IOSR Journal of Engineering

Displaying 161-200 of 498 results

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Cloud-Assisted Video Streaming Over QoS-Enabled Wireless Networks

    With the proliferation of inexpensive broadband connections, video streaming services over the Internet are growing rapidly. Delivering video over wireless networks is a challenging task, especially when high definition is required, due to its high bit rate, delay, and loss sensitivity. This paper presents a modified slicing scheme that can...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Neural Networks for Iris Recognition: Comparisons between LVQ and Cascade Forward Back Propagation Neural Network Models, Architectures and Algorithm

    In this paper, Iris recognition is a proven, accurate means to identify people. In this paper, it includes the preprocessing system, segmentation, feature extraction and recognition of an iris recognition system was suggested based on two Artificial Neural Network (ANN) models separately: Cascade Forward (CFBPNN) and Linear Vector Quantization (LVQ)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

    Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cross Layer Protocol for Improving the Performance of Ad Hoc Networks

    To implement the cross layer protocol for improving the performance of multi-hop wireless network by routing, scheduling the transmission and traffic management. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Investigation of Dual Meander Slot to Microstrip Patch Antenna

    A dual microstrip meander slot antenna is presented for Wireless Local Area Network (WLAN) application. The proposed antenna comprises a rectangular microstrip patch element embedded with two meander slots. The parametric study is performed to investigate the characteristic of microstrip patch antenna with double meandered slots compared to the same...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of ALU Using Asynchronous Design

    Power consumption has become one of the biggest challenges in design of high performance microprocessors. In this paper, the authors present a design technique using GALs (Globally-Asynchronous Locally-Synchronous) for implementing asynchronous ALUs, which aims to eliminate the global clock. Here ALUs are designed with delay insensitive dual rail four phase...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Multiple Symbol Differential Detection of MPSK Which Is Invariant to Frequency Offset Using Maximum-Likelihood Detection

    It is well-known that classical differential detection of MPSK signals, wherein the information is encoded as the first order phase difference, is a simple and robust form of communication in environments not subject to frequency variation. For channels that introduce into the carrier a random frequency shift, e.g., those associated...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Data Link Control in Data Communication

    DLC is the service provided by the Data Link layer of function defined in the Open Systems Interconnection OSI model for network communication. The Data Link layer is responsible for providing reliable data transfer across one physical link (or telecommunications path) within the network. Technical communication systems are developed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    A Review on Designing of the Dual Reflector Axially Symmetric Cassegrain Antenna

    Dual reflector antennas are considered as pencil beam antennas that can produce radiation identical to searchlight. Cassegrain Reflector Antenna Design consists of various effects caused by blockage by primary feed or by the sub-reflector and its effect on overall performance. The objective of the paper is to provide the overview...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Secure Surveillance Using Virtual Intelligent Agent With Dominating Influence

    As it is known embedded system is a special-purpose computer system designed to perform a dedicated function. As a spice the authors also included robotics domain and achieved this project successfully. In this project, an automation surveillance system is achieved using PIR sensor which detects the human. Also the robot...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    RR-MAC: Receiver Reservation MAC Protocol With Time-Division for Wireless Sensor Networks

    Wireless sensors networks are potentially employed in various fields such as defense system, target tracking, target monitoring, wildlife monitoring and disaster management. The node's of a wireless sensor network consists of three main parts-processor, transmitter/receiver and memory unit. For these parts to be operational in an efficient way, the battery...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Evolution for Frequency Invariance for Double Differential Detection System

    The Evolution of Multiple Symbol Differential Detection (MSDD) of double differential QAM signal is studied in the presence of frequency offset, phase offset and additive white Gaussian noise. It is shown that in the case of nonzero frequency offset distorts the transmitted signal through attenuating its amplitude and MSDD receiver...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Optimization of ECAT Through DA-DCT

    Discrete Cosine Transform (DCT) is a widely used tool in image and video compression applications. Recently, the high-throughput DCT designs have been adopted to fit the requirements of real-time application. Operating the shifting and addition in parallel, an Error-Compensated Adder-Tree (ECAT) is proposed to deal with the truncation errors and...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Patch Antenna Array Fault Modeling and Its Monitoring

    The On/Off faults are among the most prominent hazards observed in antenna arrays. They behave like a catalyst towards steady degradation of the circuit's performance. This paper is regarding fault monitoring in the microstrip patch antenna array. The fault modeling, included here is single and double fault models of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Broadband Rectangular Ring Slot Microstrip Antenna With High Return Loss and Also Compare With Rectangular MSA

