IOSR Journal of Engineering

Displaying 1-40 of 498 results

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

    In this paper, the authors propose an optimized version of the FCFS scheduling algorithm to address the major challenges of task scheduling in cloud. The incoming tasks are grouped on the basis of task requirement like minimum execution time or minimum cost and prioritized (FCFS manner). Resource selection is done...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones

    Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Secure Outsourcing of Linear Optimization in Cloud Computing

    Cloud computing has become a reality which is capable of enabling general public and organizations to make use of huge computational resources without capital investment in pay per use fashion. This new paradigm allows customers who have no much computational resources to outsource their expensive computational workloads to cloud and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering