IOSR Journal of Engineering

Displaying 121-160 of 498 results

  • White Papers // Feb 2013

    Throughput Improvement for Cell Edge Users

    Users at the cell edge in a cellular network suffer from low data rate due to low SINR Cooperative transmission schemes which are used in wireless networks to improve the spectral efficiency. In this paper, the authors study the downlink capacity of edge users in a cellular network and see...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Microstrip Antenna for WLAN Application Using Probe Feed

    Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. A low profile patch antenna for WLAN application is proposed in this paper. This proposed antenna is made by using the probe feeding and aperture...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Mm Waves Role in Satellite Communication

    The frequency band of Millimeter Wave (MM Wave) in Electromagnetic spectrum is 30-300 GHz and is sometimes called the Extremely High Frequency (EHF) range. Apart from Radar system, communication system is another important application of MM Waves which proved better than Microwaves/optics in certain features. Certain characteristics of the earth's...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Efficient Hand-Geometry System for Biometric Identifications

    In this paper, the authors propose an efficient hand geometry based system to recognize individuals. Hand geometry used in this verification system utilizes some hand geometry features which cannot vary with small variation of palm position. In this work, users can place their hands freely without the need for pegs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Embedded Ethernet Interface Using Arm Processor

    Currently device with microcontroller has been widely used in industrial field. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM processor-based embedded Ethernet interface is presented. In the design, an existing SPI serial device...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Novel Compact CPW- Fed Antenna for ULTRA WIDEBAND Applications

    RECENTLY, with the rapid development of wireless communication systems for local access networks including Personal Digital Assistants (PDA), portable PCs, and Bluetooth, the need for low profile and compact antenna has been on the rise. The demand was increased day by day in wireless communication, especially for the ULTRA WIDEBAND...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Reconfigurable Microstrip Patch Antenna Using MEMS Technology

    This paper proposes the design of a Reconfigurable Micro Strip Patch Antenna Using MEMS Technology A Reconfigurable Microstrip patch antenna of operating frequency in the range of 5-8 GHz (CBand), for the application of wireless communication has been designed. The term Re-configurability refers that it adaptively changes its characteristics. A...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    DFT Based MMSE Equaliser in MIMO-OFDM

    MIMO-OFDM is considered as a fast growing technology now days. OFDM is a multi carrier modulation technique in which the carriers are Orthogonal to each others as a result of which it provides high bandwidth efficiency and multiple carriers share the data among themselves. During the research equalizer is always...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

    Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Gtalk and Skype are frequently used for this purpose, which is a third party. So, the authors are utilizing...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Time Based Location Management Using CACHE Scheme for Mobile Environment

    Location management refers to the problem of updating and searching the current locations of mobile nodes in a wireless network. The location administration basically is performed by using two registers, HLR (Home Location Register) and VLR (Visitor Location Register). The current location information has to be maintained efficiently in location...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

    Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Intrusion Detection of Masquerading Attacks & Secure Authentication in Cloud

    This paper proposed for a new authenticated access control scheme for securing data in cloud system. In this scheme cloud system verifies the authenticity of user and provides access control only to applicable user to decrypt the stored data. The scheme prevents replay attacks and supports creation, modification, and reading...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fully Homomorphic Encryption Equating to Cloud Security: An Approach

    As the data storage challenge continues to grow for insurers and everyone else, one of the obvious solutions is cloud technology. Storing data on remote servers rather than in-house is definitely a money-saver, but in insurance circles, the worry has been that having critical data reside outside the physical and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comparison for Secured Transmission of Packets in Wireless LAN Using AES and ECC

    Wireless Local Area Network (WLAN) has increased rapidly, providing flexibility and mobility to the device users. This made the technology popular amongst a wide range of users in the universe. But one of the common problems the authors are overcoming is fragment loss. So far they were following a scheme...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis and Evaluation of Probabilistic Routing Protocol for Intermittently Connected Network

    Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Secure Massive Data Storage With Consistency And Route Control On The Cloud

    As the advent of computer has thrown light to the storage of massive data in small spaces the resources has been reduced broadly. Cloud computing in recent times has become a trend among organization to store data and retrieve it on-the-go around the globe. With this the data storage devices...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed RK- Secure Sum Protocol for Privacy Preserving

    Secure multi party computation allows several parties to compute some function of their inputs without disclosing the actual input to one another. Secure sum computation is an easily understood example and the component of the various secure multi party computation solutions. Secure sum computation allows parties to compute the sum...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detection of Routing Misbehavior in MANET Using Improved 2ACK

