracting...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    Data Mining System, Functionalities and Applications: A Radical Review

    Data mining involves the use of sophisticated data analysis tools to discover previously unknown valid patterns and relationships in large data set. Data mining is the process of locating potentially practical, interesting and previously unknown patterns from a big volume of data. It plays an important role in result orientation....

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    Design and Development of Algorithm for Software Components Retrieval Using Clustering and Support Vector Machine

    In the last decades, for retrieval of software components, various models come under existence. Component based software development is important area in software development. In this paper, the authors describe various algorithms and techniques for efficiently retrieval of components from the component repository. They discuss XNOR similarity function, clustering algorithms...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    Improvement of Power Quality by using Active Filter based on Vectorial Power Theory Control Strategy on the MATLAB-Simulink Platform

    Harmonic current drawn from a supply by the nonlinear load results in the distortion of the supply voltage waveform. Both distorted current and voltage may cause conductors to overheat and may reduce the efficiency and life expectancy of the equipment. So that reduction of harmonics is very important in day...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    Effective Battery Management in FPGA based DC SPV System through Closed Loop Bi- Directional DC-DC Converter for Energy Storage

    In this present scenario of power generation, solar PV systems became very popular to generate electrical energy for remote locations and no grid interaction. For this type of systems, battery storage is must to store the electrical energy and stored electrical energy is used to feed the loads during night...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    Implementation of FPGA based Hybrid Adder to Design Fused Add Multiply Operator using Modified Booth Recoder

    DSP applications carry out a large number of arithmetic operations. It is based on add-multiply operator. The conventional method of add-multiply operator performed separately. So it requires more power, area and hardware complexity. For an existing system recoding technique were used to implement the direct recoding of the sum of...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    4D Modeling of Multi Storied Building using GIS

    The conventional method of project scheduling and planning using primavera and AutoCAD does not provide the complete progress of the work in synchronized manner in a single platform. This paper presents new system of planning and scheduling by creating 4D model of building using GIS software. The methodology of 4D...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2015

    High Performance 128 Bits Multiplexer Based MBE Multiplier for Signed-Unsigned Number Operating at 1GHz

    Modern supercomputers and vector processors require dedicated and high performance 128 bits multipliers for integer number multiplication of signed and unsigned operands. Since, multiplication hardware is the most time critical, maximum area and power consuming operation, the specialized design of multipliers for least delay, minimum in area and lowest in...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    An Energy Storage using Cascaded Multilevel Inverters by PMSM with Autonomous Power Regernarative Control System

    For the higher half of the twentieth century electrical(EVs) are through of designed developed to suit a spread of application from construct cars to advanced military vehicles. The energy storage devices are better in a motor drive system. The power distribution strategy for energy source, and energy storage, electric motor...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Design of SPI Flash Controller for Spartan6 FPGA

    In the world of communication protocols, SPI is often considered as "Little" communication protocol compared to Ethernet, USB and others. Ethernet and USB are meant for "Outside the box communications" and data exchanges between whole systems. While SPI, as well as I2C are well suited for communications between integrated circuits...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Recent Patterns and Trends of Data Mining for Web Management

    Data accept become an analytical ability in abounding organizations, and therefore, able admission to data, administration of data, extracting advice from the data and authoritative use of the advice has become a burning need. As a result, amalgam and extracting advice from the databases in the anatomy of patterns and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    An Efficient Design of Sum-Modified Booth Recoder for Fused Add-Multiply Operator

    This proposed method is purely based on modified recoding techniques for booth recoding in DSP application. The proposed method implements a newly designed recoding technique for modified booth recoding. This paper implements the direct recoding of the multiplier in its Sum Modified Booth (SMB) form. The proposed SMB algorithm is...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Multi-keyword Ranked Search over Encrypted Cloud Data

    Multi-keyword Ranked Search over Encrypted cloud data (MRSE) while preserving strict system-wise privacy in cloud computing paradigm. Among various multi-keyword semantics, the authors choose the efficient principle of "Coordinate matching", i.e., as many matches as possible, to capture the similarity between search query and data documents. Specifically, they use "Inner...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Optimized Virtual Resource Deployment using CloudSim

    Cloud computing provides reliable, secure, fault-tolerant, sustainable and scalable infrastructures services to customer. It is becoming the default mode of services to the small and large organization. Deployment of resources to the cloud environment is a challenging research area. A number of research efforts are published to optimize the deployment...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2014

    Mobile Commerce: Security Challenges and Technologies

    The term e-commerce (electronic commerce) denotes business processes on the Internet, such as the buying and selling of goods. There is a distinction between B2B (Business-To-Business) and B2C (Business-To-Consumer) markets. In the first case, the business processes are carried out between businesses; in the latter case, they are carried out...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2014

    Mobile Commerce: The New Era of Shopping

    Mobile commerce (also known as mobile e-commerce or m-commerce) is a new trend for online shopping that uses wireless devices such as mobile phones for online transactions including online shopping, bill payments etc. As the mobile developers are releasing interesting and useful apps every day, the use of mobile phones...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2014

    Sniffeer Technology for Mobiles

    The cell phone though the mobile communication system is proved to be an advantageous method of communication over wired communication, there is another problem that is the mobile phones get lost or get misplaced. The losses are increasing day-by-day and there has been very little effort that has been done...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2014

    A Study of Historical Perspective and Practical Guidelines for Supply Chain Management

    Interest in supply chain management has steadily increased since the 1980s when firms saw the benefits of collaborative relationships within and beyond their own organization. Firms are finding that they can no longer compete effectively in isolation of their suppliers or other entities in the supply chain. A number of...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Design and Implementation of Low-Power and Area-Efficient for Carry Select Adder (CSLA)

    Design of area- and power-efficient high-speed systems are one of the most substantial areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to propagate a carry through the adder. The sum for each bit position in an elementary adder...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Implementation and use of Data Structures in Linux

    In this paper, the authors describe the abstract or conceptual software architecture of the Linux kernel. This level of architecture is concerned with the large-scale subsystems within the kernel, but not with particular procedures or variables. One of the purposes of such an abstract architecture is to form a mental...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Load Balancing using Genetic Algorithm in Mobile Cloud Computing

    Cloud computing has been involved at a very large scale in the outsourcing of computing resources of IT infrastructures, service platforms and software in the last few years. Mobile cloud computing is a fast developing technology today that faces the dominant problem of load imbalance due to the high demand...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Design and Simulation of Hybrid Modified Viterbi Decoder for Fast Communication

    Very Large Scale Integration (VLSI) technology highly recommends less power, less area and low delay design. For wireless communication applications low power encoder and decoders are highly beneficial. This paper presents hybrid method Viterbi decoder which consumes very less power, area and delay compared to trace back type and register...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    M-Partition Privacy Scheme to Anonymizing Set-Valued Data

    In distributed databases there is an increasing need for sharing data that contain personal information. The existing system presented collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. M-privacy guarantees that anonymized data satisfies a given privacy constraint against any group of up to m colluding...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Stabilizing the network in presence of agents using flow graph and Shapely value in B2B E-commerce

    B2B e-commerce is widely spread. One of problems is to identify the supplier who will manufacture sub product and send back to manufacturer for assembling it into a final product. After identifying the best supplier the authors want to transfer the information about the sub product to the supplier and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Packet Scheduling in Cloud by Employing Genetic Algorithm

    The problem of packet scheduling is a single-hop multichannel system, with the goal of minimizing the average message waiting time. The problem of finding a schedule with minimum message waiting time is NP-complete, by means of polynomial time reduction of the time table design problem to the authors' problem. They...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Fraud Detection using Data Mining Techniques

    Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud detection model by using this model. As e-commerce sales continue to grow, the associated...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (U.S. National Institute of Standards and Technology (NIST)). Cloud...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Efficient Resource Mapping by means of Storage Tiering using RAID in Cloud

    Recent technologies that reach end users are those which provide services for all their needs. Cloud computing is a technology where service is provided for all end user's needs and requests. As the authors move deeper into an era in which data usage and the storage capacity are increased double...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Performance Enhancement of Data Processing using Multiple Intelligent Cache in Hadoop

    Every day, the authors create 2.5 quintillion bytes of data, out of 2.5 quintillion data 90% of the data in the world today has been created in the last two years alone. This data comes from everywhere; sensors used to gather climate information, posts to social media sites, digital pictures...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Comparative Study on Context-Based Document Clustering

    Clustering is an automatic learning technique aimed at grouping a set of objects into subsets or clusters. Objects in the same cluster should be as similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in the other clusters. Document clustering has become an...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Managing Cluster-Based Trust Model for Peer to Peer Networks

    The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. Peer-to-peer network represents a large portion of internet traffic, and becomes fundamental data sources. Because of lacking the security mechanism from third-party, P2P network will face some...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    High Speed Low Power Viterbi Decoder Design for TCM

    Trellis Coded Modulation (TCM) schemes are used in many bandwidth-efficient systems. Typically, a TCM system employs a high-rate convolutional code, which leads to a high complexity of the Viterbi Decoder (VD) for the TCM decoder, even if the constraint length of the convolutional code is moderate. For example, the rate-3/4...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Mobile Element Trajectory Control Scheme to Reduce Sensed Data Collection Delay against Obstacles

