IOSR Journal of Engineering

Displaying 441-480 of 498 results

  • White Papers // Jun 2012

    Improving Computational Efficiency of Tentative Data Set

    The aim of data mining is to find novel, interesting and useful patterns from data using algorithms that will do it in a way that is more computational efficient than previous method. Current data mining practice is very much driven by practical computational concerns. In focusing almost exclusively on computational...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Adaptive Coding and Energy Efficient Packet Rate Transmission Over Wireless LAN Friendly VOIP

    Energy efficiency takes important in wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. Current wireless network power management often substantially degrades performance and may increase overall energy usage when used with latency-sensitive applications. The authors propose power management that adapts its behavior...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Concealing Encrypted Iris Templates in Images Using Quantized DCT Coefficients

    In this paper, the authors introduce a novel steganography-based approach to protect the iris data by hiding it into a digital image for personal identification purpose. Transformations are done to encrypt the biometric data before hiding. JPEG quantization blocks in diagonal sequence are investigated for exploring an efficient hiding algorithm...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cloud Agile Manufacturing

    In this paper, the authors propose a new manufacturing paradigm called Cloud Agile Manufacturing, and its principal objective is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Component Identification From Existing Object Oriented System Using Hierarchical Clustering

    One of the important tasks in software engineering is software architecture modeling. High level software architecture is useful in all phases of software life cycle. Component based software architecture is beneficial as it is useful for reusing system parts represented as components. Most of the existing object-oriented systems do not...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Preserving Privacy in Horizontally Partitioned Databases Using Hierarchical Model

    Now-a-days, business organizations and government sectors need to maintain large amounts of data to be integrated in distributed databases for storing from scientific experiments, daily transactions in businesses etc. The data may contain personal information as well. It is necessary to preserve information about the individuals in many organizations. So...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study on Performance Evaluation of Peer-to-Peer Distributed Databases

    The design phase of the distributed database environment holds a vital part in affecting the performance. The Peer-to-Peer architecture gives a great degree of hope to handle the data in an efficient manner. This paper analyses a cluster based Peer-to-Peer architecture named FlexiPeer for the distributed databases to address the...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Security Against Selective Forward Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are being increasingly deployed for various applications such as object tracking and monitoring, precision agriculture, controlling nuclear reactors, detecting seismic activities, security and surveillance, navigational activities, industrial automation, and so on. In selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Transmission of MIMO - OFDM Signal Using Optical Link

    Wireless networks have quickly become part of everyday life. Wireless LANs, cell phone networks, and personal area networks are just a few examples of widely used wireless networks. However, wireless devices are range and data rate limited. The research community has spent a great deal of effort on finding ways...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cryptography Playfair Cipher Using Linear Feedback Shift Register

    In this paper, the authors present a new approach for secure transmission of message by modified version of Play fair cipher combining with random number generator methods. To develop this method of encryption technique, one of the simplest methods of random number generator methods called Linear Feedback Shift Register (LFSR)...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Designing a Secure Protocol for Mobile Voting Through SMS

    In this paper, the authors cover a novel scheme to solve the issue of holding fair electoral verdict indications of people in a country or in an organization through proposing the design and development of mobile voting protocol which is not only very easy to use but is also robust,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study of the Modified KDD 99 Dataset by Using Classifier Ensembles

    Network security has been an important research area. KDD 99 dataset has been used to analyze various network security methods. However, it has been shown that this dataset has redundant data points that make the analysis bias for these data points. New modified data sets are proposed that overcome these...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Semantic Web Crawler Based on Lexical Database

    Crawlers are basic entity that makes search engine to work efficiently in World Wide Web. Semantic concept is implied into the search engine to provide precise and constricted search results which is required by end users of Internet. Search engine could be enhanced in searching mechanism through semantic lexical database...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Evaluation of Green Supply Chain Management Strategies Using Fuzzy AHP and TOPSIS

    In this paper, the authors present a new decision making approach for group multi-criteria evaluation for green supply chain management strategies, which clubs green procurement, manufacturing, green service to customer and environmental management process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance of TCP, UDP and SCTP on Sensor Network with Different Data Reporting Intervals

    The performance of the congestion control algorithms of most of the reliable transport protocol of internet, particularly wireless networks and mobile ad-hoc networks, are not satisfactory under a high density sensor network applications, since they are designed mainly for wired networks and not for sensor networks. In this paper, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Throughtput Competitive Advance Reservation Using Polynomial Time

    In response to the high throughput needs of grid and cloud computing applications, several production networks have recently started to support advance reservation of dedicated circuits. An important open problem within this paper is to devise advance reservation algorithms that can provide provable throughput performance guarantees independently of the specific...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Information Integration for Heterogeneous Data Sources

    Information retrieval from heterogeneous information systems is required but challenging at the same as data is stored and represented in different data models in different information systems. Information integrated from heterogeneous data sources into single data source are faced upon by major challenge of information transformation-were in different formats and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Integrating Virtual Reality in Education Using Intranet Grids

    In recent years there has been increase in diverse views in relation to the use of Virtual Reality (VR) to enhance learning and cognition. Besides, there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. On the other hand, the advent of grid...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Optimized Self Reconfigurable Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms e.g., using multiradio/channel systems to meet the increasing capacity demands by the above-mentioned and other...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    High Speed Current Mode Sense Amplifier for SRAM Applications

    The sense amplifier is one of the most important components of semiconductor memories used to sense stored date. This plays an important role to reduce the overall sensing delay and voltage. Earlier voltage mode sense amplifiers are used to sense the date it sense the voltage difference at bit and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Design and Analysis of Pulse Width Modulator (PWM) using Low Input Impedance Current Comparator

    Pulse width modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. The voltage-mode comparator is the most critical component of pulse-width modulator which dominates the accuracy of modulation process. In this paper, a new design of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analysis of Optimum Software Quality Factors

    Software quality has emerged as pivotal aspects of any software development process. Quality of software depends on the process followed during its development. Factors affecting the quality of software are identified from among the quality models, on the basis of the most common, crucial and critical ones. Further, understanding of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Overview on Clustering Methods

    Clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the process of grouping similar objects into different groups, or more precisely, the partitioning of a data set into subsets, so that...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis on Different Modulation Techniques of MIMO in Multipath Fading Channel

    This paper presents performance comparison of various modulation techniques in Rayleigh fading channel. In the comparison, the space time coding has been used. The performance comparison are made on the basis of Bit Error Rate(BER) and Symbol Error Rate(SER) performance matrices over Rayleigh fading channel with BPSK,QPSK,8PSK and QAM modulation...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis for Different Interleavers in Various Modulation Schemes With OFDM Over an AWGN Channel

    The next generation wireless communications systems need to be of a higher standard in order to provide the customers with the multitude of high quality services they demand. In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has been successfully used in terrestrial digital video broadcasting and showed it is a...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secure Data Entry in Operational Systems for Data Warehouse

    A 'Data warehouse' is a repository of an organization's electronically stored data. Emergence of huge data warehouses has also put a big challenge in these data entry processing systems. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in...

    Provided By IOSR Journal of Engineering