IOSR Journal of Engineering

Displaying 361-400 of 498 results

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Low Power Binary to Gray Code Converter Using Gate Diffusion Input (GDI)

    In modern era, ultra-low power design has an active research topic due to its various applications. In this paper, the authors introduce a novel low power and area efficient binary to gray code converter is implemented by using four transistor XOR gate. This four transistor XOR gate is designed by...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Efficient Load Balancing in Cloud Computing Using Fuzzy Logic

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, software and web services. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA Algorithms for Bluetooth Security Systems

    In this paper, comparison of the Hybrid encryption algorithm (3DES-Tiger-RSA) and old hybrid method (DES-RSA, by Wuling Ren & Zhiqian Miao) for Bluetooth security system is done. Performance of the above security algorithm is evaluated based on the efficiency of the algorithm. The efficiency is calculated on the basis of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Object Based Data Partition Algorithm for XML Database

    The growing use of XML data format in global information needs an effective XML data management system. With the rapid growth of XML data in internet, users are confronted with big data issues; it's becoming a new research direction for managing massive XML data now. Conventional centralized data management technologies...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Authorization using Implicit Password

    In this paper, the authors introduce a authorization scheme for banking by using implicit password. As they know graphical password scheme suffered from shoulder-surfing and screen dump attacks. As they know for banking security is the first line of defense against compromising confidentiality and integrity. Simply the username and password...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Design of Aperture Coupled Micro-Strip patch Antenna for Wireless Communication applications at 5.8Ghz

    A microstrip antenna is basically a low profile antenna with a number of advantages over other antennas like small in size, light weight, inexpensive to fabricate. A microstrip antenna with aperture coupled feeding technique is used here as it is one of the most important method for exciting microstrip antenna...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Advanced Task Scheduling for Cloud Service Provider Using Genetaic Algorithm

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. To improve the QoS in a system one must...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    An Analysis of 10 Gbits/s Optical Transmission System using Fiber Bragg Grating (FBG)

    In this paper, the authors discussed on a simulation of optical transmission system in optical fiber. The optical fiber is always used in telecommunication system because of its characteristics which include small size or dimension, low loss and low interferences from outside environment. There are various types of optical fiber,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Comparative Study of Prototype Model for Software Engineering with System Development Life Cycle

    The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. Many models were suggested like waterfall, prototype, rapid application development, V-shaped etc. In this paper, the authors focus on the comparative analysis of these software...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Knowledge Based Analysis of Statistical Tools in Attack Detection

    With the network playing more and more important effect in the modern society, crimes using computer network are presenting the obvious trend of escalation. In order to ensure network security, one technique adopted for detecting abnormal or unauthorized behavior is the Intrusion Detection System (IDS). Various data mining techniques are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Managing Child-to-Parent (Reverse) Relationship Instead of Parent-to-Child During Execution of a Transaction in Oracle

    Most of the computer professionals, academicians and students know the traditional way of handling one too many relationship using parent and child table. Whenever, there is a one-to-many relationship in a database, the authors used to define a primary or composite key in the parent table and it is referred...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme

    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. This scheme provides the ability to hide the data into a host image and then recover the host image without losing any information when the secret data is extracted. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Symmetric Key Based Steganography Algorithm for Secured Data Transfer

    Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable....

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Statistical Approach to Perform Web Based Summarization

    Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism of the search engines they use. Not surprisingly it in general consists...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Oversampling Technique for Peak to Average Power Ratio Measurement of Discrete Time OFDM Signal

    When measured, the Peak to Average Power Ratio (PAPR) of the discrete Orthogonal Frequency Division Multiplexing (OFDM) signal comes out to be less as compared to its continuous counterpart. This happens due to non-consideration of some of the peaks while measuring PAPR of the discrete time OFDM signal. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Hardware Implementation of Face Detection Using ADABOOST Algorithm

    One of the main challenges of computer vision is efficiently detecting and classifying objects in an image or video sequence. Several machine learning approaches have been applied to this problem, demonstrating significant improvements in detection accuracy and speed. However, most approaches have limited object detection to a single class of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Low Power CMOS 1-Bit Full Adder Cell Based on Voltage Scaling

    Operating an Integrated circuit at the prescribed Voltage scaling (constant field scaling) is preferable for reliable circuit operation under temperature fluctuations. In this paper, the authors proposed to design 1 - bit full adder by "Changing the threshold voltage and W/L ratio" under temperature variation insensitive conditions. They measured power...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Secure Localization Technique for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consist of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibrations, pressure, motion, pollutants and etc to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional and control the activity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design and Implementation a System Communication of Optical Fiber by Using Interval Wavelength (532nm-820nm) of Diode Laser

    An optical communication system consists of a transmitter, which encodes a message into an optical signal, a channel, which carries the signal to its destination, and a receiver, which reproduces the message from the received optical signal. One of the most important types of optical communication system is optical Fiber...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance of Free Space Optical Communication System With BPSK and QPSK Modulation

    Free Space Optics is the technology which implies the line-of-sight link for the transfer of data between two distant points. The beam of light is used to provide optical connection that can transmit and receive data. The performance of the modulation techniques-Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Minimization of ICI Using OFDM Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) is an emerging broadband multicarrier modulation technique developed into a popular scheme for wideband digital communication, whether wireless or wired used in applications such as Digital Television, audio broadcasting, wireless networking and broadband internet access. OFDM has a well known limitation that is very sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    MIMO Communication System at a Glance

    The MIMO communication system has multiple antennas at both the transmitting and the receiving ends of the channel. Using multiple antennas introduces additional spatial channels on account of which the capacity of the channel increases hence the authors get increased spectral efficiency without additional bandwidth or transmit power. Because of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Suggested Correlation Formula Between (HPF) and (OPMUF) Parameters Over Middle East Region

    In this paper, a study of the behavior and correlation between High Possible Frequency (HPF) and Optimum Maximum Usable Frequency (OPMUF) parameters for the communication links distributed over Middle East Region were made. A mutual correlation equation between the two parameters has been suggested. The analytical test of the monthly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Qos Based Mac Protocol for Wireless Multimedia Sensor Network

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Ftp Implementation With Arm Processor and Gprs for Real Time Applications

    In this paper, the authors present the principles of a low-cost Internet-based data processing system. The main h e a r t of the system is an embedded hardware (ARM 9) running with a Linux OS. The embedded device communicates through General Packet Radio Service (GPRS) module, which makes it...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Selective State-Transition Decoding: A Combined Approach for Trellis Coded Modulation Scheme

    The authors are presenting a new suboptimum decoding strategy, namely, Adaptive Selective State-Transition Decoding (ASSTD) for Trellis Coded Modulation schemes transmission over band-limited ISI channels. The ASSTD is a combined approach provides an improved error performance over Reduced State Sequence Estimation (RSSE) techniques which are in practical use. The ASSTD...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Printed Microstrip Antenna for RADAR Communication

    A single layer, single feed compact slotted patch antenna is thoroughly simulated in this paper. Resonant frequency has been reduced drastically by cutting two different slots. The first one is the combinations of two triangular and another rectangular slot at the upper right corner and rest is bilateral triangle at...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Literature Survey on Performance of Free Space Optical Communication Links Under Strong Turbulence

    Free space optical communication has widespread use because of its advantages such as high modulation bandwidth, enhanced security and low power. In free space optical communication, laser beam signals are transmitted through air. Due to atmospheric turbulence, signals are affected. This atmospheric turbulence leads to fading of the channel. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Comparison and Analysis of PAPR Reduction Techniques in OFDM

    In this paper, different techniques for reducing Peak To Average Power Ratio (PAPR) is discussed. The performance of an Orthogonal Frequency Division Multiplexing (OFDM) system is degraded if the Peak-to-Average Power Ratio(PAPR) is high. An OFDM system dynamic range is typically two or four times larger than a single carrier...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Inpainting Realization of GUI in JAVA Using Exemplar Method

    Image In-painting technique is of filling in holes in an image to preserve its overall continuity. There are many applications of this technique include the restoration of old photographs and damaged film; removal of labeled text like dates, subtitles, or publicity; and the removal of entire objects from the image...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Compact UWB Antenna With T-Shaped Slots and Staircase Ground Plane for Enhanced Bandwidth

    In the coming years, there is great demand for high-speed data transmissions on cost effective basis. In order to achieve the same a new technology known as the Ultra WideBand (UWB) has been used. This technology has revolutionary advantages of an unlicensed service that can be used anywhere, anytime, by...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Throughput Improvement for Cell Edge Users

    Users at the cell edge in a cellular network suffer from low data rate due to low SINR Cooperative transmission schemes which are used in wireless networks to improve the spectral efficiency. In this paper, the authors study the downlink capacity of edge users in a cellular network and see...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Microstrip Antenna for WLAN Application Using Probe Feed

    Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. A low profile patch antenna for WLAN application is proposed in this paper. This proposed antenna is made by using the probe feeding and aperture...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Mm Waves Role in Satellite Communication

    The frequency band of Millimeter Wave (MM Wave) in Electromagnetic spectrum is 30-300 GHz and is sometimes called the Extremely High Frequency (EHF) range. Apart from Radar system, communication system is another important application of MM Waves which proved better than Microwaves/optics in certain features. Certain characteristics of the earth's...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Efficient Hand-Geometry System for Biometric Identifications

    In this paper, the authors propose an efficient hand geometry based system to recognize individuals. Hand geometry used in this verification system utilizes some hand geometry features which cannot vary with small variation of palm position. In this work, users can place their hands freely without the need for pegs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Embedded Ethernet Interface Using Arm Processor

    Currently device with microcontroller has been widely used in industrial field. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM processor-based embedded Ethernet interface is presented. In the design, an existing SPI serial device...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Novel Compact CPW- Fed Antenna for ULTRA WIDEBAND Applications

    RECENTLY, with the rapid development of wireless communication systems for local access networks including Personal Digital Assistants (PDA), portable PCs, and Bluetooth, the need for low profile and compact antenna has been on the rise. The demand was increased day by day in wireless communication, especially for the ULTRA WIDEBAND...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Reconfigurable Microstrip Patch Antenna Using MEMS Technology

    This paper proposes the design of a Reconfigurable Micro Strip Patch Antenna Using MEMS Technology A Reconfigurable Microstrip patch antenna of operating frequency in the range of 5-8 GHz (CBand), for the application of wireless communication has been designed. The term Re-configurability refers that it adaptively changes its characteristics. A...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    DFT Based MMSE Equaliser in MIMO-OFDM

    MIMO-OFDM is considered as a fast growing technology now days. OFDM is a multi carrier modulation technique in which the carriers are Orthogonal to each others as a result of which it provides high bandwidth efficiency and multiple carriers share the data among themselves. During the research equalizer is always...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Low Power H.264 Video Compression Achitecture for Mobile Communication

    This paper presents a method to reduce the computation and memory access for variable block size Motion Estimation (ME) using pixel truncation. Previous work has focused on implementing pixel truncation using a fixed-block size(16?16 pixels) ME. However, pixel truncation fails to give satisfactory results for smaller block partitions. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    ATLIST Method: Exploits Vulnerability in SOA

    The numbers of reported day to day increase Vulnerabilities in operating system and web applications. Vulnerability analysis approaches done several manual tasks so it's error prone and costly. Now, ATLIST is a new vulnerability analysis method to detect victims or weakness on client activities in single machine, shared resources and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Architecture to Achieve Anonymity and Traceability

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Monitoring Road Accidents Using Sensors and Providing Medical Facilities

    This paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need to develop such system which should inform automatically to medical rescue team that some...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

    For advanced streaming applications over wired-wireless networks TCP-Friendly Rate Control (TFRC) has been widely adopted nowadays to give smooth sending rate and unceasing quality in streaming applications TFRC applies an equation-based rate control scheme. However, TFRC tends to fail in wireless environment if packet lost event was done by poor...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Mobile Data Availability Similarity Between Cooperative Caching and Replication

    Mobile computing led to gain increased attention to people and to their ability and efficiency of its services at any time and place, example of this query for billing, and weather forecast, as well as retrieval of information through the database of bank accounts is done through different working environment,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Practical and Comparative Study of Call Graph Construction Algorithms

    A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the improvements over previous Call Graphs in terms of precision, cost and accuracy. In object oriented languages the Call...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Review on Diverse Ensemble Methods for Classification

    Ensemble methods for different classifiers like bagging and boosting which combine the decisions of multiple hypotheses are some of the strongest existing machine learning methods. The diversity of the members of an ensemble is known to be an important factor in determining its generalization error. DECORATE (Diverse Ensemble Creation by...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Cost Estimation of Maintenance Phase for Component Based Software

    Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Accurate estimation makes good understanding between the customer and user. Maintenance plays important role in various software developments like Iterative development, Agile development and Component Based Software Development...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Energy Efficient Anchor-Based Localization Algorithm for WSN

    Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. To solve the localization problem for find out the location of sensor nodes in wireless sensor network, a Anchor based...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing

    Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the software. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of limited capability (power and processing) Micro Electro Mechanical Systems (MEMS) capable of measuring and reporting physical variables related to their environment. In surveillance applications, sensors are deployed in a certain field to detect and report events like presence, movement, or...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR File Authentication

    Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user's data are usually processed remotely in unknown machines that users do not own or operate. Control of user's data is reduced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Arising Issues In Wireless Sensor Networks: Current Proposals and Future Developments

    Sensor Networks have been heralded as one of 21 most enabling technologies for 21st century by Business Week. In recent times wireless sensor networks have received significant attention from researchers due to its unlimited potential. However despite all this effort at providing improved services in these areas, issues still remain...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Defending Sybil Attack Using Associate Membership Method in Distributed P2P Network

    The Peer-to-peer networks popularity is increasing day by day for its resource allocation system like file sharing, Skype etc .The system is extremely fast because of its fully decentralized nature. Although this is efficient system but this system's security is vulnerable and can be attacked anytime by attackers. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server

    Wireless sensor networks consisting of a large number of low powers, low cost sensor node that communicate wirelessly. Such sensor networks can be used in wide range of applications such as military sensing and tracking, health monitoring etc, when the sensing field is too far from the station, transmitting data...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Efficient Optimization of Multiple SPARQL Queries

    A W3C standard for processing RDF data is a SPARQL query language, a technique that is used to encode data in meaningful manner. The authors investigate the foundations of SPARQL query optimization by grouping into individual clusters using common substructures in the multiple SPARQL queries, propose a comprehensive set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

    The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Constrained Delaunay Triangulation for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. WSN has the potential of significantly enhancing user ability to monitor and interact with user's physical environment. Fault tolerance is one of the main issues in Wireless Sensor...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    High Performance Cloud Data Mining Algorithm and Data Mining in Clouds

    The authors describe the design and implementation of a high performance cloud that they have used to archive, analyze and mine large distributed data sets. By a cloud, they mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering