IOSR Journal of Engineering

Displaying 161-200 of 498 results

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Cloud-Assisted Video Streaming Over QoS-Enabled Wireless Networks

    With the proliferation of inexpensive broadband connections, video streaming services over the Internet are growing rapidly. Delivering video over wireless networks is a challenging task, especially when high definition is required, due to its high bit rate, delay, and loss sensitivity. This paper presents a modified slicing scheme that can...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Neural Networks for Iris Recognition: Comparisons between LVQ and Cascade Forward Back Propagation Neural Network Models, Architectures and Algorithm

    In this paper, Iris recognition is a proven, accurate means to identify people. In this paper, it includes the preprocessing system, segmentation, feature extraction and recognition of an iris recognition system was suggested based on two Artificial Neural Network (ANN) models separately: Cascade Forward (CFBPNN) and Linear Vector Quantization (LVQ)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

    Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Investigation of Dual Meander Slot to Microstrip Patch Antenna

    A dual microstrip meander slot antenna is presented for Wireless Local Area Network (WLAN) application. The proposed antenna comprises a rectangular microstrip patch element embedded with two meander slots. The parametric study is performed to investigate the characteristic of microstrip patch antenna with double meandered slots compared to the same...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of ALU Using Asynchronous Design

    Power consumption has become one of the biggest challenges in design of high performance microprocessors. In this paper, the authors present a design technique using GALs (Globally-Asynchronous Locally-Synchronous) for implementing asynchronous ALUs, which aims to eliminate the global clock. Here ALUs are designed with delay insensitive dual rail four phase...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Multiple Symbol Differential Detection of MPSK Which Is Invariant to Frequency Offset Using Maximum-Likelihood Detection

    It is well-known that classical differential detection of MPSK signals, wherein the information is encoded as the first order phase difference, is a simple and robust form of communication in environments not subject to frequency variation. For channels that introduce into the carrier a random frequency shift, e.g., those associated...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Digital Pheromone Scheme in Wireless Sensor and Robot Networks

    In this paper, the authors design a bio-inspired patrolling algorithm based on digital pheromone. As events have different importance, they refer to them as having different priorities. In their patrolling schemes, robots efficiently handle as many high priority events as possible. Inspired by the pheromone-based communication among ants, they introduce...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    CEMR: Congestion Evasion Multicast Routing to Maximize Throughput for Mobile Ad Hoc Networks

    This paper is focused on a new solution for congestion evasion in ad hoc multicast routing that referred as Congestion Evasion Multicast Routing short CEMR. CEMR is aimed at Congestion Evasion in Multicast Mobile Ad hoc routing protocol. The current MAC level routing strategy is independent which can work with...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Virtual Wi-Fi for Single Hopping

    Single hopping is implemented by using software approach over IEEE802.11WLAN card using orthogonality concept and protocol. Most feature of single hopping is to achieve virtual Wi-Fi network. Design parameters of this approach are time delay and energy consumption .There are many scenarios where a wireless device connect to virtual Wi-Fi...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Mobile Robot Navigation System Using RFID Technology

    Skilled navigation in mobile robotics usually requires solving two problems pertaining to the knowledge of the position of the robot, and to a motion control strategy. When no prior knowledge of the environment is available, the problem becomes even more challenging, since the robot has to build a map of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Algorithm for Power Saving and Over Head Reduction in the Wireless Networks

    The majority of the nodes connected and operating as an today are Wireless networks, because of its own advantage. In the Adhoc networks nodes are not connected with any fixed infrastructure and are operated by battery power. Each node consumes a large amount of energy while transmission or reception of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Vlsi Design of Cache Compression in Microprocessor Using Pattern Matching Technique

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multi processors are used in the system design, more processors require more accesses to memory. Thus it raises a 'wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Analysis of Channel Assignment Scheme in Wimax

    Along with information technology of flourishing, the popularization rate of wireless communication equipment is higher. However, WiMAX is the one of new broadband wireless technologies. The performance of mobile WiMAX system is highly dependent on channel assignment scheme because frequency spectrum is finite in wireless communication systems. There are two...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Analysis of Quad-Band Rectangular Microstrip Patch Antenna

    This paper proposes the rectangular microstrip patch antenna suitable to operate in different frequency bands. The rectangular microstrip patch antenna is designed and simulated using IE3D simulation software. The result obtained shows that the designed antenna is suitable for operation in four different frequency bands with bandwidth of 6.90%, 2.33%,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Qos Parameters Comparison for 802.11 B, A&G Standards

    The use of wired local area networks has become ever more common place, even in situations where only a few computers need to be connected together. Advantages like cost reduction, High robustness and easy system configuration making WLAN more popular. Three different PHY layers are available for the IEEE 802.11...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Oversampling Technique for Peak to Average Power Ratio Measurement of Discrete Time OFDM Signal

    When measured, the Peak to Average Power Ratio (PAPR) of the discrete Orthogonal Frequency Division Multiplexing (OFDM) signal comes out to be less as compared to its continuous counterpart. This happens due to non-consideration of some of the peaks while measuring PAPR of the discrete time OFDM signal. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Hardware Implementation of Face Detection Using ADABOOST Algorithm

    One of the main challenges of computer vision is efficiently detecting and classifying objects in an image or video sequence. Several machine learning approaches have been applied to this problem, demonstrating significant improvements in detection accuracy and speed. However, most approaches have limited object detection to a single class of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Low Power CMOS 1-Bit Full Adder Cell Based on Voltage Scaling

    Operating an Integrated circuit at the prescribed Voltage scaling (constant field scaling) is preferable for reliable circuit operation under temperature fluctuations. In this paper, the authors proposed to design 1 - bit full adder by "Changing the threshold voltage and W/L ratio" under temperature variation insensitive conditions. They measured power...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Secure Localization Technique for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consist of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibrations, pressure, motion, pollutants and etc to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional and control the activity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Design and Implementation a System Communication of Optical Fiber by Using Interval Wavelength (532nm-820nm) of Diode Laser

    An optical communication system consists of a transmitter, which encodes a message into an optical signal, a channel, which carries the signal to its destination, and a receiver, which reproduces the message from the received optical signal. One of the most important types of optical communication system is optical Fiber...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance of Free Space Optical Communication System With BPSK and QPSK Modulation

    Free Space Optics is the technology which implies the line-of-sight link for the transfer of data between two distant points. The beam of light is used to provide optical connection that can transmit and receive data. The performance of the modulation techniques-Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Minimization of ICI Using OFDM Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) is an emerging broadband multicarrier modulation technique developed into a popular scheme for wideband digital communication, whether wireless or wired used in applications such as Digital Television, audio broadcasting, wireless networking and broadband internet access. OFDM has a well known limitation that is very sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    MIMO Communication System at a Glance

    The MIMO communication system has multiple antennas at both the transmitting and the receiving ends of the channel. Using multiple antennas introduces additional spatial channels on account of which the capacity of the channel increases hence the authors get increased spectral efficiency without additional bandwidth or transmit power. Because of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Iris Recognition: An Emerging Biometric Technology

    Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks

    Next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. One of the research challenges for next generation all-IP-based wireless systems is the design of intelligent mobility management techniques that take advantage of IP-based technologies to achieve global roaming among various access technologies....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Biometric Speech Watermarking Technique in Images Using Wavelet Transform

    The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cope With Black Hole Attacks in AODV Protocol in Manet by End to End Route Discovery

    Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

    Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sensing Methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    VLSI Based Implementation of Single Round AES Algorithm

    This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design of Enhanced LEACH Routing Protocol for Wireless Sensor Network

    A wireless network consists of a large number of small sensors. The sensor is low-power transceivers & can be an effective tool for gathering data in a variety of environments. The communication between the sensor nodes must be designed to conserve the limited energy resources within the sensor. LEACH clustering...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Finger Print Image Enhancement and Point Pattern Based Verification

    Fingerprints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Dash7: Performance

    A new wireless sensor networking technology, DASH7 uses the ISO/IEC 18000-7 standard for active RFID. It operates in the 433 MHz unlicensed spectrum. DASH7 provides many advantages over other wireless technologies such as multi-year battery life, dynamic range of up to 2 Km (potentially farther) etc.DASH7 is the name of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Complementary Cumulative Distribution Function for Performance Analysis of OFDM Signals

    Peak-to-Average Power Ratio (PAPR) is an important parameter for the analysis of Orthogonal Frequency Division Multiplexing (OFDM) signals. CCDF curves are known to have great importance in the study of signal performance on the basis of power level. This paper presents the CCDF performance of the OFDM signal with different...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

    A Mobile Ad hoc NETwork (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Concerted Routing Metrics Evaluating and Distributed Rate Adaptation in Wireless Mesh Networks

    This paper proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multibiometric Identification System Based on Score Level Fusion

    Biometric identification systems, which use physical features to check a person's identity, ensures much greater security than password and number systems. Multi-biometric system is being increasingly deployed in much large scale application because they provide lower error rate, large population coverage compared to uni-biometric. In this paper, multi-biometric identification system...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Recognition Using Gabor Filter and Frequency Domain Filtering

    Fingerprint recognition is one of the most popular methods used for identification with greater degree of success. The fingerprint has unique characteristics called minutiae, which are points where a curve track finishes, intersect or branches off. In this paper a novel method for Fingerprint recognition is considered using a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Enhancement of Gain of Rectangular Micro Strip Antenna Using Multilayer Multidielectric Structure

    In rapidly developing market in Personal Communication Systems (PCS), mobile satellite communications, Direct Broadband Television (DBS) Wireless Local Area Networks (WLANs) suggest that demand for Microstrip antennas and array will increase even further. In this paper the gain of microstrip patch antenna is enhanced by using covered dielectric layer which...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Speech/Data Discrimination in Communication Systems

    This paper proposes a discrimination algorithm, which discriminates speech and data on a multiplexed input signal. Commercial communication networks may use single voice band channel for transmission of both speech and data. Also, for optimum utilization of channel, the pauses in voice signal are being utilized. At receiver side the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Hardware Implementation and Analysis of BPSK System on Xilinx System Generator

    With the recent advent of hardware description languages (e.g., Verilog or VHDL) and digital implementation for Field-Programmable Gate Arrays (FPGAs), substantial academic digital design projects become practicable. In the present paper, the design of a digital Binary-Phase-Shift-Keying (BPSK) modulator and detector is described. The project details the design of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based Adaptive Traffic Control System

    Through this paper, the authors intend to present an improvement in existing traffic control system at intersection. System is made more efficient with addition of intelligence in term of artificial vision, using image processing techniques to estimate actual road traffic and compute time each time for every road before enabling...

    Provided By IOSR Journal of Engineering