IOSR Journal of Engineering

Displaying 41-80 of 485 results

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

    In this paper, adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long distances. The aim of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Nonlinear Companding Transform Algorithm for Peak -to-Average Power Ratio Reduction of OFDM Signal

    Orthogonal Frequency Division Multiplexing (OFDM) is digital multicarrier Modulation access system for high data rate transfer .But it has high PEAK To Average Power Ratio which increases complexity of A/D Converter and D/A Converters and lowers the efficiency of power amplifiers. In this paper Repeated Clipping and Filtering (RCF) distortion...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    FPGA Implementation of MB-OFDM Using Biorthogonal Encoder

    UWB is a high data rate, short range technology .It transmits the information over a minimum bandwidth of 500 MHZ. Modern UWB systems use Modulation techniques such as OFDM (Orthogonal Frequency Division Multiplexing). The MB-OFDM proposal is selected for UWB system model. MultiBand OFDM (MB-OFDM) is a short-range wireless technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    New Fault Injection Approach for Network on Chip

    Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Study and Analysis of Fractal Linear Antenna Arrays

    A fractal is a recursively generated object having a fractional dimension. They have no characteristic size, and are constructed of many copies of themselves at different scales. In this paper, the authors primarily focus on design of fractal linear array antenna for even number of elements and comparison of fractal...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Parametric Study for Rectangular Microstrip Patch Antennas

    Physically, MSA consists of a metallic radiating patch backed up by a dielectric substrate and a ground plane below that. These days, MSAs are widely used in many applications due to their inherent advantages such as low profile, lightweight, planer configuration and ease of fabrication. However, main limitation of MSAs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based Adaptive Traffic Control System

    Through this paper, the authors intend to present an improvement in existing traffic control system at intersection. System is made more efficient with addition of intelligence in term of artificial vision, using image processing techniques to estimate actual road traffic and compute time each time for every road before enabling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of PM: Direction of Arrival Estimation Algorithm for Smart Antenna System

    This paper presents analysis of simulation results for Direction of arrival estimation for smart antenna system using non Eigen value decomposition based algorithm. Direction Of Arrival (DOA) estimation in smart antenna for identifying the directions of the desired signals and the null steering beamformer to adapts the antenna pattern to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Arm Based Temperature Measurement and Control System Using CPLD

    In this paper a temperature measurement and control system is proposed using ARM processor S3C2440 as a controlling device. This system uses LM35D sensor and its related peripherals for temperature measurement. This temperature is filtered and transmitted to the ADC MCP3201. ARM and CPLD are used for processing and controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Viterbi Algorithm for Error Detection and Correction

    In the present world, communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Zigbee Based Sensor Networks for Temperature Monitoring and Controlling

    In Now-a-days, the people have many different types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and to save property from damage. There is need to develop wireless sensor network for temperature controlling. In this paper, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Verification Using Gabor Filter Bank

    Biometrics deals with identification of individuals based on their biological or behavioral characteristics. The use of fingerprints, for identification has been employed in law enforcement for about a century. An application of fingerprint is for personal authentication, for instance to access a computer, A bank-machine, cars or home. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Pen Drive to Pen Drive and Mobile Data Transfer Using ARM

    Generally, the authors used to transfer data between two pen drives by using laptops or desktops. But it is not always possible to carry such a large size device to the particular location. So to overcome this problem, they are designing a hardware which is more compact to carry anywhere....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sigfree: Buffer Overflow Attack Detection

    Sigfree act as a Defender or protective shield for the today's Information world from insider or outsider attacker. Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Buffer Overflow attack is an attack which gives rise to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Iris Recognition: An Emerging Biometric Technology

    Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks

    Next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. One of the research challenges for next generation all-IP-based wireless systems is the design of intelligent mobility management techniques that take advantage of IP-based technologies to achieve global roaming among various access technologies....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Biometric Speech Watermarking Technique in Images Using Wavelet Transform

    The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cope With Black Hole Attacks in AODV Protocol in Manet by End to End Route Discovery

    Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

    Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sensing Methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    VLSI Based Implementation of Single Round AES Algorithm

    This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design of Enhanced LEACH Routing Protocol for Wireless Sensor Network

    A wireless network consists of a large number of small sensors. The sensor is low-power transceivers & can be an effective tool for gathering data in a variety of environments. The communication between the sensor nodes must be designed to conserve the limited energy resources within the sensor. LEACH clustering...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Finger Print Image Enhancement and Point Pattern Based Verification

    Fingerprints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Hardware Implementation and Analysis of BPSK System on Xilinx System Generator

    With the recent advent of hardware description languages (e.g., Verilog or VHDL) and digital implementation for Field-Programmable Gate Arrays (FPGAs), substantial academic digital design projects become practicable. In the present paper, the design of a digital Binary-Phase-Shift-Keying (BPSK) modulator and detector is described. The project details the design of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Liveness Detection Using Wavelet

    Fingerprint verification is one of the most reliable personal identification methods. It plays a very important role in forensic and civilian applications. In this paper, the authors propose a simple and effective approach for fingerprint liveness detection based on the wavelet analysis of the finger tip surface texture. In present...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Overview of Smart Antenna and a Survey on Direction of Arrival Estimation Algorithms for Smart Antenna

    Smart antenna systems is one of the most rapidly developing areas of communication. With effective Direction Of Arrival (DOA) and Beam forming techniques Smart Antenna Systems prove to be most efficient in terms of quality of signals in wireless communication. In this paper a brief overview of Smart Antenna along...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of Empirical Propagation Models for WiMAX in Urban Environment

    This paper presents a simulation study of different path loss empirical propagation models with measured field data in urban environment. The results are different if they are used in different environment other than in which they were designed For comparative analysis the authors use the Free Space path Loss model,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Evaluation of Uncoded Adaptive OFDM System Over AWGN Channel

    The demand for high-speed mobile wireless communications is rapidly growing. OFDM technology promises to be a key technique for achieving the high data capacity and spectral efficiency requirements for wireless communication systems of the near future. It is adopted as a standard for HYPERLAN & IEEE 802.11. It offers considerable...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Simulation of Rectangular Patch Antenna With Jeans Substrate

    There has been growing interest in researchers to merge wearable system technology with textile-technology. Utilization of textile material for development of antenna has been rapid due to wearable computing. A wearable antenna is meant to be a part of clothing used for communication purpose such as Tracking and navigation, health...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Stacked Multiband Microstrip Antenna

    In microstrip antenna research a new trend is found where the researchers improve antenna characteristics by introducing different structures within the antenna geometry. With the development of computational electromagnetic new approaches of analysis has become another branch of activity. This paper presents a design of stacked patch configuration of microstrip...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Protocols (AODV, DSR)of MANET(Mobile Ad-Hoc Network)& Black Hole Attack InAODV

    Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Due to Open medium, dynamic topology, distributed cooperation, ad-hoc networks are vulnerable to many types of security attacks. Black hole attack is one of the severe security threats which can be easily employed by exploiting...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Towards New Interfaces at Multitouch Technology

    In today's society, the way in which the people physically interact with electronic devices is changing how they are focused in their technological research. This change has led to many great advances, including the development of new interfaces at multi touch technology. Through the use of these new interfaces, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Embedded Data Acquisition System for Mobile Applications

    This paper presents an interactive way to acquire the parametric data of moving application using of GPRS services. The total system is incorporated in the mobile application like car, bus, etc. The embedded system is designed with the help of microcontroller and user interface devices. The acquisition of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design & Simulation of Circular Microstrip Antenna With Defected Ground Structure (DGS) for WLAN Applications

    In this paper, a circular microstrip patch antenna with Defected Ground Structure (DGS) has been analyzed and simulated for the WLAN applications. The proposed antennas have been simulated at 2.45 GHz frequency using co-axial feeding technique. Actually, the authors design two circular microstrip antennas i.e. conventional CMSA and CMSA with...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Vehicle Obstacles Avoidance Using Vehicle-To Infrastructure Communication

    VANET is a technology where vehicles are considered as mobile nodes to create a mobile network. In the existing model, vehicle obstructs the communication between other vehicles will not be considered as an obstacle. Due to existing model the impact on the LOS (Line Of Sight) obstruction, received signal power,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Efficient Load Balancing in Cloud Computing Using Fuzzy Logic

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, software and web services. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2011

    Challenging Computing Techniques - An Overview of Cloud Computing

    Cloud computing is an Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity. It is a new generation of computing that utilizes distant servers for data storage and management, allowing the device to use smaller and more efficient chips that consume...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Evaluation of UWB Interference on WiMAX

    This paper describes the analysis of UWB interference on WiMax systems. Co-existence between these two systems is important due to unlicensed use of 3.1 to 10.6 GHz frequency band by UWB. The interference impact of UWB devices entirely depends on the victim receiver characteristics. From the knowledge of noise density...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Rapid Growth of Customer Use and Adoption of the Broadcasting Agent and Receivers: A Driving M-Commerce Factor

    The success of M-commerce credit goes to the M-commerce driving factors. The driving factor instruct that the factor which is responsible and necessary for enabling the M-commerce. There are Radio broadcasting, telephone broadcasting, television broadcasting, cable radio broadcasting, satellite broadcasting and web casting considering as broadcasting agent. It is observed...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    A New Algorithm to Find Best Splitting Criteria for Web Page Classification

    Web is popular as the availability of data is vast. It contains several billions of HTML documents, pictures and other multi media files. These documents reside on Internet servers and the information-exchange can be done through HTTP protocols. Individual HTML files having unique address is called Web page and collection...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

    Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey of Weight-Based Clustering Algorithms in MANET

    As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. Several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevailing routing algorithms don't utilize the potency that may be obtained by clustering a network. Clustering method involves in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Green Computing Under Cloud Environment Proposed Architecture Using Cloud Computing & Thin Client

    Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less power. Most cloud services run in browser based environment so the authors don't need a fat client to use in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Defending Against Replication Node Attack in Wireless Sensor Network

    In Wireless Sensor network, nodes are interconnected and information is shared among them. In a situation, many attacks are involved to misuse the wireless sensor network. One of the attacks is replica node replication attack, in which the adversary can detain and conciliation of sensor nodes by hacking IP address...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure Data Forwarding

    A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Analysis of Manhattan Mobility Model Without RSUs

    The vehicular communication is an important issue to the researchers who are engaged in preventing traffic accidents and traffic jams. The earlier vehicular models had discussed only communication among vehicles through the Road Side Units (RSU). Most of the researchers used IEEE 802.11 for vehicular communication in which the vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Comprehensive Parametric Analysis of Vertical Handoff in Next Generation Wireless Networks

    The science and technology is developing day by day leading to expand and forcing to reshape user's living standards. The main aspects leading to deployment of a wide array of wireless and mobile networks are advances in miniaturization, low power circuit design and development in radio access technologies and increase...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, and time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks. Large-scale networks mean that wireless network at the dynamic time. Propel...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since the highly dynamic nature of MANET coupled with limited bandwidth...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Research Paper on Comparison Between Energy Efficient Routing Protocol with Energy and Location in MANET

    Energy is an important issue in MANET (Mobile Ad-hoc NETwork). Nodes in network are working in presence of limited energy. So, energy efficient routing is needed for reducing energy consumption. Energy efficient routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Multipath routing protocol (AOMDV)...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Virtual Energy Based Encryption & Keying on Wireless Sensor Network

    Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this the authors introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that reduces the number of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols With Varying Number of Nodes and Traffic Applications Over MANETs

    Wireless Technology is at its peak when they talk about research and innovation. This field has become a hub of invention of new theories and structures. Mobile Ad-hoc Network is a special point of focus for the researchers. MANET is a collection of wireless mobile nodes which forms a dynamic...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Enhancement in Elimination of Security Threads using Trusted Proactive Routing

    Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

    Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Gtalk and Skype are frequently used for this purpose, which is a third party. So, the authors are utilizing...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Time Based Location Management Using CACHE Scheme for Mobile Environment

    Location management refers to the problem of updating and searching the current locations of mobile nodes in a wireless network. The location administration basically is performed by using two registers, HLR (Home Location Register) and VLR (Visitor Location Register). The current location information has to be maintained efficiently in location...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

    Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Secure Outsourcing of Linear Optimization in Cloud Computing

    Cloud computing has become a reality which is capable of enabling general public and organizations to make use of huge computational resources without capital investment in pay per use fashion. This new paradigm allows customers who have no much computational resources to outsource their expensive computational workloads to cloud and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2012

    An Actual Communication Network Performance Evaluation Method

    The queuing system and network theories may be hardly applied to solve performance evaluation problems for actual large-scale computer systems and networks. This is true especially for high performance communication networks such as wireless, satellite or photonic networks. The reason is that the theoretical assumptions can hardly be fulfilled in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Service-Oriented Architecture based Global Positioning System

    The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information, anywhere on or near the Earth. The GPS provides critical capabilities to military, civil and commercial users around the world. This paper present a Service Oriented Architecture (SOA) based Global Positioning System (GPS)....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Design Methodology for Time Domain Dead Beat Algorithm

    In this paper, the authors propose a way of implementing a deadbeat controller in FPGA. The focus is on the FPGA implementation of the digital controller. The emphasis is on the software tools for design and simulation of FPGA based hardware for control applications. The FPGA is interfaced to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hardware/Software Co-Simulation of BPSK Modulator Using Xilinx System Generator

    In this paper, the authors present a theoretical background overview of the digital communication systems and the BPSK modulation. The BPSK modulation represents an important modulation technique in terms of signal power. The BPSK system is simulated using Mat lab/ Simulink environment and system generator, a tool from Xilinx used...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    P2P Reputation Management Scheme Using a Cryptographic Protocol

    Reputation management in a Peer-To-Peer network is difficult as challenges are posed by lack of centralized authority. For this reason P2P (Peer-To-Peer) network is vulnerable which can facilitate non-cooperation, cheating, leaching on the network and propagation of malicious code. The security model used for centralized C/S systems is not suitable...

    Provided By IOSR Journal of Engineering