    Mobile elements usage created a new dimension to reduce and balance energy consumption in Wireless Sensor Networks (WSN). At the same point, due to the inherent and slower movement of mobile elements makes the data collection latency to become higher. Scheduling of mobile elements need to address traverse pattern through...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Document Clustering Approach Using Internal Criterion Function

    Document clustering is the act of collection of similar documents into bins. Fast and high quality document clustering is an important task in organizing information, search engine results obtaining results from user query, enhancing web crawling and information retrieval. With the large amount of data available and with a goal...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Proxy MSS based Synchronous Checkpointing Approach for Mobile Distributed Systems

    Mobile Distributed Systems (MDSs) are made up of Mobile Host (MH), Base Station (BS) and Mobile Support Station (MSS). Among which MSSs play a key role in mobile environment. This paper presents a low overhead proxy MSS based framework to handle the fault in mobile distributed systems. In the proposed...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    A Survey on Clustering Techniques and Load Balancing Algorithms

    In this paper, the authors present a detailed survey on various techniques used for cluster formation and load balancing algorithms to improve the lifetime of the WSN so that it can be extended to reasonable times. There are many reasons where energy will be drained rapidly. Some situations like improper...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    A Novel Approach to Surface Refraction Effects on GPS Radio Occultation Refractivity in Marine Boundary Layer

    GPS (Global Positioning System) radio occultation has proved to be a powerful tool for remotely sensing the earth's neutral atmosphere and ionosphere. In this paper, the authors propose a novel approach to retrieving marine troposphere profiles based on single ground-based GPS occultation observations. A new retrieval method uses the data...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Text Extraction from Live Captured Image with Diversified Background using Edge Based & K-Means Clustering

    The proposed system highlights a novel approach of extracting a text from image using K-means clustering. Text extraction from image is concerned with extracting the relevant text data from a collection of images. Recent studies in the field of image processing show a great amount of interest in content retrieval...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    M-Partition Privacy Scheme to Anonymizing Set-Valued Data

    In distributed databases there is an increasing need for sharing data that contain personal information. The existing system presented collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. M-privacy guarantees that anonymized data satisfies a given privacy constraint against any group of up to m colluding...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Stabilizing the network in presence of agents using flow graph and Shapely value in B2B E-commerce

    B2B e-commerce is widely spread. One of problems is to identify the supplier who will manufacture sub product and send back to manufacturer for assembling it into a final product. After identifying the best supplier the authors want to transfer the information about the sub product to the supplier and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Packet Scheduling in Cloud by Employing Genetic Algorithm

    The problem of packet scheduling is a single-hop multichannel system, with the goal of minimizing the average message waiting time. The problem of finding a schedule with minimum message waiting time is NP-complete, by means of polynomial time reduction of the time table design problem to the authors' problem. They...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Fraud Detection using Data Mining Techniques

    Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud detection model by using this model. As e-commerce sales continue to grow, the associated...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    A Survey on Clustering Techniques and Load Balancing Algorithms

    In this paper, the authors present a detailed survey on various techniques used for cluster formation and load balancing algorithms to improve the lifetime of the WSN so that it can be extended to reasonable times. There are many reasons where energy will be drained rapidly. Some situations like improper...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (U.S. National Institute of Standards and Technology (NIST)). Cloud...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Efficient Resource Mapping by means of Storage Tiering using RAID in Cloud

    Recent technologies that reach end users are those which provide services for all their needs. Cloud computing is a technology where service is provided for all end user's needs and requests. As the authors move deeper into an era in which data usage and the storage capacity are increased double...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Performance Enhancement of Data Processing using Multiple Intelligent Cache in Hadoop

    Every day, the authors create 2.5 quintillion bytes of data, out of 2.5 quintillion data 90% of the data in the world today has been created in the last two years alone. This data comes from everywhere; sensors used to gather climate information, posts to social media sites, digital pictures...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Comparative Study on Context-Based Document Clustering

    Clustering is an automatic learning technique aimed at grouping a set of objects into subsets or clusters. Objects in the same cluster should be as similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in the other clusters. Document clustering has become an...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Managing Cluster-Based Trust Model for Peer to Peer Networks

    The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. Peer-to-peer network represents a large portion of internet traffic, and becomes fundamental data sources. Because of lacking the security mechanism from third-party, P2P network will face some...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Security Issues and Solutions in Cloud & Grid Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost efficiency and flexibility. Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. However, despite the surge in activity...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Semantic-Based Web Mining Under the Framework of Agent

