IOSR Journal of Engineering

Displaying 481-498 of 498 results

  • White Papers // Apr 2012

    Integrating Virtual Reality in Education Using Intranet Grids

    In recent years there has been increase in diverse views in relation to the use of Virtual Reality (VR) to enhance learning and cognition. Besides, there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. On the other hand, the advent of grid...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Optimized Self Reconfigurable Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms e.g., using multiradio/channel systems to meet the increasing capacity demands by the above-mentioned and other...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Enhance Accuracy in Software Development's Planning & Estimation Process by Adopt Uncertainty Analysis and Assessment" in the System Modeling Process" - A Review

    In the process of software project development prediction of effort and estimate it is very challenging task. So it is referred as intricate "Brain tester". Though the authors have several cost and effort estimating method. They are not got success to find a method which will give accurately estimation of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Android Speech to Text Converter for SMS Application

    The mobile phone users are increase day by day and everyone wants to develop new things which are improved version of existing one. The SMS user might want the faster SMS technology which can convert their voice into text and SMS will be transferred. This paper is based on evaluating...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform

    While many solutions for making backup and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the differentiating in devices, vendors, operating system and version available in mobile market. The authors introduce a new backup and restore approach for mobile devices, which helps...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Indexing of Query on Spatial Data in P2P Systems

    Peer-To-Peer technology plays an important role in spatial data sharing .In spatial P2P each peer stores part of the available spatial information and runs software with equivalent functionality rather than through a central server. Spatial P2P is dynamic in nature. Spatial objects are having distinct properties like identity location and...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Mitigating Denial-of-Service Attacks Using Genetic Approach

    Denial-of-Service attacks are considered as very dangerous. These attacks have crashed many computers on internet recently. Detecting Denial-of-Service (DoS) attacks has been a difficult problem to solve. Security of computers from DoS attacks has become a crucial issue. Recognition of attacks is becoming a harder problem to crack in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Effect of Noise on image steganography based on LSB insertion and RSA encryption

    This project simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security about hidden data, than the previous work. The main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

    Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and nitty-gritties such as the software's physical hosting location, hardware specifications, efficiency of data processing. Recently many works focus on providing data dynamics and/or public verifiability to the protocols...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Performance Analysis of Different M-ARY Modulation Techniques Over Wireless Fading Channel

    Cellular communication systems are the most widely used wireless communication systems. It is the people primary need today to achieve the higher data rates in limited spectrum bandwidth to improve the performance of signals. The authors know digital communication system outperforms analog ones in terms of noise performance and flexibility....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Data Link Control in Data Communication

    DLC is the service provided by the Data Link layer of function defined in the Open Systems Interconnection OSI model for network communication. The Data Link layer is responsible for providing reliable data transfer across one physical link (or telecommunications path) within the network. Technical communication systems are developed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    A Review on Designing of the Dual Reflector Axially Symmetric Cassegrain Antenna

    Dual reflector antennas are considered as pencil beam antennas that can produce radiation identical to searchlight. Cassegrain Reflector Antenna Design consists of various effects caused by blockage by primary feed or by the sub-reflector and its effect on overall performance. The objective of the paper is to provide the overview...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Low Power H.264 Video Compression Achitecture for Mobile Communication

    This paper presents a method to reduce the computation and memory access for variable block size Motion Estimation (ME) using pixel truncation. Previous work has focused on implementing pixel truncation using a fixed-block size(16?16 pixels) ME. However, pixel truncation fails to give satisfactory results for smaller block partitions. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2012

    An Actual Communication Network Performance Evaluation Method

    The queuing system and network theories may be hardly applied to solve performance evaluation problems for actual large-scale computer systems and networks. This is true especially for high performance communication networks such as wireless, satellite or photonic networks. The reason is that the theoretical assumptions can hardly be fulfilled in...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    A New Algorithm to Find Best Splitting Criteria for Web Page Classification

    Web is popular as the availability of data is vast. It contains several billions of HTML documents, pictures and other multi media files. These documents reside on Internet servers and the information-exchange can be done through HTTP protocols. Individual HTML files having unique address is called Web page and collection...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Rapid Growth of Customer Use and Adoption of the Broadcasting Agent and Receivers: A Driving M-Commerce Factor

    The success of M-commerce credit goes to the M-commerce driving factors. The driving factor instruct that the factor which is responsible and necessary for enabling the M-commerce. There are Radio broadcasting, telephone broadcasting, television broadcasting, cable radio broadcasting, satellite broadcasting and web casting considering as broadcasting agent. It is observed...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Evaluation of UWB Interference on WiMAX

    This paper describes the analysis of UWB interference on WiMax systems. Co-existence between these two systems is important due to unlicensed use of 3.1 to 10.6 GHz frequency band by UWB. The interference impact of UWB devices entirely depends on the victim receiver characteristics. From the knowledge of noise density...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2011

    Challenging Computing Techniques - An Overview of Cloud Computing

    Cloud computing is an Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity. It is a new generation of computing that utilizes distant servers for data storage and management, allowing the device to use smaller and more efficient chips that consume...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Compact Double-T Monopole Antenna for Dual Wideband Wireless Communications Systems

    In this paper, the authors carry a dual band monopole antenna design specially meant for wireless applications. The proposed antenna consists of a rectangular patch monopole in which a slot is cut in order to obtain a dual band operation and size reduction. The antenna operates in frequency band 2.3...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering