IOSR Journal of Engineering

Displaying 161-200 of 498 results

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Cloud-Assisted Video Streaming Over QoS-Enabled Wireless Networks

    With the proliferation of inexpensive broadband connections, video streaming services over the Internet are growing rapidly. Delivering video over wireless networks is a challenging task, especially when high definition is required, due to its high bit rate, delay, and loss sensitivity. This paper presents a modified slicing scheme that can...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Neural Networks for Iris Recognition: Comparisons between LVQ and Cascade Forward Back Propagation Neural Network Models, Architectures and Algorithm

    In this paper, Iris recognition is a proven, accurate means to identify people. In this paper, it includes the preprocessing system, segmentation, feature extraction and recognition of an iris recognition system was suggested based on two Artificial Neural Network (ANN) models separately: Cascade Forward (CFBPNN) and Linear Vector Quantization (LVQ)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

    Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Investigation of Dual Meander Slot to Microstrip Patch Antenna

    A dual microstrip meander slot antenna is presented for Wireless Local Area Network (WLAN) application. The proposed antenna comprises a rectangular microstrip patch element embedded with two meander slots. The parametric study is performed to investigate the characteristic of microstrip patch antenna with double meandered slots compared to the same...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of ALU Using Asynchronous Design

    Power consumption has become one of the biggest challenges in design of high performance microprocessors. In this paper, the authors present a design technique using GALs (Globally-Asynchronous Locally-Synchronous) for implementing asynchronous ALUs, which aims to eliminate the global clock. Here ALUs are designed with delay insensitive dual rail four phase...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Multiple Symbol Differential Detection of MPSK Which Is Invariant to Frequency Offset Using Maximum-Likelihood Detection

    It is well-known that classical differential detection of MPSK signals, wherein the information is encoded as the first order phase difference, is a simple and robust form of communication in environments not subject to frequency variation. For channels that introduce into the carrier a random frequency shift, e.g., those associated...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering