IOSR Journal of Engineering

Displaying 361-400 of 485 results

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Efficient Load Balancing in Cloud Computing Using Fuzzy Logic

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, software and web services. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Statistical Approach to Perform Web Based Summarization

    Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism of the search engines they use. Not surprisingly it in general consists...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Comparative Study of Prototype Model for Software Engineering with System Development Life Cycle

    The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. Many models were suggested like waterfall, prototype, rapid application development, V-shaped etc. In this paper, the authors focus on the comparative analysis of these software...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Knowledge Based Analysis of Statistical Tools in Attack Detection

    With the network playing more and more important effect in the modern society, crimes using computer network are presenting the obvious trend of escalation. In order to ensure network security, one technique adopted for detecting abnormal or unauthorized behavior is the Intrusion Detection System (IDS). Various data mining techniques are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Managing Child-to-Parent (Reverse) Relationship Instead of Parent-to-Child During Execution of a Transaction in Oracle

    Most of the computer professionals, academicians and students know the traditional way of handling one too many relationship using parent and child table. Whenever, there is a one-to-many relationship in a database, the authors used to define a primary or composite key in the parent table and it is referred...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme

    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. This scheme provides the ability to hide the data into a host image and then recover the host image without losing any information when the secret data is extracted. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Symmetric Key Based Steganography Algorithm for Secured Data Transfer

    Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable....

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA Algorithms for Bluetooth Security Systems

    In this paper, comparison of the Hybrid encryption algorithm (3DES-Tiger-RSA) and old hybrid method (DES-RSA, by Wuling Ren & Zhiqian Miao) for Bluetooth security system is done. Performance of the above security algorithm is evaluated based on the efficiency of the algorithm. The efficiency is calculated on the basis of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Object Based Data Partition Algorithm for XML Database

    The growing use of XML data format in global information needs an effective XML data management system. With the rapid growth of XML data in internet, users are confronted with big data issues; it's becoming a new research direction for managing massive XML data now. Conventional centralized data management technologies...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Authorization using Implicit Password

    In this paper, the authors introduce a authorization scheme for banking by using implicit password. As they know graphical password scheme suffered from shoulder-surfing and screen dump attacks. As they know for banking security is the first line of defense against compromising confidentiality and integrity. Simply the username and password...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Design of Aperture Coupled Micro-Strip patch Antenna for Wireless Communication applications at 5.8Ghz

    A microstrip antenna is basically a low profile antenna with a number of advantages over other antennas like small in size, light weight, inexpensive to fabricate. A microstrip antenna with aperture coupled feeding technique is used here as it is one of the most important method for exciting microstrip antenna...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Advanced Task Scheduling for Cloud Service Provider Using Genetaic Algorithm

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. To improve the QoS in a system one must...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    An Analysis of 10 Gbits/s Optical Transmission System using Fiber Bragg Grating (FBG)

    In this paper, the authors discussed on a simulation of optical transmission system in optical fiber. The optical fiber is always used in telecommunication system because of its characteristics which include small size or dimension, low loss and low interferences from outside environment. There are various types of optical fiber,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Oversampling Technique for Peak to Average Power Ratio Measurement of Discrete Time OFDM Signal

    When measured, the Peak to Average Power Ratio (PAPR) of the discrete Orthogonal Frequency Division Multiplexing (OFDM) signal comes out to be less as compared to its continuous counterpart. This happens due to non-consideration of some of the peaks while measuring PAPR of the discrete time OFDM signal. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Hardware Implementation of Face Detection Using ADABOOST Algorithm

    One of the main challenges of computer vision is efficiently detecting and classifying objects in an image or video sequence. Several machine learning approaches have been applied to this problem, demonstrating significant improvements in detection accuracy and speed. However, most approaches have limited object detection to a single class of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Low Power CMOS 1-Bit Full Adder Cell Based on Voltage Scaling

    Operating an Integrated circuit at the prescribed Voltage scaling (constant field scaling) is preferable for reliable circuit operation under temperature fluctuations. In this paper, the authors proposed to design 1 - bit full adder by "Changing the threshold voltage and W/L ratio" under temperature variation insensitive conditions. They measured power...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Secure Localization Technique for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consist of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibrations, pressure, motion, pollutants and etc to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional and control the activity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design and Implementation a System Communication of Optical Fiber by Using Interval Wavelength (532nm-820nm) of Diode Laser

    An optical communication system consists of a transmitter, which encodes a message into an optical signal, a channel, which carries the signal to its destination, and a receiver, which reproduces the message from the received optical signal. One of the most important types of optical communication system is optical Fiber...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance of Free Space Optical Communication System With BPSK and QPSK Modulation

    Free Space Optics is the technology which implies the line-of-sight link for the transfer of data between two distant points. The beam of light is used to provide optical connection that can transmit and receive data. The performance of the modulation techniques-Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Minimization of ICI Using OFDM Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) is an emerging broadband multicarrier modulation technique developed into a popular scheme for wideband digital communication, whether wireless or wired used in applications such as Digital Television, audio broadcasting, wireless networking and broadband internet access. OFDM has a well known limitation that is very sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    MIMO Communication System at a Glance

    The MIMO communication system has multiple antennas at both the transmitting and the receiving ends of the channel. Using multiple antennas introduces additional spatial channels on account of which the capacity of the channel increases hence the authors get increased spectral efficiency without additional bandwidth or transmit power. Because of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Suggested Correlation Formula Between (HPF) and (OPMUF) Parameters Over Middle East Region

    In this paper, a study of the behavior and correlation between High Possible Frequency (HPF) and Optimum Maximum Usable Frequency (OPMUF) parameters for the communication links distributed over Middle East Region were made. A mutual correlation equation between the two parameters has been suggested. The analytical test of the monthly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Qos Based Mac Protocol for Wireless Multimedia Sensor Network

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design and Implementation of Fpga Based High Performance Instruction List (IL) Processor

    Programmable Logic Controller (PLC) is a device that allows an Electro-Mechanical engineer to automate his mechanical process in an efficient manner. PLC is a typical Microprocessor or Micro-Controller based system with its dedicated operating system to interpret the control specification, scan inputs and accordingly activate the final control elements. As...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Comparative Study of High Performance Braun's Multiplier Using FPGAs

    Multiplication is one of the essential operations in Digital Signal Processing (DSP) applications like Fast Fourier Transform (FFT), Digital filters etc. With the advancements in technology, research is still going on to design a multiplier that consumes less power or has high speed or occupies less area or a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Developed Java Software for Switching Secured Short Message Service (SMS)

    In this paper, the authors implement a software based SMS switching system using GLOBACOM and MTN as network carriers. JAVA programming language with focus on socket programming will be used for the software development. The application client, which is the portion that runs on the mobile phone, uses Java macro...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Analysis of Dropped Packets for Location Aided Routing Protocol Using Artificial Intelligence

    Location Aided Routing protocol (LAR) is an on demand protocol in MANET which uses GPS in mobile nodes to find the location of node. It calculates routing when it is needed. LAR protocol has two zones namely expected zone and request zone. The expected zone is circular in shape while...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    ATLIST Method: Exploits Vulnerability in SOA

    The numbers of reported day to day increase Vulnerabilities in operating system and web applications. Vulnerability analysis approaches done several manual tasks so it's error prone and costly. Now, ATLIST is a new vulnerability analysis method to detect victims or weakness on client activities in single machine, shared resources and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Architecture to Achieve Anonymity and Traceability

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Monitoring Road Accidents Using Sensors and Providing Medical Facilities

    This paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need to develop such system which should inform automatically to medical rescue team that some...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

    For advanced streaming applications over wired-wireless networks TCP-Friendly Rate Control (TFRC) has been widely adopted nowadays to give smooth sending rate and unceasing quality in streaming applications TFRC applies an equation-based rate control scheme. However, TFRC tends to fail in wireless environment if packet lost event was done by poor...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Mobile Data Availability Similarity Between Cooperative Caching and Replication

    Mobile computing led to gain increased attention to people and to their ability and efficiency of its services at any time and place, example of this query for billing, and weather forecast, as well as retrieval of information through the database of bank accounts is done through different working environment,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Practical and Comparative Study of Call Graph Construction Algorithms

    A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the improvements over previous Call Graphs in terms of precision, cost and accuracy. In object oriented languages the Call...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Pattern Evaluation Proved To Be Important For Decision Support in Data Warehouse

    It is the mobile sensor network or satellite that is observing and obtaining the data pattern. This paper focuses on spatio-temporal data and events pattern for the data mining and for data warehouse. There is a repository or database where sensor, satellite inputs or data are collected for analysis. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Combining Cryptography with Channel Coding

    Cryptography is a form of hiding the text so to increase the security of the information. It can also be defined as the process of converting the valuable information into some form of non-scene information which can be understand able by the sender and the intended receiver only. On the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Close Look Towards Modified Booth's Algorithm with BKS Process

    In this paper, the authors are remodeling of modified Booth's algorithm, where shift three at a time. The result shows that classical concept of single shift multiplication algorithms are to be revised with a multiple number of shifts. The observation is that in general the complexity is N/3, which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee

    In this paper, an intelligent Campus Security Tracking system (iCST) has been designed and implemented base on the RFID and ZigBee network. iCST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Architecture for Node-level Congestion in WSN Using Rate Optimization

    The application has presented the details of Wireless Sensor Network differs basically from the overall knowledge network. It spotlight on tight communication however restricted in storage, lifetime, power and energy. The WSNs consists of unbelievable network load and it leads to energy wastage and packet loss. Several of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA Algorithms for Bluetooth Security Systems

    In this paper, comparison of the Hybrid encryption algorithm (3DES-Tiger-RSA) and old hybrid method (DES-RSA, by Wuling Ren & Zhiqian Miao) for Bluetooth security system is done. Performance of the above security algorithm is evaluated based on the efficiency of the algorithm. The efficiency is calculated on the basis of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Object Based Data Partition Algorithm for XML Database

    The growing use of XML data format in global information needs an effective XML data management system. With the rapid growth of XML data in internet, users are confronted with big data issues; it's becoming a new research direction for managing massive XML data now. Conventional centralized data management technologies...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Authorization using Implicit Password

    In this paper, the authors introduce a authorization scheme for banking by using implicit password. As they know graphical password scheme suffered from shoulder-surfing and screen dump attacks. As they know for banking security is the first line of defense against compromising confidentiality and integrity. Simply the username and password...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Design of Aperture Coupled Micro-Strip patch Antenna for Wireless Communication applications at 5.8Ghz

    A microstrip antenna is basically a low profile antenna with a number of advantages over other antennas like small in size, light weight, inexpensive to fabricate. A microstrip antenna with aperture coupled feeding technique is used here as it is one of the most important method for exciting microstrip antenna...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Advanced Task Scheduling for Cloud Service Provider Using Genetaic Algorithm

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. To improve the QoS in a system one must...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    An Analysis of 10 Gbits/s Optical Transmission System using Fiber Bragg Grating (FBG)

    In this paper, the authors discussed on a simulation of optical transmission system in optical fiber. The optical fiber is always used in telecommunication system because of its characteristics which include small size or dimension, low loss and low interferences from outside environment. There are various types of optical fiber,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Survey on Object Detect, Track and Identify Using Video Surveillance

    Network video surveillance has been a popular security application for many years. Target tracking in a cluttered environment remains one of the challenging problems of video surveillance. The task of target tracking is a key component of video surveillance and monitoring systems. It provides input to high-level processing such as...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Design and Implementation of Mobile Learning using 3G Technology

    Mobile learning is new. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes another very important complement to the traditional ways of learning after digital learning. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    MMSE-V-BLAST Optimal-Ordering In Different Channels

    The Bell Labs lAyered Space-Time (BLAST) algorithm is simple, and hence, a popular choice for a Multiple-Input-Multiple-Output (MIMO) receiver. Because of the difficulties that arise due to the optimal ordering in terms of BER, while considering real analytical evaluations, the one and only solution is by introducing OSIC schemes to...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Data Clustering with Leaders and Subleaders Algorithm

    In this paper, an efficient hierarchical clustering algorithm, suitable for large data sets is proposed for effective clustering and prototype selection for pattern classification. It is another simple and efficient technique which uses incremental clustering principles to generate a hierarchical structure for finding the subgroups/subclusters within each cluster. As an...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Survey of Related Technologies for Improved Spectrum Efficiency

    The most noted effect of rapid growth in wireless networks in recent years has been the issues of spectrum usage and management because of its importance in wireless communication as the medium of data transmission. Efficient utilization of spectrum has been the major concerns in spectrum management over recent years...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Liveness Detection Using Wavelet

    Fingerprint verification is one of the most reliable personal identification methods. It plays a very important role in forensic and civilian applications. In this paper, the authors propose a simple and effective approach for fingerprint liveness detection based on the wavelet analysis of the finger tip surface texture. In present...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Nonlinear Companding Transform Algorithm for Peak -to-Average Power Ratio Reduction of OFDM Signal

    Orthogonal Frequency Division Multiplexing (OFDM) is digital multicarrier Modulation access system for high data rate transfer .But it has high PEAK To Average Power Ratio which increases complexity of A/D Converter and D/A Converters and lowers the efficiency of power amplifiers. In this paper Repeated Clipping and Filtering (RCF) distortion...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    FPGA Implementation of MB-OFDM Using Biorthogonal Encoder

    UWB is a high data rate, short range technology .It transmits the information over a minimum bandwidth of 500 MHZ. Modern UWB systems use Modulation techniques such as OFDM (Orthogonal Frequency Division Multiplexing). The MB-OFDM proposal is selected for UWB system model. MultiBand OFDM (MB-OFDM) is a short-range wireless technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    New Fault Injection Approach for Network on Chip

    Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Study and Analysis of Fractal Linear Antenna Arrays

    A fractal is a recursively generated object having a fractional dimension. They have no characteristic size, and are constructed of many copies of themselves at different scales. In this paper, the authors primarily focus on design of fractal linear array antenna for even number of elements and comparison of fractal...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Parametric Study for Rectangular Microstrip Patch Antennas

    Physically, MSA consists of a metallic radiating patch backed up by a dielectric substrate and a ground plane below that. These days, MSAs are widely used in many applications due to their inherent advantages such as low profile, lightweight, planer configuration and ease of fabrication. However, main limitation of MSAs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Overview of Smart Antenna and a Survey on Direction of Arrival Estimation Algorithms for Smart Antenna

    Smart antenna systems is one of the most rapidly developing areas of communication. With effective Direction Of Arrival (DOA) and Beam forming techniques Smart Antenna Systems prove to be most efficient in terms of quality of signals in wireless communication. In this paper a brief overview of Smart Antenna along...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of Empirical Propagation Models for WiMAX in Urban Environment

    This paper presents a simulation study of different path loss empirical propagation models with measured field data in urban environment. The results are different if they are used in different environment other than in which they were designed For comparative analysis the authors use the Free Space path Loss model,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Evaluation of Uncoded Adaptive OFDM System Over AWGN Channel

    The demand for high-speed mobile wireless communications is rapidly growing. OFDM technology promises to be a key technique for achieving the high data capacity and spectral efficiency requirements for wireless communication systems of the near future. It is adopted as a standard for HYPERLAN & IEEE 802.11. It offers considerable...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Simulation of Rectangular Patch Antenna With Jeans Substrate

    There has been growing interest in researchers to merge wearable system technology with textile-technology. Utilization of textile material for development of antenna has been rapid due to wearable computing. A wearable antenna is meant to be a part of clothing used for communication purpose such as Tracking and navigation, health...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Stacked Multiband Microstrip Antenna

    In microstrip antenna research a new trend is found where the researchers improve antenna characteristics by introducing different structures within the antenna geometry. With the development of computational electromagnetic new approaches of analysis has become another branch of activity. This paper presents a design of stacked patch configuration of microstrip...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Protocols (AODV, DSR)of MANET(Mobile Ad-Hoc Network)& Black Hole Attack InAODV

    Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Due to Open medium, dynamic topology, distributed cooperation, ad-hoc networks are vulnerable to many types of security attacks. Black hole attack is one of the severe security threats which can be easily employed by exploiting...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Towards New Interfaces at Multitouch Technology

    In today's society, the way in which the people physically interact with electronic devices is changing how they are focused in their technological research. This change has led to many great advances, including the development of new interfaces at multi touch technology. Through the use of these new interfaces, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Embedded Data Acquisition System for Mobile Applications

    This paper presents an interactive way to acquire the parametric data of moving application using of GPRS services. The total system is incorporated in the mobile application like car, bus, etc. The embedded system is designed with the help of microcontroller and user interface devices. The acquisition of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks Under Secure Sparse Regeneration

    In wavelength-routed WDM optical networks requires regeneration for few light paths, when the strength of optical signal reduced and also security and privacy are essential before Optical Burst Switching (OBS) networks can become an everyday reality. Many-casting is a communication paradigm to implement the distributed applications. In many-casting, destinations can...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Improving Energy Efficiency Using LEARN Algorithm for Wireless Sensor Networks

    A number of energy-aware routing protocols were proposed to seek the energy efficiency of routes in Multihop wireless networks. Among them, several geographical localized routing protocols were proposed to help making smarter routing decision using only local information and reduce the routing overhead. However, all proposed localized routing methods cannot...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Printed Coupled Loop Wideband Antenna Design for Wireless Communication

    This paper explains the wideband loop antenna design for wireless communication. Printed antennas are supposed to be more attractive for mobile phone operations for achieving WWAN purposes. In mobile phones theses antenna usually cover the internal circuitry at the top or bottom of the device and they also require further...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Enhancement of Satellite Image Resolution With Moving Objects

    Satellite images are being used in many applications like Meteorology, Agriculture, Geology, Forestry, Landscape, Biodiversity, Planning, Education, Regional, Seismology and oceanography. The Enhanced satellite images make diagnostic details more obvious. The Image Enhancement is the main technique for improving the resolution and visual appearance of the image. One of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Traffic Modelling for Capacity Analysis of CDMA Networks Using Lognormal Approximation Method

    This paper presents teletraffic modelling in cellular networks operating with Code Division Multiple Access (CDMA) to assist in capacity analysis of such systems using statistical means. Since the introduction of CDMA, owing to capacity edge over other multiple access techniques, there is the need for tools that will assist in...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Public Transportation Management Services by Integrating GSM-GPS

    This paper proposes and implements a solution for enhancing public transportation management services based on GPS and GSM in Andhra Pradesh. The system consists of four modules: BUS Station Module, In-BUS Module, BASE Station Module and BUS Stop Module. Equipped with PC and GSM modem, BUS Station Module sends the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Analysis of Mobile Telecommunication Development and Operational Practices Vis-?-Vis 4G Wireless Technology

    4G is a brand name for the Fourth Generation of the cellular wireless standards. Over the years, Nigerian telecommunication firms have been in operation with predecessor generation standards (such as 2G and 3G). The design principle of each of these cellular wireless standards follow the same principle, where the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Wireless Data Logging and Supervisory Control of Process Using Lab View

    Wireless data acquisition, data logging and supervisory control are the basic building blocks of plant automation. In this paper plant consisting of multiple boilers where multiple process variables of the boilers need to be acquired from the field is considered and analyzed. The data of the process variables needs to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design of a Control Logic in a Dynamic Reconfigurable System

    this paper, the authors propose an architecture for controlling Dynamic Reconfigurable systems. The processor instructions when compiled one by one produces very high delay overhead. If these instructions are converted into a combinational logic then the overhead can be reduced thereby making the system an efficient one. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    VHDL Implementation of 8-Bit ALU

    In this paper VHDL implementation of 8-bit Arithmetic Logic Unit (ALU) is presented. The design was implemented using VHDL Xilinx Synthesis tool ISE 13.1 and targeted for Spartan device. ALU was designed to perform arithmetic operations such as addition and subtraction using 8-bit fast adder, logical operations such as AND,...

    Provided By IOSR Journal of Engineering