IOSR Journal of Engineering

Displaying 361-400 of 481 results

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Comparative Study of Prototype Model for Software Engineering with System Development Life Cycle

    The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. Many models were suggested like waterfall, prototype, rapid application development, V-shaped etc. In this paper, the authors focus on the comparative analysis of these software...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Knowledge Based Analysis of Statistical Tools in Attack Detection

    With the network playing more and more important effect in the modern society, crimes using computer network are presenting the obvious trend of escalation. In order to ensure network security, one technique adopted for detecting abnormal or unauthorized behavior is the Intrusion Detection System (IDS). Various data mining techniques are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Managing Child-to-Parent (Reverse) Relationship Instead of Parent-to-Child During Execution of a Transaction in Oracle

    Most of the computer professionals, academicians and students know the traditional way of handling one too many relationship using parent and child table. Whenever, there is a one-to-many relationship in a database, the authors used to define a primary or composite key in the parent table and it is referred...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme

    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. This scheme provides the ability to hide the data into a host image and then recover the host image without losing any information when the secret data is extracted. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Symmetric Key Based Steganography Algorithm for Secured Data Transfer

    Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable....

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA Algorithms for Bluetooth Security Systems

    In this paper, comparison of the Hybrid encryption algorithm (3DES-Tiger-RSA) and old hybrid method (DES-RSA, by Wuling Ren & Zhiqian Miao) for Bluetooth security system is done. Performance of the above security algorithm is evaluated based on the efficiency of the algorithm. The efficiency is calculated on the basis of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Object Based Data Partition Algorithm for XML Database

    The growing use of XML data format in global information needs an effective XML data management system. With the rapid growth of XML data in internet, users are confronted with big data issues; it's becoming a new research direction for managing massive XML data now. Conventional centralized data management technologies...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Authorization using Implicit Password

    In this paper, the authors introduce a authorization scheme for banking by using implicit password. As they know graphical password scheme suffered from shoulder-surfing and screen dump attacks. As they know for banking security is the first line of defense against compromising confidentiality and integrity. Simply the username and password...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Design of Aperture Coupled Micro-Strip patch Antenna for Wireless Communication applications at 5.8Ghz

    A microstrip antenna is basically a low profile antenna with a number of advantages over other antennas like small in size, light weight, inexpensive to fabricate. A microstrip antenna with aperture coupled feeding technique is used here as it is one of the most important method for exciting microstrip antenna...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Advanced Task Scheduling for Cloud Service Provider Using Genetaic Algorithm

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. To improve the QoS in a system one must...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    An Analysis of 10 Gbits/s Optical Transmission System using Fiber Bragg Grating (FBG)

    In this paper, the authors discussed on a simulation of optical transmission system in optical fiber. The optical fiber is always used in telecommunication system because of its characteristics which include small size or dimension, low loss and low interferences from outside environment. There are various types of optical fiber,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Efficient Load Balancing in Cloud Computing Using Fuzzy Logic

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, software and web services. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Statistical Approach to Perform Web Based Summarization

    Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism of the search engines they use. Not surprisingly it in general consists...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Hardware Implementation of Modified RC4 Stream Cipher Using FPGA

    In this paper, an efficient hardware implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee

    In this paper, an intelligent Campus Security Tracking system (iCST) has been designed and implemented base on the RFID and ZigBee network. iCST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Architecture for Node-level Congestion in WSN Using Rate Optimization

    The application has presented the details of Wireless Sensor Network differs basically from the overall knowledge network. It spotlight on tight communication however restricted in storage, lifetime, power and energy. The WSNs consists of unbelievable network load and it leads to energy wastage and packet loss. Several of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Implementation of Artificial Intelligence Techniques for Economic Load Dispatch

    In this paper, the authors present the applications of computational intelligence techniques to economic load dispatch problems. The fuel cost equation of a thermal plant is generally expressed as continuous quadratic equation. In real situations the fuel cost equations can be discontinuous. In view of the above, both continuous and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Power Efficient Energy-Aware Routing Protocol for Wireless Sensor Networks

    The most important issue that must be solved in designing a data transmission algorithm for Wireless Sensor Networks (WSNs) is how to save sensor node energy while meeting the needs of applications/users as the sensor nodes are battery limited. While satisfying the energy saving requirement, it is also necessary to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Data Transmission at 16.8kb/s Over 32kb/s ADPCM Channel

    In this paper, the authors present three models of Quadrature Amplitude Modulation (QAM) modem operating at data rate of 16.8kb/s to be transmitted over 32kb/s Adaptive Differential Pulse Code Modulation (ADPCM) channel. These modems operate at symbol rates of 2400, 2800, and 3360 baud with associated number of bits per...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Improving the Quality of Service in Wireless Body Area Networks Using Genetic Algorithm

    Wireless Body Area Sensor Networks are the highly distributed network, in which its nodes are the organizer itself and each of them has the flexibility of gathering and sending patient biomedical knowledge to a terminal that referred to as sink. When knowledge sent to sink from a path that doesn't...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Evaluation Method Proposal for High Performance ICT Systems and Networks

    In this paper, the authors present a predicted functional architecture of an emerging application of High Performance Computing and Communication (HPCC) application: the integrated manufacturing and management system. The computer network was defined for a case study of big manufacturer of household appliances. To evaluate and/or predict performance of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Implementation of WSN Node Using Hardware Specialization

    Wireless Sensor Networks holds space in wide range of application ranging from tracking to monitoring health, environment etc. The power (energy consumption) attribute for WSN requires special attention as WSN has to work unattended for long durations. Till now WSN nodes has been designed using low-power micro-controller. But still its...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Improving Computational Efficiency of Tentative Data Set

    The aim of data mining is to find novel, interesting and useful patterns from data using algorithms that will do it in a way that is more computational efficient than previous method. Current data mining practice is very much driven by practical computational concerns. In focusing almost exclusively on computational...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Pattern Evaluation Proved To Be Important For Decision Support in Data Warehouse

    It is the mobile sensor network or satellite that is observing and obtaining the data pattern. This paper focuses on spatio-temporal data and events pattern for the data mining and for data warehouse. There is a repository or database where sensor, satellite inputs or data are collected for analysis. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Combining Cryptography with Channel Coding

    Cryptography is a form of hiding the text so to increase the security of the information. It can also be defined as the process of converting the valuable information into some form of non-scene information which can be understand able by the sender and the intended receiver only. On the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Close Look Towards Modified Booth's Algorithm with BKS Process

    In this paper, the authors are remodeling of modified Booth's algorithm, where shift three at a time. The result shows that classical concept of single shift multiplication algorithms are to be revised with a multiple number of shifts. The observation is that in general the complexity is N/3, which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Algorithm to Simulate the Temporal Database Using Exponential Distribution

    Since the early eighties, an active temporal database research community has sought new insight into the management of time-referenced, or temporal, data and has developed concepts, tools and techniques that better support the management of such data. Much of this activity has been motivated by the observations that most databases...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Cryptography Using Genetic Algorithms (GAs)

    Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. Public key cryptography is one of the most important types of cryptography. In public key cryptography the key has to be unique. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Detection of SQL Injection Attack in Web Applications Using Web Services

    Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks are extremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application's...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Impact of Personal Software Process on Software Quality

    Today, concern for quality has become an international movement. Even though most industrial organizations have now adopted modern quality principles, the software community has continued to rely on testing as the principal quality management method. Different decades have different trends in software engineering. The Personal Software Process (PSP) is an...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Optimal Route Search in Mobile Ad-Hoc Network Using Ant Colony Optimization With Power Saving Technique

    In ad-hoc networks the mobile nodes communicate with each other using multi-hop wireless links. The main drawback of such network is that there are no stationary infrastructures to route the packets. Hence, routing protocols have to adapt quickly and elegantly to frequent and unpredictable changes in network technology and they...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Web Based Solution for Thermal Printing of Bar Code

    A barcode is an optical machine-readable representation of data, which shows the relevant data about the material to which it is attached or fixed. With the help of bar code, the information can be assessed automatically, quickly and accurately. It is the fastest means of gathering data and can be...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Intrusion Detection Technique Based on Dendritic Cell Algorithm and Dempster Belief Theory

    Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    ATLIST Method: Exploits Vulnerability in SOA

    The numbers of reported day to day increase Vulnerabilities in operating system and web applications. Vulnerability analysis approaches done several manual tasks so it's error prone and costly. Now, ATLIST is a new vulnerability analysis method to detect victims or weakness on client activities in single machine, shared resources and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Architecture to Achieve Anonymity and Traceability

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Monitoring Road Accidents Using Sensors and Providing Medical Facilities

    This paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need to develop such system which should inform automatically to medical rescue team that some...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

    For advanced streaming applications over wired-wireless networks TCP-Friendly Rate Control (TFRC) has been widely adopted nowadays to give smooth sending rate and unceasing quality in streaming applications TFRC applies an equation-based rate control scheme. However, TFRC tends to fail in wireless environment if packet lost event was done by poor...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Fading Channels on OFDM

    High data rates are demanded a lot in modern communications. It is the huge development in the communications industry that led to this demand. One of the essential components of recent communications is Orthogonal Frequency Division Multiplexing (OFDM). Handling bad conditions, high bandwidth and using the available spectral efficiently are...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design of Enhanced LEACH Routing Protocol for Wireless Sensor Network

    A wireless network consists of a large number of small sensors. The sensor is low-power transceivers & can be an effective tool for gathering data in a variety of environments. The communication between the sensor nodes must be designed to conserve the limited energy resources within the sensor. LEACH clustering...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Finger Print Image Enhancement and Point Pattern Based Verification

    Fingerprints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Hardware Implementation and Analysis of BPSK System on Xilinx System Generator

    With the recent advent of hardware description languages (e.g., Verilog or VHDL) and digital implementation for Field-Programmable Gate Arrays (FPGAs), substantial academic digital design projects become practicable. In the present paper, the design of a digital Binary-Phase-Shift-Keying (BPSK) modulator and detector is described. The project details the design of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based Adaptive Traffic Control System

    Through this paper, the authors intend to present an improvement in existing traffic control system at intersection. System is made more efficient with addition of intelligence in term of artificial vision, using image processing techniques to estimate actual road traffic and compute time each time for every road before enabling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of PM: Direction of Arrival Estimation Algorithm for Smart Antenna System

    This paper presents analysis of simulation results for Direction of arrival estimation for smart antenna system using non Eigen value decomposition based algorithm. Direction Of Arrival (DOA) estimation in smart antenna for identifying the directions of the desired signals and the null steering beamformer to adapts the antenna pattern to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Arm Based Temperature Measurement and Control System Using CPLD

    In this paper a temperature measurement and control system is proposed using ARM processor S3C2440 as a controlling device. This system uses LM35D sensor and its related peripherals for temperature measurement. This temperature is filtered and transmitted to the ADC MCP3201. ARM and CPLD are used for processing and controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Viterbi Algorithm for Error Detection and Correction

    In the present world, communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Zigbee Based Sensor Networks for Temperature Monitoring and Controlling

    In Now-a-days, the people have many different types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and to save property from damage. There is need to develop wireless sensor network for temperature controlling. In this paper, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Verification Using Gabor Filter Bank

    Biometrics deals with identification of individuals based on their biological or behavioral characteristics. The use of fingerprints, for identification has been employed in law enforcement for about a century. An application of fingerprint is for personal authentication, for instance to access a computer, A bank-machine, cars or home. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Pen Drive to Pen Drive and Mobile Data Transfer Using ARM

    Generally, the authors used to transfer data between two pen drives by using laptops or desktops. But it is not always possible to carry such a large size device to the particular location. So to overcome this problem, they are designing a hardware which is more compact to carry anywhere....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

    In this paper, adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long distances. The aim of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

    Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey of Weight-Based Clustering Algorithms in MANET

    As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. Several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevailing routing algorithms don't utilize the potency that may be obtained by clustering a network. Clustering method involves in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Green Computing Under Cloud Environment Proposed Architecture Using Cloud Computing & Thin Client

    Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less power. Most cloud services run in browser based environment so the authors don't need a fat client to use in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Defending Against Replication Node Attack in Wireless Sensor Network

    In Wireless Sensor network, nodes are interconnected and information is shared among them. In a situation, many attacks are involved to misuse the wireless sensor network. One of the attacks is replica node replication attack, in which the adversary can detain and conciliation of sensor nodes by hacking IP address...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure Data Forwarding

    A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Analysis of Manhattan Mobility Model Without RSUs

    The vehicular communication is an important issue to the researchers who are engaged in preventing traffic accidents and traffic jams. The earlier vehicular models had discussed only communication among vehicles through the Road Side Units (RSU). Most of the researchers used IEEE 802.11 for vehicular communication in which the vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Data Mining Approach Using Apriori Algorithm: The Review

    In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions. As is common in association rule mining, given a set of itemsets, the algorithm attempts to find subsets which are common to at least a minimum...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Software Redefined Communication System

    Beginning with practical difficulties in teaching communication systems in class room, this paper describes a set of innovative experimental demonstrations developed using SDR. Communication engineering is one of the interesting, at the same time difficult subject to learn if the concept is not clear or well explained. Normal practice is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Radix4 Configurable Booth Multiplier for Low Power and High Speed Applications

    Portable multimedia and Digital Signal Processing (DSP) systems, which typically require flexible processing ability, low power consumption, and short design cycle, have become increasingly popular over the past few years. Many multimedia and DSP applications are highly multiplication intensive so that the performance and power consumption of these systems are...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Fabrication of 456 MHz Bandpass Filter

    Bandpass filter is a passive component which is able to select signals inside a specific bandwidth at a certain center frequency and reject signals in another frequency region, especially in frequency regions, which have the potential to interfere the information signals. A bandpass filter must be used in transmitter and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    The Performance of Saturated Packet Queue System on Broadband PLC Network

    The latest development of Broadband Power Line Communication Network may offer a platform for synchrophasor-sensor network in power distribution networks to establish a smart grid. Random data traffic passing through the slave-station of synchrophasor-sensor network can be viewed as packet entering of a queue. Since the length of queue is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Design of RF - Based Programmable Frequency Divider for IEEE 802.11a Wireless Access

    Frequency being a parameter of the electronic signal give the researchers, a wide scope to improve & standardize the electronics & telecommunication system in the most productive & efficient way. As the telecommunication system is flourishing, it uses frequency as one of the most important parameter for its development. In...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation of FPGA Based Low Power Digital FIR Filter

    Finite Impulse Response (FIR) filters are widely used in various DSP applications. The low-power or low-area techniques developed specifically for digital filters can be found in. Many applications in digital communication (channel equalization and frequency channelization), speech processing (adaptive noise cancelation), seismic signal processing (noise elimination), and several other areas...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Virtual Wi-Fi for Single Hopping

    Single hopping is implemented by using software approach over IEEE802.11WLAN card using orthogonality concept and protocol. Most feature of single hopping is to achieve virtual Wi-Fi network. Design parameters of this approach are time delay and energy consumption .There are many scenarios where a wireless device connect to virtual Wi-Fi...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Performance Analysis of Different M-ARY Modulation Techniques Over Wireless Fading Channel

    Cellular communication systems are the most widely used wireless communication systems. It is the people primary need today to achieve the higher data rates in limited spectrum bandwidth to improve the performance of signals. The authors know digital communication system outperforms analog ones in terms of noise performance and flexibility....

    Provided By IOSR Journal of Engineering