IOSR Journal of Engineering

Displaying 1-40 of 498 results

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

    In this paper, the authors propose an optimized version of the FCFS scheduling algorithm to address the major challenges of task scheduling in cloud. The incoming tasks are grouped on the basis of task requirement like minimum execution time or minimum cost and prioritized (FCFS manner). Resource selection is done...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones

    Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    High Speed Current Mode Sense Amplifier for SRAM Applications

    The sense amplifier is one of the most important components of semiconductor memories used to sense stored date. This plays an important role to reduce the overall sensing delay and voltage. Earlier voltage mode sense amplifiers are used to sense the date it sense the voltage difference at bit and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Low Power Binary to Gray Code Converter Using Gate Diffusion Input (GDI)

    In modern era, ultra-low power design has an active research topic due to its various applications. In this paper, the authors introduce a novel low power and area efficient binary to gray code converter is implemented by using four transistor XOR gate. This four transistor XOR gate is designed by...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Design and Analysis of Pulse Width Modulator (PWM) using Low Input Impedance Current Comparator

    Pulse width modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. The voltage-mode comparator is the most critical component of pulse-width modulator which dominates the accuracy of modulation process. In this paper, a new design of...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Implementing of Serial Ports to Ethernet Gateway on Embedded System

    The use of the multi-serial/Ethernet conversion gateway simplifies the networked control and distributed management of information for serial devices. So the design of a new type of gateway for data converting from serial ports to Ethernet based on embedded system is highlighted in this paper. The design is based on...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Harms Associated with Cellular Towers (CDMA vs GSM)

    The use of mobile phone is increasing enormously, and hence has become a subject of recent interest and study, due to use of ElectroMagnetic (EM) wave in the microwave range and produces radiation. Various physiological studies have found that the excessive Radio Frequency (RF) wave exposure affects the biological systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Memorized Window Consolidation (MWC) Based TCP Recovery for Vegas and B/w Based Congestion Control

    In this paper, the authors present a framework for unanimous TCP flow window size recovery, "Memorized flow recovery", which differs from most TCP algorithms by memorized window size consolidation as measure to control the window size increment post link recovery from disconnection. It identifies the window size in use during...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study and Performance Evaluation of Xilinx HDLC Controller and FCS Calculator

    In this paper, design, simulation and implementation design of HDLC Controller provides a high performance. This design is then coded in a Hardware Description Language (VHDL). The functioning of the coded design is to simulate on simulation software (e.g. ModelSim). After proper simulation, the design is synthesized and then translated...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Management of Future Internet with Autonomic Network Architecture and Model

    Research efforts a strong foundation towards standardization of architectural principals of the managing future Internet. Autonomic network engineering for managing Future Internet (AFI) has been established under the European Telecommunications Standards Institute (ETSI). AFI has been focusing on scenarios, use cases, and requirements for autonomic self managing future Internet, as...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Semantic Web Crawler Based on Lexical Database

    Crawlers are basic entity that makes search engine to work efficiently in World Wide Web. Semantic concept is implied into the search engine to provide precise and constricted search results which is required by end users of Internet. Search engine could be enhanced in searching mechanism through semantic lexical database...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Evaluation of Green Supply Chain Management Strategies Using Fuzzy AHP and TOPSIS

    In this paper, the authors present a new decision making approach for group multi-criteria evaluation for green supply chain management strategies, which clubs green procurement, manufacturing, green service to customer and environmental management process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Pattern Evaluation Proved To Be Important For Decision Support in Data Warehouse

    It is the mobile sensor network or satellite that is observing and obtaining the data pattern. This paper focuses on spatio-temporal data and events pattern for the data mining and for data warehouse. There is a repository or database where sensor, satellite inputs or data are collected for analysis. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Combining Cryptography with Channel Coding

    Cryptography is a form of hiding the text so to increase the security of the information. It can also be defined as the process of converting the valuable information into some form of non-scene information which can be understand able by the sender and the intended receiver only. On the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Close Look Towards Modified Booth's Algorithm with BKS Process

    In this paper, the authors are remodeling of modified Booth's algorithm, where shift three at a time. The result shows that classical concept of single shift multiplication algorithms are to be revised with a multiple number of shifts. The observation is that in general the complexity is N/3, which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee

    In this paper, an intelligent Campus Security Tracking system (iCST) has been designed and implemented base on the RFID and ZigBee network. iCST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Architecture for Node-level Congestion in WSN Using Rate Optimization

    The application has presented the details of Wireless Sensor Network differs basically from the overall knowledge network. It spotlight on tight communication however restricted in storage, lifetime, power and energy. The WSNs consists of unbelievable network load and it leads to energy wastage and packet loss. Several of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA Algorithms for Bluetooth Security Systems

    In this paper, comparison of the Hybrid encryption algorithm (3DES-Tiger-RSA) and old hybrid method (DES-RSA, by Wuling Ren & Zhiqian Miao) for Bluetooth security system is done. Performance of the above security algorithm is evaluated based on the efficiency of the algorithm. The efficiency is calculated on the basis of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Object Based Data Partition Algorithm for XML Database

    The growing use of XML data format in global information needs an effective XML data management system. With the rapid growth of XML data in internet, users are confronted with big data issues; it's becoming a new research direction for managing massive XML data now. Conventional centralized data management technologies...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Authorization using Implicit Password

    In this paper, the authors introduce a authorization scheme for banking by using implicit password. As they know graphical password scheme suffered from shoulder-surfing and screen dump attacks. As they know for banking security is the first line of defense against compromising confidentiality and integrity. Simply the username and password...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Design of Aperture Coupled Micro-Strip patch Antenna for Wireless Communication applications at 5.8Ghz

    A microstrip antenna is basically a low profile antenna with a number of advantages over other antennas like small in size, light weight, inexpensive to fabricate. A microstrip antenna with aperture coupled feeding technique is used here as it is one of the most important method for exciting microstrip antenna...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Advanced Task Scheduling for Cloud Service Provider Using Genetaic Algorithm

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. To improve the QoS in a system one must...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    An Analysis of 10 Gbits/s Optical Transmission System using Fiber Bragg Grating (FBG)

    In this paper, the authors discussed on a simulation of optical transmission system in optical fiber. The optical fiber is always used in telecommunication system because of its characteristics which include small size or dimension, low loss and low interferences from outside environment. There are various types of optical fiber,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2012

    An Actual Communication Network Performance Evaluation Method

    The queuing system and network theories may be hardly applied to solve performance evaluation problems for actual large-scale computer systems and networks. This is true especially for high performance communication networks such as wireless, satellite or photonic networks. The reason is that the theoretical assumptions can hardly be fulfilled in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Service-Oriented Architecture based Global Positioning System

    The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information, anywhere on or near the Earth. The GPS provides critical capabilities to military, civil and commercial users around the world. This paper present a Service Oriented Architecture (SOA) based Global Positioning System (GPS)....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Design Methodology for Time Domain Dead Beat Algorithm

    In this paper, the authors propose a way of implementing a deadbeat controller in FPGA. The focus is on the FPGA implementation of the digital controller. The emphasis is on the software tools for design and simulation of FPGA based hardware for control applications. The FPGA is interfaced to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hardware/Software Co-Simulation of BPSK Modulator Using Xilinx System Generator

    In this paper, the authors present a theoretical background overview of the digital communication systems and the BPSK modulation. The BPSK modulation represents an important modulation technique in terms of signal power. The BPSK system is simulated using Mat lab/ Simulink environment and system generator, a tool from Xilinx used...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    P2P Reputation Management Scheme Using a Cryptographic Protocol

    Reputation management in a Peer-To-Peer network is difficult as challenges are posed by lack of centralized authority. For this reason P2P (Peer-To-Peer) network is vulnerable which can facilitate non-cooperation, cheating, leaching on the network and propagation of malicious code. The security model used for centralized C/S systems is not suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

    A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. At the same time routers in the Internet do not perform any security verification of the source IP address contained in the packets. The lack of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Aviris Hyperspectral Images Compression Using 3D Spiht Algorithm

    Hyperspectral sequence image is compressed using 3D Discrete Wavelet Transform (3D DWT) to decorrelate the three dimensions of hyperspectral image. Than the sequence is encoded efficiently by the 3D SPIHT algorithm, which operates on the pyramid structure of wavelet coefficients obtained. After decompression, the image evaluated by the PSNR, are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Prevention of Attacks in Internet Controlled Embedded Applications

    Embedded systems are becoming a main solution to many specific tasks because of this high stability, minimal power consumption, portability and numerous useful. Now-a-days, many new applications are developed using embedded system. This paper deals with the issues related to embedded applications when they are implemented in Internet. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Implementation of Systolic Array Architecture for 3D-DWT Optimizing Speed and Power

    Demand for high speed and low power architectures for image/video compression algorithms are increasing with scaling in VLSI technology. Video sequences are considered as 3D sequences and are compressed using 3D DWT architectures. In this paper, systolic array architectures for 2D DWT have been modified and have been used in...

    Provided By IOSR Journal of Engineering