IOSR Journal of Engineering

Displaying 81-120 of 485 results

  • White Papers // Feb 2013

    Development of OFDM Space Coded Outdoor Wireless Link

    Orthogonal Frequency-Division Multiplexing, or OFDM, is a process of digital modulation that is used in computer technology today. Essentially, OFDM is configured to split a communication signal in several different channels. Each of these channels is formatted into a narrow bandwidth modulation, with each channel operating at a different frequency....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the Embedded system makes it secure, table and reliable. Embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper describes...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Location Aided Routing in Mobile Ad Hoc Networks

    A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review on Methodologies of Remote Sensing, GPS and GIS

    Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans)...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Advance Scheme for Localization Using Curvilinear Component Analysis

    The performance of applications of wireless sensor network depend upon the precise location of the nodes. The localization protocol patches together the relative coordinate, local maps into a global coordinate map. These protocols require some nodes that know their absolute coordinates, called anchor nodes. While many factors influence the node...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Automatic Restaurant Order System Using Zigbee

    Automation is the Technology Concerned with Application of Mechanical, electronics & computer based systems to operate & control production. Due to advancement in technology the people have seen atomization of many things. They have seen an atomized vending machine which will serve a hot or soft drinks, Chocolates &many things....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Blind Channel Estimation Using Maximum Likelihood in OFDM Systems

    new blind channel estimation scheme for OFDM systems is based on the Maximum Likelihood (ML) principle. The approach combines different modulation schemes on adjacent subcarriers, such as BPSK and QPSK, to resolve phase ambiguity. By avoiding the use of second- and higher-order statistics, a very fast convergence rate is achieved....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    BPSK Transmitter Design Using FPGA With DAC and Pulse Shaping Filter to Minimize Inter-Symbol Interference(ISI)

    In contrast to the sophisticated implementation of Binary Phase Shift Keying (BPSK) transmitter using Application Specific Integrated Circuit (ASIC), mixer, and Local Oscillator(LO) for carrier signal; Software Defined Radio (SDR) provides a high performance, efficient and re-configurable platform to integrate all these individual functions of BPSK transmitter. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed Localization in Wireless Ad-Hoc Networks

    Localization has newly received research interest due to the success of the emerging Wireless Sensor Network (WSN) technology. This interest is expected to grow further with the proliferation of wireless sensor network applications such as medicine, military, transport. In this context routing, protocols and technologies of communication on those wireless...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Efficient Routing Protocols for Mobile Ad HocNetworks

    Ad hoc on demand distance vector routing protocol is specially designed for mobile ad hoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, the authors propose an energy efficient route...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Improving Energy Efficiency Using LEARN Algorithm for Wireless Sensor Networks

    A number of energy-aware routing protocols were proposed to seek the energy efficiency of routes in Multihop wireless networks. Among them, several geographical localized routing protocols were proposed to help making smarter routing decision using only local information and reduce the routing overhead. However, all proposed localized routing methods cannot...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks Under Secure Sparse Regeneration

    In wavelength-routed WDM optical networks requires regeneration for few light paths, when the strength of optical signal reduced and also security and privacy are essential before Optical Burst Switching (OBS) networks can become an everyday reality. Many-casting is a communication paradigm to implement the distributed applications. In many-casting, destinations can...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Intrusion Detection of Masquerading Attacks & Secure Authentication in Cloud

    This paper proposed for a new authenticated access control scheme for securing data in cloud system. In this scheme cloud system verifies the authenticity of user and provides access control only to applicable user to decrypt the stored data. The scheme prevents replay attacks and supports creation, modification, and reading...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fully Homomorphic Encryption Equating to Cloud Security: An Approach

    As the data storage challenge continues to grow for insurers and everyone else, one of the obvious solutions is cloud technology. Storing data on remote servers rather than in-house is definitely a money-saver, but in insurance circles, the worry has been that having critical data reside outside the physical and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comparison for Secured Transmission of Packets in Wireless LAN Using AES and ECC

    Wireless Local Area Network (WLAN) has increased rapidly, providing flexibility and mobility to the device users. This made the technology popular amongst a wide range of users in the universe. But one of the common problems the authors are overcoming is fragment loss. So far they were following a scheme...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis and Evaluation of Probabilistic Routing Protocol for Intermittently Connected Network

    Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Secure Massive Data Storage With Consistency And Route Control On The Cloud

    As the advent of computer has thrown light to the storage of massive data in small spaces the resources has been reduced broadly. Cloud computing in recent times has become a trend among organization to store data and retrieve it on-the-go around the globe. With this the data storage devices...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed RK- Secure Sum Protocol for Privacy Preserving

    Secure multi party computation allows several parties to compute some function of their inputs without disclosing the actual input to one another. Secure sum computation is an easily understood example and the component of the various secure multi party computation solutions. Secure sum computation allows parties to compute the sum...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detection of Routing Misbehavior in MANET Using Improved 2ACK

    A Mobile Ad-hoc NETwork consists of individual mobile nodes communicating via wireless link. The node which refuses to share their own resources but gets benefit from other nodes, are called selfish or misbehaving nodes. The nodes in MANET are mobile with changing topologies. Performance of network may get affected due...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comprehensive Study on Tracking VoIP Caller

    Session Initiation Protocol (SIP) is most extensively usable VoIP protocol which works on application layer. It uses Transmission Control Protocol or User Datagram Protocol which further uses Internetworking Protocol for establishing VoIP communication. None of these protocols including SIP provides absolute location information which provides caller's location in latitude and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Artificial Routing Protocol for Cut Detection of Cut Vertices

    A Wireless Sensor Network can break into a number of disconnected paths due to failure of some of the nodes known as cut vertices. In this paper, the authors propose an efficient algorithm to detect vertices. The neighbor node gets failure intimation from the cut vertex so that the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review of Bot Protection Using CAPTCHA for Web Security

    Today several daily activities such as communication, education, E-commerce, Entertainment and tasks are carried out by using the internet. To perform such web activities users have to register regarding the websites. In registering websites, some intruders write malicious programs that waste the website resources by making automatic false enrolments that...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR File Authentication

    Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user's data are usually processed remotely in unknown machines that users do not own or operate. Control of user's data is reduced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Arising Issues In Wireless Sensor Networks: Current Proposals and Future Developments

    Sensor Networks have been heralded as one of 21 most enabling technologies for 21st century by Business Week. In recent times wireless sensor networks have received significant attention from researchers due to its unlimited potential. However despite all this effort at providing improved services in these areas, issues still remain...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Defending Sybil Attack Using Associate Membership Method in Distributed P2P Network

    The Peer-to-peer networks popularity is increasing day by day for its resource allocation system like file sharing, Skype etc .The system is extremely fast because of its fully decentralized nature. Although this is efficient system but this system's security is vulnerable and can be attacked anytime by attackers. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server

    Wireless sensor networks consisting of a large number of low powers, low cost sensor node that communicate wirelessly. Such sensor networks can be used in wide range of applications such as military sensing and tracking, health monitoring etc, when the sensing field is too far from the station, transmitting data...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Efficient Optimization of Multiple SPARQL Queries

    A W3C standard for processing RDF data is a SPARQL query language, a technique that is used to encode data in meaningful manner. The authors investigate the foundations of SPARQL query optimization by grouping into individual clusters using common substructures in the multiple SPARQL queries, propose a comprehensive set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

    The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Constrained Delaunay Triangulation for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. WSN has the potential of significantly enhancing user ability to monitor and interact with user's physical environment. Fault tolerance is one of the main issues in Wireless Sensor...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    High Performance Cloud Data Mining Algorithm and Data Mining in Clouds

    The authors describe the design and implementation of a high performance cloud that they have used to archive, analyze and mine large distributed data sets. By a cloud, they mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

    Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Gtalk and Skype are frequently used for this purpose, which is a third party. So, the authors are utilizing...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Time Based Location Management Using CACHE Scheme for Mobile Environment

    Location management refers to the problem of updating and searching the current locations of mobile nodes in a wireless network. The location administration basically is performed by using two registers, HLR (Home Location Register) and VLR (Visitor Location Register). The current location information has to be maintained efficiently in location...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

    Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design Analysis of a Security Lock System Using Pass-Code and Smart-Card

    In this paper, security lock system using Pass code and smart card has been achieved. It is a micro controller based system which aims at interfacing selected hardware components with software to obtain a higher degree of security. In achieving this work, seven major stages were considered in the design...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Modified ABC Algorithm & Its Application to Wireless Sensor Network Dynamic Deployment

    Wireless Sensor Networks plays a gargantuan role in instrumenting the modern day world; hence it is crucial to develop an optimal design flow. Out of the various Swarm intelligent algorithms developed so far, Artificial Bee Colony (ABC) algorithm offers a vivid scope for this objective. First introduced for solving numerical...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis of Wimax Under Jamming Effect for Various Antennas

    Use of Internet is increasing day by day. Wi-Fi provides wireless access to the internet but range is limited to certain meters only. So concept of WiMAX is introduced to increase the range. WiMAX means worldwide interoperability for microwave access. WiMAX is also known as wireless broadband. The WiMAX based...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Unearthing the Compromised Nodes and Restoring Them in Wireless Sensor Network

    Sensor nodes are usually deployed in an open environment therefore they are subjected to various kinds of attacks like Worm Hole attack, Black Hole attack, False Data Injection attacks. Since the attackers can cause disruption and failure to the network, it's very important to detect these compromised nodes and revoke...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Local Oscillators Phase Noise Cancellation Methods

    Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation scheme that employs a large number of orthogonal Closely-spaced sub-carriers. Each sub-carrier is modulated with a modulation scheme (QPSK or QAM generally) at a low symbol rate. Each of the sub-carrier is then multiplexed together and this forms the OFDM...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Physiological Parameter Monitoring and Recording System

    The design and development of a Zigbee smart non-invasive wearable physiological parameters monitoring device has been developed and reported in this paper. The system can be used to monitor physiological parameters, such as temperature and heart rate, of a human subject. The system consists of an electronic device which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

    A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. At the same time routers in the Internet do not perform any security verification of the source IP address contained in the packets. The lack of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Aviris Hyperspectral Images Compression Using 3D Spiht Algorithm

    Hyperspectral sequence image is compressed using 3D Discrete Wavelet Transform (3D DWT) to decorrelate the three dimensions of hyperspectral image. Than the sequence is encoded efficiently by the 3D SPIHT algorithm, which operates on the pyramid structure of wavelet coefficients obtained. After decompression, the image evaluated by the PSNR, are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Prevention of Attacks in Internet Controlled Embedded Applications

    Embedded systems are becoming a main solution to many specific tasks because of this high stability, minimal power consumption, portability and numerous useful. Now-a-days, many new applications are developed using embedded system. This paper deals with the issues related to embedded applications when they are implemented in Internet. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Implementation of Systolic Array Architecture for 3D-DWT Optimizing Speed and Power

    Demand for high speed and low power architectures for image/video compression algorithms are increasing with scaling in VLSI technology. Video sequences are considered as 3D sequences and are compressed using 3D DWT architectures. In this paper, systolic array architectures for 2D DWT have been modified and have been used in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Hybrid Model On Data Clustering and Computational Intelligence for Bank Crisis Classification and Prediction

    The prediction of bank failures is an important academic topic of which many have used artificial intelligence methods to build an early warning system for this purpose. The objective of this paper is to enhance the accuracy in predicting bank failures by proposing two hybrid models. In this paper, two...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Implementing of Serial Ports to Ethernet Gateway on Embedded System

    The use of the multi-serial/Ethernet conversion gateway simplifies the networked control and distributed management of information for serial devices. So the design of a new type of gateway for data converting from serial ports to Ethernet based on embedded system is highlighted in this paper. The design is based on...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Harms Associated with Cellular Towers (CDMA vs GSM)

    The use of mobile phone is increasing enormously, and hence has become a subject of recent interest and study, due to use of ElectroMagnetic (EM) wave in the microwave range and produces radiation. Various physiological studies have found that the excessive Radio Frequency (RF) wave exposure affects the biological systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Memorized Window Consolidation (MWC) Based TCP Recovery for Vegas and B/w Based Congestion Control

    In this paper, the authors present a framework for unanimous TCP flow window size recovery, "Memorized flow recovery", which differs from most TCP algorithms by memorized window size consolidation as measure to control the window size increment post link recovery from disconnection. It identifies the window size in use during...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study and Performance Evaluation of Xilinx HDLC Controller and FCS Calculator

    In this paper, design, simulation and implementation design of HDLC Controller provides a high performance. This design is then coded in a Hardware Description Language (VHDL). The functioning of the coded design is to simulate on simulation software (e.g. ModelSim). After proper simulation, the design is synthesized and then translated...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Management of Future Internet with Autonomic Network Architecture and Model

    Research efforts a strong foundation towards standardization of architectural principals of the managing future Internet. Autonomic network engineering for managing Future Internet (AFI) has been established under the European Telecommunications Standards Institute (ETSI). AFI has been focusing on scenarios, use cases, and requirements for autonomic self managing future Internet, as...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Semantic Web Crawler Based on Lexical Database

    Crawlers are basic entity that makes search engine to work efficiently in World Wide Web. Semantic concept is implied into the search engine to provide precise and constricted search results which is required by end users of Internet. Search engine could be enhanced in searching mechanism through semantic lexical database...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Evaluation of Green Supply Chain Management Strategies Using Fuzzy AHP and TOPSIS

    In this paper, the authors present a new decision making approach for group multi-criteria evaluation for green supply chain management strategies, which clubs green procurement, manufacturing, green service to customer and environmental management process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Intelligent Reconfigurable Computing Systems

    Every new technology comes with a scope of research on making it more economical in terms of money and time. Intelligent reconfigurable computing systems follow a similar trend by implementing the applications over the available reconfigurable hardware. Reconfigurability basically aims at reuse of the hardware for similar problems or sub...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering