IOSR Journal of Engineering

Displaying 441-480 of 498 results

  • White Papers // Jun 2012

    The Suggested Correlation Formula Between (HPF) and (OPMUF) Parameters Over Middle East Region

    In this paper, a study of the behavior and correlation between High Possible Frequency (HPF) and Optimum Maximum Usable Frequency (OPMUF) parameters for the communication links distributed over Middle East Region were made. A mutual correlation equation between the two parameters has been suggested. The analytical test of the monthly...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Preserving Privacy in Horizontally Partitioned Databases Using Hierarchical Model

    Now-a-days, business organizations and government sectors need to maintain large amounts of data to be integrated in distributed databases for storing from scientific experiments, daily transactions in businesses etc. The data may contain personal information as well. It is necessary to preserve information about the individuals in many organizations. So...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study on Performance Evaluation of Peer-to-Peer Distributed Databases

    The design phase of the distributed database environment holds a vital part in affecting the performance. The Peer-to-Peer architecture gives a great degree of hope to handle the data in an efficient manner. This paper analyses a cluster based Peer-to-Peer architecture named FlexiPeer for the distributed databases to address the...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Security Against Selective Forward Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are being increasingly deployed for various applications such as object tracking and monitoring, precision agriculture, controlling nuclear reactors, detecting seismic activities, security and surveillance, navigational activities, industrial automation, and so on. In selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Transmission of MIMO - OFDM Signal Using Optical Link

    Wireless networks have quickly become part of everyday life. Wireless LANs, cell phone networks, and personal area networks are just a few examples of widely used wireless networks. However, wireless devices are range and data rate limited. The research community has spent a great deal of effort on finding ways...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cryptography Playfair Cipher Using Linear Feedback Shift Register

    In this paper, the authors present a new approach for secure transmission of message by modified version of Play fair cipher combining with random number generator methods. To develop this method of encryption technique, one of the simplest methods of random number generator methods called Linear Feedback Shift Register (LFSR)...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Designing a Secure Protocol for Mobile Voting Through SMS

    In this paper, the authors cover a novel scheme to solve the issue of holding fair electoral verdict indications of people in a country or in an organization through proposing the design and development of mobile voting protocol which is not only very easy to use but is also robust,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study of the Modified KDD 99 Dataset by Using Classifier Ensembles

    Network security has been an important research area. KDD 99 dataset has been used to analyze various network security methods. However, it has been shown that this dataset has redundant data points that make the analysis bias for these data points. New modified data sets are proposed that overcome these...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Adaptive Coding and Energy Efficient Packet Rate Transmission Over Wireless LAN Friendly VOIP

    Energy efficiency takes important in wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. Current wireless network power management often substantially degrades performance and may increase overall energy usage when used with latency-sensitive applications. The authors propose power management that adapts its behavior...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Concealing Encrypted Iris Templates in Images Using Quantized DCT Coefficients

    In this paper, the authors introduce a novel steganography-based approach to protect the iris data by hiding it into a digital image for personal identification purpose. Transformations are done to encrypt the biometric data before hiding. JPEG quantization blocks in diagonal sequence are investigated for exploring an efficient hiding algorithm...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cloud Agile Manufacturing

    In this paper, the authors propose a new manufacturing paradigm called Cloud Agile Manufacturing, and its principal objective is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Component Identification From Existing Object Oriented System Using Hierarchical Clustering

    One of the important tasks in software engineering is software architecture modeling. High level software architecture is useful in all phases of software life cycle. Component based software architecture is beneficial as it is useful for reusing system parts represented as components. Most of the existing object-oriented systems do not...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Design and Analysis of Pulse Width Modulator (PWM) using Low Input Impedance Current Comparator

    Pulse width modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. The voltage-mode comparator is the most critical component of pulse-width modulator which dominates the accuracy of modulation process. In this paper, a new design of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    High Speed Current Mode Sense Amplifier for SRAM Applications

    The sense amplifier is one of the most important components of semiconductor memories used to sense stored date. This plays an important role to reduce the overall sensing delay and voltage. Earlier voltage mode sense amplifiers are used to sense the date it sense the voltage difference at bit and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Semantic Web Crawler Based on Lexical Database

    Crawlers are basic entity that makes search engine to work efficiently in World Wide Web. Semantic concept is implied into the search engine to provide precise and constricted search results which is required by end users of Internet. Search engine could be enhanced in searching mechanism through semantic lexical database...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Evaluation of Green Supply Chain Management Strategies Using Fuzzy AHP and TOPSIS

    In this paper, the authors present a new decision making approach for group multi-criteria evaluation for green supply chain management strategies, which clubs green procurement, manufacturing, green service to customer and environmental management process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance of TCP, UDP and SCTP on Sensor Network with Different Data Reporting Intervals

    The performance of the congestion control algorithms of most of the reliable transport protocol of internet, particularly wireless networks and mobile ad-hoc networks, are not satisfactory under a high density sensor network applications, since they are designed mainly for wired networks and not for sensor networks. In this paper, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Throughtput Competitive Advance Reservation Using Polynomial Time

    In response to the high throughput needs of grid and cloud computing applications, several production networks have recently started to support advance reservation of dedicated circuits. An important open problem within this paper is to devise advance reservation algorithms that can provide provable throughput performance guarantees independently of the specific...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Information Integration for Heterogeneous Data Sources

    Information retrieval from heterogeneous information systems is required but challenging at the same as data is stored and represented in different data models in different information systems. Information integrated from heterogeneous data sources into single data source are faced upon by major challenge of information transformation-were in different formats and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Integrating Virtual Reality in Education Using Intranet Grids

    In recent years there has been increase in diverse views in relation to the use of Virtual Reality (VR) to enhance learning and cognition. Besides, there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. On the other hand, the advent of grid...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Optimized Self Reconfigurable Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms e.g., using multiradio/channel systems to meet the increasing capacity demands by the above-mentioned and other...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis on Different Modulation Techniques of MIMO in Multipath Fading Channel

    This paper presents performance comparison of various modulation techniques in Rayleigh fading channel. In the comparison, the space time coding has been used. The performance comparison are made on the basis of Bit Error Rate(BER) and Symbol Error Rate(SER) performance matrices over Rayleigh fading channel with BPSK,QPSK,8PSK and QAM modulation...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis for Different Interleavers in Various Modulation Schemes With OFDM Over an AWGN Channel

    The next generation wireless communications systems need to be of a higher standard in order to provide the customers with the multitude of high quality services they demand. In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has been successfully used in terrestrial digital video broadcasting and showed it is a...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secure Data Entry in Operational Systems for Data Warehouse

    A 'Data warehouse' is a repository of an organization's electronically stored data. Emergence of huge data warehouses has also put a big challenge in these data entry processing systems. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secured Transaction with Efficient Mining and Prediction in Mobile Commerce

    In this paper, the authors explore a new data mining capability and security for a mobile commerce environment. M-commerce is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. To achieve effective mobile commerce...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    A VHDL Implementation of Low Power Virus Detection Processor

    Now-a-days, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fully Homomorphic Encryption Equating to Cloud Security: An Approach

    As the data storage challenge continues to grow for insurers and everyone else, one of the obvious solutions is cloud technology. Storing data on remote servers rather than in-house is definitely a money-saver, but in insurance circles, the worry has been that having critical data reside outside the physical and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comparison for Secured Transmission of Packets in Wireless LAN Using AES and ECC

    Wireless Local Area Network (WLAN) has increased rapidly, providing flexibility and mobility to the device users. This made the technology popular amongst a wide range of users in the universe. But one of the common problems the authors are overcoming is fragment loss. So far they were following a scheme...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis and Evaluation of Probabilistic Routing Protocol for Intermittently Connected Network

    Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Secure Massive Data Storage With Consistency And Route Control On The Cloud

    As the advent of computer has thrown light to the storage of massive data in small spaces the resources has been reduced broadly. Cloud computing in recent times has become a trend among organization to store data and retrieve it on-the-go around the globe. With this the data storage devices...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed RK- Secure Sum Protocol for Privacy Preserving

    Secure multi party computation allows several parties to compute some function of their inputs without disclosing the actual input to one another. Secure sum computation is an easily understood example and the component of the various secure multi party computation solutions. Secure sum computation allows parties to compute the sum...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detection of Routing Misbehavior in MANET Using Improved 2ACK

    A Mobile Ad-hoc NETwork consists of individual mobile nodes communicating via wireless link. The node which refuses to share their own resources but gets benefit from other nodes, are called selfish or misbehaving nodes. The nodes in MANET are mobile with changing topologies. Performance of network may get affected due...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comprehensive Study on Tracking VoIP Caller

    Session Initiation Protocol (SIP) is most extensively usable VoIP protocol which works on application layer. It uses Transmission Control Protocol or User Datagram Protocol which further uses Internetworking Protocol for establishing VoIP communication. None of these protocols including SIP provides absolute location information which provides caller's location in latitude and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Artificial Routing Protocol for Cut Detection of Cut Vertices

    A Wireless Sensor Network can break into a number of disconnected paths due to failure of some of the nodes known as cut vertices. In this paper, the authors propose an efficient algorithm to detect vertices. The neighbor node gets failure intimation from the cut vertex so that the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review of Bot Protection Using CAPTCHA for Web Security

    Today several daily activities such as communication, education, E-commerce, Entertainment and tasks are carried out by using the internet. To perform such web activities users have to register regarding the websites. In registering websites, some intruders write malicious programs that waste the website resources by making automatic false enrolments that...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR File Authentication

    Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user's data are usually processed remotely in unknown machines that users do not own or operate. Control of user's data is reduced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Arising Issues In Wireless Sensor Networks: Current Proposals and Future Developments

    Sensor Networks have been heralded as one of 21 most enabling technologies for 21st century by Business Week. In recent times wireless sensor networks have received significant attention from researchers due to its unlimited potential. However despite all this effort at providing improved services in these areas, issues still remain...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Defending Sybil Attack Using Associate Membership Method in Distributed P2P Network

    The Peer-to-peer networks popularity is increasing day by day for its resource allocation system like file sharing, Skype etc .The system is extremely fast because of its fully decentralized nature. Although this is efficient system but this system's security is vulnerable and can be attacked anytime by attackers. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, and time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks. Large-scale networks mean that wireless network at the dynamic time. Propel...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since the highly dynamic nature of MANET coupled with limited bandwidth...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Research Paper on Comparison Between Energy Efficient Routing Protocol with Energy and Location in MANET

    Energy is an important issue in MANET (Mobile Ad-hoc NETwork). Nodes in network are working in presence of limited energy. So, energy efficient routing is needed for reducing energy consumption. Energy efficient routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Multipath routing protocol (AOMDV)...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Virtual Energy Based Encryption & Keying on Wireless Sensor Network

    Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this the authors introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that reduces the number of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols With Varying Number of Nodes and Traffic Applications Over MANETs

    Wireless Technology is at its peak when they talk about research and innovation. This field has become a hub of invention of new theories and structures. Mobile Ad-hoc Network is a special point of focus for the researchers. MANET is a collection of wireless mobile nodes which forms a dynamic...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Enhancement in Elimination of Security Threads using Trusted Proactive Routing

    Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

    Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Gtalk and Skype are frequently used for this purpose, which is a third party. So, the authors are utilizing...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Time Based Location Management Using CACHE Scheme for Mobile Environment

    Location management refers to the problem of updating and searching the current locations of mobile nodes in a wireless network. The location administration basically is performed by using two registers, HLR (Home Location Register) and VLR (Visitor Location Register). The current location information has to be maintained efficiently in location...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

    Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A New Approach to Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. As volunteer clouds are allowed to communicate with each other and with other commercial clouds also, it's necessary to implement an enhanced interoperable environment. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Requirements and Challenges for Securing Cloud Applications and Services

    Adopting cloud computing is a complex decision involving many factors. This paper focuses on the central issues of cloud computing security. The cloud computing architectural framework provides a conceptual framework to help evaluate initial cloud risks and inform security decisions. It's a quick method for evaluating the tolerance for moving...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Improving Security for Data Migration in Cloud Computing Using Randomized Encryption Technique

    With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Green Cloud Computing: A Constructive Advent to Curtail the Carbon Emission Radiation Due to Servers

    This paper analytically scrutinizes the energy dissipation based on services and invades the conditions to promote green cloud computing to save energy crisis. In conventional, cloud computing emphasis on the data computing efficiency whereas green cloud computing accredit to the research and practice of applying computing resources in virtuous, adequate...

    Provided By IOSR Journal of Engineering