IOSR Journal of Engineering

Displaying 1-40 of 498 results

  • White Papers // Nov 2014

    A Novel Off-Chip Capacitor-Less CMOS LDO with Fast Transient Response

    A novel Low-DropOut (LDO) regulator without external capacitor featuring with fast transient response and low-power dissipation for System-On-Chip (SOC) is proposed in this paper. By introducing an auxiliary feedback path to splits the poles without using a miller compensating scheme, the proposed LDO achieves fast transient response and high stability...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Fine-Grain Power-Gated Logic for Asynchronous Circuit using Partial Charge Reuse

    In this paper, the authors introduce a novel low power logic family called Asynchronous Fine-grain Power-gated Logic (AFPL). Each pipeline stage in the AFPL circuit is made up of Efficient Charge Recovery Logic (ECRL) gate, which carry out the logic part of the stage and a handshake controller, which handles...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2014

    A Novel FPGA Based Synchronous High Resolution Digital Pulse Width Modulators for Inverters

    In this paper, the authors present the survey of pulse width modulators for inverters. Pulse width modulators are widely used as the basic block for controlling the on and off of the load that connecting with the inverter. Here, they present two synchronous techniques that increase the resolution of pulse...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2014

    An Overview of Reconfigurable Hardware for Efficient Implementation of DSP Algorithms

    Reconfigurable hardware is emerging as the best option for the efficient implementation of complex and computationally expensive signal processing algorithms. Reconfigurable hardware exploits the benefit of high of computational efficiency of hardware as well as flexibility of software implementation. Field Programmable Gate Array (FPGA) which finds wide range of applications...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Third Order Current-Mode Filter Realization Using CMOS Current-Mirror

    In this paper, the authors have presented an approach to realize third order current-mode filters using CMOS current-mirrors with two different techniques. This paper presents the realization of third-order Low-Pass (LP) active current-mode filters using cascade technique of lossy and lossless integrators. Another important technique is the active realization of...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Design and Implementation of Low Power Floating Point Multiplier

    In this paper, the authors describe a design and efficient implementation of an IEEE 754 low power single precision floating point multiplier targeted for Xilinx Virtex 5 FPGA. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2013

    Implementation of Baugh-Wooley Multiplier based on Soft-Core Processor

    In this paper, the authors present on implementation of Baugh-Wooley multiplier based on soft-core processor. MicroBlaze soft core is high performance embedded soft core processor developed by XILINX company. This soft core enjoys high configurability and allows designer to make proper choice based on their own design requirements to build...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Performance Analysis of Energy Efficient and Charge Recovery Adiabatic Techniques for Low Power Design

    The power consumption of the electronic devices can be reduced by adopting different design styles. Adiabatic logic style is said to be an attractive solution for such low power electronic applications. By using adiabatic techniques energy dissipation in PMOS network can be minimized and some of energy stored at load...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    An FPGA Based Implementation for 2-D Discrete Wavelet Transform

    A 2-D discrete wavelet transform hardware design based on multiplier design based architecture is presented in this paper. The authors have proposed based on arithmetic for low complexity and efficient implementation of 2-D discrete wavelet transform. The multiplier design based technique has been applied to reduce the number of delay....

    Provided By IOSR Journal of Engineering

  • White Papers // May 2013

    4-Input Decimal Adder Using 90 nm CMOS Technology

    The core of every microprocessor, Digital Signal Processor (DSP), and data processing application-Specific Integrated Circuit (ASIC) is its data path. At the hearts of data paths and addressing units are arithmetic units, such as a comparators, adders, and multipliers. In this paper, a 4 - input decimal adder has been...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

    In this paper, the authors propose an optimized version of the FCFS scheduling algorithm to address the major challenges of task scheduling in cloud. The incoming tasks are grouped on the basis of task requirement like minimum execution time or minimum cost and prioritized (FCFS manner). Resource selection is done...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones

    Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

    In this paper, adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long distances. The aim of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

    Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Knowledge Based Analysis of Statistical Tools in Attack Detection

    With the network playing more and more important effect in the modern society, crimes using computer network are presenting the obvious trend of escalation. In order to ensure network security, one technique adopted for detecting abnormal or unauthorized behavior is the Intrusion Detection System (IDS). Various data mining techniques are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Managing Child-to-Parent (Reverse) Relationship Instead of Parent-to-Child During Execution of a Transaction in Oracle

    Most of the computer professionals, academicians and students know the traditional way of handling one too many relationship using parent and child table. Whenever, there is a one-to-many relationship in a database, the authors used to define a primary or composite key in the parent table and it is referred...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme

    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. This scheme provides the ability to hide the data into a host image and then recover the host image without losing any information when the secret data is extracted. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Symmetric Key Based Steganography Algorithm for Secured Data Transfer

    Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Assuage Bandwidth Utilization DDoS Attacks by Using Prototype Analyzer and Transfer Scheduling Scheme

    Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Risk Chain Prediction Metrics for Predicting Fault Proneness in Software Systems

    The paper presents two atypical risk chain prediction metrics for barometer coupling and accord in software systems. The authors' aboriginal metric, Ideal Coupling Between Object classes (ICBO), is based on the acclaimed CBO coupling metric, while the added metric, Ideal Lack of Cohesion On Methods (ILCOM5), is based on the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation for V-Blast MIMO Systems Under Various Modulation Schemes Using Ricean Channel

    Wireless communication system with multi-antenna arrays has been a field of intensive research on the last years. The use of multiple antennas at both the transmitter and the receiver sides can drastically improve the channel capacity and data rate. The paper of the performance limits of MIMO system becomes very...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Embedded System Design for a Multi Variable Input Operations

    There are several multivariable input systems with one or more outputs exist in nature or designed and implemented successfully artificially. The input parameters of the system may or may not bear any relationship with each other however, output or outputs of the system definitely possess fixed relationship with input parameters....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

    Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. In CD-MAC every terminal is aggressively selects a relay for partnership and lets it transmit at the same time so that this mitigates intrusion from near terminals and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Compact Double-T Monopole Antenna for Dual Wideband Wireless Communications Systems

    In this paper, the authors carry a dual band monopole antenna design specially meant for wireless applications. The proposed antenna consists of a rectangular patch monopole in which a slot is cut in order to obtain a dual band operation and size reduction. The antenna operates in frequency band 2.3...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Fading Channels on OFDM

    High data rates are demanded a lot in modern communications. It is the huge development in the communications industry that led to this demand. One of the essential components of recent communications is Orthogonal Frequency Division Multiplexing (OFDM). Handling bad conditions, high bandwidth and using the available spectral efficiently are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Factors of Cloud Computing Data Centers Using M/G/m/m+r Queuing Systems

    Cloud computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing systems fundamentally provide access to large amounts of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    An Analysis of V-Blast Detection Schemes for MIMO Wireless Communications

    Vertical Bell Laboratories lAyered Space Time (V-BLAST) is a Multiple Input Multiple Output (MIMO) wireless communication system that uses multiple antenna elements at transmit and receive to offer high spectral efficiency and increased capacity in a rich multipath environment without increasing the use of the spectrum. Whereas, the detection schemes...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Intelligent Reconfigurable Computing Systems

    Every new technology comes with a scope of research on making it more economical in terms of money and time. Intelligent reconfigurable computing systems follow a similar trend by implementing the applications over the available reconfigurable hardware. Reconfigurability basically aims at reuse of the hardware for similar problems or sub...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementation of VOIP Communication on Embedded Systems

    In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VOIP software, and embedded VOIP is one of these blind spots. The VOIP application in this paper sets...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

    Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Comparative Study of Prototype Model for Software Engineering with System Development Life Cycle

    The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. Many models were suggested like waterfall, prototype, rapid application development, V-shaped etc. In this paper, the authors focus on the comparative analysis of these software...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering