International Journal of Electronics and Computer Science Engineering

Displaying 121-160 of 200 results

  • White Papers // Aug 2012

    Fragile Watermarking for Image Authentication: Survey

    In this paper, the authors report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Study of Performance of OFDM Over Various Channels

    A time was there when mobile was used for voice call only but now the main thrust on mobile communication is to access data, Day by day wireless communication is going towards the demand of very high-speed. In this scenario the OFDM technology can fulfill these requirements of high speed...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Realization of Dualcore IBM Power5 Fine Grained Multithreaded Processor

    In the present world the computer has become an essential and inevitable part in any field and industry be it in administrative field, science, defense or in any other field. The processor designed and implemented is typical RISC machines following a 4-stage pipelining having instruction fetch (I-fetch), instruction decode, executing...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Multimodal Biometric Recognition System Based on Fusion of Palmprint, Fingerprint and Face

    Multibiometric recognition systems, which aggregate information from multiple biometric sources, are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data and susceptibility. Multibiometric systems promise significant improvements as higher accuracy and increased resistance to spoofing over the single biometric systems. This paper proposes a...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Different PAPR Reduction Techniques for Orthogonal Frequency Division Multiplexed Signals

    Communication is one of the important aspects of life. With the advancement in age and its growing demands, there has been rapid growth in the field of communications. Signals, which were initially sent in the analog domain, are being sent more and more in the digital domain these days. For...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Slot Based Frequency Estimation in OFDM

    Orthogonal Frequency-Division Multiplexing (OFDM) has been employed in several current and future 4-th Generation (4G) wireless standards. Frequency offsets in OFDM introduce Inter-Carrier Interference (ICI). Channel estimations are also required. This paper focuses on the channel and frequency offset estimation for OFDM-based systems. For cooperative-relay OFDM with frequency offsets, where...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design of Instruction List (IL) Processor for Process Control

    Raman amplifiers are widely used for high capacity long haul communication systems. One of the main reason for which it can be used is its improved noise figure. In this paper noise figure of Raman amplifiers is studied and analyzed for different pumping schemes. The main sources of noise and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Improved Multispanning Tree Routing Using Efficient and Reliable Routing Algorithm for Irregular Networks

    A Strategy of Multi-spanning Tree Zone Ordered Label Based routing is improved with Efficient And Reliable (EAR) routing for irregular networks is presented and analyzed in this paper. Most existing deadlock free routing methods for irregular topologies impose several limitations on node and channel labeling in an irregular network is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Exploration of Data Mining Techniques in Fraud Detection: Credit Card

    Data mining has been increasing as one of the chief key features of many security initiatives. Often, used as a means for detection of fraud, assessing risk as well. Data mining involves the use of data analysis tools to discover unknown, valid patterns as well as relationships in large data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient Framework for QoS Based Multicasting for Large Scale Multimedia Content Distribution

    Multicasting is the process of sending the information to multiple destinations. This technology is highly efficient for delivering the large scale multimedia content where the end receivers have identical needs and similar set of system components. But in reality, the end users have heterogeneous set of requirements for different service...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design of a Narrow-Band Photonic Crystal Based Omni-Directional Mirror for Optical Fiber Communication

    Photonic Crystals (PCs) may be considered as a new class of optical materials. These materials are based on the interaction between an optical field and materials exhibiting periodicity on the scale of wave length. The main feature of photonic crystals is that they can prohibit the propagation of electromagnetic waves...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Intrusion Detection Systems for the Availability Attacks in Ad-Hoc Networks

    Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. So many approaches are proposed for Ad-Hoc Networks for dealing with various attacks. Trust based mechanism coupled with Ad Hoc Networks...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Review on Media Independent Handover Services for Heterogeneous Wireless Communication Networks

    A seamless vertical handover between heterogeneous networks without interruption to the on-going services is very important in next generation wireless networks which aim at the provision of uninterrupted network connections anywhere and at any time. This paper provides a review on the vertical handover mechanism focusing mainly on the services...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Stacked Wideband Microstrip-Line-Fed Wide Slot Microstrip Patch Antenna

    Microstrip antennas have many advantages over the conventional antennas because of light weight and low volume, low profile planar configuration which can be easily made conformal to host surface, low fabrication cost, capable of dual and triple frequency operations, mechanically robust when mounted on rigid surfaces rectangular microstrip antenna exhibits...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Performance Analysis of Chess Board Protocol in RoF

    The optical and wireless communication systems integration will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    ESRWF: Extreme State-Rank based Workload Factoring for Integrated Cloud Computing Model

    Despite all the hypes, the designers of workload factoring solutions have consistently debated on the tradeoffs between factoring of workload and their resulting performance. When computational resources are provided to the existing system; one of the main challenges that the computing community is face dazzling workload of application requests and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparative Analysis of LEON 3 and NIOS II Processor Development Environment: Case Study Rijindael's Encryption Algorithm

    Embedded system design is becoming complex day-by-day, combined with reduced time-to-market deadlines. Due to the constraints and complexity in the design of embedded systems, it incorporates hardware/software co-design methodology. An embedded system is a combination of hardware and software parts integrated together on a common platform. A soft-core processor which...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Area Optimized FPGA Implementation of Adaptive Beamformer

    Spatially propagating signals encounter the presence of interfering signals and noise signals. Quadratic Rotation Decomposition (QRD) based Recursive Least Squares (RLS) algorithm can be used in variety of communication applications and its low complexity implementation can be of interest. In this paper the authors have presented an application of QRD...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Web Data Identification and Extraction

    Now-a-days, with the rapid growth of the web, a large volume of data and information are published in numerous web pages. As web sites are getting more complicated, the construction of web information extraction systems becomes more difficult and time-consuming. In this paper proposes a new method to perform the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Transaction Security for E-commerce Application

    E-commerce applications are becoming popular day-by-day as they are working like a virtual shop. Writing good E-commerce application is tedious task and complex also. The applications if made complex are very difficult to maintain. Usability is a very basic concept in the E-commerce application. User has to get the information...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    SEO and Content Management System

    In the current scenario Web users wants to highlight themselves on the net, they should know the importance of web marketing and at that time Search Engine Optimization (SEO) comes in picture. Usually if one business is well affected by web then the people must have to be on top...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design and Modification of Circular Monopole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz. The antenna is designed on FR4 substrate and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Comparative Study of Different Routing Protocols in MANET Based on Simulation Using Ns-2

    A mobile ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Optimizing Routing in Delay-Tolerant Network (DTNS)

    The authors try to formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property that no...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    A Review on Advancements in Biometrics

    Biometrics is an automated method of recognizing a person based on physiological or behavioral characteristics. Biometric recognition technology relies upon the physiological characteristic of an individual, offering positive identification that is difficult to counterfeit. Examples of physiological biometric features include height, weight, body odor, the shape of the hands, vein...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Design, Analysis and Implementation of a New Topology of Multi Phase Synchronous Buck Converter Under Current Mode Control

    This paper presents a new PWM Multi phase DC-DC converter under current mode control with an auxiliary circuit which provides zero voltage switching in order to meet the power supply requirements of the processors of modern electronic equipments like laptops, mobiles, and PDAs etc which require more than 70 A...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Fingerprint Recognition System

    The popular Biometric used to authenticate a person is fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper, the authors projected Fingerprint Recognition using Minutia Score Matching...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Speech Recognition by Wireless Robot

    This paper presents a brief survey on automatic speech recognition and discusses the major themes and advances made in the past. After years of research and development the accuracy of automatic speech recognition remains one of the important research challenges. The design of speech Recognition system requires careful attentions the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Aperture Coupled Stacked Patch Antenna for Dual-Band

    Microstrip Antennas (MAS) are very useful antenna where low profile antennas are required. They are most popular due to their small size, low cost, light weight. The first aperture coupled microstrip antenna was introduced in 1985 by D M Pozar. Aperture coupled antenna is a particular antenna with high gain...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Automatic Test Case Generation in Object Oriented Programming

    This paper presents a new methodology to select test cases from regression test suites. The selection strategy is based on analyzing the dynamic behavior of the applications that written in any programming language. Methods based on dynamic analysis are more safe and efficient. The authors design a technique that combine...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Enhancements Performance in TCP-LP: Low-Priority Service Via End Point Conditional Randomized Protocols

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources Without constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable to the Internet environment. However, the random search strategies adopted by these...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient of Finding and Tracking Inconsistencies in Software Design Models

    Software models typically contain many inconsistencies and consistency checkers help engineers find them. Even if engineers are willing to tolerate inconsistencies, they are better off knowing about their existence to avoid follow on errors and unnecessary rework. However, current approaches do not detect or track inconsistencies fast enough. This paper...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Wireless Sensor Networks - Architectures, Protocols, Simulators and Applications: A Survey

    Wireless Sensor Networks (WSNs) have emerged as a new research technology in the distributed computing environment and plays a very important role in the pervasive computing to support various applications. It has a great potential to be utilized in battlefields and in different commercial applications like traffic surveillance, habitat monitoring,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Direct User Data Authentication in Cloud

    Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Secure QR-Pay System With Ciphering Techniques in Mobile Devices

    Mobile payment is very important and critical solution for mobile commerce. A user-friendly mobile payment solution is strongly needed to support mobile users to conduct secure and reliable payment transactions using mobile devices. This paper presents an innovative mobile payment system based on 2-Dimentional (2D) barcodes called QR-codes for mobile...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    An Efficient Method for Extracting Features From Blurred Fingerprints Using Modified Gabor Filter

    Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes. Fingerprint is one of the most...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    EDFA-WDM Optical Network Analysis

    Optical network that apply Wavelength Division Multiplexing (WDM) is currently widely used in existing telecommunications infrastructures and is expected to play a significant role in next generation networks and the future internet supporting a large variety of services having very different requirements in terms of bandwidth, latency, reliability and other...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Analytical Approach for Performance of Wireless Sensor Networks

    Wireless Sensor Networks (WSN) have been noticed and researched in recent years. WSNs have inherent and unique characteristics compared with traditional networks. It consists of light-weight, low power and small size Sensor Nodes (SNs). They have ability to monitor, calculate and communicate wirelessly. Sensor nodes should send their collected data...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    3 Factor Securities Based on RFID,GSM and Face Recognition for Visitor Identification

    Now-a-day's everything is moving from Manual to automatic so it is necessary to developed automatic security system involving more than one electronic device to make it more reliable. In the coming future ubiquitous society, RFID tags will be affixed to every person. This technology is anticipated to be a key...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Aug 2012

    Implementing Watermarking Concept Along With Data Compression in Multimedia Transmission

    This paper presents a technical review for enhancing security and reliability in the transmission of information. In this paper Watermarking technique along with Data Compression is being described to improve the quality, security and efficiency in the transmission of information. In this paper, the authors provide a measure to remove...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jun 2012

    Optical Wavelength Converters Based on Cross Gain Modulation and Cross Phase Modulation in SOA

    All optical wavelength converters are expected to become key components in the future broadband net works. Their most important use will be for avoidance of wavelength blocking in optical cross connects in Wavelength Division Multiplexed (WDM) networks. Thereby the converters increase the flexibility and the capacity of the network for...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    BER Performance of ZF and MMSE Equalizers for V-Blast MIMO Wireless Communication

    Multiple-Input - Multiple-Output (MIMO) wireless systems use multiple antenna elements at transmit and receive to offer improved capacity and data rate over single antenna topologies in multipath channels. In such systems, the antenna properties as well as the multipath channel characteristics play a key role in determining communication performance. This...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Reactive and Proactive Routing Protocol Energy Efficiency Performance Analysis in Wireless Adhoc Networks

    MANET (Mobile Ad hoc NETwork) is a self organizing and self configuring network without the need of any centralized base station. It is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. MANETs are infrastructure less and can be set up anytime, anywhere. In...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

    This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but their paper is mainly focused on two types of DoS...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Energy Efficient Reactive Routing Using Energy Evaluation Model With CBR and VBR Traffic Model

    A Mobile Ad hoc NETworks (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize in to arbitrary and temporary network topologies, allowing people and devices to seamlessly communicate without any pre-existing communication architecture. One of the main issues in MANET routing protocols is development of...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Group Mobility Model Based Proactive and Reactive Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a dynamic network Topology without the aid of any existing network infrastructure or centralized administration. Each node participating in the network acts as a host and as a router, means they have to forward packets and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Wi-Fi Based Multinode M.S Level Sensor in UAV's Using MEMS

    Communication networks and strategies for cooperative UAV swarms have received significant attention. The main problem in controlling autonomous vehicles needs some knowledge of its altitude angles. These angles can be measured in different ways, for instance, using a conventional inertial navigation system. A novel approach to deal these problems by...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Sep 2012

    Optimized and Secured Educlouds by Implementing Virtualization

    Cloud computing is an emerging technology that access remote servers through Internet to maintain data and applications. It incorporates the advantages of grid and utility computing. Academia has not remained unaware of this trend, and several educational solutions (LMS) based on cloud technologies are already in place, especially for Software...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Encryption and Signature Scheme Implementation for Data Integrity Using Recoverable Concealed Data Aggregation

    Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Analysis and Security Measures of Malware in Mobile Device

    New mobile technologies are growing rapidly. Smart phones and iPhones has added new dimensions in the field of mobile technology. It is used not only for conversation but also to carry data. The various features of Smartphone are Wi-Fi, touch-screen, SMS, digital camera, games, various apps, GPS system, mobile browsing,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Oct 2012

    Oilwell Monitoring and Control Based on Wireless Sensor Networks Using ARM

    The existing Oil-Pumping Unit (OPU) system has a high power consuming process. It has the incapability of OPU's structural health monitoring. A sensor network based intelligent control is proposed for power economy and efficient oil-well health monitoring using wireless sensor network. The proposed system consists of three-level sensors: First Level...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Design of Cross-Shaped Slot Loaded Wideband Microstrip Patch Antenna for Mobile Communication

    Microstrip antennas are becoming very widespread within the wireless and mobile communication because of their various advantages over the conventional antennas. Microstrip antennas have many advantages over the conventional antennas because of light weight and low volume, low profile planar configuration which can be easily made conformal to host surface,...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Patch Antenna with Low Pass Filter Design to Supress Higher Order Harmonics in Efficient Rectenna Design

    Wireless power transmission technology has become one of the most growing, high impact technology that will change the world in recent years. For wireless microwave power transmission rectenna is most important, rectenna means rectifier and antenna which is used for harvesting of microwave power or, converting ac current power to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Autonomic Data Replication in Cloud Environment

    Cloud computing is an emerging practice that offers more flexibility in infrastructure and reduces cost than the authors' traditional computing models. Cloud providers offer everything from access to raw storage capacity resources to complete application services. The services that are provided by the cloud can be accessed from anywhere and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    The BER Vs SNR Performance of FRFT-OFDM Systems Using Convolution Code

    Traditional Fast Fourier Transform algorithm makes the implementation of the multicarrier system feasible and attractive with respect to single-carrier systems. However, when the channel is doubly selective (i.e. time-frequency selective), this traditional methodology fails. Since the channel frequency response is rapidly time-varying as a result the optimal transmission/reception methodology not...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Coverage in Wireless Sensor Networks: A Survey

    Wireless sensor network is an emerging field which is accomplishing much importance because of its vast contribution in varieties of applications. Wireless sensor networks are used to monitor a given field of interest for changes in the environment. Coverage is one of the main active research interests in WSN. In...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Designing Parallel Bus Using Universal Asynchronous Receiver Transmitter

    This is designed to the core of a UART interface module, which includes both receive and transmit modules, and the command parser. This paper will be a viable solution to design parallel buses with the help of UART. In the test bench, there is a RFM (Register File Model) to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Analysis of Communication Receiver Performance in Presence of Noise Jamming Using VISSIM/COMM

    A typical communication system includes three key elements: a transmitter, a communication medium (or channel), and a receiver. Modeling of all three of these elements is necessary in order to evaluate the performance of a Communication System under jamming condition as well. To meet this objective, simulation software "VisSim/Comm." is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Bandwidth and Gain Enhanced with H-Slotted Microstrip Patch for Wireless Communication

    This paper describes the enhancement of rectangular patch for GSM band of frequency 5.3 GHz. First the authors have designed a rectangular microstrip patch antenna. After that measurement results in terms of S11 and radiation pattern are given. Microstrip design equation are introduced and validated by simulated and experimental results....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Survey on Video on Demand Over Mobile Ad-Hoc Networks

    Video on demand is one of the most required technology used by the mobile users. But this technology still suffers with many problems because of low speed transmission and network load. In this paper, the authors have defined an intermediate router between the server and the client. The router is...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    Fuzzy Logic Controlled Cluster Head Selection for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), cluster based methods are well known with special advantage of scalability and efficient communication. In this case, the entire network is divided into clusters and in each cluster a cluster head node is selected, normally based on maximum residual energy. But there are other parameters...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Performance Analysis of TORA & DSR Routing Protocols in Mobile Ad-Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Scalability of LBS in Mobile GIS Using Web Services

    GIS becomes an active research area in the field of GIS. Information collection is one of the most important fact in application directions of mobile GIS. Spatial Data Infrastructures (SDI) providing geospatial web services as well as mobile GIS. In this paper was to investigate the possibility of designing and...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    PGBR Protocol for Cloud Routing Implementation in NS-3

    The current internet infrastructure is fronting a number of boundaries that is not suitable to meet the growing number of services and users. In particular, one aspect that requires enhancement is routing, where original routing concepts were designed for static traffic patterns with minimal variations and supporting mainly low through...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Impact of Link Breaks on AODV and AOMDV in MANET: A Performance Analysis

    MANETs are ad hoc multi hop networks, formed of mobile battery chargeable devices and commonly used in emergency situations. With its dynamic topology and limited energy level they often come across with link breaks. This paper analyzes how energy consumption of the mobile devices and density of mobile nodes affects...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Band Width of Micro Strip Antenna Improved by Using Parasitic Array

    Microstrip patch antennas are widely used in various applications because of low profile, light-weight, low cost and easily integration with RF devices. It is widely used mobile, missile, satellite etc. However, microstrip antennas have many disadvantages. One of them is the excitation of surface waves that occur in the substrate...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Dec 2012

    Fingerprint Pattern Recognition Using Back Propagation Algorithms

    Humans have used body characteristics such as face, voice, gait, etc. for thousands of years to recognize each other. A biometric fingerprint recognition system has most reliable for robust recognition in world. In this paper, Fingerprint recognition is one of the accurate biometric recognition system and identification of Human fingerprint...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Hazards and the Security with Respect to the Physical Layer in Common Networks

    The entire online revolution is because of the growth of networking technologies. The authors use computer networks to carry out bank transactions, to manage the power grid, to control the transport infrastructure, to fight crime, to buy and sell goods and services and so on. A network is a combination...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Routing Optimization Performance on Ad-Hoc Network: Distributed Approach Using 4G Devices

    Information and Communication technology try to reach the realistic world in the virtual system via using the 4G communication devices in real time applications. While adopting the 4G communication devices in the exiting environment, various Quality of Services issue occurs to meet the realistic system. QoS issues include the device...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Malware Detection and Removal Techniques

    Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc....

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wide Band Slotted Microstrip Antenna for Wireless Communications

    The proposed antenna design approach is based on a single-layer, rectangular patch (Length=80mm and Width=60mm) with inverted U-slot, horizontal and vertical edge slots on the patch with coaxial probe feed. The proposed antenna is modeled using IE3D ElectroMagnetic (EM) simulation packages namely IE3D from Zeland. The proposed antenna shows the...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design Consideration of Microstrip Patch Antenna

    The study of microstrip patch antennas has made great progress in these days. This is mostly due to their versatility in terms of possible geometries that makes them applicable for many different situations. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects like low cost, lighter...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Rhombic Split Ring Resonator (R-SRR) Structure on Rectangular Patch Antenna Design

    This paper focusing on the effect of the complementary Rhombic Split Ring Resonator (R-SRR) structure of gain, return loss and the radiation pattern the rectangular patch antenna design. The basic rectangular patch antenna design had been simulated in CST Microwave Studio simulation software. Then, the single unit of the R-SRR...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Development of a Secured Security System for an Automobile Using GSM Technology and Electronic Circuit

    This paper focuses on the design and development of a security system for an automobile using GSM technology and electronic circuit which is being used to prevent or control the theft of a vehicle. The case of car hijacking has become so rampant that it has become a threat to...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    A Dual Channel Technique for Content Protection in IPTV

    With the introduction of IPTV (Internet Protocol TeleVision), traditional wire-line content providers and service providers are entering a new era of delivering broadcast and Video On Demand (VOD) services to their customers. The Content Protection has becoming an extremely important issue as the use of IPTV services are increasing over...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Comparative Study of Proactive Routing Protocols for MANETs

    Mobile ad hoc network is an infrastructure-less self-configuring network of nodes. Each node of this type of network can move independently in any direction and will change its links to other devices frequently. To communicate to one node to another one each node can act as both host as well...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    In today's world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Jan 2013

    Design and Analysis of C0-Axial Feed Rectangular Patch Antenna on High Impedance Surface

    Increasing the demand of wireless communication systems, the micro strip patch antennas becomes very popular because of its low cast, light weight, easy to feed and attractive radiation characteristics. In spite of various advantages it also suffers with some draw backs such as narrow band width, low gain and surface...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Review on Reconfigurable Low Pass Bandstop Filter Based on Technology, Method and Design

    Reconfigurable filter technology is in robustness development. Due on the tunable and reconfigurable capability will contribute a various advantages in wireless applications. This tuning selectivity consist a numerous method, for example using varactor, micromachines, and PINdiodes. In this paper, the authors discussed PIN diodes as a switching element. The design...

    Provided By International Journal of Electronics and Computer Science Engineering

  • White Papers // Mar 2013

    A Novel Compact CPW-FED Printed Dipole Antenna for UHF RFID and Wireless LAN Applications

    A novel compact CPW-fed printed dipole antenna is proposed for dual-band Ultra wide band (UHF) RFID and Wireless Local Area Network (WLAN) operations. This antenna consist of two dipole elements and it covers 2.53 GHz Ultra High Frequency (UHF) RFID and 5.2 GHZ WLAN IEEE 802.11 Standards. The return loss,...

    Provided By International Journal of Electronics and Computer Science Engineering