    A Mobile Ad-hoc NETwork consists of individual mobile nodes communicating via wireless link. The node which refuses to share their own resources but gets benefit from other nodes, are called selfish or misbehaving nodes. The nodes in MANET are mobile with changing topologies. Performance of network may get affected due...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comprehensive Study on Tracking VoIP Caller

    Session Initiation Protocol (SIP) is most extensively usable VoIP protocol which works on application layer. It uses Transmission Control Protocol or User Datagram Protocol which further uses Internetworking Protocol for establishing VoIP communication. None of these protocols including SIP provides absolute location information which provides caller's location in latitude and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Artificial Routing Protocol for Cut Detection of Cut Vertices

    A Wireless Sensor Network can break into a number of disconnected paths due to failure of some of the nodes known as cut vertices. In this paper, the authors propose an efficient algorithm to detect vertices. The neighbor node gets failure intimation from the cut vertex so that the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review of Bot Protection Using CAPTCHA for Web Security

    Today several daily activities such as communication, education, E-commerce, Entertainment and tasks are carried out by using the internet. To perform such web activities users have to register regarding the websites. In registering websites, some intruders write malicious programs that waste the website resources by making automatic false enrolments that...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR File Authentication

    Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user's data are usually processed remotely in unknown machines that users do not own or operate. Control of user's data is reduced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Arising Issues In Wireless Sensor Networks: Current Proposals and Future Developments

    Sensor Networks have been heralded as one of 21 most enabling technologies for 21st century by Business Week. In recent times wireless sensor networks have received significant attention from researchers due to its unlimited potential. However despite all this effort at providing improved services in these areas, issues still remain...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Defending Sybil Attack Using Associate Membership Method in Distributed P2P Network

    The Peer-to-peer networks popularity is increasing day by day for its resource allocation system like file sharing, Skype etc .The system is extremely fast because of its fully decentralized nature. Although this is efficient system but this system's security is vulnerable and can be attacked anytime by attackers. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server

    Wireless sensor networks consisting of a large number of low powers, low cost sensor node that communicate wirelessly. Such sensor networks can be used in wide range of applications such as military sensing and tracking, health monitoring etc, when the sensing field is too far from the station, transmitting data...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Efficient Optimization of Multiple SPARQL Queries

    A W3C standard for processing RDF data is a SPARQL query language, a technique that is used to encode data in meaningful manner. The authors investigate the foundations of SPARQL query optimization by grouping into individual clusters using common substructures in the multiple SPARQL queries, propose a comprehensive set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

    The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Constrained Delaunay Triangulation for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. WSN has the potential of significantly enhancing user ability to monitor and interact with user's physical environment. Fault tolerance is one of the main issues in Wireless Sensor...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    High Performance Cloud Data Mining Algorithm and Data Mining in Clouds

    The authors describe the design and implementation of a high performance cloud that they have used to archive, analyze and mine large distributed data sets. By a cloud, they mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Entrepreneurial Characteristics and Competency as Determinants of Business Performance in SMEs

    This paper is to empirically test the influence of entrepreneurial characteristics and competencies on business performance in Small and Medium Enterprises (SMEs). This study was conducted with 147 SMEs owner in Malang regency East Java Indonesia using survey instrument. Data analysis using the structural equation modelling. The results of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementation of VOIP Communication on Embedded Systems

    In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VOIP software, and embedded VOIP is one of these blind spots. The VOIP application in this paper sets...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    DCE Cradle: Simulate Network Protocols With Real Stacks for Better Realism

    Reusing real protocol implementations of the kernel network stack in network simulators can increase the realism of network experimentations as well as decrease the cost of protocol development. In this paper, the authors introduce DCE Cradle, a novel framework that allows to use any features of Linux kernel network stack...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

    Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Viterbi Algorithm for Error Detection and Correction

    In the present world, communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Zigbee Based Sensor Networks for Temperature Monitoring and Controlling

    In Now-a-days, the people have many different types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and to save property from damage. There is need to develop wireless sensor network for temperature controlling. In this paper, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    The Suggested Correlation Formula Between (HPF) and (OPMUF) Parameters Over Middle East Region

    In this paper, a study of the behavior and correlation between High Possible Frequency (HPF) and Optimum Maximum Usable Frequency (OPMUF) parameters for the communication links distributed over Middle East Region were made. A mutual correlation equation between the two parameters has been suggested. The analytical test of the monthly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Qos Based Mac Protocol for Wireless Multimedia Sensor Network

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design and Implementation of Fpga Based High Performance Instruction List (IL) Processor

    Programmable Logic Controller (PLC) is a device that allows an Electro-Mechanical engineer to automate his mechanical process in an efficient manner. PLC is a typical Microprocessor or Micro-Controller based system with its dedicated operating system to interpret the control specification, scan inputs and accordingly activate the final control elements. As...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Comparative Study of High Performance Braun's Multiplier Using FPGAs

    Multiplication is one of the essential operations in Digital Signal Processing (DSP) applications like Fast Fourier Transform (FFT), Digital filters etc. With the advancements in technology, research is still going on to design a multiplier that consumes less power or has high speed or occupies less area or a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Developed Java Software for Switching Secured Short Message Service (SMS)

    In this paper, the authors implement a software based SMS switching system using GLOBACOM and MTN as network carriers. JAVA programming language with focus on socket programming will be used for the software development. The application client, which is the portion that runs on the mobile phone, uses Java macro...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Analysis of Mobile Telecommunication Development and Operational Practices Vis-?-Vis 4G Wireless Technology

    4G is a brand name for the Fourth Generation of the cellular wireless standards. Over the years, Nigerian telecommunication firms have been in operation with predecessor generation standards (such as 2G and 3G). The design principle of each of these cellular wireless standards follow the same principle, where the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Wireless Data Logging and Supervisory Control of Process Using Lab View

    Wireless data acquisition, data logging and supervisory control are the basic building blocks of plant automation. In this paper plant consisting of multiple boilers where multiple process variables of the boilers need to be acquired from the field is considered and analyzed. The data of the process variables needs to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design of a Control Logic in a Dynamic Reconfigurable System

    this paper, the authors propose an architecture for controlling Dynamic Reconfigurable systems. The processor instructions when compiled one by one produces very high delay overhead. If these instructions are converted into a combinational logic then the overhead can be reduced thereby making the system an efficient one. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    VHDL Implementation of 8-Bit ALU

    In this paper VHDL implementation of 8-bit Arithmetic Logic Unit (ALU) is presented. The design was implemented using VHDL Xilinx Synthesis tool ISE 13.1 and targeted for Spartan device. ALU was designed to perform arithmetic operations such as addition and subtraction using 8-bit fast adder, logical operations such as AND,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study of ICI Cancellation Techniques in OFDM

    OFDM (Orthogonal Frequency Division Multiplexing) is a well known technique in 4G Broadband wireless communication systems. OFDM has high spectral efficiency but it suffers from frequency offset problem due to the difference between transmitter and receiver local oscillator frequencies which causes loss of orthogonality between subcarriers leading to ICI. This...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Based ATM Security by Using ARM7

    The purpose of this paper is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    High Speed Data Acquisition System With Ethernet Interface

    This paper introduces a high speed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind this effort. Using standard...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multiband Microstrip Patch Antenna for Microwave Applications

    In this paper, the authors present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Investigation of Dual Meander Slot to Microstrip Patch Antenna

    A dual microstrip meander slot antenna is presented for Wireless Local Area Network (WLAN) application. The proposed antenna comprises a rectangular microstrip patch element embedded with two meander slots. The parametric study is performed to investigate the characteristic of microstrip patch antenna with double meandered slots compared to the same...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of ALU Using Asynchronous Design

    Power consumption has become one of the biggest challenges in design of high performance microprocessors. In this paper, the authors present a design technique using GALs (Globally-Asynchronous Locally-Synchronous) for implementing asynchronous ALUs, which aims to eliminate the global clock. Here ALUs are designed with delay insensitive dual rail four phase...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Multiple Symbol Differential Detection of MPSK Which Is Invariant to Frequency Offset Using Maximum-Likelihood Detection

    It is well-known that classical differential detection of MPSK signals, wherein the information is encoded as the first order phase difference, is a simple and robust form of communication in environments not subject to frequency variation. For channels that introduce into the carrier a random frequency shift, e.g., those associated...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Digital Pheromone Scheme in Wireless Sensor and Robot Networks

    In this paper, the authors design a bio-inspired patrolling algorithm based on digital pheromone. As events have different importance, they refer to them as having different priorities. In their patrolling schemes, robots efficiently handle as many high priority events as possible. Inspired by the pheromone-based communication among ants, they introduce...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    CEMR: Congestion Evasion Multicast Routing to Maximize Throughput for Mobile Ad Hoc Networks

    This paper is focused on a new solution for congestion evasion in ad hoc multicast routing that referred as Congestion Evasion Multicast Routing short CEMR. CEMR is aimed at Congestion Evasion in Multicast Mobile Ad hoc routing protocol. The current MAC level routing strategy is independent which can work with...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Parametric Study for Rectangular Microstrip Patch Antennas

    Physically, MSA consists of a metallic radiating patch backed up by a dielectric substrate and a ground plane below that. These days, MSAs are widely used in many applications due to their inherent advantages such as low profile, lightweight, planer configuration and ease of fabrication. However, main limitation of MSAs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Overview of Smart Antenna and a Survey on Direction of Arrival Estimation Algorithms for Smart Antenna

    Smart antenna systems is one of the most rapidly developing areas of communication. With effective Direction Of Arrival (DOA) and Beam forming techniques Smart Antenna Systems prove to be most efficient in terms of quality of signals in wireless communication. In this paper a brief overview of Smart Antenna along...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of Empirical Propagation Models for WiMAX in Urban Environment

    This paper presents a simulation study of different path loss empirical propagation models with measured field data in urban environment. The results are different if they are used in different environment other than in which they were designed For comparative analysis the authors use the Free Space path Loss model,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Evaluation of Uncoded Adaptive OFDM System Over AWGN Channel

    The demand for high-speed mobile wireless communications is rapidly growing. OFDM technology promises to be a key technique for achieving the high data capacity and spectral efficiency requirements for wireless communication systems of the near future. It is adopted as a standard for HYPERLAN & IEEE 802.11. It offers considerable...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Simulation of Rectangular Patch Antenna With Jeans Substrate

    There has been growing interest in researchers to merge wearable system technology with textile-technology. Utilization of textile material for development of antenna has been rapid due to wearable computing. A wearable antenna is meant to be a part of clothing used for communication purpose such as Tracking and navigation, health...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Stacked Multiband Microstrip Antenna

    In microstrip antenna research a new trend is found where the researchers improve antenna characteristics by introducing different structures within the antenna geometry. With the development of computational electromagnetic new approaches of analysis has become another branch of activity. This paper presents a design of stacked patch configuration of microstrip...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Protocols (AODV, DSR)of MANET(Mobile Ad-Hoc Network)& Black Hole Attack InAODV

    Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Due to Open medium, dynamic topology, distributed cooperation, ad-hoc networks are vulnerable to many types of security attacks. Black hole attack is one of the severe security threats which can be easily employed by exploiting...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Towards New Interfaces at Multitouch Technology

    In today's society, the way in which the people physically interact with electronic devices is changing how they are focused in their technological research. This change has led to many great advances, including the development of new interfaces at multi touch technology. Through the use of these new interfaces, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Embedded Data Acquisition System for Mobile Applications

    This paper presents an interactive way to acquire the parametric data of moving application using of GPRS services. The total system is incorporated in the mobile application like car, bus, etc. The embedded system is designed with the help of microcontroller and user interface devices. The acquisition of the present...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks Under Secure Sparse Regeneration

    In wavelength-routed WDM optical networks requires regeneration for few light paths, when the strength of optical signal reduced and also security and privacy are essential before Optical Burst Switching (OBS) networks can become an everyday reality. Many-casting is a communication paradigm to implement the distributed applications. In many-casting, destinations can...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Improving Energy Efficiency Using LEARN Algorithm for Wireless Sensor Networks

    A number of energy-aware routing protocols were proposed to seek the energy efficiency of routes in Multihop wireless networks. Among them, several geographical localized routing protocols were proposed to help making smarter routing decision using only local information and reduce the routing overhead. However, all proposed localized routing methods cannot...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Printed Coupled Loop Wideband Antenna Design for Wireless Communication

    This paper explains the wideband loop antenna design for wireless communication. Printed antennas are supposed to be more attractive for mobile phone operations for achieving WWAN purposes. In mobile phones theses antenna usually cover the internal circuitry at the top or bottom of the device and they also require further...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Enhancement of Satellite Image Resolution With Moving Objects

    Satellite images are being used in many applications like Meteorology, Agriculture, Geology, Forestry, Landscape, Biodiversity, Planning, Education, Regional, Seismology and oceanography. The Enhanced satellite images make diagnostic details more obvious. The Image Enhancement is the main technique for improving the resolution and visual appearance of the image. One of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Virtual Wi-Fi for Single Hopping

    Single hopping is implemented by using software approach over IEEE802.11WLAN card using orthogonality concept and protocol. Most feature of single hopping is to achieve virtual Wi-Fi network. Design parameters of this approach are time delay and energy consumption .There are many scenarios where a wireless device connect to virtual Wi-Fi...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Performance Analysis of Different M-ARY Modulation Techniques Over Wireless Fading Channel

    Cellular communication systems are the most widely used wireless communication systems. It is the people primary need today to achieve the higher data rates in limited spectrum bandwidth to improve the performance of signals. The authors know digital communication system outperforms analog ones in terms of noise performance and flexibility....

    Provided By IOSR Journal of Engineering