International Journal of Innovative Technology and Exploring Engineering (IJITEE)

Displaying 1-40 of 197 results

  • White Papers // Jun 2014

    CATP: An Enhanced MANETs Clustering Algorithm Based on Nodes Trusts and Performances

    A Mobile Ad-hoc NETwork (MANET) is a wireless network without the support of any fixed infrastructure. Security is one of the main challenges in ad hoc network due to dynamic topology and mobility of nodes. Organizing mobile nodes into manageable clusters can limit the amount of secure routing information. Under...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2014

    Comparison Between Two Hardware Implementations of a Formal Neuron on FPGA Platform

    The formal neuron is equivalent to a simple processor that performs a series of mathematical operations more or less complex on real data. The chosen representation to encode these data is the 32 bits floating point representation; this makes possible to achieve satisfactory precision in calculation. This paper presents a...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2014

    Design and Analysis of Low Offset High Speed Low Power 1Kb SRAM Memory

    Memory is an important part of computer and microprocessor based system design. It is used to store data or information in terms of binary number (0 or 1). In this paper, the authors present the design and analysis of 1Kb Static Random Access Memory (SRAM) at 180nm technology and main...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // May 2014

    Assessing Collaboration Framework in Multi- Cloud Environment

    Cloud computing has emerged as a popular paradigm that offers computing resources (e.g. CPU, storage, bandwidth and software) as scalable and on-demand services over the Internet. As more players enter this emerging market, a heterogeneous cloud computing market is expected to evolve, where individual players will have different volumes of...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // May 2014

    A Survey on Automatic Protocol Blocker for Privacy -Preserving Public Auditing in Cloud Computing

    Cloud computing is nothing but specific style of computing where everything from computing power to infrastructure, business apps are provided \"As a service\". In cloud, shared resources, softwares and information is provided as a metered service over the network. By data outsourcing, users can be relieved from the burden of...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // May 2014

    Cloud Computing and its Security Concerns A Survey

    Cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computing technologies. Cloud computing is evolving into the most desirous computing technology especially because of its low cost & resource independence but also incurs some of the most...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // May 2014

    A Framework to Increase the Lifetime of a Sensor Network by Dynamic Cluster Head Selection and Re-Clustering

    In spatial correlated sensor networks, nearby sensor nodes show a high degree of similarity in their readings. Keeping this in mind, the monitored region is divided into clusters and one cluster head is assigned to a cluster which does the sensing work while other nodes are in sleep state. This...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Apr 2014

    FPGA-Based Handwritten Signature Recognition System

    In this paper, a method of classification of handwritten signature based on neural networks, and FPGA implementation is proposed. The designed architecture is described using Very high speed integrated circuits Hardware Description Language (VHDL). The proposed application consists of features extraction from handwritten digit images, and classification based on Multi...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Apr 2014

    Reducing Inner Data Stealing Using Bogus Information Attacks in the Cloud Computing

    Cloud computing is giving the new approach to use the user's computers to handle and storing the confidential information. Cloud computing providing services like Infrastructure as a Service , Platform as a Service and Software as a Service as well as the users have to pay according to...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Apr 2014

    Enhancing Data Confidentiality in Cloud System Using Key-Private PRE Scheme

    Cloud computing is an approach to computing that leverages the efficient pooling of an on-demand, self-managed, virtual infrastructure. It abstracts the business services from complex IT infrastructure by making use of virtualization and pooling of resources. The risks involved on evaluation are that it requires trusting of cloud platform provider...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Mar 2014

    Analysis of Agile Software Development Utilising Cloud Computing Capabilities

    Industries are now using agile software development teams and cloud computing to accelerate development operations. Cloud computing and virtualization make agile development teams to combine multiple phases of development with other cloud services. The evolution of agile development has changed the method of software development. The agile development strategy was...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Mar 2014

    Privacy Measure for Publishing the Data- A Case Study

    Privacy-maintaining data release is one of the most important challenges in an information system because of the wide collection of sensitive information on the World Wide Web (WWW). Many solutions have been proposed by several researchers for privacy-maintaining data release. This paper provides an inspection of the state-of-the-art methods for...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2014

    Hide Inside-Separable Reversible Data Hiding in Encrypted Image

    Recently, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly memory space from...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2014

    Load Testing Strategy Review When Transitioning to Cloud

    The core objective of testing is to certify the product to a quality level at which the application is ready for releasing to the end customers. Apart from functional parameters, there are many other key parameters, especially operational parameters, which play a major role in deciding how the testing is...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2014

    Improving Web Service Selection using Fuzzy Quality of Protection

    The authors aim to solve the selection of secure web services in a global and flexible manner by introducing a fuzzy logic method. This paper presents a stride model based evaluation of web service security using quality of protection parameters like spoofing, tampering, reputation, information disclosure, denial of service and...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2014

    Reconfigurable Down Sampling Channelizer for SDR Receiver Using FPGA

    In this paper the authors present, the design and implementation of reconfigurable down sampling the IF band frequency to baseband in Software Defined Radio (SDR) receiver. To enhance both the integration and adaptation of multiple communication standards like GSM, CDMA and WCDM systems, the selection of channel in SDR technology...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2014

    An Efficient Framework for Exploring Personal Pattern Mining and Prediction in Mobile Commerce

    Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. With the rapid advance of wireless communication technology and the increasing popularity of powerful portable devices, mobile users not only can access worldwide information from...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    Protection Against Online Password Guessing Attacks by Using Graphicals Passwords

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. A very pivotal usability goal for authentication systems is to support users in selecting secure passwords. Users often create predictable and easy to remember passwords that are easy for...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    Design of Low Power SRAM Architecture with Isolated Read and Write Operations at Deep Submicron CMOS Technology

    Low power VLSI design has become the major challenge of chip designs as leakage power has been rising with scaling of technologies. In deep submicron technologies, leakage power becomes a key for a low power design due to its ever increasing proportion in chip's total power consumption. Motivated by emerging...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    PIC Microcontroller Universal Board

    A microcontroller is a device which integrates a number of the components of a microprocessor system onto a single microchip and optimized to interact with the outside world through on-board interfaces; i.e. it is a little gadget that houses a microprocessor, ROM (Read Only Memory), RAM (Random Access Memory), I/O...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    Mining Regular Pattern Over Dynamic Data Stream Using Bit Stream Sequence

    In recent years, data streams have become an increasingly important area of research for the computer science, database and data mining communities. Data streams are ordered and potentially unbounded sequences of data points created by a typically non-stationary generation process. Common data mining tasks associated with data streams include clustering,...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    A Survey on Application of Machine Learning Algorithms on Data Mining

    In the context of data mining the feature size is very large and it is believed that it needs a bigger population. Hence, this translates directly into higher computational load. Data and information have become major assets for most of the organizations. The success of any organization depends largely on...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    A New Approach to Communicate Secret Message (Key) Among a Group Using Chain Matrix Multiplication Based on Public Key Crypto System

    Group key management is a fundamental building block for secure group communication systems. It is required for many applications such as teleconference, group meeting etc. Proposed system, secure group communication in public key cryptography systems is proposed for dynamic groups which are secure. In this scheme a group is established...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    FPGA Implementation of AES Algorithm

    In this paper the authors present the FPGA implementation of AES algorithm cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel. It protects against unauthorized parties by preventing unauthorized alteration of use. Generally speaking, it uses a cryptographic system to transform a plaintext...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    Threshold Energy Based LEACH Algorithm for Wireless Sensor Networks

    This paper presents a new protocol called Threshold energy based leach algorithm (Tela) for Wireless Sensor Networks (WSN) which aims to reduce energy consumption within the wireless network. Efficiency of a wireless network mainly depends on energy of nodes. In cluster based protocols, changing of clusters and cluster head also...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    Palm Vein Recognition for Human Identification Using NN

    In the ubiquitous network society, where individuals can easily access their information anytime and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology, which can distinguish between registered legitimate users and imposters, is...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    A Comparative Overview of Popular Attacks Relevant to Adhoc -Networks

    The wireless ad hoc network become mundane, yet the core issue is the security. There are different types of attacks provided by different researcher but still faces research challenges. In ad hoc networks, nodes have limited resources like bandwidth, battery power and storage capacity. In this paper the authors pay...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Nov 2013

    Towards OLAP - Based Data Mining Using Multidimensional Database and Fuzzy Decision Trees

    In this paper, a new approach for data mining is described, coupling fuzzy multi-dimensional databases and fuzzy data mining systems, and achieving knowledge discovery from imperfect data. An architecture based on fuzzy multidimensional databases is given. It uses these kinds of data repositories to extract relevant knowledge from large data...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Nov 2013

    A Novel Approach for Query Suggestions for Personalizing the Web

    Web recommender systems predict the needs of web users and provide them with recommendations to personalize their pages. Such systems had been expected to have a bright future, especially in ecommerce and E-learning environments. However, although they have been intensively explored in the Web Mining and Machine learning fields, and...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Nov 2013

    An Analytical Review on the Techniques Opted for the Detection of Cloning in Spread Sheets

    Spreadsheets are widely used in industry: it is estimated that end-user programmers outnumber programmers by a factor. However, spreadsheets are error-prone, numerous companies have lost money because of spreadsheet errors. One of the causes for spreadsheet problems is the prevalence of copy-pasting. Based on existing text-based clone detection algorithms, different...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2013

    High Performance Current-Mode Multiplier Circuit

    Multiplier-divider circuits is using in digital signal processing base on neural networks and communications (amplifiers with variable gain, modulators, detectors, etc.). In most of CMOS analog circuit, transistors are only in triode or saturate regions; till now both regions not used. In this one kind of current mode multiplier-divider circuits...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2013

    Build a Web Application with Precautions to Prevent SQL Injection Attack

    SQL injection attacks have become one of the most common and dangerous Web application security issues on the Internet. SQL injection vulnerabilities occur when an application takes user content data and uses it to construct SQL (Structured Query Language) statements without first properly validating or sanitizing that content. SQL injection...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2013

    Correlated Low Rate DDoS Attack on Router Queues

    Network security is the booming issue inspite of tremendous advancements in the security aspects. Among the available network issues, attacks performed to breach the security against a particular host is also a major concern. In regard to this the authors preferred to study and perform DDoS attack in a coordinated...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2013

    Database Partitioning: A Review Paper

    Data management is much tedious task in growing data environment. Partitioning is the best possible solution which is partially accepted. Partitioning provides availability, maintenance and improvised query performance to the database users. This paper focuses the three key methods of partitioning and helps to reduce the delay in response time....

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2013

    Analysis of Supply Chain Management in Cloud Computing

    Supply chain management typically involves supervising the transfer of products and goods, such as from a supplier, then to a manufacturer, a wholesaler, a retailer and finally to the consumer. Information Technology (IT) refers to the use of computer-based programs to store and manipulate information. IT advances directly can correlate...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2013

    UNDERWARE - A Layer for Homogeneous Access to Heterogeneous Multi - Core Processors

    In this paper the authors propose a new way to tackle the problem of using the existing resources of multi-core processors with different types of cores, like PowerPC, Intel, ARM, DSPs, FPGA areas, etc. Applications for these heterogeneous multi-cores are difficult to write, as most programmers and programming tools target...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2013

    Secure Audit Service by Using TPA for Data Integrity in Cloud System

    Cloud computing is the vast computing utility, where users can remotely store their data into the cloud so to have the benefit of the on-demand availability of huge and different applications and services from a shared pool of configurable computing resources. Cloud-based outsourced storage space reduces the patron load of...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2013

    A Novel Approach to Face Recognition With Pose and Illumination Variation Using Support Vector Machine as Classifier

    Human face recognition has attracted significant consideration as one of the most effective applications of image analysis and understanding. Face recognition is one among the diverse techniques used to identify an individual. Pose and Illumination are the two major challenges, among the several factors that influence face recognition. This paper...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2013

    An Optimized Vertical Fragmentation Approach

    Vertical fragmentation in databases is considered as a difficult problem; it has attracted the interest of many researchers and has been the subject of several studies. In the literature, these studies suggest approaches to solving the problem of vertical fragmentation, these approaches always provide a solution, but the authors find...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2013

    Semantic Web Tool: For Efficient Retrieval of Links and Required Information

    Web, which grows significantly, becomes a need for modern society to make transactions, search the information, and spread the information. This paper presents the prototype for the semantic web based tool for efficient retrieval of links and required information. By using this tool, users can easily access the information without...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2013

    Smart Card Reader Meeting ISO 7816-3 and EMV Level 1 Specifications Using PIC24F Microcontroller

    A smart card is a pocket-sized card containing an embedded intelligent integrated circuit (i.e., intelligence to respond to a request from an external device). Smart cards contain a microprocessor chip that serves the dual functions of communication and extensive data storage. These cards are user friendly and have the capacity...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2013

    FPGA Implementation of MPLS

    Today's Internet applications like Voice over Internet Protocol (VoIP), real-time video streaming, video calling requires very high data-rates. If the resources are limited then the network gets congested and high speed applications perform poorly. Increasing bandwidth is one of the options for these networks. This paper presents hardware architecture of...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2013

    An Efficient Technique Used To Generate Test Case on Embedded System Using Fuzzy Logic

    Logical generation of the test case process ensures that the test cases have been derived in a consistent and objective manner and which covers all the requirements of the system. Temperature monitoring and controlling of nuclear reactor system is used which is an embedded system in which simulation is done...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // May 2013

    Automation of Business Process by Optimization of Data Extraction and Loading

    An automobile industry is transitioning to a new electronic enterprise Product Lifecycle Management (PLM) environment using the WindchillPDMLink 10.0 application from Windchill 5.0. The development teams were using software called EIS, which does not have proper workflow. Even though new software exists the users were using the legacy EIS database....

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Apr 2013

    Digital Watermarking and Other Data Hiding Techniques

    A watermark can be considered to be some kind of information that is embedded into underlying data for tamper detection, localization, ownership proof, and/or traitor tracing purposes. Digital watermarking is not a new name in the technology world but there are different techniques in data hiding which are similar to...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Mar 2013

    Certain Approaches of Real Time Object Tracking in Video Sequences on Embedded Linux Platform

    Video tracking in real time is one of the most important topics in the field of computer vision. Detection and tracking of moving objects in the video scenes is the first relevant step in the information extraction in many computer vision applications. This idea can be used for the surveillance...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2013

    Cascaded Multilevel Inverter for PV Cell Application Using PIC Microcontroller

    The PV power generation have low efficiency due to the various constrains. This paper gives a new proposed method to improve the performance of the PV system. The PV cell is connected to boost chopper and Multi-Level Inverter (MLI). In order to improve the efficiency and for making the power...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2013

    SPI Implementation on FPGA

    The SPI is a full-duplex, synchronous, serial data link that enables communication between a host processor and peripherals. Based upon Motorola's SPI-bus specifications, version V03.06, the designs are general purpose solutions offering viable ways to controlling SPI-bus, and highly flexible to suit any particular needs. However, field programmable gate array...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2013

    Safety Reliability Enhancement in Fault tolerant Automotive Embedded System

    Reliability is control and prevention of failures to reduce failure and improve operations by enhancing performance with system-level analysis and modeling are needed not only for predictability and comparability when partitioning end-to-end functions at design time levels of reliability. Reliability numbers by themselves will not motivate improvements, performance of two...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2013

    Performance Analysis of Embedded Linux in Embedded System

    Now-a-days, embedded systems with Linux OS are commonly applied in automotive industry. This paper represents two features of embedded system namely multithreading and semaphore in embedded Linux. The flow charts are used to represent the program written in 'C', run on Linux operating system .In multithreading the same string is...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2013

    Performance Evaluation of OSPF-Based Data Network

    The implementation of the Open Shortest Path First (OSPF) routing protocol for data network has became imperative as the size of the internet growing at an alarming rate and data network needs to employ routing protocol to route data faster so as to prevent network congestion and high IP drop...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Nov 2012

    Optimised Architecture Implementation of Bidirectional Scanning in FPGA for Television

    In the past, Field Programmable Gate Array (FPGA) circuits only contained a limited amount of logic and operated at a low frequency, but during last decade there has been a tremendous advancement in the fields of FPGAs circuits. Today FPGA are very fast, high density, and low power, suitable for...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2012

    Design of High Speed CODEC for On Chip Cross Talk Avoidance

    The cross talk is dependent on the data transition patterns on the bus, patterns can be classified based on the severity of the crosstalk they impose on the bus. The general idea behind techniques that improve on-chip bus speed is to remove undesirable patterns that are associated with certain classes...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2012

    Open Core Protocol for High Performance on Chip Bus

    The need for on-chip bus protocols are increased drastically for efficient and lossless communication among large number of IP cores of SOC design. This paper proposes a high-performance, highly scalable, bus-independent interface between IP cores named as open core protocol-international partnership. The Open Core Protocol (OCP) is a core centric...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2012

    Design and Analysis of 32-bit RISC Processor based on MIPS

    Because memory was expensive in old days, designer of instruction enhanced complication of instruction to reduce program length. Tendency of complication instruction design brought up one traditional instruction design style, which is named \"Complex Instruction Set Computer-CISC\" structure. But great disparity among instructions and low universal property result in instruction...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2012

    Single Dictionary based Cache Compression and Decompression Algorithm

    Computer systems and micro architecture researchers have proposed using hardware data compression units within the memory hierarchies of microprocessors in order to improve performance, energy efficiency, and functionality. All work on cache compression, has made unsubstantiated assumptions about the performance, power consumption, and area overheads of the proposed compression algorithms...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2012

    FPGA Implementation of 64 Point FFT Processor

    A power efficient Fast Fourier Transform (FFT) processor for use in the Direction Of Arrival (DOA) estimation of a wideband waveform is presented. The target device for implementation is a Xilinx Spartan-3 Xc3s200 Field Programmable Gate Array (FPGA). The FFT processor was developed using the Xilinx ISE in verilog code....

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Aug 2012

    FPGA Implementation of Low Power Pipelined 32-Bit Risc Processor

    In this paper the authors present the design and implementation of a low power pipelined 32-bit high performance RISC core. The various blocks include the fetch, decode, execute and memory read/write back to implement 4 stage pipelining. In this paper they are proposing low power design technique in front end...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jul 2012

    Discovering Application Level Semantics for Data Compression Using HCT

    Natural phenomena show that many creatures form large social groups and move in regular patterns. However, previous papers focus on finding the movement patterns of each single object or all objects. The author propose an efficient distributed mining algorithm to jointly identify a group of moving objects and discover their...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jul 2012

    Energy-Aware Fault Tolerance in Hard Real-Time Embedded Systems

    Energy consumption of electronic devices has become a serious concern in recent years. Energy efficiency is necessary to lengthen the battery lifetime in portable systems, as well as to reduce the operational costs and the environmental impact of stationary systems. Dynamic Power Management (DPM) algorithms aim to reduce the energy...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Mar 2014

    Analysis of Agile Software Development Utilising Cloud Computing Capabilities

    Industries are now using agile software development teams and cloud computing to accelerate development operations. Cloud computing and virtualization make agile development teams to combine multiple phases of development with other cloud services. The evolution of agile development has changed the method of software development. The agile development strategy was...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Mar 2014

    Privacy Measure for Publishing the Data- A Case Study

    Privacy-maintaining data release is one of the most important challenges in an information system because of the wide collection of sensitive information on the World Wide Web (WWW). Many solutions have been proposed by several researchers for privacy-maintaining data release. This paper provides an inspection of the state-of-the-art methods for...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2014

    Hide Inside-Separable Reversible Data Hiding in Encrypted Image

    Recently, more and more attention is paid to Reversible Data Hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly memory space from...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jan 2014

    Reconfigurable Down Sampling Channelizer for SDR Receiver Using FPGA

    In this paper the authors present, the design and implementation of reconfigurable down sampling the IF band frequency to baseband in Software Defined Radio (SDR) receiver. To enhance both the integration and adaptation of multiple communication standards like GSM, CDMA and WCDM systems, the selection of channel in SDR technology...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    Design of Low Power SRAM Architecture with Isolated Read and Write Operations at Deep Submicron CMOS Technology

    Low power VLSI design has become the major challenge of chip designs as leakage power has been rising with scaling of technologies. In deep submicron technologies, leakage power becomes a key for a low power design due to its ever increasing proportion in chip's total power consumption. Motivated by emerging...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Dec 2013

    PIC Microcontroller Universal Board

    A microcontroller is a device which integrates a number of the components of a microprocessor system onto a single microchip and optimized to interact with the outside world through on-board interfaces; i.e. it is a little gadget that houses a microprocessor, ROM (Read Only Memory), RAM (Random Access Memory), I/O...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Oct 2013

    High Performance Current-Mode Multiplier Circuit

    Multiplier-divider circuits is using in digital signal processing base on neural networks and communications (amplifiers with variable gain, modulators, detectors, etc.). In most of CMOS analog circuit, transistors are only in triode or saturate regions; till now both regions not used. In this one kind of current mode multiplier-divider circuits...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Sep 2013

    UNDERWARE - A Layer for Homogeneous Access to Heterogeneous Multi - Core Processors

    In this paper the authors propose a new way to tackle the problem of using the existing resources of multi-core processors with different types of cores, like PowerPC, Intel, ARM, DSPs, FPGA areas, etc. Applications for these heterogeneous multi-cores are difficult to write, as most programmers and programming tools target...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jul 2013

    Comparative Study of the 64-bit and Apple families of Microprocessors

    The people live in an era of computers. From the smallest embedded system to the complex servers that take care of the world economy, they need microprocessors to run them. As time passed by, applications needed more processing power and this lead to an explosive era of research on the...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2013

    Advanced Scheme for Data Transmission with Early Congestion Detection

    The authors develop a distributed opportunistic routing scheme with early congestion detection for multi-hop wireless networks. The introduced scheme utilizes the functionality of opportunistic routing and considering an expected average per packet reward criterion, shortest path and so on. Congestion in network causes packet loss and delayed packet delivery. By...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jul 2012

    Runtime Scheduling Of Dynamic Task Graphs Communication with Embedded Multiprocessors

    The multiprocessor mapping and scheduling algorithms have been extensively studied over the past few decades and have been tackled from different perspectives. Task scheduling is an essential aspect of parallel programming. Most heuristics for this NP-hard problem are based on a simple system model that assumes fully connected processors and...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2012

    User Authentication using Colors and Data Security Using Armstrong Numbers for Wireless Sensor Networks

    In real world, data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. A Wireless Sensor Network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2012

    Network Selection Algorithm for Vertical Handover in Co-operative Wireless Network

    Wireless networks are emerging towards a heterogeneous co-operative architecture to support communication needs of the end user. In this paper a centralized spectrum manager is presented which calculates the traffic load on each network and allocates another network to the user by using the network selection algorithm. Simulation results shows...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2012

    Performance Comparison of Ad-Hoc Network Routing Protocols Using NS-2

    Mobile Ad-hoc NETwork (MANET) is an infrastructure less and decentralized network which need a robust dynamic routing protocol. Many routing protocols for such networks have been proposed so far. The most popular ones are Dynamic Source Routing (DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV) routing...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jun 2012

    A Comparative Study Between Web Mining Tools Over Some WUM Algorithms to Analyze Web Access Logs

    This paper has attempted to provide an up-to-date survey of the rapidly growing area of Web usage mining, which is the demand of current technology. In this paper, the authors present an overview of the various research areas in Web data mining and then focus on the Web usage mining...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Jul 2012

    Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

    A Mobile Ad-hoc NETwork (MANET) is a temporary network that is composed of the mobile devices which communicates through wireless links without any pre-existing infrastructure. Routing is one of the major concerns in the MANET due to its frequent changing topology and the absence of centralized administrator. In this paper,...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2010

    A Novel Game Theoretic Approach for Cluster Head Selection in WSN

    In recent years Wireless Sensor Network (WSN) is an active domain of research. A WSN consists of a number of sensor nodes each with limited energy, bandwidth, storage and processing capabilities. Clustering is one of the basic approaches that offer a practical way of providing scalability when designing a large...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2013

    Survey on Efficient and Forward Secure Schemes for Unattended WSNs

    Unattended wireless sensor networks face challenges in providing good security and in showing good performance. The lack of communication with the final data receivers is the main reason for this. It is possible for the UWSNs to gather the sensible data for long time. These data are vulnerable to adversaries...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // Feb 2013

    Anomaly Detections in Internet Traffic Using Empirical Measures

    Introducing Internet traffic anomaly detection mechanism based on large deviations results for empirical measures. Using past traffic traces the authors characterize network traffic during various time-of-day intervals, assuming that it is anomaly-free. Throughout, they compare the two approaches presenting their advantages and disadvantages to identify and classify temporal network anomalies....

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)

  • White Papers // May 2013

    Efficient Load Re Balancing Algorithm for Distributed File Systems

    This system presents an innovative idea in cloud computing. In a giant cloud the authors are able to add thousands of nodes together. The main aim is to allot files to those nodes while not creating significant load to any of the nodes, for that files square measure partitioned off...

    Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)