International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

Displaying 1-40 of 524 results

  • White Papers // Feb 2015

    Performance Analysis of Relay-Aided Cellular Networks

    Energy efficiency in cellular networks has been receiving significant attention in wireless communication, because of the importance in reducing the energy consumption and maintaining the profitability of networks, in addition it makes these networks "Greener". In the traditional cellular architecture, the urban cell topography increases the capacity along with the...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Feb 2015

    Multiparameter Based Energy Efficient Scheduling For Wireless Sensor Networks

    Wireless sensor networks have become increasingly popular due to their wide range of applications. Energy consumption is one of the biggest constraints of the wireless sensor node and this limitation combined with a typical deployment of large number of nodes has added many challenges to the design and management of...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Feb 2015

    Review To Detect and Isolate Malicious Vehicle in VANET

    Vehicular Ad hoc NETworks (VANETs) are more increasing attentions from academia and deployment efforts from industry, due to the various applications and potential tremendous benefits they offer for future VANET users. VANET does not have any fixed topology and the nodes move from one location to another. To transfer a...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Feb 2015

    A Review on Cost-Efficient and Optimum Solution for Fiber-Wireless (Fi-Wi) Technology

    In recent years there is an explosive growth towards broadband access technologies which basically require higher bandwidth, better flexibility and lower cost access network and enable users to access internet in an "Anytime anywhere" fashion. So Fiber-Wireless (Fi-Wi) is efficiently combination of both optical network and wireless network which can...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Feb 2015

    Implementation of Adaptive Viterbi Decoder on FPGA for Wireless Communication

    A new trend in wireless communication systems has dictated the need for dynamical adaptation of communication systems in order to suit environmental requirements. Wireless networks usually employ sophisticated Forward Error Correction (FEC) techniques such as Viterbi algorithm to combat with the channel distortion effects such as multipath fading and intersymbol...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Environmental Vulnerability Evaluation in Basra Province Based on Remote Sensing and GIS Techniques

    In this paper, a methodology to evaluate natural and social pressure, environment sensitivity, and ecological stability in a GIS-based approach was developed for the Basrah Province, Iraq. The information used in this paper, was obtained from two different sources: a soil survey with more than 500 soil samples positioned by...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Network Visualization: Application to Wireless Network

    Network visualization means offering network design and construction in a graphical manner with images and animations to go with. Network visualization paints a vivid picture of a virtual network using images. This enables a comprehensive study of network functions and its operational characteristics. In this paper, the authors introduce this...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    The Efficient Energy Aware Routing and Data Aggregation in Multi-Hop Wireless Sensor Network

    The Energy resource especially in Wireless Sensor Networks (WSNs) are major concerned. Since sensor nodes are normally more dense of data sampled by sensor nodes have more redundant of data and data aggregation became an adorable method to ignore redundancy, reducing frequent of transmission and then to conserving energy. Many...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Design and Analysis of Channel Assignment Algorithm for IEEE 802.11 WLAN Network Performance Enhancements

    Wireless Local Area Networks (WLANs) using single channel have limited bandwidth. Channel interference between Access Points (APs) of WLAN also decreases the network throughput. The solution of this problem is to transmit data simultaneously on multiple channels is considered as an alternative. In this paper, the authors propose a channel...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Modelling Architecture for Multimedia Data Warehouse

    Data warehouse is an information system mainly used to support strategic decision. During last few years there is a need arise to manage multimedia data in decision making process in business industry which leads to build multimedia data warehouse. Multimedia data warehouse is a collection of large volume of image,...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Enhancing Security Using Location of Mobile Users

    Now-a-days, mobile phones are more powerful than what a desktop used to be few decades back. A hand held device or mobile phones are capable of performing operations what a desktop can perform. Many day-to-day operations are carried out by mobile phones but the most important is exchanging of confidential...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Simulation of Rectangular Microstrip Patch Antenna

    In this paper, the authors design and simulate a rectangular micro-strip patch antenna operating at a frequency of 2.34 GHz. The rising importance of wireless communication and multimedia services increasing the efforts to the design and implementation of micro-strip patch structures. A patch antenna is advantageous because of its low...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    An Evaluation of \"Security Services\" Schemes for IEEE 802.11 Wireless LAN's Using Qualnet

    In the era of information and communication technology, WLANs are being used for military, multimedia and health application, where high system performance and the ability to stay in link are extremely required. WLAN supports best-effort service at lower investment and cost. Apart from low cost, IEEE 802.11 technology is relatively...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Implementing Multiprime RSA Algorithm to Enhance the Data Security in Cloud Computing

    Cloud computing is an internet based technology where a large amount of resources are shared as a service. It is a payment-based model where the users can pay for what they can use. The resources available in the cloud can be shared \"As-a-service\". Many business organizations have fear in storing...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Further More Investigations on Methods Developed for Database Security

    In this paper, the authors review methods developed for anonymizing data from 1994 to 1997. Publishing micro-data such as census or patient data for extensive research and other purposes is an important problem area being focused by government agencies and other social associations. The traditional approach identified through literature survey...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Certain Investigations on Security Issues and Resolving Strategies in Cloud Computing

    In this paper, the authors review methods developed for anonymizing data from 2011 to present. Publishing micro-data such as census or patient data for extensive research and other purposes is an important problem area being focused by government agencies and other social associations. The traditional approach identified through literature survey...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jan 2015

    Investigations on Decentralized Access Control Strategies for Anonymous Authentication of Data Stored in Clouds

    In this paper, the authors explain about various methods prevailing in literature of anonymous authentication mechanisms for data stored in clouds. It is a decentralized access of system in which every system have the access control of data. The cloud which is a secured storage area where the anonymous authentication...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Multiparty Access Control Model for Collaborative Management of Shared Data in Online Social Networks

    Online Social Networks (OSNs) have perceived astounding advancement as of late and turn into a true webpage for toxic joined with online clients. These sorts of OSNs offer excellent opportunity for computerized friendly connections and additionally subtle elements uncovering, additionally hoist various insurance and also protection concerns. Despite the fact...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Performance Evaluation of Learning by Example Techniques over Different Datasets

    The clustering activity is an unsupervised learning observation which coalesce the data into segments. Grouping of data is done by identifying common characteristics that are labeled as similarities among data based on their characteristics. Scheming the performance of selective clustering algorithms over different chosen data sets are evaluated here. Burst...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    An Cost Effective Approach for Provisioning In a Cloud

    Cloud computing is becoming popular buzzword today. Cloud computing provides opportunity to dynamically scale the computing resources for applications, which is shared among customers using virtualization technology. Infrastructure-as-a-Service (IaaS) allows the cloud provider freely locate the infrastructure over the internet in cost-effective manner by migrating in the form of virtual...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Adaptive K-Means Clustering Techniques For Data Clustering

    K-means is a rather simple but well known algorithm for grouping objects, clustering. In the presented paper, a modified k-means clustering is proposed. It adapts itself according to the image based on color based clustering. The no. of clusters using the color features are computed based on histogram analysis in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Privacy Improvement for Fingerprint Recognition Based On RSA

    In this paper, the authors proposed an adaptive encryption based privacy improvement for fingerprint recognition. During enrollment, two fingerprints are captured from two different fingers and then extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Resisting Proxy-Based Attacks Based On Temporal and Spatial Locality Behaviour

    In computer networks, a proxy server is a server that may be a computer system or an application that acts as an intermediary for requests from clients seeking resources from other servers. In this paper, it mainly focuses to resist proxy-based DDOS attacks. It extracts the behavior features of traffic...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Novel Approach of Load Balancing Strategy in Cloud Computing

    The term 'Cloud computing' has grown in popularity, especially with its widespread use. The very concept of cloud computing is complex and consists of a number of related concepts. However, as the cloud computing environment is growing in number and kinds of services being provided, the need of efficient load...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Software Project Planning and Resource Allocation Using Ant Colony Optimization with Uncertainty Handling

    In software engineering field, developing software tools is challenging and important. In software project humans are important. Human resources are mainly needed. In software project, planning is important. Since software project is much related to human resource, the human resource allocation is the important problem. A software project planning tool...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Virtual Prototyping (VP) In Construction

    VP means virtual prototyping is a computer aided design process. It is the latest and cost effective way to visualize real circumstances that enhance effective communication of design and ideas without manufacturing physical samples. Virtual prototyping involves the integration of different design software's during each and every stages of a...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    DNA Based Cryptography Using Permutation and Random Key Generation Method

    DNA cryptography is a new instinctive cryptographic field emerged with the research of DNA computing, in which DNA is used as information shipper and the modern biological technology is used as accomplishment tool. Studies and implementation has proved that this method is very efficient in encrypting, storing and transmitting data...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    An Innovative Framework for the Detection and Prediction of Phishing Websites

    With the advent of internet, various online attacks have been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Enabling Search and Retrieval over Encrypted Data Using Homomorphic Encryption

    Outsourcing of data has become an advanced data service to store information into a global storage space. Data owners can upload their private data onto this space, and do many operations on them. Performing information retrieval tasks while preserving data confidentiality is a big challenge when data is stored on...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Dynamic Querying In NoSQL System

    Three mege trends big data, big user and cloud computing that leads to the adoption of NoSQL. NoSQL simply means Not Only SQL. Today most of the applications are hosted in cloud and that available through internet. They must support large number of users 24 hours a day, 365 days...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Detection and Deletion of Outliers from Large Datasets

    In this paper, the authors propose a method for detecting and deleting distance based outliers in very large data sets. This is based on the outlier detection solving set algorithm. This method introduces parallel computation so as to save more time and having excellent performance. First, weights are assigned to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Dynamic Reconcile Algorithm for Address Generator in Wimax Deinterleaver

    In this paper, a new reconcile algorithm for address generator supporting varying modulation schemes in the WiMAX deinterleaver is been put forward. WiMAX can be fixed or mobile, and uses forward error correction along with interleaving and deinterleaving techniques for combating the transmissions errors. Interleaving and deinterleaving are inverse operations...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Adaptive IIR Notch Filter Design For Cancellation of Periodic Impulsive Noise in OFDM Based Power Line Communications

    In this paper, the authors present a simple and cost effective method to remove the periodic impulsive noise in Power-Line Communications (PLC) system. In the real PLC environment, some electrical appliances will produce impulsive noise at a fixed frequency with the Power Spectral Density (PSD) usually exceeding that of the...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    RF-Pilot Based Frequency Offset Estimation and Phase Noise Compensation for CO-OFDM Systems

    One of the most severe impairments that affect coherent optical systems employing high-order modulation formats is phase noise due to transmit and receive lasers. The vulnerable sensitivity to laser line-width induced Inter-Carrier Interference (ICI) has long been recognized as a major problem to Coherent Optical Orthogonal Frequency-Division Multiplexing (CO-OFDM) systems....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A New Method for Satellite Image Security Using DWT-DCT Watermarking and AES Encryption

    With the large-scale research in space sciences and space technologies, there is a great demand of satellite image security system for providing secure storage and transmission of satellite images. As the demand to protect the sensitive and valuable data from satellites has increased and hence proposed a new method for...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Comprehensive Study on Data Hiding In Audio Signals Using DWT and EMD with Synchronisation Code

    Watermarking has become a major solution for protection of multimedia data with copyright. Many approaches have been developed to prevent the unauthorized copying and sale of copyright protected data. Audio watermarks are special signals embedded into digital audio. These signals are extracted by detection mechanisms and decoded. The efficiency of...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Comparative Study on Protection Methods in MPLS-TP Networks

    Today the data traffic is growing more than ten times the rate of voice traffic. Time Division Multiplexing (TDM) based technologies has been for a long time a major player for data transport, it shows weakness on busty traffic such as packetized voice and video especially because of the fast...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Network Coding Combined With Rate Diversity Gains in MANET Based On an Opportunistic Routing Scheme

    In this paper, the authors investigate the performance gains obtained by combining network coding and rate diversity gains in wireless environment. Network coding is a new research area which has a lot of interesting applications in practical networking systems. Link rate diversity provides another degree of freedom in wireless environment....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Optimal Reserving Room Based Reversible Data Hiding In Encrypted Images

    An undesirable side effect of many water marking and data hiding schemes is that the host signal into which auxiliary data is embedded is distorted. In some applications which hide data into important images, permanent distortion of the image is unacceptable (e.g. X ray images). In these applications, a reversible...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Structural Morphology Based Automatic Virus Particle Detection Using Robust Segmentation and Decision Tree Classification

    Accurate and automatic approach to locate virus particles in electron microscopy is cardinal because of the large number of electron views that are needed to perform high resolution three dimensional reconstructions at the ultra structural level. This paper describes a fully automatic approach to locate adenovirus particles where low level...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Multiparty Access Control Model for Collaborative Management of Shared Data in Online Social Networks

    Online Social Networks (OSNs) have perceived astounding advancement as of late and turn into a true webpage for toxic joined with online clients. These sorts of OSNs offer excellent opportunity for computerized friendly connections and additionally subtle elements uncovering, additionally hoist various insurance and also protection concerns. Despite the fact...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Performance Evaluation of Learning by Example Techniques over Different Datasets

    The clustering activity is an unsupervised learning observation which coalesce the data into segments. Grouping of data is done by identifying common characteristics that are labeled as similarities among data based on their characteristics. Scheming the performance of selective clustering algorithms over different chosen data sets are evaluated here. Burst...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    An Cost Effective Approach for Provisioning In a Cloud

    Cloud computing is becoming popular buzzword today. Cloud computing provides opportunity to dynamically scale the computing resources for applications, which is shared among customers using virtualization technology. Infrastructure-as-a-Service (IaaS) allows the cloud provider freely locate the infrastructure over the internet in cost-effective manner by migrating in the form of virtual...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Hardware Implementation of Zero-force Precoded MIMO OFDM System to Reduce BER

    Achieving high data rates in wireless transmission is in demand and has become a competitive factor in current fast moving world. Generally multiple-input-multiple-output systems are used to achieve high data rates. In MIMO every user may experience inter-user-interference because data of two or more users is transmitted from transmitter over...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    A Minimum Cost Effective Cluster Algorithm Using UWSN

    The authors' node clustering has been considered in Underwater Wireless Sensor Networks (UWSNs) to improve energy efficiency and prolong network lifetime. Network survivability is a great concern in cluster-based UWSNs. In this paper, they propose a dependable clustering protocol to provide a survivable cluster hierarchy against cluster-head failures in such...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Multiple Sink Model Which Support Different Parameters in Wireless Sensor Field

    Wireless sensor network is very essential in today's life. The rapid growth of mobile technology is increases in recent years. And thus this is challenging job for industry to develop an efficient network which suits in today's technology. The users are main factor in this technology, without users the network...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Analysis of Restoration and Protection in Optical Network With Simulation Framework

    Survivability is one of the most important requirements of optical networks. As optical networks are prone to component failures and carry a large volume of traffic, maintaining a high level of service availability is an important issue. In this paper, existing restoration methods proposed for optical network are critically analyzed....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Applying Modified K-Nearest Neighbor to Detect Insider Threat in Collaborative Information Systems

    Collaborative information systems have acquired a lot of attention recently by providing all the information at one place. These systems can be used in all scenarios where there are many user roles defined and a lot of common information is accessed by them. In such cases, a huge possibility of...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Stock Price Prediction Using Artificial Neural Network

    A stock market is a public market for the trading of company stock. It is an organized set-up with a regulatory body and the members who trade in shares are registered with the stock market and regulatory body SEBI. Since stock market data are highly time-variant and are normally in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Security in Cloud Audit Using the Key Based Homomorphic Linear Authenticator

    Using cloud storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Data Reporting in Wireless Sensor Network Using a Dynamic en-routing Scheme to Ensure Privacy

    Wireless sensor networking is a rising technology, which potentially supports many Emerging applications for both civilian and military purpose. Node compromise is the major and unique security issues in sensor network. These compromised nodes could report false sensed results and degrade the reliability of the whole network. The secure network...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Fraud Detection in Mobile Telecommunication

    Fraud has been very common in the society, and it affects private enterprises as well as public entities. However, in recent years, the development of new technologies has also provided criminals more sophisticated way to commit fraud and it therefore requires more advanced techniques to detect and prevent such events....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Fast and Secure Countermand Verification Process Using MAP in Vehicular Ad Hoc Network

    Secure authentication in VANET is deploying by Public Key Infrastructure (PKI), and to use Certificate Revocation Lists (CRLs) for managing the revoked certificates. In PKI, each entity in the network holds an authentic certificate, and every message should be digitally signed before its transmission. A CRL, usually issued by a...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Performance Enhancement of VANETs Using Cluster Based Routing

    Vehicular Ad hoc NETworks (VANETs) are a promising technology to enable the communications among vehicles and between vehicles and Road Side Units (RSU). A new algorithm to construct stable clusters is introduced to perform Cluster Based Routing (CBR) and to improve the performance of VANETs. The stable clustering algorithm groups...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Protection Of WDM FSO Network Over Fading Channels

    FSO uses modulated optical focused beams to establish atmospheric data transmission. This re-emerging technology combines high data rates around 2.5Gbps in commercial implementations. This characteristic, along with high network reconfigurability (provided by the short deployment time), license-free operation and low sensitivity to electromagnetic interference and jamming, makes FSO systems even...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Adding Persuasive Features in Graphical Password to Increase the Capacity of Knowledge Based Authentication Mechanism

    The existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. An important usability goal of an authentication system is to support users for selecting the better password. User creates memorable password which is easy to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Performance Analysis of Intersection Based Algorithm in VANET with Traffic Light Considerations

    Vehicular ad hoc networks is an emerging technology, in vehicular safety algorithm, the source vehicle that detects an accident can generate a warning message and propagate it to the succeeding vehicles to notify drivers before they reach to the potential danger zone on the road. The main application of VANET...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Trusted and Optimized Platform for MANET: CACO

    MANET (Mobile Ad-hoc NETwork) is a type of ad hoc network that can alter locations and has the ability to self configure on the fly. Because MANETs are mobile, they are having wireless connections to connect to various other mobile nodes. Therefore there is a great need of trust scheme...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    VANETs: A Survey on Routing Protocols and Issues

    In past few years, VANET (Vehicular Ad-hoc NETwork) has become a remarkable area for research analysis and development. VANET is a subgroup of MANET (Mobile Ad-hoc NETwork). VANET and MANET both are wireless networks which are characterized as self-configured and autonomous ad-hoc networks. VANETs differ from MANETs in terms of...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Analysis of Collapsibility of Canister at High Speed in Ice Pellet Launcher Using ABAQUS/Explicit Software

    Canister is a cylindrical shaped container, one end of which is open, in which bird specimen or ice pellets are loaded and fired in ice-pellet launcher system. The canister is propelled through the length of the gun barrel by means of compressed air and is arrested by canister arrester. High...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Prediction of Weakest Area and Line in IEEE 57 Bus System

    In this paper, the authors present a method of finding weakest area and line in complex power system network which comprises of a 57 bus and 6 generator system (IEEE 57-bus system). The case studies have been analyzed by considering the effect of generator outages and other abnormal loadings. This...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Reed-Solomon Coded OFDM with Unique Word as Guard Interval

    In this paper, the authors give an idea for a new transmit signal structure for OFDM (Orthogonal Frequency Division Multiplexing).To avoid the interference between to signal the users always require a guard band interval using cyclic prefix. But instead of that here a new term is used which is nothing...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jun 2014

    Performance Analysis of Advanced FMIPv6 For Handover Management In VANET

    Vehicular Ad-hoc NETwork (VANET) is a growing technology. The vehicle (acting as mobile routers) in the network uses the wireless medium to communicate with other nodes (vehicles) in their radio range. A Heterogeneous Wireless Network (HWN) which is hybrid network of cellular network (having Access Routers (AR) and Internet Service...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    An Effective Way to Ensemble the Clusters

    Clustering is a process of grouping a set of objects into classes of similar objects and is a most interesting concept of data mining in which it is defined as a collection of data objects that are similar to one another. Data mining is the process of extracting knowledge hidden...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Prominent Privacy Mechanism using Tickets Granting Service for Wireless Networks

    Wireless networks are indispensable for supporting such access anywhere and anytime. Due to its \"Open air\" nature, the wireless environment imposes greater challenges on ensuring network security than in wired networks. Present mechanism for handover authentication relays on authentication module, user's privacy, access control though it hardly serves its best....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    An Efficient Iris Recognition System Using Contourlet Transform and Neural Networks

    Iris recognition is the most accurate and reliable biometric identification system used for security purposes. The iris recognition system consists of image acquisition, localization, normalization enhancement, feature extraction and classification. Segmentation is used for the localization of the correct iris region in an eye and it should be done to...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    An Efficient Secure Data Transmission for Adaptive Hello Messaging Scheme in Manet

    In mobile ad-hoc networks, a hello protocol is generally used to maintain neighbor relationship between the nodes. According to this, each node broadcasts hello packets at regular intervals to discover its intermediate nodes to forward a packet. When the node moves into an inactive region, the transmission of hello packets...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    IMLBTR Based Localization of Wireless Sensor Network in the Wild

    Wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure, sound etc. A sensor system deployed in a forest area shows that the localization in the wild remains very challenging due to various interfering factors such as fire risk evaluation, canopy...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Idealized Approach for Content Management Scheme in Vehicular Ad-Hoc Network

    Vehicle to vehicle communication plays a vital role in exchanging of contents between two or more vehicles. Those contents are providing varity of applications to vehicle users such as rollover warning, emergency vehicle warning, lane changing warning and so on. Precise communication between vehicles is very important to enable perfect...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Clock Tree Power Optimization of Three Dimensional VLSI System with Network

    In this paper, the authors proposed a method, which is based on minimum-cost maximum-flow formulation to globally determine the tree topology, which maintains load balance and considers the wire length between pulse generators and pulsed latches. Experimental results indicate that the proposed migration approach can improve the power consumption by...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // May 2014

    Peruse Of Black Hole Attack and Prevention Using AODV on MANET

    Mobile Ad-hoc NETwork (MANET) has been an active research area as it has the special features such as fast, dynamic and easy to deploy anywhere. Absence of central monitoring unit, MANET highly depends on mobile nodes reliability. This leads MANETs are more vulnerable to various communication security attacks. One of...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Feb 2014

    A Survey on Palmprint Recognition

    Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Palmprint recognition is one of the popular methods which have been investigated over last fifteen years due to its several advantages such as stable line features, low-resolution imaging, low-cost...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Sep 2014

    Adaptive K-Means Clustering Techniques For Data Clustering

    K-means is a rather simple but well known algorithm for grouping objects, clustering. In the presented paper, a modified k-means clustering is proposed. It adapts itself according to the image based on color based clustering. The no. of clusters using the color features are computed based on histogram analysis in...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Jul 2014

    Multiband and Compact Fractal Antenna for Wireless Communication

    Antennas with low profile, compact size, multiband are in great insist in modern telecommunication system. Fractal antennas are simple, light weight and compact in size. Sierpinski carpet geometry based rectangular patch fractal antenna is described in this paper. Multiband antenna offers multiple telecommunication services in to single device. This leads...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    An Improved Dynamic Data Replica Selection and Placement in Hybrid Cloud

    Cloud computing platform is getting more and more attentions as a new trend of data management. Data replication has been widely used to speed up data access in cloud. Replica selection and placement are the major issues in replication. In this paper, the authors propose an approach for dynamic data...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    An Efficient Distributed Dynamic Load Balancing Algorithm for Private Cloud Environment

    In recent years cloud computing is one of the emerging research area that encompasses virtualization, networking, storage, software and on-demand web services. Clients, distributed servers and datacenters are the fundamental components of cloud infrastructure. The number of users in cloud computing is growing in an exponential rate at every day....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    An Efficient Dynamic Indexing and Metadata Model for Storage in Cloud Environment

    Cloud computing is an emerging, computing paradigm in which tasks are assigned to software, combination of connections, and services accessed over a network. This connections and network of servers is collectively known as the cloud. Instead of operating their own data centers, users might rent computing power and storage capacity...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Mar 2014

    Improving Resilience of Cloud Application Using Ranking Technique

    Cloud computing is a general term for anything that involves delivering hosted services over the Internet. A fault tolerance is a setup or configuration that prevents a computer or network device from failing in the event of an unexpected problem or error. In this paper, the authors propose a model...

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    SMS Based Automatic Vehicle Accident Information System

    Now-a-days, infrastructure has developed but the number of accidents is also getting increased even though many accidents are minor but due to lack of first aid and the reach of ambulance to the spot is late so there is a huge number of people are losing the life every day....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

  • White Papers // Apr 2014

    Fuzzy Relational Clustering Algorithm Based Multi- Agent Systems

    A Multi-Agent System (MAS) is a distributed system which is composed of multiple interacting intelligent agents or entities. These agents are used to solve complex functions and operations which are all difficult to solve by human. This paper mainly concentrates on agent fitness and the growth of an agent population....

    Provided By International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)