International Journal of Electronics and Computer Science Engineering

Displaying 41-80 of 224 results

  • White Papers // Apr 2013

    Data Extraction from Environment Using GPRS Sensors

    Increase in vehicular pollution affect on environment as well on human health, so this paper contain brief introduction to vehicular pollution. To monitor this pollution Wireless Sensor Network (WSN) system is proposed. The proposed system consists of a Mobile Data-AcQuisition unit (Mobile-DAQ) and a fixed internet-enabled Pollution monitoring Server (Pollution-Server)....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Soft Core Processor for Embedded System

    A softcore processor is a Hardware Description Language (HDL) model of a specific processor Central Processing Unit (CPU) that can be customized for a given application and synthesized for an ASIC or FPGA target. In many applications, softcore processors provide several advantages over custom designed processors such as reduced cost,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Orthogonal Frequency Division Multiplexing System with Frequency Offset Estimation

    Orthogonal Frequency Division Multiplexing (OFDM) system, use a large number of parallel narrowband subcarriers instead of a single wide-band carrier to transport information. Orthogonal frequency division multiplexing is the modulation technique use in digital communication systems. Carrier frequency offset occurs due to Doppler effect or noise. Carrier Frequency Offsets (CFOs)...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Modular BiNoC Architecture Design for Network on Chip

    The advent of deep sub-micron technology has recently highlighted the criticality of the on-chip interconnects. As diminishing feature sizes have led to increases in global wiring delays, Network-on-Chip (NoC) architectures are viewed as a possible solution to the wiring challenge and have recently crystallized into a significant research thrust. Both...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Low Cost Tunable Bandstop Filter Design of Defected Ground Structure Using FR4 Substrate

    This paper presents a tunable bandstop filter design using Defected Ground Structure (DGS) where FR4 substrate is used as a low cost solution compared to others substrate such as Teflon and Rogers RT/Duroid. Thus, the performance of the tunable DGS bandstop filter using FR4 substrate is analyzed in this paper....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Analysis of Communication Receiver Performance in Presence of Noise Jamming Using VISSIM/COMM

    A typical communication system includes three key elements: a transmitter, a communication medium (or channel), and a receiver. Modeling of all three of these elements is necessary in order to evaluate the performance of a Communication System under jamming condition as well. To meet this objective, simulation software "VisSim/Comm." is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    The Roadmap for Cyber Crime Investigation

    As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called \"Cyber forensics.\" Cyber penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Review on Reconfigurable Low Pass Bandstop Filter Based on Technology, Method and Design

    Reconfigurable filter technology is in robustness development. Due on the tunable and reconfigurable capability will contribute a various advantages in wireless applications. This tuning selectivity consist a numerous method, for example using varactor, micromachines, and PINdiodes. In this paper, the authors discussed PIN diodes as a switching element. The design...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Novel Compact CPW-FED Printed Dipole Antenna for UHF RFID and Wireless LAN Applications

    A novel compact CPW-fed printed dipole antenna is proposed for dual-band Ultra wide band (UHF) RFID and Wireless Local Area Network (WLAN) operations. This antenna consist of two dipole elements and it covers 2.53 GHz Ultra High Frequency (UHF) RFID and 5.2 GHZ WLAN IEEE 802.11 Standards. The return loss,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Design and Simulation of CPW-FED Printed Antenna for Ultra Wide Band (UWB) and Wireless LAN (WLAN) Applications

    In this paper, design and simulation of CPW-fed printed antenna for Ultra Wide Band (UWB) and WirelessLAN applications is proposed .The antenna is integrated with the CPW-fed. Return loss, gain and directivity and current distribution for the different frequencies are explored, It is shown proposed antenna has good gain and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Design of Cross-Shaped Slot Loaded Wideband Microstrip Patch Antenna for Mobile Communication

    Microstrip antennas are becoming very widespread within the wireless and mobile communication because of their various advantages over the conventional antennas. Microstrip antennas have many advantages over the conventional antennas because of light weight and low volume, low profile planar configuration which can be easily made conformal to host surface,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Patch Antenna with Low Pass Filter Design to Supress Higher Order Harmonics in Efficient Rectenna Design

    Wireless power transmission technology has become one of the most growing, high impact technology that will change the world in recent years. For wireless microwave power transmission rectenna is most important, rectenna means rectifier and antenna which is used for harvesting of microwave power or, converting ac current power to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Autonomic Data Replication in Cloud Environment

    Cloud computing is an emerging practice that offers more flexibility in infrastructure and reduces cost than the authors' traditional computing models. Cloud providers offer everything from access to raw storage capacity resources to complete application services. The services that are provided by the cloud can be accessed from anywhere and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    The BER Vs SNR Performance of FRFT-OFDM Systems Using Convolution Code

    Traditional Fast Fourier Transform algorithm makes the implementation of the multicarrier system feasible and attractive with respect to single-carrier systems. However, when the channel is doubly selective (i.e. time-frequency selective), this traditional methodology fails. Since the channel frequency response is rapidly time-varying as a result the optimal transmission/reception methodology not...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Coverage in Wireless Sensor Networks: A Survey

    Wireless sensor network is an emerging field which is accomplishing much importance because of its vast contribution in varieties of applications. Wireless sensor networks are used to monitor a given field of interest for changes in the environment. Coverage is one of the main active research interests in WSN. In...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Designing Parallel Bus Using Universal Asynchronous Receiver Transmitter

    This is designed to the core of a UART interface module, which includes both receive and transmit modules, and the command parser. This paper will be a viable solution to design parallel buses with the help of UART. In the test bench, there is a RFM (Register File Model) to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Bandwidth and Gain Enhanced with H-Slotted Microstrip Patch for Wireless Communication

    This paper describes the enhancement of rectangular patch for GSM band of frequency 5.3 GHz. First the authors have designed a rectangular microstrip patch antenna. After that measurement results in terms of S11 and radiation pattern are given. Microstrip design equation are introduced and validated by simulated and experimental results....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Survey on Video on Demand Over Mobile Ad-Hoc Networks

    Video on demand is one of the most required technology used by the mobile users. But this technology still suffers with many problems because of low speed transmission and network load. In this paper, the authors have defined an intermediate router between the server and the client. The router is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Fuzzy Logic Controlled Cluster Head Selection for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), cluster based methods are well known with special advantage of scalability and efficient communication. In this case, the entire network is divided into clusters and in each cluster a cluster head node is selected, normally based on maximum residual energy. But there are other parameters...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Survey on Password Security Systems

    Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Prognosis of Different Cellular Generations

    Technological advancement in mobile telephony from 1G to 3G, 4G and 5G has a very axiomatic fact that made an entire world a global village. The cellular system employs a different design approach and technology that most commercial radio and television system use. In the cellular system, the service area...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    A Dual Channel Technique for Content Protection in IPTV

    With the introduction of IPTV (Internet Protocol TeleVision), traditional wire-line content providers and service providers are entering a new era of delivering broadcast and Video On Demand (VOD) services to their customers. The Content Protection has becoming an extremely important issue as the use of IPTV services are increasing over...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Comparative Study of Proactive Routing Protocols for MANETs

    Mobile ad hoc network is an infrastructure-less self-configuring network of nodes. Each node of this type of network can move independently in any direction and will change its links to other devices frequently. To communicate to one node to another one each node can act as both host as well...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    In today's world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design and Analysis of C0-Axial Feed Rectangular Patch Antenna on High Impedance Surface

    Increasing the demand of wireless communication systems, the micro strip patch antennas becomes very popular because of its low cast, light weight, easy to feed and attractive radiation characteristics. In spite of various advantages it also suffers with some draw backs such as narrow band width, low gain and surface...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Designing Low Power Circuits: A Review

    The growing market of battery-operated portable applications like laptop, mobile etc requires microelectronic devices with low power consumption. As transistor size continues to shrink and as need for more complex chips increases, power management of the chip is one of the key challenges in VLSI industry. The manufacturers are looking...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Band Width of Micro Strip Antenna Improved by Using Parasitic Array

    Microstrip patch antennas are widely used in various applications because of low profile, light-weight, low cost and easily integration with RF devices. It is widely used mobile, missile, satellite etc. However, microstrip antennas have many disadvantages. One of them is the excitation of surface waves that occur in the substrate...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Microstrip Antenna for X and Ku Band

    A design of microstrip patch antenna gap coupled with two parasitic elements on its non-radiating edges and a single parasitic element on its radiating edge for the operation in X band and Ku band is proposed here. The parasitic elements are partially shorted. This design is giving an impedance bandwidth...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Simulation of Full Duplex Data Transmission in Rof System Using Optisystem

    Wireless coverage of the end-user domain; be it outdoors or indoors, is poised to become an essential part of broadband communication networks. In order to offer integrated broadband services (combining voice, data, video, multimedia services, and new value added services), systems will need to offer higher data transmission capacities. The...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    A Survey of Advanced Microwave Frequency Measurement Techniques

    Microwaves are radio waves with wavelengths ranging from as long as one meter to as short as one millimeter, or equivalently, with frequencies between 300 MHz and 300 GHz. The science of photonics includes the generation, emission, modulation, signal processing, switching, transmission, amplification, detection and sensing of light. Microwave photonics...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    An Overview of Technical Aspect for WiFi Networks Technology

    Generally the wireless networks have been widely developed Compared with wired network and the wireless communication removes the restriction of wired connections, as well as support to ubiquitous access to the Internet. One of successful wireless networks architecture is WiFi (Wireless Fidelity) which is based on a serial standard of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Development of a Secured Security System for an Automobile Using GSM Technology and Electronic Circuit

    This paper focuses on the design and development of a security system for an automobile using GSM technology and electronic circuit which is being used to prevent or control the theft of a vehicle. The case of car hijacking has become so rampant that it has become a threat to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Routing Optimization Performance on Ad-Hoc Network: Distributed Approach Using 4G Devices

    Information and Communication technology try to reach the realistic world in the virtual system via using the 4G communication devices in real time applications. While adopting the 4G communication devices in the exiting environment, various Quality of Services issue occurs to meet the realistic system. QoS issues include the device...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Malware Detection and Removal Techniques

    Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wide Band Slotted Microstrip Antenna for Wireless Communications

    The proposed antenna design approach is based on a single-layer, rectangular patch (Length=80mm and Width=60mm) with inverted U-slot, horizontal and vertical edge slots on the patch with coaxial probe feed. The proposed antenna is modeled using IE3D ElectroMagnetic (EM) simulation packages namely IE3D from Zeland. The proposed antenna shows the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design Consideration of Microstrip Patch Antenna

    The study of microstrip patch antennas has made great progress in these days. This is mostly due to their versatility in terms of possible geometries that makes them applicable for many different situations. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects like low cost, lighter...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Rhombic Split Ring Resonator (R-SRR) Structure on Rectangular Patch Antenna Design

    This paper focusing on the effect of the complementary Rhombic Split Ring Resonator (R-SRR) structure of gain, return loss and the radiation pattern the rectangular patch antenna design. The basic rectangular patch antenna design had been simulated in CST Microwave Studio simulation software. Then, the single unit of the R-SRR...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Hazards and the Security with Respect to the Physical Layer in Common Networks

    The entire online revolution is because of the growth of networking technologies. The authors use computer networks to carry out bank transactions, to manage the power grid, to control the transport infrastructure, to fight crime, to buy and sell goods and services and so on. A network is a combination...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Analysis of Grid Based Distributed Data Mining System for Service Oriented Frameworks

    Distribution of data and computation allows for solving larger problems and execute applications that are distributed in nature. A grid is a distributed computing infrastructure that enables to manage large amount of data and run business applications supporting consumers and end users. The grid can play a significant role in...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Effect of Black Hole Active Attack on Reactive Routing Protocol AODV in MANET Using Network Simulator

    Mobile ad-hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. MANET has potential applications in very unpredictable and dynamic environments. Due to security vulnerabilities of the routing protocols, wireless...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Analysis of Communication Receiver Performance in Presence of Noise Jamming Using VISSIM/COMM

    A typical communication system includes three key elements: a transmitter, a communication medium (or channel), and a receiver. Modeling of all three of these elements is necessary in order to evaluate the performance of a Communication System under jamming condition as well. To meet this objective, simulation software "VisSim/Comm." is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Bandwidth and Gain Enhanced with H-Slotted Microstrip Patch for Wireless Communication

    This paper describes the enhancement of rectangular patch for GSM band of frequency 5.3 GHz. First the authors have designed a rectangular microstrip patch antenna. After that measurement results in terms of S11 and radiation pattern are given. Microstrip design equation are introduced and validated by simulated and experimental results....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Survey on Video on Demand Over Mobile Ad-Hoc Networks

    Video on demand is one of the most required technology used by the mobile users. But this technology still suffers with many problems because of low speed transmission and network load. In this paper, the authors have defined an intermediate router between the server and the client. The router is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Fuzzy Logic Controlled Cluster Head Selection for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), cluster based methods are well known with special advantage of scalability and efficient communication. In this case, the entire network is divided into clusters and in each cluster a cluster head node is selected, normally based on maximum residual energy. But there are other parameters...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Survey on Password Security Systems

    Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Low Cost Tunable Bandstop Filter Design of Defected Ground Structure Using FR4 Substrate

    This paper presents a tunable bandstop filter design using Defected Ground Structure (DGS) where FR4 substrate is used as a low cost solution compared to others substrate such as Teflon and Rogers RT/Duroid. Thus, the performance of the tunable DGS bandstop filter using FR4 substrate is analyzed in this paper....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Prognosis of Different Cellular Generations

    Technological advancement in mobile telephony from 1G to 3G, 4G and 5G has a very axiomatic fact that made an entire world a global village. The cellular system employs a different design approach and technology that most commercial radio and television system use. In the cellular system, the service area...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Orthogonal Frequency Division Multiplexing System with Frequency Offset Estimation

    Orthogonal Frequency Division Multiplexing (OFDM) system, use a large number of parallel narrowband subcarriers instead of a single wide-band carrier to transport information. Orthogonal frequency division multiplexing is the modulation technique use in digital communication systems. Carrier frequency offset occurs due to Doppler effect or noise. Carrier Frequency Offsets (CFOs)...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    Modular BiNoC Architecture Design for Network on Chip

    The advent of deep sub-micron technology has recently highlighted the criticality of the on-chip interconnects. As diminishing feature sizes have led to increases in global wiring delays, Network-on-Chip (NoC) architectures are viewed as a possible solution to the wiring challenge and have recently crystallized into a significant research thrust. Both...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Apr 2013

    To Study the Different Loss Reduction of Transmission and Distribution Line Using GSM Technology

    Designing and implementing commercial as well as industrialized systems based on wireless. Robust communication has always been a important field of interest among many researchers and developers. Many special protection systems are available based on volume of power distributed and often the load changes without calculation required an advanced and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    A Multilevel Automatic Thresholding for Image segmentation Using Genetic Algorithm and DWT

    In this paper, an automatic multilevel thresholding Method for Image segmentation is proposed based on Discrete Wavelet Transforms and Genetic Algorithm. The authors have combined Genetic Algorithm with DWT to make Segmentation faster and adequate results. First the length of the histogram is reduced by using DWT. Using this Reduced...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2012

    Reconfiguration of Mobile Robot

    Dynamic Partial Reconfiguration (DPR) of FPGAs presents many opportunities for application design flexibility, enabling tasks to dynamically swap in and out of the FPGA without entire system interruption. In this paper, the authors will implement a line follower robot for the white line as well as for black line; both...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Evolutionary Standards in Image Compression Along With Comparative Analysis of Their Performance

    Image compression has developed as full fledged field from past many years because of rapidly growing entertainment market and unparalleled increase in the use of internet services for storage transmission and processing of multimedia data. Data compression techniques are primarily divided into two categories, lossless and lossy. The lossy technique...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Analysis of Video Frame Transmission on DVB-H 4K Mode System for Different Code Rates

    DVB-H (Digital Video Broadcasting for Handheld terminals) is a digital transmission standard developed by the international DVB-Project. It was standardized in 2004 and enables small battery powered handheld devices to receive IP data services such as low definition TV services. The DVB-H standard is derived from the DVB-T standard which...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparison of Dijkstra's Shortest Path Algorithm With Genetic Algorithm for Static and Dynamic Routing Network

    In this paper, the authors calculate the Shortest path between Source and Destination node for Static and Dynamic Routing Networks. First, they applied Dijkstra's Algorithm (DA) and then Genetic Algorithm (GA) to find the Shortest Path. Both the Algorithms provide the same solution. The results affirmed the potential of Genetic...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    3 Factor Securities Based on RFID,GSM and Face Recognition for Visitor Identification

    Now-a-day's everything is moving from Manual to automatic so it is necessary to developed automatic security system involving more than one electronic device to make it more reliable. In the coming future ubiquitous society, RFID tags will be affixed to every person. This technology is anticipated to be a key...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Implementing Watermarking Concept Along With Data Compression in Multimedia Transmission

    This paper presents a technical review for enhancing security and reliability in the transmission of information. In this paper Watermarking technique along with Data Compression is being described to improve the quality, security and efficiency in the transmission of information. In this paper, the authors provide a measure to remove...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Relevant Pages in Semantic Web Search Engines Using Ontology

    In general, search engines are the most popular means of searching any kind of information from the Internet. Generally, keywords are given to the search engine and the Web database returns the documents containing specified keywords. In many situations, irrelevant results are given as results to the user query since...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparison of Tacit Encryption Algorithm With Various Encryption Algorithms

    A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. A cryptographic algorithm is considered to be computationally secured if it cannot be broken with standard resources, either current or future and apart from the algorithm...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    Cooperative Spectrum Sensing and Detection Efficiency in Cognitive Radio Network

    Spectrum sensing is required for better utilization of spectrum and preventing interference with licensed users. However, detection performance in practice is often compromised with multipath fading, shadowing and receiver uncertainty issues. To mitigate the impact of these issues, cooperative spectrum sensing has been shown to be an effective method to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    MATLAB Based Digital IIR Filter Design

    A fundamental aspect of signal processing is filtering. Filtering involves the manipulation of the spectrum of a signal by passing or blocking certain portions of the spectrum, depending on the frequency of those portions. In this paper, Digital filters are designed using frequency specifications. Matlab provides different options for digital...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    Design Error Performance of Space-Frequency Block Coded OFDM Systems With Different Equalizers and For Different Modulation Schemes

    Multiple transmit and receive antennas can be used to form Multiple-Input Multiple-Output (MIMO) channels to increase the capacity (by a factor of the minimum number of transmit and receive antennas) and data rate. In this paper, the combination of MIMO technology and Orthogonal Frequency Division Multiplexing (OFDM) systems is considered...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    IP Routing Configuration in a Router With Troubleshooting

    Today whole world is connected via internet for worldwide communication. Different network devices like router, switch, bridge, hub, server, multiplexer/Demultiplexer and modem are used for communication. To connect different networks only routers are used to provide routes for packets of data from one network to another. To communicate between different...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    Improving TCP Performance in Multi Hop Mobile Adhoc Network

    TCP is a window-based flow and congestion control protocol that uses a sliding window mechanism to manage its data transmission. The purpose of this scheme is to guarantee that the sender adjusts its transmission rate to meet both sender and receiver needs. Thus, the TCP sender contains a variable denoted...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    BER Analysis of Wideband Code Division Multiple Access

    There has been a dramatic change in the field of field of telecommunication service. M-ary Quadrature Amplitude modulation and Quadrature Phase Shift Keying (QPSK) modulation schemes are considered in Wideband Code Division Multiple Access (WCDMA) system. Here, the authors are using MATLAB for simulation and evaluation of BER (Bit Error...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Feb 2012

    Classical Cryptography V/s Quantum Cryptography a Comparative Study

    In this era of information technology, the need for security has attained paramount importance. As most of the sensitive information is stored in computers the need of data security becomes increasingly important. Protecting this information against unauthorized access is therefore a major concern for both operating systems and users alike....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    Performance Analysis of Different Channels of W-CDMA Using Different Modulation Techniques

    The transmission from base station to mobile or downlink transmission using M-ary Quadrature Amplitude Modulation (QAM) and Quadrature Phase Shift Keying (QPSK) modulation scheme are consider in W-CDMA system. The authors can analysis the performance of these modulation techniques when the system is subjected to AWGN and multipath Rayleigh fading...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    Effect on WDM Due to Cross Phase Modulation

    CROSS Phase Modulation (XPM) is known as the phenomenon that the variations of intensity of one optical signal can change the refractive index of the fiber (Kerr effects), and modulate the phase of other optical signals co-propagating in the same fiber. The authors compare the impact of Q-factor, BER and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    HDL Implementation of Low Density Parity Check (LDPC) Decoder

    Low-Density Parity-Check (LDPC) codes are one of the most promising error-correcting codes approaching Shannon capacity and have been adopted in many applications. These codes offer huge advantages in terms of coding gain, throughput and power dissipation. Error correction algorithms are often implemented in hardware for fast processing to meet the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Integrating Steganography Using Genetic Algorithm and Visual Cryptography for Robust Encryption in Computer Forensics

    The proposed system highlights a novel approach for creating a secure steganographic method using genetic algorithm and visual cryptography for robust encryption in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    Applying Channel Estimation in MIMO Network Coding Protocol

    In this paper, a combination of MIMO and network coding, based on MINEC protocol, is used for improving the performance of the relay networks in fading environments. The authors have introduced the concept of channel estimation into the proposed three-node relay network. When the receiver is having no knowledge of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    DWT Based Watermarking Algorithm Using Haar Wavelet

    The development of computer networks enhance the development of the information technology in different areas. Sometimes the digital data can be easily used to copied, modified and distributed in an illegal way. The copy right protection, intellectual protection and material right protection for authors, owners, buyers and distributors is necessary...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    A Neural Network Algorithm Based Blind Source Separation Using Fast Fixed Point Independent Component Analysis

    Image separation is defined as decomposing a real world image mixture into individual images objects. Independent component analysis is an active area of research and is being utilized for its capability in statistically independent separation images. Neural network algorithm ICA has been used to extract interference and mixed images and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    An Overview of Technical Aspect for WiFi Netwoks Technology

    A generally the wireless networks have been widely developed Compared with wired network and the wireless communication removes the restriction of wired connections, as well as support to ubiquitous access to the Internet. One of successful wireless networks architecture is WiFi (Wireless Fidelity) which is based on a serial standard...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    A Novel Approach for Digital Watermarking of an Image Using DFT

    Watermarking techniques are always used for copyright and ownership assertion purposes to protect the important documents. There are various type of watermark embedding techniques in transform domain are presented, for example 2-D DFT, 2-D DCT, 2-D DWT, 3-D DCT and 3-D DWT. Some time in case of an image authentication...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2012

    A Survey of Routing Protocols for Ad Hoc Wireless Home Networks

    Ad hoc networks are wireless mobile networks that do not rely on preexisting infrastructure and these networks allow a more flexible model of communication than traditional networks since the user is not limited to a fixed physical location. In order to facilitate communication within the network, a routing protocol is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Enhancements Performance in TCP-LP: Low-Priority Service Via End Point Conditional Randomized Protocols

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources Without constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable to the Internet environment. However, the random search strategies adopted by these...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Optimizing Routing in Delay-Tolerant Network (DTNS)

    The authors try to formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property that no...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Review on Advancements in Biometrics

    Biometrics is an automated method of recognizing a person based on physiological or behavioral characteristics. Biometric recognition technology relies upon the physiological characteristic of an individual, offering positive identification that is difficult to counterfeit. Examples of physiological biometric features include height, weight, body odor, the shape of the hands, vein...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design, Analysis and Implementation of a New Topology of Multi Phase Synchronous Buck Converter Under Current Mode Control

    This paper presents a new PWM Multi phase DC-DC converter under current mode control with an auxiliary circuit which provides zero voltage switching in order to meet the power supply requirements of the processors of modern electronic equipments like laptops, mobiles, and PDAs etc which require more than 70 A...

    Provided By International Journal of Electronics and Computer Science Engineering