    To make automatic service discovery possible, the authors need to add semantics to the web service. A semantic-based web mining is mentioned by many people in order to improve web service levels and address the existing web services requested by the people. The backbone of this solution is clearly the...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules

    The discovery of association rules is an important task in data mining and knowledge discovery. Several algorithms have been developed for finding frequent itemsets and mining comprehensive association rules from the databases. The efficiency of these algorithms is a major issue since a long time and has captured the interest...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    Sentiment Classification Approaches - A Review

    With the outbreak of web 2.0, several types of social media such as blogs, discussion forums, review websites and community websites that can be useful for determine the public; sentiment and opinion, towards products and services. Recent surveys impart that online reviews have greater economic impact compared to claric media....

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    Decision Support in Customer Relationship Management Using Data Mining Techniques

    With a unbridled increase in international and domestic forms of business, Customer Relationship Management (CRM) has become one of the matters of concern to the enterprise and the entrepreneurs. CRM takes customer as the center and it enchants a new life to the organization system and optimizes its business process...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    Infrastructure Oriented Hybrid Cloud Architecture

    Today cloud computing has become a key IT buzzword and mega trend, not a hype. Cloud computing is in its infancy in terms of market adoption. In this paper cloud computing, its adoption issues, security issues has been discussed. A Infrastructure oriented hybrid cloud architecture has been proposed. Adoption of...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    M-Learning Through Educloud Computing in Campus

    EduCloud computing is the new technology that has various advantages and it is an adoptable technology in this present scenario. The main advantage of the EduCloud computing is that this technology reduces the cost effectiveness for the implementation of the Hardware, software and License for all. This is the better...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    Induction of Fuzzy Pattern System

    Machine learning, data mining, and several related research areas are concerned with methods for the automated induction of models and the extraction of patterns from realistic data. Fuzzy classification is one of the important applications in fuzzy set where values range between 0 and 1. Main objectives of the fuzzy...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    Fuzzy Markov Model for Arrival Process in Web Server Queues

    The World Wide Web (WWW) has become one of the most popular and important applications on the Internet. The need for communication networks capable of providing an ever increasing spectrum of services calls for efficient techniques for the analysis, monitoring, evaluation and design of the networks. Analysis are perpetually faced...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Oct 2013

    Scheduling Algorithm Design for Grid Computing

    A grid computer is multiple numbers of same classes of computers clustered together. A grid computer is connected through a super fast network. Geographically distributed resources cooperate to solve big problems, is called grid computing. Grid computing, is distributed computing model that is provides easy access to heterogeneous resources that...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2013

    Compression Cluster Based Efficient K-Medoid Algorithm to Increase Scalability

    The experiments are pursued on both synthetic in data sets are real. The synthetic data sets which the user used for their experiments were generated using the procedure. They refer to readers to it for more details to the generation of large data sets. They report experimental results on two...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    Design and Simulation of Hybrid Modified Viterbi Decoder for Fast Communication

    Very Large Scale Integration (VLSI) technology highly recommends less power, less area and low delay design. For wireless communication applications low power encoder and decoders are highly beneficial. This paper presents hybrid method Viterbi decoder which consumes very less power, area and delay compared to trace back type and register...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Aug 2014

    Design and Implementation of Low-Power and Area-Efficient for Carry Select Adder (CSLA)

    Design of area- and power-efficient high-speed systems are one of the most substantial areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to propagate a carry through the adder. The sum for each bit position in an elementary adder...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2013

    Power Aware & High Speed Booth Multiplier Based on Adiabatic Logic

    Multiplier is one of the major arithmetic operations carried out in DSP applications. This paper presents a modified booth multiplier based on adiabatic logic. It is composed of booth encoder, multiplier containing partial product generators and 1-bit (half and full) adders and final adder. Booth multiplication allows for smaller, faster...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Mar 2013

    Implementation of CNTFET Based 6-T SRAM Cell in Spice3

    In this paper, the authors treat the Carbon Nanotube Field Effect Transistors (CNFETs) in terms of new development as a possible future basic element for beyond CMOS technology used in Ultra High Scale Integration (ULSI) with their excellent current capabilities, ballistic transport operation and superior thermal conductivities. They have used...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2013

    Power Estimation in 6T SRAM Using Recovery Boosting

    Static RAM cells are widely used for industrial and scientific subsystems, automotive electronics, etc. The power consumption of SRAM values depend on how frequently it is accessed. It can be power-hungry as dynamic RAM, when used at high frequencies. Integrated circuits consume higher watts at full bandwidth. In non-volatile SRAM...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Design of SPI Flash Controller for Spartan6 FPGA

