Security plays a vital role during the transmission of private data from one sender to the other. Although there are many security algorithms implemented but here we are providing the security algorithms on the RFID devices. The authentication techniques implemented in RFID is based on the new algorithm based on smart cards. The data send through the tags can be made secure using the pro...
Paper Information
Authors Dr. Vinita Sharma, Jitendra Kumar Gupta, K. K. Mishra
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 22

The traditional multi-bitstream approach to the heterogeneity issue is very constrained and inefficient under multi bit rate applications. The multi bitstream coding techniques allow partial decoding at a various resolution and quality levels. Several scalable coding algorithms have been proposed in the international standards over the past decade, but these former methods can only accom...
Paper Information
Authors Dr. S.China Venkateswarlu. Ms. Daggumati Rajani, V.Sridhar
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

Ad-hoc networks are basically self organizing and self configuring multi-hop mobile wireless network in which the information packets are transmitted in a store and forward manner from a source to an arbitrary destination via intermediate nodes. The main objective of this paper is to performance evaluation of AODV (Ad-hoc on demand distance vector) and DSDV (Destination sequence distance...
Paper Information
Authors Er. Abhishek Sengar, Er. Sandeep Shrivastav
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

In this paper, we used an image with a gray scale (256 bits) and bmp type. An image can be converted into binary file by using one of filters (Sober, Prewitt, and Robert) to find edges of the original image. Then we input the watermark to prove the authentic and password that used as a key for ciphering the information. This information will embed by using the Vigenere system that will s...
Paper Information
Authors Dr. Kareem Mohammed Jubor
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

Cluster computing systems have recently generated enormous interest for providing easily scalable and cost-effective parallel computing solution for processing large-scale applications. Various adaptive space-sharing scheduling algorithms have been proposed to improve the performance of dedicated and homogeneous clusters. But commodity clusters are naturally non-dedicated and tend to be ...
Paper Information
Authors Dr. Amit Chhabra, Gurvinder Singh
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Traditionally, computer software’s has been written for serial computation. This software is to be run on a single computer with a single Central Processing Unit (CPU). A problem is broken into a discrete serial of instructions that executed in the exact order, one after another. Only one instruction can be executed at any moment of time on a single CPU. Parallel computi...
Paper Information
Authors Dr. P.K. Suri, Sumit Mittal
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 44

The wide qualities of distributed (ex: P2P networks) network has given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism. ...
Paper Information
Authors Bolladi Swathi, P.Vasanth Sena
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 25

The purpose of this paper is to identify and explore the challenges for potential solutions in the field of Mobile Application, Cloud Computing, Artificial Intelligence, Robotics and Home – made Devices (Television, Refrigerator, Air Conditioner, Air Cooler, Mixer Grinder) in Embedded Systems. This paper is an attempt to introduce the reader into the world of GSM based O...
Paper Information
Authors Mr. Prashant Kumar, Dr. Suyash Narayan Mishra, Mr. Zoheb Rahman
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 31

In this paper an image outlier technique, which is a hybrid model called SVM regression based DWT optimization have been introduced. Outlier filtering of RGB image is using the DWT model such as Optimal-HAAR wavelet changeover (OHC), which optimized by the Least Square Support Vector Machine (LS-SVM) . The LS-SVM regression predicts hyper coefficients obtained by using QPSO model. The ma...
Paper Information
Authors Dr. R.Sunitha, Yugandhar Dasari
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Ad hoc networks consist of independent self structured nodes. Nodes use a wireless medium for exchange their message or data, therefore two nodes can converse directly if and only if they are within each other’s broadcast range. Swarm intelligence submits to complex behaviors that occur from very effortless individual activities and exchanges, which is frequently experie...
Paper Information
Authors Mr. B. M. G. Prasad, Dr. P.V.S. Srinivas
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 15