IOSR Journal of Engineering

Displaying 1-40 of 498 results

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Virtual Energy Based Encryption & Keying on Wireless Sensor Network

    Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this the authors introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that reduces the number of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols With Varying Number of Nodes and Traffic Applications Over MANETs

    Wireless Technology is at its peak when they talk about research and innovation. This field has become a hub of invention of new theories and structures. Mobile Ad-hoc Network is a special point of focus for the researchers. MANET is a collection of wireless mobile nodes which forms a dynamic...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Enhancement in Elimination of Security Threads using Trusted Proactive Routing

    Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

    In this paper, adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long distances. The aim of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

    Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey of Weight-Based Clustering Algorithms in MANET

    As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. Several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevailing routing algorithms don't utilize the potency that may be obtained by clustering a network. Clustering method involves in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Green Computing Under Cloud Environment Proposed Architecture Using Cloud Computing & Thin Client

    Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less power. Most cloud services run in browser based environment so the authors don't need a fat client to use in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Defending Against Replication Node Attack in Wireless Sensor Network

    In Wireless Sensor network, nodes are interconnected and information is shared among them. In a situation, many attacks are involved to misuse the wireless sensor network. One of the attacks is replica node replication attack, in which the adversary can detain and conciliation of sensor nodes by hacking IP address...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure Data Forwarding

    A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Analysis of Manhattan Mobility Model Without RSUs

    The vehicular communication is an important issue to the researchers who are engaged in preventing traffic accidents and traffic jams. The earlier vehicular models had discussed only communication among vehicles through the Road Side Units (RSU). Most of the researchers used IEEE 802.11 for vehicular communication in which the vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Comprehensive Parametric Analysis of Vertical Handoff in Next Generation Wireless Networks

    The science and technology is developing day by day leading to expand and forcing to reshape user's living standards. The main aspects leading to deployment of a wide array of wireless and mobile networks are advances in miniaturization, low power circuit design and development in radio access technologies and increase...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, and time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks. Large-scale networks mean that wireless network at the dynamic time. Propel...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since the highly dynamic nature of MANET coupled with limited bandwidth...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Research Paper on Comparison Between Energy Efficient Routing Protocol with Energy and Location in MANET

    Energy is an important issue in MANET (Mobile Ad-hoc NETwork). Nodes in network are working in presence of limited energy. So, energy efficient routing is needed for reducing energy consumption. Energy efficient routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Multipath routing protocol (AOMDV)...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Analysis of Dropped Packets for Location Aided Routing Protocol Using Artificial Intelligence

    Location Aided Routing protocol (LAR) is an on demand protocol in MANET which uses GPS in mobile nodes to find the location of node. It calculates routing when it is needed. LAR protocol has two zones namely expected zone and request zone. The expected zone is circular in shape while...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Interference and Noise Detection in a Cognitive Radio Environment

    Now-a-days cellular and handheld devices hold up most of the data exchange services that is one currently and they widely use high speed data links causing increased usage of available spectrum. However these devices are not always in use so the links stays void sometime and using those void links...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design of High Speed Reconfigurable Coprocessor for Multiplier/Adder and Subtractions Operations

    As the quantity of data transmission and reception increases, there is a gradual increase in bandwidth on demand and quality of service. This further increases data traffic which leads to loss of information, reduced accuracy and reliability. To overcome this drawback, the authors proposed coprocessor can be used for communication...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Security Framework for Wireless Sensor Networks: IBE-Trust

    The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Sensor Network: An Emerging Technology

    Wireless sensor network is a special kind of network that differs from the conventional communication networks in terms of architecture and deployment. Dynamic in nature, the wireless sensor networks have added a new dimension not only to the further exploration in a hard-to-reach environment, but also to the complexity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Construct of Broadband Printed Rectangular Monopole Antenna

    In this paper, the authors have investigated an rectangular monopole antenna that was printed on a Printed Circuit Board (PCB). The antenna consists of a rectangular patch and a ground plane so that the antenna acts as a planar monopole antenna which is broadband. Broadband planar monopole antennas have all...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Bandwidth Allocation in Wireless Networks With Multiple Degradable Quality of Service

    In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Handset Antenna Design for Mobile Communication System

    Monopole slot antenna is suitable for handset applications due to its simple planar structure. Besides that, it is compact, low cost, low profile and easy to manufacture. It also has wide bandwidth and omnidirectional charatriesticts. The monopole antenna is obtained by cutting monopole slot at the edge of the ground...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    ATLIST Method: Exploits Vulnerability in SOA

    The numbers of reported day to day increase Vulnerabilities in operating system and web applications. Vulnerability analysis approaches done several manual tasks so it's error prone and costly. Now, ATLIST is a new vulnerability analysis method to detect victims or weakness on client activities in single machine, shared resources and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Architecture to Achieve Anonymity and Traceability

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Monitoring Road Accidents Using Sensors and Providing Medical Facilities

    This paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need to develop such system which should inform automatically to medical rescue team that some...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

    For advanced streaming applications over wired-wireless networks TCP-Friendly Rate Control (TFRC) has been widely adopted nowadays to give smooth sending rate and unceasing quality in streaming applications TFRC applies an equation-based rate control scheme. However, TFRC tends to fail in wireless environment if packet lost event was done by poor...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Mobile Data Availability Similarity Between Cooperative Caching and Replication

    Mobile computing led to gain increased attention to people and to their ability and efficiency of its services at any time and place, example of this query for billing, and weather forecast, as well as retrieval of information through the database of bank accounts is done through different working environment,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Practical and Comparative Study of Call Graph Construction Algorithms

    A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the improvements over previous Call Graphs in terms of precision, cost and accuracy. In object oriented languages the Call...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Review on Diverse Ensemble Methods for Classification

    Ensemble methods for different classifiers like bagging and boosting which combine the decisions of multiple hypotheses are some of the strongest existing machine learning methods. The diversity of the members of an ensemble is known to be an important factor in determining its generalization error. DECORATE (Diverse Ensemble Creation by...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Statistical Approach to Perform Web Based Summarization

    Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism of the search engines they use. Not surprisingly it in general consists...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Cost Estimation of Maintenance Phase for Component Based Software

    Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Accurate estimation makes good understanding between the customer and user. Maintenance plays important role in various software developments like Iterative development, Agile development and Component Based Software Development...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Energy Efficient Anchor-Based Localization Algorithm for WSN

    Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. To solve the localization problem for find out the location of sensor nodes in wireless sensor network, a Anchor based...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing

    Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the software. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of limited capability (power and processing) Micro Electro Mechanical Systems (MEMS) capable of measuring and reporting physical variables related to their environment. In surveillance applications, sensors are deployed in a certain field to detect and report events like presence, movement, or...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Web Personalization Using Ontology: A Survey

    This paper contains concept of ontologies on the basis of user behaviour being analyzed. Ontologies are the structural frameworks for organizing information and are used in artificial intelligence, the Semantic Web, systems engineering, software engineering, biomedical informatics, library science, enterprise bookmarking, and information architecture as a form of knowledge representation...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Algorithm to Simulate the Temporal Database Using Exponential Distribution

    Since the early eighties, an active temporal database research community has sought new insight into the management of time-referenced, or temporal, data and has developed concepts, tools and techniques that better support the management of such data. Much of this activity has been motivated by the observations that most databases...

    Provided By IOSR Journal of Engineering