IOSR Journal of Engineering

Displaying 41-80 of 481 results

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Nonlinear Companding Transform Algorithm for Peak -to-Average Power Ratio Reduction of OFDM Signal

    Orthogonal Frequency Division Multiplexing (OFDM) is digital multicarrier Modulation access system for high data rate transfer .But it has high PEAK To Average Power Ratio which increases complexity of A/D Converter and D/A Converters and lowers the efficiency of power amplifiers. In this paper Repeated Clipping and Filtering (RCF) distortion...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    FPGA Implementation of MB-OFDM Using Biorthogonal Encoder

    UWB is a high data rate, short range technology .It transmits the information over a minimum bandwidth of 500 MHZ. Modern UWB systems use Modulation techniques such as OFDM (Orthogonal Frequency Division Multiplexing). The MB-OFDM proposal is selected for UWB system model. MultiBand OFDM (MB-OFDM) is a short-range wireless technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    New Fault Injection Approach for Network on Chip

    Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Study and Analysis of Fractal Linear Antenna Arrays

    A fractal is a recursively generated object having a fractional dimension. They have no characteristic size, and are constructed of many copies of themselves at different scales. In this paper, the authors primarily focus on design of fractal linear array antenna for even number of elements and comparison of fractal...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Parametric Study for Rectangular Microstrip Patch Antennas

    Physically, MSA consists of a metallic radiating patch backed up by a dielectric substrate and a ground plane below that. These days, MSAs are widely used in many applications due to their inherent advantages such as low profile, lightweight, planer configuration and ease of fabrication. However, main limitation of MSAs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sigfree: Buffer Overflow Attack Detection

    Sigfree act as a Defender or protective shield for the today's Information world from insider or outsider attacker. Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Buffer Overflow attack is an attack which gives rise to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Iris Recognition: An Emerging Biometric Technology

    Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks

    Next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. One of the research challenges for next generation all-IP-based wireless systems is the design of intelligent mobility management techniques that take advantage of IP-based technologies to achieve global roaming among various access technologies....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Biometric Speech Watermarking Technique in Images Using Wavelet Transform

    The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cope With Black Hole Attacks in AODV Protocol in Manet by End to End Route Discovery

    Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

    Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sensing Methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    VLSI Based Implementation of Single Round AES Algorithm

    This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design of Enhanced LEACH Routing Protocol for Wireless Sensor Network

    A wireless network consists of a large number of small sensors. The sensor is low-power transceivers & can be an effective tool for gathering data in a variety of environments. The communication between the sensor nodes must be designed to conserve the limited energy resources within the sensor. LEACH clustering...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Finger Print Image Enhancement and Point Pattern Based Verification

    Fingerprints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Hardware Implementation and Analysis of BPSK System on Xilinx System Generator

    With the recent advent of hardware description languages (e.g., Verilog or VHDL) and digital implementation for Field-Programmable Gate Arrays (FPGAs), substantial academic digital design projects become practicable. In the present paper, the design of a digital Binary-Phase-Shift-Keying (BPSK) modulator and detector is described. The project details the design of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based Adaptive Traffic Control System

    Through this paper, the authors intend to present an improvement in existing traffic control system at intersection. System is made more efficient with addition of intelligence in term of artificial vision, using image processing techniques to estimate actual road traffic and compute time each time for every road before enabling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of PM: Direction of Arrival Estimation Algorithm for Smart Antenna System

    This paper presents analysis of simulation results for Direction of arrival estimation for smart antenna system using non Eigen value decomposition based algorithm. Direction Of Arrival (DOA) estimation in smart antenna for identifying the directions of the desired signals and the null steering beamformer to adapts the antenna pattern to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Arm Based Temperature Measurement and Control System Using CPLD

    In this paper a temperature measurement and control system is proposed using ARM processor S3C2440 as a controlling device. This system uses LM35D sensor and its related peripherals for temperature measurement. This temperature is filtered and transmitted to the ADC MCP3201. ARM and CPLD are used for processing and controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Viterbi Algorithm for Error Detection and Correction

    In the present world, communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Zigbee Based Sensor Networks for Temperature Monitoring and Controlling

    In Now-a-days, the people have many different types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and to save property from damage. There is need to develop wireless sensor network for temperature controlling. In this paper, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Verification Using Gabor Filter Bank

    Biometrics deals with identification of individuals based on their biological or behavioral characteristics. The use of fingerprints, for identification has been employed in law enforcement for about a century. An application of fingerprint is for personal authentication, for instance to access a computer, A bank-machine, cars or home. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Pen Drive to Pen Drive and Mobile Data Transfer Using ARM

    Generally, the authors used to transfer data between two pen drives by using laptops or desktops. But it is not always possible to carry such a large size device to the particular location. So to overcome this problem, they are designing a hardware which is more compact to carry anywhere....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design & Simulation of Circular Microstrip Antenna With Defected Ground Structure (DGS) for WLAN Applications

    In this paper, a circular microstrip patch antenna with Defected Ground Structure (DGS) has been analyzed and simulated for the WLAN applications. The proposed antennas have been simulated at 2.45 GHz frequency using co-axial feeding technique. Actually, the authors design two circular microstrip antennas i.e. conventional CMSA and CMSA with...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Beam Pattern Improvement in CMA Using a Prefilter

    The demand for wireless mobile communications services is growing at an explosive rate; the high demand for 3G services needs increased in system capacity. The most elementary solution would be to increase bandwidth; however, this becomes challenging as the electromagnetic spectrum is becoming increasingly congested. The frequency reuse concept increases...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Development of OFDM Space Coded Outdoor Wireless Link

    Orthogonal Frequency-Division Multiplexing, or OFDM, is a process of digital modulation that is used in computer technology today. Essentially, OFDM is configured to split a communication signal in several different channels. Each of these channels is formatted into a narrow bandwidth modulation, with each channel operating at a different frequency....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the Embedded system makes it secure, table and reliable. Embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper describes...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Location Aided Routing in Mobile Ad Hoc Networks

    A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review on Methodologies of Remote Sensing, GPS and GIS

    Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans)...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Advance Scheme for Localization Using Curvilinear Component Analysis

    The performance of applications of wireless sensor network depend upon the precise location of the nodes. The localization protocol patches together the relative coordinate, local maps into a global coordinate map. These protocols require some nodes that know their absolute coordinates, called anchor nodes. While many factors influence the node...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Automatic Restaurant Order System Using Zigbee

    Automation is the Technology Concerned with Application of Mechanical, electronics & computer based systems to operate & control production. Due to advancement in technology the people have seen atomization of many things. They have seen an atomized vending machine which will serve a hot or soft drinks, Chocolates &many things....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Blind Channel Estimation Using Maximum Likelihood in OFDM Systems

    new blind channel estimation scheme for OFDM systems is based on the Maximum Likelihood (ML) principle. The approach combines different modulation schemes on adjacent subcarriers, such as BPSK and QPSK, to resolve phase ambiguity. By avoiding the use of second- and higher-order statistics, a very fast convergence rate is achieved....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    BPSK Transmitter Design Using FPGA With DAC and Pulse Shaping Filter to Minimize Inter-Symbol Interference(ISI)

    In contrast to the sophisticated implementation of Binary Phase Shift Keying (BPSK) transmitter using Application Specific Integrated Circuit (ASIC), mixer, and Local Oscillator(LO) for carrier signal; Software Defined Radio (SDR) provides a high performance, efficient and re-configurable platform to integrate all these individual functions of BPSK transmitter. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed Localization in Wireless Ad-Hoc Networks

    Localization has newly received research interest due to the success of the emerging Wireless Sensor Network (WSN) technology. This interest is expected to grow further with the proliferation of wireless sensor network applications such as medicine, military, transport. In this context routing, protocols and technologies of communication on those wireless...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Efficient Routing Protocols for Mobile Ad HocNetworks

    Ad hoc on demand distance vector routing protocol is specially designed for mobile ad hoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, the authors propose an energy efficient route...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Liveness Detection Using Wavelet

    Fingerprint verification is one of the most reliable personal identification methods. It plays a very important role in forensic and civilian applications. In this paper, the authors propose a simple and effective approach for fingerprint liveness detection based on the wavelet analysis of the finger tip surface texture. In present...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Overview of Smart Antenna and a Survey on Direction of Arrival Estimation Algorithms for Smart Antenna

    Smart antenna systems is one of the most rapidly developing areas of communication. With effective Direction Of Arrival (DOA) and Beam forming techniques Smart Antenna Systems prove to be most efficient in terms of quality of signals in wireless communication. In this paper a brief overview of Smart Antenna along...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Hardware Implementation of Modified RC4 Stream Cipher Using FPGA

    In this paper, an efficient hardware implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Novel Technique in stegnanalysis using S-DES and Back propagation Algorithm

    In this paper, the authors propose a new algorithm by improving and combining S-DES and back propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Study of Webcrawler: Implementation of Efficient and Fast Crawler

    A focused crawler is a web crawler that attempts to download only web pages that are relevant to a pre-defined topic or set of topics. Focused crawling also assumes that some labeled examples of relevant and not relevant pages are available. The topic can be represent by a set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Enhance Accuracy in Software Development's Planning & Estimation Process by Adopt Uncertainty Analysis and Assessment" in the System Modeling Process" - A Review

    In the process of software project development prediction of effort and estimate it is very challenging task. So it is referred as intricate "Brain tester". Though the authors have several cost and effort estimating method. They are not got success to find a method which will give accurately estimation of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Android Speech to Text Converter for SMS Application

    The mobile phone users are increase day by day and everyone wants to develop new things which are improved version of existing one. The SMS user might want the faster SMS technology which can convert their voice into text and SMS will be transferred. This paper is based on evaluating...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform

    While many solutions for making backup and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the differentiating in devices, vendors, operating system and version available in mobile market. The authors introduce a new backup and restore approach for mobile devices, which helps...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Indexing of Query on Spatial Data in P2P Systems

    Peer-To-Peer technology plays an important role in spatial data sharing .In spatial P2P each peer stores part of the available spatial information and runs software with equivalent functionality rather than through a central server. Spatial P2P is dynamic in nature. Spatial objects are having distinct properties like identity location and...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Mitigating Denial-of-Service Attacks Using Genetic Approach

    Denial-of-Service attacks are considered as very dangerous. These attacks have crashed many computers on internet recently. Detecting Denial-of-Service (DoS) attacks has been a difficult problem to solve. Security of computers from DoS attacks has become a crucial issue. Recognition of attacks is becoming a harder problem to crack in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Effect of Noise on image steganography based on LSB insertion and RSA encryption

    This project simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security about hidden data, than the previous work. The main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

    Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and nitty-gritties such as the software's physical hosting location, hardware specifications, efficiency of data processing. Recently many works focus on providing data dynamics and/or public verifiability to the protocols...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analysis of Optimum Software Quality Factors

    Software quality has emerged as pivotal aspects of any software development process. Quality of software depends on the process followed during its development. Factors affecting the quality of software are identified from among the quality models, on the basis of the most common, crucial and critical ones. Further, understanding of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Prevention of Attacks in Internet Controlled Embedded Applications

    Embedded systems are becoming a main solution to many specific tasks because of this high stability, minimal power consumption, portability and numerous useful. Now-a-days, many new applications are developed using embedded system. This paper deals with the issues related to embedded applications when they are implemented in Internet. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Implementation of Systolic Array Architecture for 3D-DWT Optimizing Speed and Power

    Demand for high speed and low power architectures for image/video compression algorithms are increasing with scaling in VLSI technology. Video sequences are considered as 3D sequences and are compressed using 3D DWT architectures. In this paper, systolic array architectures for 2D DWT have been modified and have been used in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Hybrid Model On Data Clustering and Computational Intelligence for Bank Crisis Classification and Prediction

    The prediction of bank failures is an important academic topic of which many have used artificial intelligence methods to build an early warning system for this purpose. The objective of this paper is to enhance the accuracy in predicting bank failures by proposing two hybrid models. In this paper, two...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Implementing of Serial Ports to Ethernet Gateway on Embedded System

    The use of the multi-serial/Ethernet conversion gateway simplifies the networked control and distributed management of information for serial devices. So the design of a new type of gateway for data converting from serial ports to Ethernet based on embedded system is highlighted in this paper. The design is based on...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Harms Associated with Cellular Towers (CDMA vs GSM)

    The use of mobile phone is increasing enormously, and hence has become a subject of recent interest and study, due to use of ElectroMagnetic (EM) wave in the microwave range and produces radiation. Various physiological studies have found that the excessive Radio Frequency (RF) wave exposure affects the biological systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Memorized Window Consolidation (MWC) Based TCP Recovery for Vegas and B/w Based Congestion Control

    In this paper, the authors present a framework for unanimous TCP flow window size recovery, "Memorized flow recovery", which differs from most TCP algorithms by memorized window size consolidation as measure to control the window size increment post link recovery from disconnection. It identifies the window size in use during...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study and Performance Evaluation of Xilinx HDLC Controller and FCS Calculator

    In this paper, design, simulation and implementation design of HDLC Controller provides a high performance. This design is then coded in a Hardware Description Language (VHDL). The functioning of the coded design is to simulate on simulation software (e.g. ModelSim). After proper simulation, the design is synthesized and then translated...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Management of Future Internet with Autonomic Network Architecture and Model

    Research efforts a strong foundation towards standardization of architectural principals of the managing future Internet. Autonomic network engineering for managing Future Internet (AFI) has been established under the European Telecommunications Standards Institute (ETSI). AFI has been focusing on scenarios, use cases, and requirements for autonomic self managing future Internet, as...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Semantic Web Crawler Based on Lexical Database

    Crawlers are basic entity that makes search engine to work efficiently in World Wide Web. Semantic concept is implied into the search engine to provide precise and constricted search results which is required by end users of Internet. Search engine could be enhanced in searching mechanism through semantic lexical database...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Evaluation of Green Supply Chain Management Strategies Using Fuzzy AHP and TOPSIS

    In this paper, the authors present a new decision making approach for group multi-criteria evaluation for green supply chain management strategies, which clubs green procurement, manufacturing, green service to customer and environmental management process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Design of Intelligent Campus Security & Attendance System Based on RFID, GSM and Zig-Bee

    In this paper, an intelligent Campus Security Tracking system (iCST) has been designed and implemented base on the RFID and ZigBee network. iCST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Architecture for Node-level Congestion in WSN Using Rate Optimization

    The application has presented the details of Wireless Sensor Network differs basically from the overall knowledge network. It spotlight on tight communication however restricted in storage, lifetime, power and energy. The WSNs consists of unbelievable network load and it leads to energy wastage and packet loss. Several of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA Algorithms for Bluetooth Security Systems

    In this paper, comparison of the Hybrid encryption algorithm (3DES-Tiger-RSA) and old hybrid method (DES-RSA, by Wuling Ren & Zhiqian Miao) for Bluetooth security system is done. Performance of the above security algorithm is evaluated based on the efficiency of the algorithm. The efficiency is calculated on the basis of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Object Based Data Partition Algorithm for XML Database

    The growing use of XML data format in global information needs an effective XML data management system. With the rapid growth of XML data in internet, users are confronted with big data issues; it's becoming a new research direction for managing massive XML data now. Conventional centralized data management technologies...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Authorization using Implicit Password

    In this paper, the authors introduce a authorization scheme for banking by using implicit password. As they know graphical password scheme suffered from shoulder-surfing and screen dump attacks. As they know for banking security is the first line of defense against compromising confidentiality and integrity. Simply the username and password...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Design of Aperture Coupled Micro-Strip patch Antenna for Wireless Communication applications at 5.8Ghz

    A microstrip antenna is basically a low profile antenna with a number of advantages over other antennas like small in size, light weight, inexpensive to fabricate. A microstrip antenna with aperture coupled feeding technique is used here as it is one of the most important method for exciting microstrip antenna...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Advanced Task Scheduling for Cloud Service Provider Using Genetaic Algorithm

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. To improve the QoS in a system one must...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    An Analysis of 10 Gbits/s Optical Transmission System using Fiber Bragg Grating (FBG)

    In this paper, the authors discussed on a simulation of optical transmission system in optical fiber. The optical fiber is always used in telecommunication system because of its characteristics which include small size or dimension, low loss and low interferences from outside environment. There are various types of optical fiber,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Survey on Object Detect, Track and Identify Using Video Surveillance

    Network video surveillance has been a popular security application for many years. Target tracking in a cluttered environment remains one of the challenging problems of video surveillance. The task of target tracking is a key component of video surveillance and monitoring systems. It provides input to high-level processing such as...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Design and Implementation of Mobile Learning using 3G Technology

    Mobile learning is new. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes another very important complement to the traditional ways of learning after digital learning. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Secure Outsourcing of Linear Optimization in Cloud Computing

    Cloud computing has become a reality which is capable of enabling general public and organizations to make use of huge computational resources without capital investment in pay per use fashion. This new paradigm allows customers who have no much computational resources to outsource their expensive computational workloads to cloud and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2012

    An Actual Communication Network Performance Evaluation Method

    The queuing system and network theories may be hardly applied to solve performance evaluation problems for actual large-scale computer systems and networks. This is true especially for high performance communication networks such as wireless, satellite or photonic networks. The reason is that the theoretical assumptions can hardly be fulfilled in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Service-Oriented Architecture based Global Positioning System

    The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information, anywhere on or near the Earth. The GPS provides critical capabilities to military, civil and commercial users around the world. This paper present a Service Oriented Architecture (SOA) based Global Positioning System (GPS)....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Design Methodology for Time Domain Dead Beat Algorithm

    In this paper, the authors propose a way of implementing a deadbeat controller in FPGA. The focus is on the FPGA implementation of the digital controller. The emphasis is on the software tools for design and simulation of FPGA based hardware for control applications. The FPGA is interfaced to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hardware/Software Co-Simulation of BPSK Modulator Using Xilinx System Generator

    In this paper, the authors present a theoretical background overview of the digital communication systems and the BPSK modulation. The BPSK modulation represents an important modulation technique in terms of signal power. The BPSK system is simulated using Mat lab/ Simulink environment and system generator, a tool from Xilinx used...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    P2P Reputation Management Scheme Using a Cryptographic Protocol

    Reputation management in a Peer-To-Peer network is difficult as challenges are posed by lack of centralized authority. For this reason P2P (Peer-To-Peer) network is vulnerable which can facilitate non-cooperation, cheating, leaching on the network and propagation of malicious code. The security model used for centralized C/S systems is not suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

    A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. At the same time routers in the Internet do not perform any security verification of the source IP address contained in the packets. The lack of...

    Provided By IOSR Journal of Engineering