International Journal of Recent Technology and Engineering (IJRTE)

Displaying 1-40 of 90 results

  • White Papers // Mar 2014

    Extracting Precise Data by Preventing Discrimination in Data Mining

    The concept of classification is one of the most popular data mining tasks. The result of classification depends critically on data quality. There are some negative social perceptions about data mining which include potential privacy invasion and discrimination. Discrimination refers to the data set which contain unwanted data items. Discrimination...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2014

    Challenges and Implementation Steps of Natural Language Interface for Information Extraction from Database

    The use of computers has started from last few years and the phase of bringing awareness in different parts of society regarding use and benefits of computer increased successfully. Not only industry but educational institutes, service sectors, manufacturing sectors etc. are using computers to store, process and update the information....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Design and Implementation of Programmable Transceivers Based Software Defined Radio Using FPGA

    In this paper, an efficient programmable transceivers based Software Defined Radio (SDR) technology is proposed. In the most wireless and mobile system and even digital communication, the modem scheme and pulse shaping filter play vital role to optimize the information size and security. Therefore, the digital modem is used to...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Design and Simulation of Energy-Efficient 8-Bit Input Buffer for NoC Router

    In NoC (Network on Chip), the power consumption is major issue while designing. In NoC router, conventional input buffer consume more energy. The paper is focused on the energy-efficient design of 8-bit input buffers, which use the characteristic of transmission of data on NoC that has probability of transmitting a...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Secure Data Storage in Cloud Service Using RC5 Algorithm

    Enterprises always used organizational internal storage system for storing data. Mainly in a customer relational management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage are there may be intruders in...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    An Efficient Concept-Based Mining Model for Analysis Partitioning Clustering

    Data clustering is an important task in the area of data mining. Clustering is the unsupervised classification of data items into homogeneous groups called clusters. Clustering methods partition a set of data items into clusters, such that items in the same cluster are more similar to each other than items...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Human Biometrics: Moving Towards Thermal Imaging

    Thermal imaging is simply the technique of using the heat given off by an object to produce an image of it or locate it. New thermal imaging frameworks for detection, segmentation and unique feature extraction and similarity measurements for human physiological biometrics recognition are reviewed. The research investigates specialized algorithms...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Implementation of Boolean Matrix Approach for Mining Multidimensional Association Rule with Non-Repetitive Predicate

    Implementation of an algorithm of mining multidimensional association rules with non repetitive predicate from relational database is given. The relational database that the authors considered here is for computer store. They mine the multidimensional association rule from it. Boolean matrix based approach has been employed to generate frequent item sets....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Nov 2013

    An Efficient Modular Approach of Intrusion Prevention in Wireless Sensor Networks

    Security of wireless sensor network becomes crucial issue in the latest research with the fast deployment of wireless sensor network. The latency between an attack detection and corrective action taken by the administrator is usually high and therefore, at the time the administrator notices an attack and takes some suitable...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Nov 2013

    Public Key Cryptography Algorithm Using Binary Manipulation and Chinese Remainder Theorem

    Cryptography enables all processes, transactions, and communications to be safely performed electronically. Public key achieve confidentiality and has the ability to create a digital signature where as private key achieve confidentiality. Public key cryptography is an extremely active subject of research with important applications in electronic commerce and internet security....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Nov 2013

    Detecting and Detaching Reactive Jammers in Wireless Sensor Network

    In recent days, reactive enjoying strike has appeared as an exceptional security risk to Wireless Sensor Network (WSN). A few schemes are generated to acknowledge the trigger nodes, whose valid transmitting stimulates any reactive jammer. After identifying the trigger node, the node may likely be shut down to deactivate the...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Nov 2013

    Review and Analysis of Various Mobile Ad Hoc Network Routing Protocols

    Now-a-days, the use of mobile wireless devices is increases tremendously all over the world which leads researchers to frequently work over the new improvements in mobile ad hoc network communication protocols, which the authors can called as MANET routing protocols. The main aim behind these researches is to outperform the...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Nov 2013

    Review of Delay and Cost Efficient Methods in Cloud Computing

    Now-a-days, the approach of cloud computing is providing utility oriented computer services to end users all over the world. At same time, cloud users can make number of requests for different cloud services and their resources. With help cloud the authors can able to access their personal or public data...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Sep 2013

    Fiscal Implementation of Encoding and Decoding Schema for Graph Mining Technique using Realtime Data Base Management System

    Graph mining in DataBase Management System (DBMS) has become an important topic of research recently because of numerous applications to a wide variety of identification problems in current educational system. Now-a-days, graphs play a vital role everywhere, occupying the social networks and mobile networks to biological net-works and the World...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Sep 2013

    Evaluation of Student Performance Using Data Mining Over a Given Data Space

    The volume of data generated every year in the users' institutions is enormous, due to this large volume of data there is the need to provide a efficient system support to aid in good decision making process; this is what necessitated this paper which is all about the evaluation of...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Sep 2013

    Association Rule Mining: A Multi-Objective Genetic Algorithm Approach Using Pittsburgh Technique

    Association rules usually found out the relationship between different data entities in given data set and moreover it is very much important task of data mining. Basically, association rule mining is a multi-objective problem, instead of a single objective problem. A multi-objective genetic algorithm approach using Pittsburgh technique is introduced...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Sep 2013

    IP- Apriori: Improved Pruning in Apriori for Association Rule Mining

    Association rule mining which is of great importance and use is one of a vital technique for data mining. Main among the association rule mining techniques have been Apriori and many more approaches have been introduced with minute changes to Apriori but their basic concept remains the same i.e. use...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Sep 2013

    Biometric Identification on the Basis of BPNN Classifier With Other Novel Techniques Used for Gait Analysis

    Gait is the manner of the limb movement or the manner of moving a foot of an individual and recognition of an individual is the task to identify a people. Gait recognition is the biometric process by which an individual can be identify by manner they walk. The advantage of...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Sep 2013

    Face Recognition System using EBGM and ANN

    There are many challenges associated with face recognition systems which make them a complex and difficult process. These factors include - pose variations, facial expressions and occlusion, age etc. These factors affect the face recognition systems and deteriorate their accuracy. The face recognition problem can be solved by using some...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Optimization of CMOS 8-bit Counter using SLA and Clock Gating Technique

    The development of digital integrated circuits is challenged by higher power consumption. Scaling helps to improves transistor density, increase speed and frequency of operation and hence higher performance. As voltages scale downward with the geometries threshold voltages must also decrease to gain the performance advantages of the new technology but...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Self Monitoring E-Mail Organizer with Information Management and Text Mining Application

    E-mail is one of the most ubiquitous applications used regularly by millions of people worldwide. Professionals have to manage hundreds of emails on a daily basis, sometimes leading to overload and stress. Lots of emails are unanswered and sometimes remain unattended as the time pass by. Managing every single email...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Spam Detection Using Baysian with Pattren Discovery

    Text mining is nothing but the discovery of interesting knowledge in text documents. But there is a big challenging issue that how to guarantee the quality of discovered relevant features. And that are in the text documents for describing user preferences because of the large number of terms, patterns and...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    An Enhanced K Means Clustering using Improved Hopfield Artificial Neural Network and Genetic Algorithm

    Due to the increase in the quantity of data across the world, it turns out to be very complex task for analyzing those data. Categorize those data into remarkable collection is one of the common forms of understanding and learning. This leads to the requirement for better data mining technique....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Peer to Peer Scheduling in PBS and Implementing Multi-Level Feedback Queues

    Grid computing is the federation of pooling resources in order to solve various large problems. Grid computing has gained remarkable importance in the last decade as the resource requirements for large applications increased drastically. Scheduling is the main issue in grid computing and it is the process of making scheduling...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Web Data Extraction Using Tree Structure Algorithms - A Comparison

    Now-a-days, web pages provide a large amount of structured data, which is required by many advanced applications. This data can be searched through their Web query interfaces. The retrieved information is also called 'Deep or hidden data'. The deep data is enwrapped in web pages in the form of data...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    KVM Based Virtualization for Low Cost Computing

    In this paper, the authors propose a virtual remote environment to user over a LAN by using open source system and virtualization tools. Today's desktop processors offer great computation functionality, fast processing power and memory. The aim is to provide low cost computing using open source technology and various free...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Comparative Study of Clustering Based Algorithm in Mobile Ad-Hoc Network

    Today Energy efficiency is a critical issue in Mobile Ad-hoc NETworks (MANETs) for increasing the lifetime of the individual nodes as well as the overall network. Mobile ad-hoc network has become a very important field of study for students and researchers owing to its wide application. In mobile ad-hoc network...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Efficient Optimization Of FPGA On-Chip Memory For Image Processing Algorithm

    In this paper the authors concerned with efficient optimization and low power implementation of FPGA on-chip memories in image processing algorithms. In recent years on chip memories are expected to increase continuously which depends upon the application for future generation portable devices and high performance processors. Memory plays a major...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Implementation of RNG in FPGA using Efficient Resource Utilization

    Computers' required random numbers initially, for simulations and numerical computations like Monte Carlo calculations. Random number generators offer an important contribution to many communication systems for security. They are critical components in computational science. However the tradeoff between quality and computational performance is an issue for many numerical simulations. FPGA...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Performance Improvement by Classification Approach for Fingerprint Identification System

    In the world of information technology, information security is an important factor. For information security, authentication plays a vital role. And for secure authentication now-a-days, biometric based authentication ('Who you are', e.g. fingerprint) replace the knowledge based ('What you know', e.g. password) and object based authentication ('What you have', e.g....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    An Enhanced Feature Selection Tool for Face Detection using Genetic Algorithm

    Various face detection techniques has been proposed over the past decade. Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. This creates unnecessary computation...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Neural Network Approach for Web Usage Mining

    Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the web. Web usage mining has become very critical for effective web site management, business and support services, personalization, and network traffic flow analysis and so on. Previous study on...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Thermal Recognition in Biometrics Approach

    Humans recognize each other according to their various characteristics for ages. The authors recognize others by their face when they meet them and by their voice as they speak to them. Identity verification (authentication) in computer systems has been traditionally based on something that one has (key, magnetic or chip...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Public Key Cryptography Using Genetic Algorithm

    Cryptography is an imperative tool for protecting and securing data. Security provides safety and reliability. Genetic Algorithm (GA) is typically used to obtain solution for optimization and search problems. This paper presents application of GA in the field of cryptography. Key Selection in public key cryptography is a selection process...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Apr 2013

    Implementation of ATM Algorithm through VHDL

    ATM (Automatic Teller Machine) is a very essential tool required for the society in order to facilitate the need of safe transaction of money. Using this facility one can easily perform the various functions such as balance inquiry, withdrawn, money transfer etc. As this machine operation rely on bank cards,...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    A Novel Architecture for Super Speed Data Communication for USB 3.0 Device Using FPGA

    The need for SuperSpeed data communication leads to the use of USB 3.0. USB 3.0 utilizes dual bus architecture which provides both SuperSpeed and non-SuperSpeed connectivity. This can be possible by mixing the advantage of parallel and serial data transfer. This paper provides a novel architecture for communication between USB...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Design of Low Power Sram Memory Using 8t Sram Cell

    Low power design has become the major challenge of present chip designs as leakage power has been rising with scaling of technologies. As modern technology is spreading fast, it is very important to design low power, high performance, and fast responding SRAM (Static Random Access Memory) since they are critical...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Privacy-Preserving Public Auditing in Cloud Using HMAC Algorithm

    Cloud computing is the arising technology to minimize the user burden in the updation of data in business using internet. Instead of local data storage and maintenance, the user is assisted with the cloud storage so that the user can remotely store their data and enjoy the on-demand high quality...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Investigation and Analysis of Current Web Mining Techniques as Well as Frameworks

    Everyone using the web, experiences how the connection to a popular web site may be very slow during rush hours and it is well known that web users tend to leave a site if the wait time for a page to be served exceeds a given value. Therefore, performance and...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Extracting Peculiar Data From Multidatabases Using Agent Mining

    Data mining is a broad term that describes the search to extract some meaningful information from data that is unformatted and either unstructured or partially structured Similarly, the researcher described it as \"The nontrivial process identifying valid, novel, potentially useful, and ultimately understandable patterns in data\". Data mining is also...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2014

    Extracting Precise Data by Preventing Discrimination in Data Mining

    The concept of classification is one of the most popular data mining tasks. The result of classification depends critically on data quality. There are some negative social perceptions about data mining which include potential privacy invasion and discrimination. Discrimination refers to the data set which contain unwanted data items. Discrimination...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Design and Implementation of Programmable Transceivers Based Software Defined Radio Using FPGA

    In this paper, an efficient programmable transceivers based Software Defined Radio (SDR) technology is proposed. In the most wireless and mobile system and even digital communication, the modem scheme and pulse shaping filter play vital role to optimize the information size and security. Therefore, the digital modem is used to...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2014

    Design and Simulation of Energy-Efficient 8-Bit Input Buffer for NoC Router

    In NoC (Network on Chip), the power consumption is major issue while designing. In NoC router, conventional input buffer consume more energy. The paper is focused on the energy-efficient design of 8-bit input buffers, which use the characteristic of transmission of data on NoC that has probability of transmitting a...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Optimization of CMOS 8-bit Counter using SLA and Clock Gating Technique

    The development of digital integrated circuits is challenged by higher power consumption. Scaling helps to improves transistor density, increase speed and frequency of operation and hence higher performance. As voltages scale downward with the geometries threshold voltages must also decrease to gain the performance advantages of the new technology but...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Efficient Optimization Of FPGA On-Chip Memory For Image Processing Algorithm

    In this paper the authors concerned with efficient optimization and low power implementation of FPGA on-chip memories in image processing algorithms. In recent years on chip memories are expected to increase continuously which depends upon the application for future generation portable devices and high performance processors. Memory plays a major...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Implementation of RNG in FPGA using Efficient Resource Utilization

    Computers' required random numbers initially, for simulations and numerical computations like Monte Carlo calculations. Random number generators offer an important contribution to many communication systems for security. They are critical components in computational science. However the tradeoff between quality and computational performance is an issue for many numerical simulations. FPGA...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    A Novel Architecture for Super Speed Data Communication for USB 3.0 Device Using FPGA

    The need for SuperSpeed data communication leads to the use of USB 3.0. USB 3.0 utilizes dual bus architecture which provides both SuperSpeed and non-SuperSpeed connectivity. This can be possible by mixing the advantage of parallel and serial data transfer. This paper provides a novel architecture for communication between USB...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Design of Low Power Sram Memory Using 8t Sram Cell

    Low power design has become the major challenge of present chip designs as leakage power has been rising with scaling of technologies. As modern technology is spreading fast, it is very important to design low power, high performance, and fast responding SRAM (Static Random Access Memory) since they are critical...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2013

    Low Power MAC Unit for DSP Processor

    Power dissipation is one of the most important design objectives in integrated circuit, after speed. Digital Signal Processing (DSP) circuits, whose main building block is a Multiplier-ACcumulator (MAC) unit. High speed and low power MAC unit is desirable for any DSP processor. This is because speed and throughput rate are...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2014

    Challenges and Implementation Steps of Natural Language Interface for Information Extraction from Database

    The use of computers has started from last few years and the phase of bringing awareness in different parts of society regarding use and benefits of computer increased successfully. Not only industry but educational institutes, service sectors, manufacturing sectors etc. are using computers to store, process and update the information....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Apr 2012

    A Comparative Study of Different Low Power Techniques for SRAM

    There is three type of low power technique discussed here for static random access memory. One is quiet bit line architecture in which the voltage of bit line stay as low as possible. To prevent the excessive full-swing charging on the bitline one-side driving scheme for write operation is used...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2013

    Cloud Business Intelligence - Is What Business Need Today

    The present economic crisis experienced by all the states of the world orients more and more the information technology industry towards efficiency. Organizations are striving to become intelligent and achieve competition advantages through the use of Business Intelligence (BI) solutions. One of the instruments that can bring about the technology...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Privacy-Preserving Public Auditing in Cloud Using HMAC Algorithm

    Cloud computing is the arising technology to minimize the user burden in the updation of data in business using internet. Instead of local data storage and maintenance, the user is assisted with the cloud storage so that the user can remotely store their data and enjoy the on-demand high quality...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Apr 2013

    Implementation of ATM Algorithm through VHDL

    ATM (Automatic Teller Machine) is a very essential tool required for the society in order to facilitate the need of safe transaction of money. Using this facility one can easily perform the various functions such as balance inquiry, withdrawn, money transfer etc. As this machine operation rely on bank cards,...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Dec 2012

    The Impact of Packet Drop Attack and Solution on Overall Performance of AODV in Mobile Ad-hoc Networks

    Mobile ad-hoc network has features like self organization, adaptation in changing environment, nodes in ad hoc network works as router for routing packets. Each nodes have limited resources like bandwidth, battery power and storage capacity. MANETs are vulnerable to Denial of Service (DoS) attacks like black hole attack, gray hole...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Self Monitoring E-Mail Organizer with Information Management and Text Mining Application

    E-mail is one of the most ubiquitous applications used regularly by millions of people worldwide. Professionals have to manage hundreds of emails on a daily basis, sometimes leading to overload and stress. Lots of emails are unanswered and sometimes remain unattended as the time pass by. Managing every single email...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jul 2013

    Spam Detection Using Baysian with Pattren Discovery

    Text mining is nothing but the discovery of interesting knowledge in text documents. But there is a big challenging issue that how to guarantee the quality of discovered relevant features. And that are in the text documents for describing user preferences because of the large number of terms, patterns and...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Apr 2012

    A Proposed Secure Framework for Safe Data Transmission in Private Cloud

    Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jun 2012

    Genetic K-Means Algorithm - Implementation and Analysis

    K-means algorithm is most widely used algorithm for unsupervised clustering problem. Though it is accepted but it has some problems which make it unreliable. Initialization of the random cluster centres, number of clusters and terminating condition play a major role in quality of clustering achieved. This paper empirically analyses a...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Modified Dynamic Algorithm of Data Clustering Using Fuzzy C Mean Algorithm

    Clustering is a division of data into group of similar objects. Each group, called a cluster, consists of objects that are similar between themselves and dissimilar compared to objects of other group. Dynamic-means is a widely used clustering method. While there are considerable research efforts to characterize the key features...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Investigation and Analysis of Current Web Mining Techniques as Well as Frameworks

    Everyone using the web, experiences how the connection to a popular web site may be very slow during rush hours and it is well known that web users tend to leave a site if the wait time for a page to be served exceeds a given value. Therefore, performance and...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Mar 2013

    Extracting Peculiar Data From Multidatabases Using Agent Mining

    Data mining is a broad term that describes the search to extract some meaningful information from data that is unformatted and either unstructured or partially structured Similarly, the researcher described it as \"The nontrivial process identifying valid, novel, potentially useful, and ultimately understandable patterns in data\". Data mining is also...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // May 2013

    Performance Improvement by Classification Approach for Fingerprint Identification System

    In the world of information technology, information security is an important factor. For information security, authentication plays a vital role. And for secure authentication now-a-days, biometric based authentication ('Who you are', e.g. fingerprint) replace the knowledge based ('What you know', e.g. password) and object based authentication ('What you have', e.g....

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2013

    Investigation on Advanced Encryption Standard Techniques Using Smart Copyback for Data

    Advanced Encryption Standard (AES) is a symmetric block cipher that is intended to replace DES as the approved standard for a wide range of applications. Advanced Encryption Standard (AES) is the current standard for secret key encryption. NIST selected Rijndael as the proposed AES algorithm. The two researchers who developed...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2013

    Problems in Mobile Agent System Security

    In the last few years, the internet, and in particular its most prominent offspring, the WWW, has become highly accepted. In spite of its much practical profit, mobile agent technology results in significant new security threats from both malicious agents and hosts. In this paper, the authors explore the approaches...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jan 2013

    Analyzing Data Collection Strategies Using Mobile Sink

    One of the most important tasks of Wireless Sensor Network (WSN) is data collection. In sensor network the sensors are sensing the information and will be collected by the sink node with multi hoping. In such a scenario the energy is consumed by the node is more. In recent years...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Apr 2012

    Clustering Approach for Distributed Cooperative Detection in Cognitive Radio Networks

    There have been significant advancements towards realizations of cognitive radios, as well as towards the development of the various enabling technologies needed for the diverse potential application scenarios of CRs. Nevertheless, the authors have also seen that a lot of further research and development work is definitely needed before general...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Apr 2012

    A Pattern Recognition Framework for Embedded Sensor Electronics

    The recent developments in the area of high speed micro-electronics and computational intelligence has opened new opportunities in smart sensor design. In this paper a generic pattern recognition framework is presented for integrated sensor based system design. Two case studies are described for Rock-Image Classification and Pulse Shape Identification. Both...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Real-Time Detection of Driver Fatigue Using DIP

    A Drowsy Driver Detection System has been developed, based on eye features detection algorithm and using a computer vision based concepts. The system uses a small monochrome security camera that points directly towards the driver's face and monitors the driver's eye and head movement in order to detect fatigue. The...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Systemwide Safety and Reliability for Intelligent Intersections in Hybrid Systems

    There is an increasing interest in the automation of driving tasks highway traffic management. The authors address intelligent intersections design problems, where traffic lights are removed. Cars exercise an interaction of centralized and distributed decision making to negotiate the intersection through. Intelligent intersections are a representative of complex hybrid systems,...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    An IPM-APSO Based Hybrid Method for Multiple Objective Minimizations Using TCPS

    This paper presents an Interior Point Method (IPM) and variant of Adaptive Particle Swarm Optimization (APSO) based hybrid method to solve optimal power flow in power system incorporating Flexible AC Transmission Systems (FACTS) such as Thyristor Controlled Phase Shifter (TCPS) for minimization of multiple objectives. The proposed IPM-APSO algorithm identifies...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Route Rating and Centrality in Zone Routing Protocol for MANET

    Routing is an important challenge in wireless adhoc networks. Mobile Adhoc networks are infrastructure less and are characterized by multi-hop wireless connectivity and changing network topology. They are self organized networks. Role of routing protocols becomes even more significant because of the dynamically changing topology of MANET. A routing protocol...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    XLP: An Integrated Protocol for Efficient and Reliable Communication in Wireless Sensor Networks

    Now-a-days, vast majority of the existing solutions are based on the classical layered protocol approach, which leads to significant overhead. Severe energy constraints of battery-powered sensor nodes necessitate energy-efficient communication in Wireless Sensor Networks (WSNs).In this paper, a CROSS-Layer Protocol (XLP) is introduced, to achieve congestion control, routing between nodes,...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    An Efficient Software Quality Models for Safety and Resilience

    Software Quality Engineering is an emerging discipline that is concerned with improving the approach to software quality. The goal is to propose a quality model suitable for such a purpose through the comparative evaluation of existing quality models and their respective support for Software Quality Engineering. Cost, schedule and quality...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Discovering a Secure Path in MANET by Avoiding Black/Gray Holes

    Mobile Ad hoc NETworks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    A Compact Microstrip Antenna for X Band Application

    In the recent years the development in communication systems requires the development of low cost, minimal weight, low profile antennas that are capable of maintaining high performance over a wide spectrum of frequencies. This technological trend has focused much effort on the design of a Microstrip patch antenna. A single...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Performance Analysis and Simulation of AODV, DSR and TORA Routing Protocols in MANETs

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates as an end system and also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. They...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Study and Analysis of Image Reconstruction Techniques for Fraud and Tamper Detection in Authenticity Verification

    Image reconstruction is a very important research problem with respect to information security. Digital image reconstruction is a robust means by which the underlying images can be revealed and analyzed for any fraud. One of the principal problems in image forensics and security systems is determining if a particular image...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Aug 2012

    Design and Implementation of DSSS-CDMA Transmitter and Receiver for Reconfigurable Links Using FPGA

    Direct Sequence Spread Spectrum (DSSS), is also called as Direct Sequence Code Division Multiplexing Access (DS-CDMA). In direct sequence spread spectrum, the stream of information to be transmitted is divided into small pieces, each of which is allocated across to a frequency channel across the spectrum. A data signal at...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)

  • White Papers // Jun 2012

    Fake Data Termination in Wireless Sensor Networks

    Wireless sensor networks are specified ad-hoc networks. They are characterized by their limited computing power and energy constraints because they are generally limited in memory, power and computational ability. Thus they can only transmit data to a limited distance. The major challenges of wireless sensor networks are security. This paper...

    Provided By International Journal of Recent Technology and Engineering (IJRTE)