IOSR Journal of Engineering

Displaying 1-40 of 498 results

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

    In this paper, the authors propose an optimized version of the FCFS scheduling algorithm to address the major challenges of task scheduling in cloud. The incoming tasks are grouped on the basis of task requirement like minimum execution time or minimum cost and prioritized (FCFS manner). Resource selection is done...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones

    Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    High Speed Current Mode Sense Amplifier for SRAM Applications

    The sense amplifier is one of the most important components of semiconductor memories used to sense stored date. This plays an important role to reduce the overall sensing delay and voltage. Earlier voltage mode sense amplifiers are used to sense the date it sense the voltage difference at bit and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Low Power Binary to Gray Code Converter Using Gate Diffusion Input (GDI)

    In modern era, ultra-low power design has an active research topic due to its various applications. In this paper, the authors introduce a novel low power and area efficient binary to gray code converter is implemented by using four transistor XOR gate. This four transistor XOR gate is designed by...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Design and Analysis of Pulse Width Modulator (PWM) using Low Input Impedance Current Comparator

    Pulse width modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. The voltage-mode comparator is the most critical component of pulse-width modulator which dominates the accuracy of modulation process. In this paper, a new design of...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud

    Cloud computing, the next generation architecture of IT enterprises, offers the users with a flexible computing environment. In cloud, the virtualized resources are provided as a service over the internet. Typical applications that have already been thought of are SaaS (Software as a Service), PaaS (Platform as a Service), IaaS...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Forensics-An IS Approach

    The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level Agreement (SLA) bounded only by the capacity of the data center. Hence,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Entrepreneurial Idea Development to Business Start-Up: Teaching Methodological Approach

    The crucial issue on entrepreneurship training in the tertiary institutions of learning is teaching students how to develop innovative business idea to the business venture start-up stage. This is the ability of the students to develop ideas that are out of the theoretical teaching of the academic environment. Several scholars...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A New Approach to Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. As volunteer clouds are allowed to communicate with each other and with other commercial clouds also, it's necessary to implement an enhanced interoperable environment. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Requirements and Challenges for Securing Cloud Applications and Services

    Adopting cloud computing is a complex decision involving many factors. This paper focuses on the central issues of cloud computing security. The cloud computing architectural framework provides a conceptual framework to help evaluate initial cloud risks and inform security decisions. It's a quick method for evaluating the tolerance for moving...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Improving Security for Data Migration in Cloud Computing Using Randomized Encryption Technique

    With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Green Cloud Computing: A Constructive Advent to Curtail the Carbon Emission Radiation Due to Servers

    This paper analytically scrutinizes the energy dissipation based on services and invades the conditions to promote green cloud computing to save energy crisis. In conventional, cloud computing emphasis on the data computing efficiency whereas green cloud computing accredit to the research and practice of applying computing resources in virtuous, adequate...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Entrepreneurial Characteristics and Competency as Determinants of Business Performance in SMEs

    This paper is to empirically test the influence of entrepreneurial characteristics and competencies on business performance in Small and Medium Enterprises (SMEs). This study was conducted with 147 SMEs owner in Malang regency East Java Indonesia using survey instrument. Data analysis using the structural equation modelling. The results of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Capital Market and the Development of the Small and Medium - Scale Enterprises in Nigeria

    This paper looked at the need to incorporate the Small and Medium Scale Enterprises (SMEs) into the capital market in Nigeria as a means of raising capital for their operations. The findings of the paper found that the growth in the transactions of the quoted companies has been fluctuating over...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementing SAAS: Cloud Computing and Android Based Application Framework for C Programming

    Under The National Mission on Education through Information and Communication Technology (NMEICT) a lot of e-learning material, applications and other useful information have been made available on its web portal. MHRD has also taken initiatives for the dissemination of this knowledge by distributing Aakash Tablets to the students at free...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering