IOSR Journal of Engineering

Displaying 81-120 of 481 results

  • White Papers // Feb 2013

    Performance Analysis of Empirical Propagation Models for WiMAX in Urban Environment

    This paper presents a simulation study of different path loss empirical propagation models with measured field data in urban environment. The results are different if they are used in different environment other than in which they were designed For comparative analysis the authors use the Free Space path Loss model,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Evaluation of Uncoded Adaptive OFDM System Over AWGN Channel

    The demand for high-speed mobile wireless communications is rapidly growing. OFDM technology promises to be a key technique for achieving the high data capacity and spectral efficiency requirements for wireless communication systems of the near future. It is adopted as a standard for HYPERLAN & IEEE 802.11. It offers considerable...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Simulation of Rectangular Patch Antenna With Jeans Substrate

    There has been growing interest in researchers to merge wearable system technology with textile-technology. Utilization of textile material for development of antenna has been rapid due to wearable computing. A wearable antenna is meant to be a part of clothing used for communication purpose such as Tracking and navigation, health...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Stacked Multiband Microstrip Antenna

    In microstrip antenna research a new trend is found where the researchers improve antenna characteristics by introducing different structures within the antenna geometry. With the development of computational electromagnetic new approaches of analysis has become another branch of activity. This paper presents a design of stacked patch configuration of microstrip...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Protocols (AODV, DSR)of MANET(Mobile Ad-Hoc Network)& Black Hole Attack InAODV

    Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Due to Open medium, dynamic topology, distributed cooperation, ad-hoc networks are vulnerable to many types of security attacks. Black hole attack is one of the severe security threats which can be easily employed by exploiting...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Towards New Interfaces at Multitouch Technology

    In today's society, the way in which the people physically interact with electronic devices is changing how they are focused in their technological research. This change has led to many great advances, including the development of new interfaces at multi touch technology. Through the use of these new interfaces, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Embedded Data Acquisition System for Mobile Applications

    This paper presents an interactive way to acquire the parametric data of moving application using of GPRS services. The total system is incorporated in the mobile application like car, bus, etc. The embedded system is designed with the help of microcontroller and user interface devices. The acquisition of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Improving Energy Efficiency Using LEARN Algorithm for Wireless Sensor Networks

    A number of energy-aware routing protocols were proposed to seek the energy efficiency of routes in Multihop wireless networks. Among them, several geographical localized routing protocols were proposed to help making smarter routing decision using only local information and reduce the routing overhead. However, all proposed localized routing methods cannot...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks Under Secure Sparse Regeneration

    In wavelength-routed WDM optical networks requires regeneration for few light paths, when the strength of optical signal reduced and also security and privacy are essential before Optical Burst Switching (OBS) networks can become an everyday reality. Many-casting is a communication paradigm to implement the distributed applications. In many-casting, destinations can...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    High Performance Cloud Data Mining Algorithm and Data Mining in Clouds

    The authors describe the design and implementation of a high performance cloud that they have used to archive, analyze and mine large distributed data sets. By a cloud, they mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Entrepreneurial Characteristics and Competency as Determinants of Business Performance in SMEs

    This paper is to empirically test the influence of entrepreneurial characteristics and competencies on business performance in Small and Medium Enterprises (SMEs). This study was conducted with 147 SMEs owner in Malang regency East Java Indonesia using survey instrument. Data analysis using the structural equation modelling. The results of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

    Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Gtalk and Skype are frequently used for this purpose, which is a third party. So, the authors are utilizing...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Time Based Location Management Using CACHE Scheme for Mobile Environment

    Location management refers to the problem of updating and searching the current locations of mobile nodes in a wireless network. The location administration basically is performed by using two registers, HLR (Home Location Register) and VLR (Visitor Location Register). The current location information has to be maintained efficiently in location...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

    Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Intrusion Detection of Masquerading Attacks & Secure Authentication in Cloud

    This paper proposed for a new authenticated access control scheme for securing data in cloud system. In this scheme cloud system verifies the authenticity of user and provides access control only to applicable user to decrypt the stored data. The scheme prevents replay attacks and supports creation, modification, and reading...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fully Homomorphic Encryption Equating to Cloud Security: An Approach

    As the data storage challenge continues to grow for insurers and everyone else, one of the obvious solutions is cloud technology. Storing data on remote servers rather than in-house is definitely a money-saver, but in insurance circles, the worry has been that having critical data reside outside the physical and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comparison for Secured Transmission of Packets in Wireless LAN Using AES and ECC

    Wireless Local Area Network (WLAN) has increased rapidly, providing flexibility and mobility to the device users. This made the technology popular amongst a wide range of users in the universe. But one of the common problems the authors are overcoming is fragment loss. So far they were following a scheme...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis and Evaluation of Probabilistic Routing Protocol for Intermittently Connected Network

    Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Secure Massive Data Storage With Consistency And Route Control On The Cloud

    As the advent of computer has thrown light to the storage of massive data in small spaces the resources has been reduced broadly. Cloud computing in recent times has become a trend among organization to store data and retrieve it on-the-go around the globe. With this the data storage devices...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed RK- Secure Sum Protocol for Privacy Preserving

    Secure multi party computation allows several parties to compute some function of their inputs without disclosing the actual input to one another. Secure sum computation is an easily understood example and the component of the various secure multi party computation solutions. Secure sum computation allows parties to compute the sum...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detection of Routing Misbehavior in MANET Using Improved 2ACK

    A Mobile Ad-hoc NETwork consists of individual mobile nodes communicating via wireless link. The node which refuses to share their own resources but gets benefit from other nodes, are called selfish or misbehaving nodes. The nodes in MANET are mobile with changing topologies. Performance of network may get affected due...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comprehensive Study on Tracking VoIP Caller

    Session Initiation Protocol (SIP) is most extensively usable VoIP protocol which works on application layer. It uses Transmission Control Protocol or User Datagram Protocol which further uses Internetworking Protocol for establishing VoIP communication. None of these protocols including SIP provides absolute location information which provides caller's location in latitude and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Artificial Routing Protocol for Cut Detection of Cut Vertices

    A Wireless Sensor Network can break into a number of disconnected paths due to failure of some of the nodes known as cut vertices. In this paper, the authors propose an efficient algorithm to detect vertices. The neighbor node gets failure intimation from the cut vertex so that the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review of Bot Protection Using CAPTCHA for Web Security

    Today several daily activities such as communication, education, E-commerce, Entertainment and tasks are carried out by using the internet. To perform such web activities users have to register regarding the websites. In registering websites, some intruders write malicious programs that waste the website resources by making automatic false enrolments that...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR File Authentication

    Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user's data are usually processed remotely in unknown machines that users do not own or operate. Control of user's data is reduced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Arising Issues In Wireless Sensor Networks: Current Proposals and Future Developments

    Sensor Networks have been heralded as one of 21 most enabling technologies for 21st century by Business Week. In recent times wireless sensor networks have received significant attention from researchers due to its unlimited potential. However despite all this effort at providing improved services in these areas, issues still remain...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Defending Sybil Attack Using Associate Membership Method in Distributed P2P Network

    The Peer-to-peer networks popularity is increasing day by day for its resource allocation system like file sharing, Skype etc .The system is extremely fast because of its fully decentralized nature. Although this is efficient system but this system's security is vulnerable and can be attacked anytime by attackers. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server

    Wireless sensor networks consisting of a large number of low powers, low cost sensor node that communicate wirelessly. Such sensor networks can be used in wide range of applications such as military sensing and tracking, health monitoring etc, when the sensing field is too far from the station, transmitting data...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Efficient Optimization of Multiple SPARQL Queries

    A W3C standard for processing RDF data is a SPARQL query language, a technique that is used to encode data in meaningful manner. The authors investigate the foundations of SPARQL query optimization by grouping into individual clusters using common substructures in the multiple SPARQL queries, propose a comprehensive set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

    The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Constrained Delaunay Triangulation for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. WSN has the potential of significantly enhancing user ability to monitor and interact with user's physical environment. Fault tolerance is one of the main issues in Wireless Sensor...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Using Mono-Alphabetic Substitution to Secure Against Threats and Risk in Information Technology

    The awareness the world over on Information Technology (IT) is a welcome development but calls for great care and concern. This is so as there are out there, many people with evil minds who see nothing good that they would not capitalize on. There are persons who would want to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Real Time Implementation of Nodes Self Scheduling Approach for Maximizing Wireless Sensor Network Lifetime

    To face the short lifetime of the WSN, the objective is to optimize energy consumption while maintaining the full sensing coverage. A major technique to save the energy is to use a wake-up scheduling protocol through which some nodes stay active whereas the others enter sleep state so as to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of MAC Protocol for Reliable Broadcast in VANETs

    Wireless communications are becoming the dominant form of transferring information, and the most active research field. In this dissertation, the authors will present one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc NETworks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Comparison and Analysis of PAPR Reduction Techniques in OFDM

    In this paper, different techniques for reducing Peak To Average Power Ratio (PAPR) is discussed. The performance of an Orthogonal Frequency Division Multiplexing (OFDM) system is degraded if the Peak-to-Average Power Ratio(PAPR) is high. An OFDM system dynamic range is typically two or four times larger than a single carrier...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Inpainting Realization of GUI in JAVA Using Exemplar Method

    Image In-painting technique is of filling in holes in an image to preserve its overall continuity. There are many applications of this technique include the restoration of old photographs and damaged film; removal of labeled text like dates, subtitles, or publicity; and the removal of entire objects from the image...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Compact UWB Antenna With T-Shaped Slots and Staircase Ground Plane for Enhanced Bandwidth

    In the coming years, there is great demand for high-speed data transmissions on cost effective basis. In order to achieve the same a new technology known as the Ultra WideBand (UWB) has been used. This technology has revolutionary advantages of an unlicensed service that can be used anywhere, anytime, by...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Aviris Hyperspectral Images Compression Using 3D Spiht Algorithm

    Hyperspectral sequence image is compressed using 3D Discrete Wavelet Transform (3D DWT) to decorrelate the three dimensions of hyperspectral image. Than the sequence is encoded efficiently by the 3D SPIHT algorithm, which operates on the pyramid structure of wavelet coefficients obtained. After decompression, the image evaluated by the PSNR, are...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Implementation of Artificial Intelligence Techniques for Economic Load Dispatch

    In this paper, the authors present the applications of computational intelligence techniques to economic load dispatch problems. The fuel cost equation of a thermal plant is generally expressed as continuous quadratic equation. In real situations the fuel cost equations can be discontinuous. In view of the above, both continuous and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Power Efficient Energy-Aware Routing Protocol for Wireless Sensor Networks

    The most important issue that must be solved in designing a data transmission algorithm for Wireless Sensor Networks (WSNs) is how to save sensor node energy while meeting the needs of applications/users as the sensor nodes are battery limited. While satisfying the energy saving requirement, it is also necessary to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Data Transmission at 16.8kb/s Over 32kb/s ADPCM Channel

    In this paper, the authors present three models of Quadrature Amplitude Modulation (QAM) modem operating at data rate of 16.8kb/s to be transmitted over 32kb/s Adaptive Differential Pulse Code Modulation (ADPCM) channel. These modems operate at symbol rates of 2400, 2800, and 3360 baud with associated number of bits per...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Improving the Quality of Service in Wireless Body Area Networks Using Genetic Algorithm

    Wireless Body Area Sensor Networks are the highly distributed network, in which its nodes are the organizer itself and each of them has the flexibility of gathering and sending patient biomedical knowledge to a terminal that referred to as sink. When knowledge sent to sink from a path that doesn't...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Evaluation Method Proposal for High Performance ICT Systems and Networks

    In this paper, the authors present a predicted functional architecture of an emerging application of High Performance Computing and Communication (HPCC) application: the integrated manufacturing and management system. The computer network was defined for a case study of big manufacturer of household appliances. To evaluate and/or predict performance of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Implementation of WSN Node Using Hardware Specialization

    Wireless Sensor Networks holds space in wide range of application ranging from tracking to monitoring health, environment etc. The power (energy consumption) attribute for WSN requires special attention as WSN has to work unattended for long durations. Till now WSN nodes has been designed using low-power micro-controller. But still its...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Improving Computational Efficiency of Tentative Data Set

    The aim of data mining is to find novel, interesting and useful patterns from data using algorithms that will do it in a way that is more computational efficient than previous method. Current data mining practice is very much driven by practical computational concerns. In focusing almost exclusively on computational...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Pattern Evaluation Proved To Be Important For Decision Support in Data Warehouse

    It is the mobile sensor network or satellite that is observing and obtaining the data pattern. This paper focuses on spatio-temporal data and events pattern for the data mining and for data warehouse. There is a repository or database where sensor, satellite inputs or data are collected for analysis. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Combining Cryptography with Channel Coding

    Cryptography is a form of hiding the text so to increase the security of the information. It can also be defined as the process of converting the valuable information into some form of non-scene information which can be understand able by the sender and the intended receiver only. On the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Close Look Towards Modified Booth's Algorithm with BKS Process

    In this paper, the authors are remodeling of modified Booth's algorithm, where shift three at a time. The result shows that classical concept of single shift multiplication algorithms are to be revised with a multiple number of shifts. The observation is that in general the complexity is N/3, which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    MMSE-V-BLAST Optimal-Ordering In Different Channels

    The Bell Labs lAyered Space-Time (BLAST) algorithm is simple, and hence, a popular choice for a Multiple-Input-Multiple-Output (MIMO) receiver. Because of the difficulties that arise due to the optimal ordering in terms of BER, while considering real analytical evaluations, the one and only solution is by introducing OSIC schemes to...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Data Clustering with Leaders and Subleaders Algorithm

    In this paper, an efficient hierarchical clustering algorithm, suitable for large data sets is proposed for effective clustering and prototype selection for pattern classification. It is another simple and efficient technique which uses incremental clustering principles to generate a hierarchical structure for finding the subgroups/subclusters within each cluster. As an...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Survey of Related Technologies for Improved Spectrum Efficiency

    The most noted effect of rapid growth in wireless networks in recent years has been the issues of spectrum usage and management because of its importance in wireless communication as the medium of data transmission. Efficient utilization of spectrum has been the major concerns in spectrum management over recent years...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Cloud Computing and ACPI: An Approach to Implement Better Energy Management Towards Green IT

    Cloud computing has proved to be a major breakthrough in terms of green computing. Cloud computing is one of the few technologies which offers the possibility of reducing energy consumption and carbon releases with almost negligible disturbance to business activities. The positives of this technology in terms of servicing and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    A Study of Diverse Wireless Network

    Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Control of Binary Input Systems

    Now-a-days many systems are controlled by items of commutation, mainly in powers electronics and hydraulic. This Boolean input system has increased in the electric industry. Power supply includes such system and there is represented by power converter. The goal of this paper is to propose a methodology to design a...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Factors affect on Requirement Prioritization

    Software engineering research is yet in its early stages hence it needs evaluation. So, software engineers think about experimental research and try to adopt analytical approaches to validate results like in other sciences. It should be asserting that requirement engineering process is to use requirements prioritization. The use of requirements...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Tree-Based Parity Check for an Optimal Data Hiding Scheme

    Reducing distortion between the cover object and the stego object is an important issue for steganography. The tree-based parity check method is very efficient for hiding a message on image data due to its simplicity. Based on this approach, the authors propose a majority vote strategy that results in least...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of Embedded Web Server with Light weight TCP/IP on Mini 2440

    In this paper, the authors analyses the Light-weight TCP/IP stack and gives the detailed processing of every layer first, then selecting the hardware platform as Samsung Mini2440 and the software platform as RT-Thread, porting of LwIP is done based on them. Then a thin web server is designed and stored...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Abstract Syntax Tree Based Clone Detection for Java Projects

    A large amount of unavoidable money is spent on the maintenance of any existing software systems. Software maintenance cost is generally higher than the development cost therefore reducing maintenance cost is a necessary task of today's software industries. Software system includes similar bugs at different places which makes system inefficient...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Vehicle Obstacles Avoidance Using Vehicle-To Infrastructure Communication

    VANET is a technology where vehicles are considered as mobile nodes to create a mobile network. In the existing model, vehicle obstructs the communication between other vehicles will not be considered as an obstacle. Due to existing model the impact on the LOS (Line Of Sight) obstruction, received signal power,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Efficient Load Balancing in Cloud Computing Using Fuzzy Logic

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, software and web services. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2011

    Challenging Computing Techniques - An Overview of Cloud Computing

    Cloud computing is an Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity. It is a new generation of computing that utilizes distant servers for data storage and management, allowing the device to use smaller and more efficient chips that consume...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Evaluation of UWB Interference on WiMAX

    This paper describes the analysis of UWB interference on WiMax systems. Co-existence between these two systems is important due to unlicensed use of 3.1 to 10.6 GHz frequency band by UWB. The interference impact of UWB devices entirely depends on the victim receiver characteristics. From the knowledge of noise density...

    Provided By IOSR Journal of Engineering