International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

Displaying 1-39 of 39 results

  • White Papers // Sep 2014

    Adaptive K-Means Clustering Techniques For Data Clustering

    K-means is a rather simple but well known algorithm for grouping objects, clustering. In the presented paper, a modified k-means clustering is proposed. It adapts itself according to the image based on color based clustering. The no. of clusters using the color features are computed based on histogram analysis in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Two Stage Batch Arrival Queue with Compulsory Server Vacation and Second Optional Repair

    In this paper, the authors deal with a single server batch arrival queue, two stages of heterogeneous service with different (arbitrary) service time distribution subject to random breakdowns followed by a repair and compulsory server vacations with general (arbitrary) vacation periods. After first stage service the server must provide second...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Audio Type Identification Using EEMD: A Noise Assisted Data Analysis Method

    Audio classification is a process of assigning particular class to an audio signal. Classifying the audio signal has many applications in the field of digital library, automatic organization of databases etc. In the last several years efforts have been made to develop different methods to extract information from audio signals,...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Multiband and Compact Fractal Antenna for Wireless Communication

    Antennas with low profile, compact size, multiband are in great insist in modern telecommunication system. Fractal antennas are simple, light weight and compact in size. Sierpinski carpet geometry based rectangular patch fractal antenna is described in this paper. Multiband antenna offers multiple telecommunication services in to single device. This leads...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    IPv6 Based Mobile Cloud Computing to Compact with Key Dilemma

    Mobile cloud computing is the combination of cloud computing and mobile networks to bring benefits for mobile users, network operators, as well as cloud computing providers. A mobile cloud approach enables developers to build applications designed specifically for mobile users without being bound by the mobile operating system and the...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    FPGA Implementation of A Pipelined MIPS Soft Core Processor

    A soft-core processor is a model of Hardware Description Language (HDL) of a specific Central Processing Unit (CPU) that can be customized for a given application and synthesized for an ASIC or FPGA target. Usually they contain embedded processors that are often in the form of soft-core processors that execute...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Design and Implementation of EPC Gen2 Using FPGA

    Electronic product code or EPC global class-I Generation-I and Generation-II are popular and globally accepted standard specification which enables the use of password protection for accessing the data stored in the memory of a RFID tag. Use of password gives one of the ultimate securities for the RFID system but...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory

    In today's world, more or less, every activity belongs to internet. The increase of e-commerce has leads many businesses to carry out the most of their day-to-day business online transaction on data. As a result of the popularity of the web, providers of web sites and storage space providers want...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Design of Stream Cipher for Encryption of Data Using Cellular Automata

    Pseudo-Random Number Generators (PRNGs) are a key component of stream ciphers used for encryption purposes. While Non linear Feedback Shift Registers (NFSRs) combined with cellular automata has been utilized for PRNGs, the use of Cellular Automata (CA) is another viable option. This paper explores the combination of NFSRs and CA...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    A Single-Phase Ac-Dc Converter with Improved Efficiency Using Atmega8 Microcontroller

    In this paper the authors proposed an AC-DC semi-bridgeless boost converter with 180 degree phase shift and less number of switches. The simplified current sensing method is applied in the converter to predict the inductor. The proposed converter has the advantageous features such as high efficiency at light loads and...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Test Data Compression Using Soft Computing Technique

    One of the methods to reduce the area and power dissipation is by doing the test data compression scheme using soft computing technique. By doing the soft computing the area minimization can be achieved. The soft computing is the term applied for solving the NP complete problems. The main objective...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Dynamic Load Rebalancing by Monitoring the Elastic Map Reduce Service in Cloud

    Cloud computing is a compelling technology. In clouds, Distributed File Systems (DFS) are sharing their resources to process the large amount of typical data. It uses imbalanced chunk relocation process using the centralized approach that causes adequate failure in real time operations. This results in load imbalance in the distributed...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Dynamic Resource Allocation by Using Elastic Compute Cloud Service

    Cloud computing is on demand as it offers dynamic flexible resource allocation for reliable and guaranteed services in pay as-the user-use manner to public. In cloud computing multiple cloud users can request number of cloud services simultaneously. So there must be a provision that all resources are made available to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Design and Implementation of Runtime Reconfigurable High Resolution Digital Pulse Width Modulator on FPGA

    Digitally controlled pulse width modulator have gained increased attention because of a number of potential advantages including lower sensitivity to parameter variations, programmability, reduction or elimination of external passive components, as well as possibilities to implement more advanced control, calibration, or protection algorithms. This paper describes a design and implementation...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    The Transmission of Image and Data Through Video Signal Using Wavelet Transform

    Due to the advanced network technology, security of data transformation is a big problem in this society. The usage of cryptography secret key method along with watermarking provides the security of data transmission. Cryptography is a tool that can be used to keep information confidential and to ensure its integrity...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    SQL Injection Attack Detection and Prevention Methods: A Critical Review

    The authors have several news regarding data alteration in the communication background. The SQL injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per their study and also prevention methods had been...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Design of 8-Port Adaptive Network on Chip

    Networks-on-Chip (NoCs) have emerged as a promising on-chip inter-connects for future multi/many-core architectures as NoCs are able to scale communication links with the growing number of cores. In this paper, the authors present an adaptive route allocation algorithm which provides a required level of QoS (guaranteed bandwidth) coupled with an...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Enhanced GenMax Algorithm for Data Mining

    Association rules mining is an important branch of data mining. Most of association rules mining algorithms make use of only one minimum support to mine items, which may be of different nature. Due to the difference in nature of items, some items may appear less frequent and yet they are...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Location Tracking and Data Compression for Accurate Energy Efficient Localization using GSM system

    Location tracking is a very popular method of finding the location in the new era. It provides lots of applications in the market. In the recent years, the mobile service providers have deployed commercial Location-Based Services (LBS) which are a positioning method that exploits the already existing infrastructures such as...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Classification and Performance Evaluation Using Data Mining Algorithms

    Different areas of research in educational data mining are analysis and visualization of data, recommendations for students, student modeling, detecting undesirable student behavior, grouping of students, social network analysis, developing concept maps, constructing courseware, planning and scheduling and predicting student's performance. In this paper, classification of the data collected from...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2014

    A Detailed Study and Analysis of different Partitional Data Clustering Techniques

    The concept of data clustering is considered to be very significant in various application areas like text mining, fraud detection, health care, image processing, bioinformatics etc. Due to its application in a variety of domains, various techniques are presented by many research domains in the literature. Data clustering is one...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2014

    Modelling Structures in Data Mining Techniques

    Data mining involves finding out patterns of data from within large data sets. The large sets of data can be structured or unstructured. The data mining process involves two phases. In the first step the authors develop data structures which can be used to hold the underlying data sets in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2013

    Ethical Hacking: A Technique to Enhance Information Security

    The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. As public and private organizations migrate more...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2013

    A Security Survey of Authenticated Routing Protocol (ARAN)

    Communication happens in ad hoc networks through multiple hops if the destination node is not in the direct wireless transmission range of sender. Many proposed routing protocol for ad hoc networks. On demand routing protocols are quite less expensive in terms of network overhead and fortunately quicker reaction time than...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Nov 2013

    RFID and Face Recognition Based Security and Access Control System

    In the past, most of the companies were using a magnetic stripe card which is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. Card has a Personal Identification Number (PIN) allow to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Oct 2013

    A Framework Based on Weighted Indexing for the Prevention of the Data Leakage in Cloud Computing Transaction

    Cloud Computing is the talk of the today's technology for the deployment of service to the consumers at their door steps. The consumers are free of the mechanism of process of deployment of the solution, but enjoying the fruit of the technology. In this research the data security issues are...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Oct 2013

    VM Assignment Algorithm Based Cost Effective Caching in Cloud Computing

    Cloud applications are evolving that offer data management services. The applications that involved in heavy I/O activities in the cloud technology, utilizes most of the services from caching. Caching the data may be either spatial data or temporal data. The local volatile memory might be an alternative support for cache,...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2013

    Managing Accountability for Application Sharing in the Cloud Using Push-Pull Key Matching Algorithm

    Cloud is large number of computers connected by the communication network. Cloud computing is the use of computing resources i.e. hardware and software through the internet. A major feature of the cloud services is that users' application are usually processed remotely in unknown machines which users do not own or...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2013

    A Survey of Attacks on Manet Routing Protocols

    An ad-hoc network is a network in which nodes communicate without using any network infrastructure and move in random order. MANET (Mobile Ad-hoc NETwork) is an attractive technology for many applications, such as rescue and tactical operations, due to the flexibility provided by their dynamic infrastructure. MANET is an autonomous...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2013

    An Efficient Security Scheme Providing Authentication and Pairwise Key Distribution with Mobile Sinks in WSN's

    Sensor networks may be deployment in hostile environments, especially in military applications. Small low cost sensor devices each equipped with limited resources are networked and are used for various critical applications. Making such sensor network secure is a challenging issue. Under such situations, the sensors may be captured, and the...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2013

    Data Security and Integrity of Cloud Storage in Cloud Computing

    Cloud computing is the computing paradigm which enable obtaining resources like software, hardware, services over the internet. Most of user stores their data on cloud for data security and integrity are prime related. In this paper, the problem of ensuring data integrity and security of data storage in cloud computing....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2013

    Modeling Secure XML Data Warehouses

    Data warehouses are most ordinarily employed in strategic decision making processes. These systems integrate heterogeneous causes which are not only restricted to their interior enterprise facts & figures but also encompass facts & figures from the WWW, the last mentioned of which have become increasingly more significant in the conclusion...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Data Security Issues in Cloud Contact Center as a Service - A Review

    An exhaustive list of security issues/concerns is associated with hosted contact centers and these issues fall into two broad categories: security issues faced by cloud providers and security issues faced by their customers. Today's hosted contact centers are increasingly complex and it is not devoid of the security breaches and...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Secure Agent in the Semantic Web

    In today's world information security is most essential but there will be a need for securing information that is extracted by the agent on the web. In this paper, the authors will discuss security of agents on the semantic web. Agents play different roles in different platforms dynamically changing access...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Wireless Intrusion Detection and Logging System

    Intrusion detection is the security patrol, and become the eyes and ears of the network, alerting the potential vulnerabilities and intrusion attempts. Monitoring can help to spot problems in the network, as well as identify performance problems, but watching every second of traffic that passes through the network, manually searching...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Development of Automatic Person Detection System to Control Ac Fan & Room Lights

    In this paper, the authors explain about \"Development of automatic person detection system to control electrical fan and lights\" using microcontroller. It is a reliable circuit that takes over the task of controlling the room lights in museums very accurately. When somebody enters into the museum then the light in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2012

    A Survey of E-Business Security For Mobile Multi-Agent Environment

    Agent technology is a very emerging field of research. Various classes of agents (e.g. intelligent agents, software agents) have emerged so far. Software agents including mobile agents are useful for distributed systems & electronic commerce. E-commerce and m-commerce can help a company or enterprise to extend its market place to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2012

    An Efficient Classification Mechanism Using Machine Learning Techniques for Attack Detection From Large Dataset

    Recent internet based communication technology has an important part in the user life. Cyber based communication and networks connections are very huge not just in the terms of size, but also in the terms of changing the services offered and the mobility of users that make them more vulnerable to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2004

    A Survey on Application of Cloudsim Toolkit in Cloud Computing

    Cloud computing is a paradigm of large scale distributed computing which is a repackaging of various existing concepts/technologies such as utility computing, grid computing, autonomic computing, virtualization and internet technologies. Cloud computing use the Internet technologies for delivery of resources 'As a service' to users on demand. As it is...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Data Security Issues in Cloud Contact Center as a Service - A Review

    An exhaustive list of security issues/concerns is associated with hosted contact centers and these issues fall into two broad categories: security issues faced by cloud providers and security issues faced by their customers. Today's hosted contact centers are increasingly complex and it is not devoid of the security breaches and...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2013

    An Efficient Security Scheme Providing Authentication and Pairwise Key Distribution with Mobile Sinks in WSN's

    Sensor networks may be deployment in hostile environments, especially in military applications. Small low cost sensor devices each equipped with limited resources are networked and are used for various critical applications. Making such sensor network secure is a challenging issue. Under such situations, the sensors may be captured, and the...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2013

    Data Security and Integrity of Cloud Storage in Cloud Computing

    Cloud computing is the computing paradigm which enable obtaining resources like software, hardware, services over the internet. Most of user stores their data on cloud for data security and integrity are prime related. In this paper, the problem of ensuring data integrity and security of data storage in cloud computing....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2012

    A Survey of E-Business Security For Mobile Multi-Agent Environment

    Agent technology is a very emerging field of research. Various classes of agents (e.g. intelligent agents, software agents) have emerged so far. Software agents including mobile agents are useful for distributed systems & electronic commerce. E-commerce and m-commerce can help a company or enterprise to extend its market place to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Secure Agent in the Semantic Web

    In today's world information security is most essential but there will be a need for securing information that is extracted by the agent on the web. In this paper, the authors will discuss security of agents on the semantic web. Agents play different roles in different platforms dynamically changing access...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Oct 2013

    A Framework Based on Weighted Indexing for the Prevention of the Data Leakage in Cloud Computing Transaction

    Cloud Computing is the talk of the today's technology for the deployment of service to the consumers at their door steps. The consumers are free of the mechanism of process of deployment of the solution, but enjoying the fruit of the technology. In this research the data security issues are...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Nov 2013

    RFID and Face Recognition Based Security and Access Control System

    In the past, most of the companies were using a magnetic stripe card which is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. Card has a Personal Identification Number (PIN) allow to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2013

    Ethical Hacking: A Technique to Enhance Information Security

    The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. As public and private organizations migrate more...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2013

    Modeling Secure XML Data Warehouses

    Data warehouses are most ordinarily employed in strategic decision making processes. These systems integrate heterogeneous causes which are not only restricted to their interior enterprise facts & figures but also encompass facts & figures from the WWW, the last mentioned of which have become increasingly more significant in the conclusion...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Oct 2013

    VM Assignment Algorithm Based Cost Effective Caching in Cloud Computing

    Cloud applications are evolving that offer data management services. The applications that involved in heavy I/O activities in the cloud technology, utilizes most of the services from caching. Caching the data may be either spatial data or temporal data. The local volatile memory might be an alternative support for cache,...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2013

    Managing Accountability for Application Sharing in the Cloud Using Push-Pull Key Matching Algorithm

    Cloud is large number of computers connected by the communication network. Cloud computing is the use of computing resources i.e. hardware and software through the internet. A major feature of the cloud services is that users' application are usually processed remotely in unknown machines which users do not own or...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2012

    An Efficient Classification Mechanism Using Machine Learning Techniques for Attack Detection From Large Dataset

    Recent internet based communication technology has an important part in the user life. Cyber based communication and networks connections are very huge not just in the terms of size, but also in the terms of changing the services offered and the mobility of users that make them more vulnerable to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Wireless Intrusion Detection and Logging System

    Intrusion detection is the security patrol, and become the eyes and ears of the network, alerting the potential vulnerabilities and intrusion attempts. Monitoring can help to spot problems in the network, as well as identify performance problems, but watching every second of traffic that passes through the network, manually searching...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Two Stage Batch Arrival Queue with Compulsory Server Vacation and Second Optional Repair

    In this paper, the authors deal with a single server batch arrival queue, two stages of heterogeneous service with different (arbitrary) service time distribution subject to random breakdowns followed by a repair and compulsory server vacations with general (arbitrary) vacation periods. After first stage service the server must provide second...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Audio Type Identification Using EEMD: A Noise Assisted Data Analysis Method

    Audio classification is a process of assigning particular class to an audio signal. Classifying the audio signal has many applications in the field of digital library, automatic organization of databases etc. In the last several years efforts have been made to develop different methods to extract information from audio signals,...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    IPv6 Based Mobile Cloud Computing to Compact with Key Dilemma

    Mobile cloud computing is the combination of cloud computing and mobile networks to bring benefits for mobile users, network operators, as well as cloud computing providers. A mobile cloud approach enables developers to build applications designed specifically for mobile users without being bound by the mobile operating system and the...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2013

    A Survey of Attacks on Manet Routing Protocols

    An ad-hoc network is a network in which nodes communicate without using any network infrastructure and move in random order. MANET (Mobile Ad-hoc NETwork) is an attractive technology for many applications, such as rescue and tactical operations, due to the flexibility provided by their dynamic infrastructure. MANET is an autonomous...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Dec 2013

    A Security Survey of Authenticated Routing Protocol (ARAN)

    Communication happens in ad hoc networks through multiple hops if the destination node is not in the direct wireless transmission range of sender. Many proposed routing protocol for ad hoc networks. On demand routing protocols are quite less expensive in terms of network overhead and fortunately quicker reaction time than...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2014

    A Detailed Study and Analysis of different Partitional Data Clustering Techniques

    The concept of data clustering is considered to be very significant in various application areas like text mining, fraud detection, health care, image processing, bioinformatics etc. Due to its application in a variety of domains, various techniques are presented by many research domains in the literature. Data clustering is one...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2014

    Modelling Structures in Data Mining Techniques

    Data mining involves finding out patterns of data from within large data sets. The large sets of data can be structured or unstructured. The data mining process involves two phases. In the first step the authors develop data structures which can be used to hold the underlying data sets in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    FPGA Implementation of A Pipelined MIPS Soft Core Processor

    A soft-core processor is a model of Hardware Description Language (HDL) of a specific Central Processing Unit (CPU) that can be customized for a given application and synthesized for an ASIC or FPGA target. Usually they contain embedded processors that are often in the form of soft-core processors that execute...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2004

    A Survey on Application of Cloudsim Toolkit in Cloud Computing

    Cloud computing is a paradigm of large scale distributed computing which is a repackaging of various existing concepts/technologies such as utility computing, grid computing, autonomic computing, virtualization and internet technologies. Cloud computing use the Internet technologies for delivery of resources 'As a service' to users on demand. As it is...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Design and Implementation of EPC Gen2 Using FPGA

    Electronic product code or EPC global class-I Generation-I and Generation-II are popular and globally accepted standard specification which enables the use of password protection for accessing the data stored in the memory of a RFID tag. Use of password gives one of the ultimate securities for the RFID system but...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2013

    Development of Automatic Person Detection System to Control Ac Fan & Room Lights

    In this paper, the authors explain about \"Development of automatic person detection system to control electrical fan and lights\" using microcontroller. It is a reliable circuit that takes over the task of controlling the room lights in museums very accurately. When somebody enters into the museum then the light in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Design and Implementation of Runtime Reconfigurable High Resolution Digital Pulse Width Modulator on FPGA

    Digitally controlled pulse width modulator have gained increased attention because of a number of potential advantages including lower sensitivity to parameter variations, programmability, reduction or elimination of external passive components, as well as possibilities to implement more advanced control, calibration, or protection algorithms. This paper describes a design and implementation...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    The Transmission of Image and Data Through Video Signal Using Wavelet Transform

    Due to the advanced network technology, security of data transformation is a big problem in this society. The usage of cryptography secret key method along with watermarking provides the security of data transmission. Cryptography is a tool that can be used to keep information confidential and to ensure its integrity...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory

    In today's world, more or less, every activity belongs to internet. The increase of e-commerce has leads many businesses to carry out the most of their day-to-day business online transaction on data. As a result of the popularity of the web, providers of web sites and storage space providers want...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Design of Stream Cipher for Encryption of Data Using Cellular Automata

    Pseudo-Random Number Generators (PRNGs) are a key component of stream ciphers used for encryption purposes. While Non linear Feedback Shift Registers (NFSRs) combined with cellular automata has been utilized for PRNGs, the use of Cellular Automata (CA) is another viable option. This paper explores the combination of NFSRs and CA...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    A Single-Phase Ac-Dc Converter with Improved Efficiency Using Atmega8 Microcontroller

    In this paper the authors proposed an AC-DC semi-bridgeless boost converter with 180 degree phase shift and less number of switches. The simplified current sensing method is applied in the converter to predict the inductor. The proposed converter has the advantageous features such as high efficiency at light loads and...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Test Data Compression Using Soft Computing Technique

    One of the methods to reduce the area and power dissipation is by doing the test data compression scheme using soft computing technique. By doing the soft computing the area minimization can be achieved. The soft computing is the term applied for solving the NP complete problems. The main objective...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Dynamic Load Rebalancing by Monitoring the Elastic Map Reduce Service in Cloud

    Cloud computing is a compelling technology. In clouds, Distributed File Systems (DFS) are sharing their resources to process the large amount of typical data. It uses imbalanced chunk relocation process using the centralized approach that causes adequate failure in real time operations. This results in load imbalance in the distributed...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Dynamic Resource Allocation by Using Elastic Compute Cloud Service

    Cloud computing is on demand as it offers dynamic flexible resource allocation for reliable and guaranteed services in pay as-the user-use manner to public. In cloud computing multiple cloud users can request number of cloud services simultaneously. So there must be a provision that all resources are made available to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Enhanced GenMax Algorithm for Data Mining

    Association rules mining is an important branch of data mining. Most of association rules mining algorithms make use of only one minimum support to mine items, which may be of different nature. Due to the difference in nature of items, some items may appear less frequent and yet they are...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Location Tracking and Data Compression for Accurate Energy Efficient Localization using GSM system

    Location tracking is a very popular method of finding the location in the new era. It provides lots of applications in the market. In the recent years, the mobile service providers have deployed commercial Location-Based Services (LBS) which are a positioning method that exploits the already existing infrastructures such as...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Classification and Performance Evaluation Using Data Mining Algorithms

    Different areas of research in educational data mining are analysis and visualization of data, recommendations for students, student modeling, detecting undesirable student behavior, grouping of students, social network analysis, developing concept maps, constructing courseware, planning and scheduling and predicting student's performance. In this paper, classification of the data collected from...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    SQL Injection Attack Detection and Prevention Methods: A Critical Review

    The authors have several news regarding data alteration in the communication background. The SQL injection attack is a popular way of attack in terms of document structure and common threats now a day. There are several ways of attack detection as per their study and also prevention methods had been...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Design of 8-Port Adaptive Network on Chip

    Networks-on-Chip (NoCs) have emerged as a promising on-chip inter-connects for future multi/many-core architectures as NoCs are able to scale communication links with the growing number of cores. In this paper, the authors present an adaptive route allocation algorithm which provides a required level of QoS (guaranteed bandwidth) coupled with an...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Adaptive K-Means Clustering Techniques For Data Clustering

    K-means is a rather simple but well known algorithm for grouping objects, clustering. In the presented paper, a modified k-means clustering is proposed. It adapts itself according to the image based on color based clustering. The no. of clusters using the color features are computed based on histogram analysis in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Multiband and Compact Fractal Antenna for Wireless Communication

    Antennas with low profile, compact size, multiband are in great insist in modern telecommunication system. Fractal antennas are simple, light weight and compact in size. Sierpinski carpet geometry based rectangular patch fractal antenna is described in this paper. Multiband antenna offers multiple telecommunication services in to single device. This leads...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)