    In the world of communication protocols, SPI is often considered as "Little" communication protocol compared to Ethernet, USB and others. Ethernet and USB are meant for "Outside the box communications" and data exchanges between whole systems. While SPI, as well as I2C are well suited for communications between integrated circuits...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    Recent Patterns and Trends of Data Mining for Web Management

    Data accept become an analytical ability in abounding organizations, and therefore, able admission to data, administration of data, extracting advice from the data and authoritative use of the advice has become a burning need. As a result, amalgam and extracting advice from the databases in the anatomy of patterns and...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    An Efficient Design of Sum-Modified Booth Recoder for Fused Add-Multiply Operator

    This proposed method is purely based on modified recoding techniques for booth recoding in DSP application. The proposed method implements a newly designed recoding technique for modified booth recoding. This paper implements the direct recoding of the multiplier in its Sum Modified Booth (SMB) form. The proposed SMB algorithm is...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Jun 2014

    High Speed Low Power Viterbi Decoder Design for TCM

    Trellis Coded Modulation (TCM) schemes are used in many bandwidth-efficient systems. Typically, a TCM system employs a high-rate convolutional code, which leads to a high complexity of the Viterbi Decoder (VD) for the TCM decoder, even if the constraint length of the convolutional code is moderate. For example, the rate-3/4...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2015

    An Energy Storage using Cascaded Multilevel Inverters by PMSM with Autonomous Power Regernarative Control System

    For the higher half of the twentieth century electrical(EVs) are through of designed developed to suit a spread of application from construct cars to advanced military vehicles. The energy storage devices are better in a motor drive system. The power distribution strategy for energy source, and energy storage, electric motor...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Text Extraction from Live Captured Image with Diversified Background using Edge Based & K-Means Clustering

    The proposed system highlights a novel approach of extracting a text from image using K-means clustering. Text extraction from image is concerned with extracting the relevant text data from a collection of images. Recent studies in the field of image processing show a great amount of interest in content retrieval...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Mobile Element Trajectory Control Scheme to Reduce Sensed Data Collection Delay against Obstacles

    Mobile elements usage created a new dimension to reduce and balance energy consumption in Wireless Sensor Networks (WSN). At the same point, due to the inherent and slower movement of mobile elements makes the data collection latency to become higher. Scheduling of mobile elements need to address traverse pattern through...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Document Clustering Approach Using Internal Criterion Function

    Document clustering is the act of collection of similar documents into bins. Fast and high quality document clustering is an important task in organizing information, search engine results obtaining results from user query, enhancing web crawling and information retrieval. With the large amount of data available and with a goal...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Apr 2014

    Proxy MSS based Synchronous Checkpointing Approach for Mobile Distributed Systems

    Mobile Distributed Systems (MDSs) are made up of Mobile Host (MH), Base Station (BS) and Mobile Support Station (MSS). Among which MSSs play a key role in mobile environment. This paper presents a low overhead proxy MSS based framework to handle the fault in mobile distributed systems. In the proposed...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Database Administration in Raspberry using A Server Machine

    Raspberry Pi is a credit-card-sized single-board computer which is invented to provide the basic features of a computer. It is built using ARM11 processor. This device does not include a built-in hard disk or solid-state drive, but uses an SD card for booting and long-term storage. This paper deals with...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Semantic Web Representation and Reasoning of Data using Ontology's

    To define what is the semantic web is very difficult as well as web itself. \"The semantic web is a mesh of information linked up in such a way as to be easily process able by machines, on a global scale.\" \"The semantic web approach develops languages for expressing information...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Cloud Storage With Improved Access Control and Assured Deletion

    Providing robust data to users is an important and difficult task for outsourced data providers. On the other hand, in some cases it is required for data to become unrecoverable in reliable manner after some time. For example, health records are required to destroy to protect patient privacy, or corporations...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Feb 2014

    Data Minining: A Path for Effective Counseling and Course Selection

    Data mining technologies are used to discover the hidden information from the varying data sets. Data mining methodologies are broadly used in various real life business applications like banking, insurance, medicine, fraud detection, product retailing, security systems etc. data mining methods are used in business process optimization and control. Data...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)

  • White Papers // Dec 2013

    Ontology Driven Focused Crawling of Web Documents

    In recent year dynamism of the World Wide Web (WWW), the issue of discovering relevant web pages has become an important challenge. Focused crawler aims at selectively seeking out pages that are relevant to a pre-defined set of topics. Most of the current approaches perform syntactic matching, that is, they...

    Provided By International Journal of Innovations in Engineering and Technology (IJIET)