IOSR Journal of Engineering

Displaying 441-480 of 485 results

  • White Papers // May 2012

    Cloud Agile Manufacturing

    In this paper, the authors propose a new manufacturing paradigm called Cloud Agile Manufacturing, and its principal objective is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Component Identification From Existing Object Oriented System Using Hierarchical Clustering

    One of the important tasks in software engineering is software architecture modeling. High level software architecture is useful in all phases of software life cycle. Component based software architecture is beneficial as it is useful for reusing system parts represented as components. Most of the existing object-oriented systems do not...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Semantic Web Crawler Based on Lexical Database

    Crawlers are basic entity that makes search engine to work efficiently in World Wide Web. Semantic concept is implied into the search engine to provide precise and constricted search results which is required by end users of Internet. Search engine could be enhanced in searching mechanism through semantic lexical database...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Evaluation of Green Supply Chain Management Strategies Using Fuzzy AHP and TOPSIS

    In this paper, the authors present a new decision making approach for group multi-criteria evaluation for green supply chain management strategies, which clubs green procurement, manufacturing, green service to customer and environmental management process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analysis of Optimum Software Quality Factors

    Software quality has emerged as pivotal aspects of any software development process. Quality of software depends on the process followed during its development. Factors affecting the quality of software are identified from among the quality models, on the basis of the most common, crucial and critical ones. Further, understanding of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Overview on Clustering Methods

    Clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the process of grouping similar objects into different groups, or more precisely, the partitioning of a data set into subsets, so that...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis on Different Modulation Techniques of MIMO in Multipath Fading Channel

    This paper presents performance comparison of various modulation techniques in Rayleigh fading channel. In the comparison, the space time coding has been used. The performance comparison are made on the basis of Bit Error Rate(BER) and Symbol Error Rate(SER) performance matrices over Rayleigh fading channel with BPSK,QPSK,8PSK and QAM modulation...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis for Different Interleavers in Various Modulation Schemes With OFDM Over an AWGN Channel

    The next generation wireless communications systems need to be of a higher standard in order to provide the customers with the multitude of high quality services they demand. In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has been successfully used in terrestrial digital video broadcasting and showed it is a...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secure Data Entry in Operational Systems for Data Warehouse

    A 'Data warehouse' is a repository of an organization's electronically stored data. Emergence of huge data warehouses has also put a big challenge in these data entry processing systems. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secured Transaction with Efficient Mining and Prediction in Mobile Commerce

    In this paper, the authors explore a new data mining capability and security for a mobile commerce environment. M-commerce is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. To achieve effective mobile commerce...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    A VHDL Implementation of Low Power Virus Detection Processor

    Now-a-days, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance of TCP, UDP and SCTP on Sensor Network with Different Data Reporting Intervals

    The performance of the congestion control algorithms of most of the reliable transport protocol of internet, particularly wireless networks and mobile ad-hoc networks, are not satisfactory under a high density sensor network applications, since they are designed mainly for wired networks and not for sensor networks. In this paper, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Throughtput Competitive Advance Reservation Using Polynomial Time

    In response to the high throughput needs of grid and cloud computing applications, several production networks have recently started to support advance reservation of dedicated circuits. An important open problem within this paper is to devise advance reservation algorithms that can provide provable throughput performance guarantees independently of the specific...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Information Integration for Heterogeneous Data Sources

    Information retrieval from heterogeneous information systems is required but challenging at the same as data is stored and represented in different data models in different information systems. Information integrated from heterogeneous data sources into single data source are faced upon by major challenge of information transformation-were in different formats and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Integrating Virtual Reality in Education Using Intranet Grids

    In recent years there has been increase in diverse views in relation to the use of Virtual Reality (VR) to enhance learning and cognition. Besides, there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. On the other hand, the advent of grid...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Optimized Self Reconfigurable Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms e.g., using multiradio/channel systems to meet the increasing capacity demands by the above-mentioned and other...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Enhance Accuracy in Software Development's Planning & Estimation Process by Adopt Uncertainty Analysis and Assessment" in the System Modeling Process" - A Review

    In the process of software project development prediction of effort and estimate it is very challenging task. So it is referred as intricate "Brain tester". Though the authors have several cost and effort estimating method. They are not got success to find a method which will give accurately estimation of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Android Speech to Text Converter for SMS Application

    The mobile phone users are increase day by day and everyone wants to develop new things which are improved version of existing one. The SMS user might want the faster SMS technology which can convert their voice into text and SMS will be transferred. This paper is based on evaluating...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform

    While many solutions for making backup and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the differentiating in devices, vendors, operating system and version available in mobile market. The authors introduce a new backup and restore approach for mobile devices, which helps...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Indexing of Query on Spatial Data in P2P Systems

    Peer-To-Peer technology plays an important role in spatial data sharing .In spatial P2P each peer stores part of the available spatial information and runs software with equivalent functionality rather than through a central server. Spatial P2P is dynamic in nature. Spatial objects are having distinct properties like identity location and...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Mitigating Denial-of-Service Attacks Using Genetic Approach

    Denial-of-Service attacks are considered as very dangerous. These attacks have crashed many computers on internet recently. Detecting Denial-of-Service (DoS) attacks has been a difficult problem to solve. Security of computers from DoS attacks has become a crucial issue. Recognition of attacks is becoming a harder problem to crack in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Effect of Noise on image steganography based on LSB insertion and RSA encryption

    This project simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security about hidden data, than the previous work. The main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

    Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and nitty-gritties such as the software's physical hosting location, hardware specifications, efficiency of data processing. Recently many works focus on providing data dynamics and/or public verifiability to the protocols...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Low Power H.264 Video Compression Achitecture for Mobile Communication

    This paper presents a method to reduce the computation and memory access for variable block size Motion Estimation (ME) using pixel truncation. Previous work has focused on implementing pixel truncation using a fixed-block size(16?16 pixels) ME. However, pixel truncation fails to give satisfactory results for smaller block partitions. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Performance Analysis of Different M-ARY Modulation Techniques Over Wireless Fading Channel

    Cellular communication systems are the most widely used wireless communication systems. It is the people primary need today to achieve the higher data rates in limited spectrum bandwidth to improve the performance of signals. The authors know digital communication system outperforms analog ones in terms of noise performance and flexibility....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Data Link Control in Data Communication

    DLC is the service provided by the Data Link layer of function defined in the Open Systems Interconnection OSI model for network communication. The Data Link layer is responsible for providing reliable data transfer across one physical link (or telecommunications path) within the network. Technical communication systems are developed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    A Review on Designing of the Dual Reflector Axially Symmetric Cassegrain Antenna

    Dual reflector antennas are considered as pencil beam antennas that can produce radiation identical to searchlight. Cassegrain Reflector Antenna Design consists of various effects caused by blockage by primary feed or by the sub-reflector and its effect on overall performance. The objective of the paper is to provide the overview...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based Adaptive Traffic Control System

    Through this paper, the authors intend to present an improvement in existing traffic control system at intersection. System is made more efficient with addition of intelligence in term of artificial vision, using image processing techniques to estimate actual road traffic and compute time each time for every road before enabling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of PM: Direction of Arrival Estimation Algorithm for Smart Antenna System

    This paper presents analysis of simulation results for Direction of arrival estimation for smart antenna system using non Eigen value decomposition based algorithm. Direction Of Arrival (DOA) estimation in smart antenna for identifying the directions of the desired signals and the null steering beamformer to adapts the antenna pattern to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Arm Based Temperature Measurement and Control System Using CPLD

    In this paper a temperature measurement and control system is proposed using ARM processor S3C2440 as a controlling device. This system uses LM35D sensor and its related peripherals for temperature measurement. This temperature is filtered and transmitted to the ADC MCP3201. ARM and CPLD are used for processing and controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Viterbi Algorithm for Error Detection and Correction

    In the present world, communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Zigbee Based Sensor Networks for Temperature Monitoring and Controlling

    In Now-a-days, the people have many different types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and to save property from damage. There is need to develop wireless sensor network for temperature controlling. In this paper, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Verification Using Gabor Filter Bank

    Biometrics deals with identification of individuals based on their biological or behavioral characteristics. The use of fingerprints, for identification has been employed in law enforcement for about a century. An application of fingerprint is for personal authentication, for instance to access a computer, A bank-machine, cars or home. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Pen Drive to Pen Drive and Mobile Data Transfer Using ARM

    Generally, the authors used to transfer data between two pen drives by using laptops or desktops. But it is not always possible to carry such a large size device to the particular location. So to overcome this problem, they are designing a hardware which is more compact to carry anywhere....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sigfree: Buffer Overflow Attack Detection

    Sigfree act as a Defender or protective shield for the today's Information world from insider or outsider attacker. Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Buffer Overflow attack is an attack which gives rise to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design & Simulation of Circular Microstrip Antenna With Defected Ground Structure (DGS) for WLAN Applications

    In this paper, a circular microstrip patch antenna with Defected Ground Structure (DGS) has been analyzed and simulated for the WLAN applications. The proposed antennas have been simulated at 2.45 GHz frequency using co-axial feeding technique. Actually, the authors design two circular microstrip antennas i.e. conventional CMSA and CMSA with...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Beam Pattern Improvement in CMA Using a Prefilter

    The demand for wireless mobile communications services is growing at an explosive rate; the high demand for 3G services needs increased in system capacity. The most elementary solution would be to increase bandwidth; however, this becomes challenging as the electromagnetic spectrum is becoming increasingly congested. The frequency reuse concept increases...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Development of OFDM Space Coded Outdoor Wireless Link

    Orthogonal Frequency-Division Multiplexing, or OFDM, is a process of digital modulation that is used in computer technology today. Essentially, OFDM is configured to split a communication signal in several different channels. Each of these channels is formatted into a narrow bandwidth modulation, with each channel operating at a different frequency....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the Embedded system makes it secure, table and reliable. Embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper describes...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Location Aided Routing in Mobile Ad Hoc Networks

    A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review on Methodologies of Remote Sensing, GPS and GIS

    Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans)...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Advance Scheme for Localization Using Curvilinear Component Analysis

    The performance of applications of wireless sensor network depend upon the precise location of the nodes. The localization protocol patches together the relative coordinate, local maps into a global coordinate map. These protocols require some nodes that know their absolute coordinates, called anchor nodes. While many factors influence the node...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Automatic Restaurant Order System Using Zigbee

    Automation is the Technology Concerned with Application of Mechanical, electronics & computer based systems to operate & control production. Due to advancement in technology the people have seen atomization of many things. They have seen an atomized vending machine which will serve a hot or soft drinks, Chocolates &many things....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Blind Channel Estimation Using Maximum Likelihood in OFDM Systems

    new blind channel estimation scheme for OFDM systems is based on the Maximum Likelihood (ML) principle. The approach combines different modulation schemes on adjacent subcarriers, such as BPSK and QPSK, to resolve phase ambiguity. By avoiding the use of second- and higher-order statistics, a very fast convergence rate is achieved....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    BPSK Transmitter Design Using FPGA With DAC and Pulse Shaping Filter to Minimize Inter-Symbol Interference(ISI)

    In contrast to the sophisticated implementation of Binary Phase Shift Keying (BPSK) transmitter using Application Specific Integrated Circuit (ASIC), mixer, and Local Oscillator(LO) for carrier signal; Software Defined Radio (SDR) provides a high performance, efficient and re-configurable platform to integrate all these individual functions of BPSK transmitter. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed Localization in Wireless Ad-Hoc Networks

    Localization has newly received research interest due to the success of the emerging Wireless Sensor Network (WSN) technology. This interest is expected to grow further with the proliferation of wireless sensor network applications such as medicine, military, transport. In this context routing, protocols and technologies of communication on those wireless...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Efficient Routing Protocols for Mobile Ad HocNetworks

    Ad hoc on demand distance vector routing protocol is specially designed for mobile ad hoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, the authors propose an energy efficient route...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Iris Recognition: An Emerging Biometric Technology

    Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks

    Next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. One of the research challenges for next generation all-IP-based wireless systems is the design of intelligent mobility management techniques that take advantage of IP-based technologies to achieve global roaming among various access technologies....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Biometric Speech Watermarking Technique in Images Using Wavelet Transform

    The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cope With Black Hole Attacks in AODV Protocol in Manet by End to End Route Discovery

    Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

    Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sensing Methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    VLSI Based Implementation of Single Round AES Algorithm

    This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design of Enhanced LEACH Routing Protocol for Wireless Sensor Network

    A wireless network consists of a large number of small sensors. The sensor is low-power transceivers & can be an effective tool for gathering data in a variety of environments. The communication between the sensor nodes must be designed to conserve the limited energy resources within the sensor. LEACH clustering...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Finger Print Image Enhancement and Point Pattern Based Verification

    Fingerprints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Hardware Implementation and Analysis of BPSK System on Xilinx System Generator

    With the recent advent of hardware description languages (e.g., Verilog or VHDL) and digital implementation for Field-Programmable Gate Arrays (FPGAs), substantial academic digital design projects become practicable. In the present paper, the design of a digital Binary-Phase-Shift-Keying (BPSK) modulator and detector is described. The project details the design of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering