IOSR Journal of Engineering

Displaying 121-160 of 481 results

  • White Papers // Feb 2013

    Throughput Improvement for Cell Edge Users

    Users at the cell edge in a cellular network suffer from low data rate due to low SINR Cooperative transmission schemes which are used in wireless networks to improve the spectral efficiency. In this paper, the authors study the downlink capacity of edge users in a cellular network and see...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Microstrip Antenna for WLAN Application Using Probe Feed

    Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. A low profile patch antenna for WLAN application is proposed in this paper. This proposed antenna is made by using the probe feeding and aperture...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Mm Waves Role in Satellite Communication

    The frequency band of Millimeter Wave (MM Wave) in Electromagnetic spectrum is 30-300 GHz and is sometimes called the Extremely High Frequency (EHF) range. Apart from Radar system, communication system is another important application of MM Waves which proved better than Microwaves/optics in certain features. Certain characteristics of the earth's...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Efficient Hand-Geometry System for Biometric Identifications

    In this paper, the authors propose an efficient hand geometry based system to recognize individuals. Hand geometry used in this verification system utilizes some hand geometry features which cannot vary with small variation of palm position. In this work, users can place their hands freely without the need for pegs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Enhancement of Satellite Image Resolution With Moving Objects

    Satellite images are being used in many applications like Meteorology, Agriculture, Geology, Forestry, Landscape, Biodiversity, Planning, Education, Regional, Seismology and oceanography. The Enhanced satellite images make diagnostic details more obvious. The Image Enhancement is the main technique for improving the resolution and visual appearance of the image. One of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Traffic Modelling for Capacity Analysis of CDMA Networks Using Lognormal Approximation Method

    This paper presents teletraffic modelling in cellular networks operating with Code Division Multiple Access (CDMA) to assist in capacity analysis of such systems using statistical means. Since the introduction of CDMA, owing to capacity edge over other multiple access techniques, there is the need for tools that will assist in...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Public Transportation Management Services by Integrating GSM-GPS

    This paper proposes and implements a solution for enhancing public transportation management services based on GPS and GSM in Andhra Pradesh. The system consists of four modules: BUS Station Module, In-BUS Module, BASE Station Module and BUS Stop Module. Equipped with PC and GSM modem, BUS Station Module sends the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design Analysis of a Security Lock System Using Pass-Code and Smart-Card

    In this paper, security lock system using Pass code and smart card has been achieved. It is a micro controller based system which aims at interfacing selected hardware components with software to obtain a higher degree of security. In achieving this work, seven major stages were considered in the design...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Modified ABC Algorithm & Its Application to Wireless Sensor Network Dynamic Deployment

    Wireless Sensor Networks plays a gargantuan role in instrumenting the modern day world; hence it is crucial to develop an optimal design flow. Out of the various Swarm intelligent algorithms developed so far, Artificial Bee Colony (ABC) algorithm offers a vivid scope for this objective. First introduced for solving numerical...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis of Wimax Under Jamming Effect for Various Antennas

    Use of Internet is increasing day by day. Wi-Fi provides wireless access to the internet but range is limited to certain meters only. So concept of WiMAX is introduced to increase the range. WiMAX means worldwide interoperability for microwave access. WiMAX is also known as wireless broadband. The WiMAX based...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Unearthing the Compromised Nodes and Restoring Them in Wireless Sensor Network

    Sensor nodes are usually deployed in an open environment therefore they are subjected to various kinds of attacks like Worm Hole attack, Black Hole attack, False Data Injection attacks. Since the attackers can cause disruption and failure to the network, it's very important to detect these compromised nodes and revoke...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Local Oscillators Phase Noise Cancellation Methods

    Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation scheme that employs a large number of orthogonal Closely-spaced sub-carriers. Each sub-carrier is modulated with a modulation scheme (QPSK or QAM generally) at a low symbol rate. Each of the sub-carrier is then multiplexed together and this forms the OFDM...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Physiological Parameter Monitoring and Recording System

    The design and development of a Zigbee smart non-invasive wearable physiological parameters monitoring device has been developed and reported in this paper. The system can be used to monitor physiological parameters, such as temperature and heart rate, of a human subject. The system consists of an electronic device which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Saving in Wireless Sensor Network Using Burst Algorithm

    A wireless sensor network is composed of a large number of low-cost devices distributed over a geographic area. Sensor nodes have limited processing capabilities therefore simplified protocol architecture should be designed so as to make communications simple and efficient. Moreover, the power supply unit is based on an energy-limited battery...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Embedded Ethernet Interface Using Arm Processor

    Currently device with microcontroller has been widely used in industrial field. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM processor-based embedded Ethernet interface is presented. In the design, an existing SPI serial device...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Novel Compact CPW- Fed Antenna for ULTRA WIDEBAND Applications

    RECENTLY, with the rapid development of wireless communication systems for local access networks including Personal Digital Assistants (PDA), portable PCs, and Bluetooth, the need for low profile and compact antenna has been on the rise. The demand was increased day by day in wireless communication, especially for the ULTRA WIDEBAND...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Reconfigurable Microstrip Patch Antenna Using MEMS Technology

    This paper proposes the design of a Reconfigurable Micro Strip Patch Antenna Using MEMS Technology A Reconfigurable Microstrip patch antenna of operating frequency in the range of 5-8 GHz (CBand), for the application of wireless communication has been designed. The term Re-configurability refers that it adaptively changes its characteristics. A...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    DFT Based MMSE Equaliser in MIMO-OFDM

    MIMO-OFDM is considered as a fast growing technology now days. OFDM is a multi carrier modulation technique in which the carriers are Orthogonal to each others as a result of which it provides high bandwidth efficiency and multiple carriers share the data among themselves. During the research equalizer is always...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Printed Coupled Loop Wideband Antenna Design for Wireless Communication

    This paper explains the wideband loop antenna design for wireless communication. Printed antennas are supposed to be more attractive for mobile phone operations for achieving WWAN purposes. In mobile phones theses antenna usually cover the internal circuitry at the top or bottom of the device and they also require further...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementation of VOIP Communication on Embedded Systems

    In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VOIP software, and embedded VOIP is one of these blind spots. The VOIP application in this paper sets...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    DCE Cradle: Simulate Network Protocols With Real Stacks for Better Realism

    Reusing real protocol implementations of the kernel network stack in network simulators can increase the realism of network experimentations as well as decrease the cost of protocol development. In this paper, the authors introduce DCE Cradle, a novel framework that allows to use any features of Linux kernel network stack...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

    Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A New Approach to Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. As volunteer clouds are allowed to communicate with each other and with other commercial clouds also, it's necessary to implement an enhanced interoperable environment. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Improving Security for Data Migration in Cloud Computing Using Randomized Encryption Technique

    With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Green Cloud Computing: A Constructive Advent to Curtail the Carbon Emission Radiation Due to Servers

    This paper analytically scrutinizes the energy dissipation based on services and invades the conditions to promote green cloud computing to save energy crisis. In conventional, cloud computing emphasis on the data computing efficiency whereas green cloud computing accredit to the research and practice of applying computing resources in virtuous, adequate...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Entrepreneurial Idea Development to Business Start-Up: Teaching Methodological Approach

    The crucial issue on entrepreneurship training in the tertiary institutions of learning is teaching students how to develop innovative business idea to the business venture start-up stage. This is the ability of the students to develop ideas that are out of the theoretical teaching of the academic environment. Several scholars...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementing SAAS: Cloud Computing and Android Based Application Framework for C Programming

    Under The National Mission on Education through Information and Communication Technology (NMEICT) a lot of e-learning material, applications and other useful information have been made available on its web portal. MHRD has also taken initiatives for the dissemination of this knowledge by distributing Aakash Tablets to the students at free...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Cloud-Assisted Video Streaming Over QoS-Enabled Wireless Networks

    With the proliferation of inexpensive broadband connections, video streaming services over the Internet are growing rapidly. Delivering video over wireless networks is a challenging task, especially when high definition is required, due to its high bit rate, delay, and loss sensitivity. This paper presents a modified slicing scheme that can...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Neural Networks for Iris Recognition: Comparisons between LVQ and Cascade Forward Back Propagation Neural Network Models, Architectures and Algorithm

    In this paper, Iris recognition is a proven, accurate means to identify people. In this paper, it includes the preprocessing system, segmentation, feature extraction and recognition of an iris recognition system was suggested based on two Artificial Neural Network (ANN) models separately: Cascade Forward (CFBPNN) and Linear Vector Quantization (LVQ)....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Novel Technique in stegnanalysis using S-DES and Back propagation Algorithm

    In this paper, the authors propose a new algorithm by improving and combining S-DES and back propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Study of Webcrawler: Implementation of Efficient and Fast Crawler

    A focused crawler is a web crawler that attempts to download only web pages that are relevant to a pre-defined topic or set of topics. Focused crawling also assumes that some labeled examples of relevant and not relevant pages are available. The topic can be represent by a set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Rapid Growth of Customer Use and Adoption of the Broadcasting Agent and Receivers: A Driving M-Commerce Factor

    The success of M-commerce credit goes to the M-commerce driving factors. The driving factor instruct that the factor which is responsible and necessary for enabling the M-commerce. There are Radio broadcasting, telephone broadcasting, television broadcasting, cable radio broadcasting, satellite broadcasting and web casting considering as broadcasting agent. It is observed...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    A New Algorithm to Find Best Splitting Criteria for Web Page Classification

    Web is popular as the availability of data is vast. It contains several billions of HTML documents, pictures and other multi media files. These documents reside on Internet servers and the information-exchange can be done through HTTP protocols. Individual HTML files having unique address is called Web page and collection...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Secure Model for Cloud Computing Based Storage and Retrieval

    Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hybrid Algorithm for Clustering Mixed Data Sets

    Clustering is one of the data mining techniques used to group similar objects into different meaningful classes known as clusters. Objects in each cluster have maximum similarity while the objects across the clusters have minimum or no similarity. This kind of partitioning of objects into various groups has many real...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Application of VLSI in Artificial Intelligence

    This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By combining VLSI technology, a very powerful...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones

    The mobile applications are one of the most important utilities of modern communication world. Currently this technology is getting compact to provide compatibility and accessibility to the users with a better option of handling. This research is based on the mobile and m-commerce technology, a fastest growing technology of today....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of VoIP by Communicating Two Systems

    VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. In this paper, the authors introduce and explore the problems that occur in the people day to day life in sending voice and data with different windows. The paper evolves in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Computing Platform for Virtual University Providing E-Learning

    According to the present scenario, cost of the electronics is decreasing day-by-day and the cost of services provided by it is also decreasing. So, no one wants to pay a high cost for any service. For that purpose, the authors tried to corporate their educational services of any e-learning website...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cryptography on Android Message Application Using Look Up Table and Dynamic Key (cama)

    Most popular shortest and cheapest textual form of communication is Short Message Service (SMS).To ensure the security of the texts which is sent, many algorithm are available. In this paper, the authors propose an efficient algorithm for cryptography which is based on static Look Up table and Dynamic Key. Symmetric...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Approach of Automatic Data Mining Algorithm for Intrusion Detection and Prevention System

    The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Artificial Intelligence Algorithms

    Artificial Intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus, strong AI claims that in near future the authors will be surrounded by such kinds of machine which can completely works like human being and machine could have human...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Micro-Sensor Network Models

    Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Networking and Ad Hoc Routing Protocols Validation

    In this paper, the authors describe mobile network and efficient routing protocol for wireless ad hoc networks. They report on its implementation, on performance comparisons and on a formal validation result. Moreover, they discuss cellular system design, global system for mobile communication, formal protocol verification and operating over infrared or...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Heuristic Route Discovery for Shared Firewall Network

    In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This paper lists the constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Algorithm to Simulate the Temporal Database Using Exponential Distribution

    Since the early eighties, an active temporal database research community has sought new insight into the management of time-referenced, or temporal, data and has developed concepts, tools and techniques that better support the management of such data. Much of this activity has been motivated by the observations that most databases...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Cryptography Using Genetic Algorithms (GAs)

    Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. Public key cryptography is one of the most important types of cryptography. In public key cryptography the key has to be unique. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Detection of SQL Injection Attack in Web Applications Using Web Services

    Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks are extremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application's...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Impact of Personal Software Process on Software Quality

    Today, concern for quality has become an international movement. Even though most industrial organizations have now adopted modern quality principles, the software community has continued to rely on testing as the principal quality management method. Different decades have different trends in software engineering. The Personal Software Process (PSP) is an...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Optimal Route Search in Mobile Ad-Hoc Network Using Ant Colony Optimization With Power Saving Technique

    In ad-hoc networks the mobile nodes communicate with each other using multi-hop wireless links. The main drawback of such network is that there are no stationary infrastructures to route the packets. Hence, routing protocols have to adapt quickly and elegantly to frequent and unpredictable changes in network technology and they...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Web Based Solution for Thermal Printing of Bar Code

    A barcode is an optical machine-readable representation of data, which shows the relevant data about the material to which it is attached or fixed. With the help of bar code, the information can be assessed automatically, quickly and accurately. It is the fastest means of gathering data and can be...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Intrusion Detection Technique Based on Dendritic Cell Algorithm and Dempster Belief Theory

    Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Statistical Approach to Perform Web Based Summarization

    Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism of the search engines they use. Not surprisingly it in general consists...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    High Performance Cloud Data Mining Algorithm and Data Mining in Clouds

    The authors describe the design and implementation of a high performance cloud that they have used to archive, analyze and mine large distributed data sets. By a cloud, they mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering