International Journal of Innovative Trends in Engineering
Approved By International Serial Standard(ISSN), National Science Library(NSL) and National Institute of Science Communication and Information Resources(NISCAIR)
ISSN: 2395-2946 (Online)

News Updates: IJITE October 2017 Volume 34 Edition Published Sucessfully.                Call for Papers: IJITE Inviting Research Papers For Volume 35 (November 2017) Edition.

IJITE - Issue 33, Volume 20, Number 01

Published On : August 2016
SNo. Paper Title & Authors Page Download
1
An Extensive Review onTwo-Way Cyclotomic Orthogonal Space-Time Transmission Scheme for Asynchronous Cooperative Systems
Tavrej Khan, Prof. Shailendra Singh Pawar &Prof. Mohd. Sarwar Raeen
Abstract: Multiple-Input-Multiple-Output(MIMO) communication techniques have been an important area of focus for 4th generation wireless systems. This is mainly because of their potentials for high capacity, increased diversity, and interference suppression. The cooperative communication techniques can avoid the difficulties of implementing actual antenna arrays and convert the single-input single-output (SISO) system into a virtual MIMO system. In this scheme, the user explores its other neighbor users to act as relaying nodes and forming virtual MIMO system. Space-Time Block Coding (STBC) is used to improve the transmission reliably and spectral efficiency of MIMO systems. When STBC is applied to a cooperative diversity, the system termed as Distributed Space Time Block Code (D-STBC). Most of the existing research assumes perfect synchronization among cooperative users in DSTBC. This means that they have identical timing, carrier frequency, and propagation delay, which is almost impossible to be achieved. The lack of common timing reference can badly influence the performance of the D-STBC system. There are different research efforts to overcome this problem; most of which have high decoding complexity.
Keywords: asynchronous cooperative communication, two-way transmission, Cyclotomic orthogonal space-time block code (COSTBC)
01-05
Full Text
2
Production of Activated Carbon from Agriculture & Paper Industry Wastes: Result, Evaluation & Discussions
Abhinav Singh , Arun Kumar Bhuneriya
Abstract: Activated carbon has been there with us for hundreds of years. It has large purposes in quite a lot of industries e.G. Within the water-cure, dye, sugar refining, among others. All the activated carbon on hand in Kenya is imported. Therefore creation of activated carbons in the community and from locally on hand materials can be one of the moneymaking and atmosphere-pleasant solutions to this as it might change into poor–valued wastes to useful materials. For that reason, the primary objective of this study used to be to prepare activated carbons from paper mill slug using a two-step method, and to establish the
Keywords:
06-12
Full Text
3
An Extensive Review on Optimal Ordering Technique for PerformanceImprovement of MIMO-OFDM System usingV-BLAST Algorithm
Brijesh Tiwari, Prof. Abdul Samee Khan &Prof.Mohd.Sarwar Raeen
Abstract: In this modern age of high speed wireless data communication, multiple input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) schemes have recently drawn wide interests due to their capability of high data rate transmission over multipath fading channels.The advent of multiple input, multiple output (MIMO) antennas has had a major influence on how the current capacity limits of single antenna systems could be increased without the need of overwhelming computational complexity. MIMO enhances the capacity of the system and can be used in conjunction with multi-user techniques to improve system throughput.
Keywords: MIMO-OFDM, V-BLAST, ZF equalizer, BPSK, Successive Interference Cancellation (SIC).
13-17
Full Text
4
An Analysis of Channel Estimation for OFDM Systems through a Literature Survey
Naveen Tiwari, Prof. Bhagwat Kakde, Dr. Manish Jain
Abstract: Radio transmission has allowed people to communicate without any physical connection for more than hundred years. When Marconi managed to demonstrate a technique for wireless telegraphy, more than a century ago, it was a major breakthrough and the start of a completely new industry. May be one could not call it a mobile wireless system, but there was no wire! Today, the progress in the semiconductor technology has made it possible, not to forgot affordable, for millions of people to communicate on the move all around the world.
Keywords: Channel estimation, Leakage nulling,OFDM.
18-21
Full Text
5
Low Power SCN CAM Based on Parity
Ashidha E.B , Elsa Jose Palatty
Abstract: we propose a low power content addressable memory (CAM) employing a new algorithm. This is based on a parity based SCN. The proposed idea is based on the recently developed parity based on SCN-CAM. The parity bit based CAM design is consist of the original data segment and an extra one-bit segment, derived from the actual data bits. We only obtain the parity bit, i.e., odd or even number of “1”s. The obtained parity bit is placed directly to the corresponding word. Thus the new architecture has the same interface as the conventional CAM with one extra bit.
Keywords: Sparse clustered network(SCN),Content addressable memory (CAM).
22-27
Full Text
6
A Survey on Privacy Preserving Multiparty Data Mining Techniques
Apoorva Shrivastava, Prof. Sandeep Pratap Singh, Prof. Sanjay Sharma
Abstract: The information system is an integrated system that holds financial and personnel records of persons working in various departments. The availability of an increasing amount of user generated data is transformative to our society. However, the large collection of user generated data contains unique patterns and can be used to re-identify individuals. Number of techniques such as privacy preserving data mining, k-anonymity, l-diversity and other techniques are developed for preventing the privacy of data owner and data release operations. In this survey work various techniques are reviewed for privacy preserving data release technique for improving the privacy with minimum cost requirements.
Keywords: Distributed Database, Multi-Party Computation, Aggregation, Privacy Preserving.
28-32
Full Text
7
A Survey on Cryptographic Schemes used In Wireless Sensor Networks for securing communication
GunjanShrivastava, Prof. SandeepPratap Singh , Prof. Sanjay Sharma
Abstract: The wireless sensor network is one of the most popular network technologies for different applications. A number of applications such as weather monitoring and geo-location tracking are implemented using the WSN technology. Because of which these networks are utilized in critical situations. Therefore the security in the communicated data is a primary aspect of the network for smooth functioning of the network.This paper provides the background of wireless sensor network. In this survey work, various techniqueof cryptographic schemes for providing security in wireless sensor network are reviewed.
Keywords:
33-38
Full Text
8
A Highly Secure Authentication Scheme Using Text and Integrated Biometrics Technique
Ephin M
Abstract: Biometrics is the measurement of physical characteristics such as fingerprints, palm print, retina, iris, face etcetera. Integrated biometric mechanism is meant for combining more than one biometric mechanism for example fingerprint and palm print, for better authentication. Existing single modal biometric system has more error rate and provides less security than the combined one[1][2]. Single modal finger print authentication fails in situations like usage of fake finger print, presence of scars in the finger print etcetera[3]. This paper presents a highly secure authentication scheme using text and combined biometrics technique which can increase the security of the system and offers better authentication whereas the error rate is less. Moreover it enables the user to select the level of authentication for various applications considering different factors in view of user behavior and threat[4]. Further, the combination of text and multimodal biometric system achieves significantly better performance than either of the individual schemes.
Keywords: Biometrics, Authentication, Security, Fingerprint, Palm print.
39-45
Full Text
9
Enhanced Load Balanced Security Solution in Cloud Computing
Kumud Gupta, Anuradha Panjeta
Abstract: With the advancement in technology and lot of upcoming security issues,one wonders how to keep the cloud environment secure and safe.The use of FHE and Homomorphic encryption for this has helped in improving the overall security in cloyd computing environments.The use of Min-Min tasks cheduling has helped in improving the task scheduling.The makespan has been reduced using the Virtual machine migration and load balancing has been improved. In our thesis we have proposed a task scheduling algorithm to achieve the minimum makespan of tasks.We have used the cloud sim 3.1 environment and netbeans as a platform to apply load balanced min-min task scheduling algorithm for static meta task scheduling and the advancement of it is enhanced load balanced min-min task scheduling in which there are two rounds,in first round the load balanced min-min scheduling is applied and in second round enhanced load balanced min-min task scheduling algorithm is applied over smaller tasks in cloud environment.Both these algorithms are applied to improve the maespan time of metatasks and improve the load balancing in cloud environment for faster execution of tasks.Also in our proposed work we have applied the security in cloud computing using the homomorphic encryption and avoided the attacks on source and destination nodes using the variation of homomorphic encryption i.e. full homomorphic encryption.The security applied using full homomorphic encryption uses the concept of router o send and direct the encrypted data to destination.
Keywords:
46-53
Full Text
10
Parallel Web Content Mining in Multicore System using Apriori Algorithm
Narendra Parmar , Dr. Vineet Richhariya , Jay Prakash Maurya
Abstract: The web content mining is a useful technique for discovering frequently and regularly occurring keywords in web data. Various algorithms have been proposed to speed up the web mining performance on the single and multicore systems. Unfortunately, when the volume of web dataset size is large, then both the computational cost and memory use can be extremely expensive. In this paper, we parallelized the Apriori algorithm using message-passing interface (MPI) on the multicore machines. We divided the large volume of database into the total number of CPU cores, and applied the integrated potential of all the CPU cores, to accomplish the maximum throughput. Our experimental result presents that the parallel execution of web content mining using Apriori algorithm achieves high speed up ratio as compared to serial execution. Finally, this paper is concluded with many future implementation and analysis.
Keywords: Web Content Mining, Data Mining, Apriori Algorithm, Parallel Processing.
54-59
Full Text