    Antennas are a very important component of communication systems. By definition, an antenna is a device used to transform an RF signal, traveling on a conductor, in to an electromagnetic wave in free space the broadband circularly polarized MSA, play a vital role in wireless communication due to its low-profile,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Comparative Analysis of Bandwidth Enhancement of Microstrip Patch Antennas Using Various Geometries

    This paper discusses the comparative study of BandWidth (BW) enhancement technique of Microstrip Patch Antenna (MSA) using various geometries. A simple Rectangular Microstrip Patch Antenna (RMSA) was designed and simulated using Zeland's Method of Moment (MoM) based EM simulation package IE3D and its various parameters such as return loss, VSWR...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of BER and Q-Factor in Intersatellite Optical Wireless Communication System

    The system performance plays a great role in analyzing the characteristics of optical wireless communication link. This paper describes the effect of bit error ratio and quality factor in communication system. The effect of diameter antennae with received power and distance is also analyzed in this paper. The value of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Three Dimensional-Chips

    This paper illustrates the performance advantages of 3D integrated circuits with two specific examples, namely 3D-FPGA and 3D-SRAM. Three-dimensional Chip (3D IC, 3D-IC, or 3-D IC) is a chip in which two or more layers of active electronic components are integrated both vertically and horizontally into a single circuit. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Traffic Modelling for Capacity Analysis of CDMA Networks Using Lognormal Approximation Method

    This paper presents teletraffic modelling in cellular networks operating with Code Division Multiple Access (CDMA) to assist in capacity analysis of such systems using statistical means. Since the introduction of CDMA, owing to capacity edge over other multiple access techniques, there is the need for tools that will assist in...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Public Transportation Management Services by Integrating GSM-GPS

    This paper proposes and implements a solution for enhancing public transportation management services based on GPS and GSM in Andhra Pradesh. The system consists of four modules: BUS Station Module, In-BUS Module, BASE Station Module and BUS Stop Module. Equipped with PC and GSM modem, BUS Station Module sends the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design Analysis of a Security Lock System Using Pass-Code and Smart-Card

    In this paper, security lock system using Pass code and smart card has been achieved. It is a micro controller based system which aims at interfacing selected hardware components with software to obtain a higher degree of security. In achieving this work, seven major stages were considered in the design...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Modified ABC Algorithm & Its Application to Wireless Sensor Network Dynamic Deployment

    Wireless Sensor Networks plays a gargantuan role in instrumenting the modern day world; hence it is crucial to develop an optimal design flow. Out of the various Swarm intelligent algorithms developed so far, Artificial Bee Colony (ABC) algorithm offers a vivid scope for this objective. First introduced for solving numerical...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis of Wimax Under Jamming Effect for Various Antennas

    Use of Internet is increasing day by day. Wi-Fi provides wireless access to the internet but range is limited to certain meters only. So concept of WiMAX is introduced to increase the range. WiMAX means worldwide interoperability for microwave access. WiMAX is also known as wireless broadband. The WiMAX based...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Unearthing the Compromised Nodes and Restoring Them in Wireless Sensor Network

    Sensor nodes are usually deployed in an open environment therefore they are subjected to various kinds of attacks like Worm Hole attack, Black Hole attack, False Data Injection attacks. Since the attackers can cause disruption and failure to the network, it's very important to detect these compromised nodes and revoke...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Local Oscillators Phase Noise Cancellation Methods

    Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation scheme that employs a large number of orthogonal Closely-spaced sub-carriers. Each sub-carrier is modulated with a modulation scheme (QPSK or QAM generally) at a low symbol rate. Each of the sub-carrier is then multiplexed together and this forms the OFDM...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Wireless Physiological Parameter Monitoring and Recording System

    The design and development of a Zigbee smart non-invasive wearable physiological parameters monitoring device has been developed and reported in this paper. The system can be used to monitor physiological parameters, such as temperature and heart rate, of a human subject. The system consists of an electronic device which is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Saving in Wireless Sensor Network Using Burst Algorithm

    A wireless sensor network is composed of a large number of low-cost devices distributed over a geographic area. Sensor nodes have limited processing capabilities therefore simplified protocol architecture should be designed so as to make communications simple and efficient. Moreover, the power supply unit is based on an energy-limited battery...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Using Mono-Alphabetic Substitution to Secure Against Threats and Risk in Information Technology

    The awareness the world over on Information Technology (IT) is a welcome development but calls for great care and concern. This is so as there are out there, many people with evil minds who see nothing good that they would not capitalize on. There are persons who would want to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Real Time Implementation of Nodes Self Scheduling Approach for Maximizing Wireless Sensor Network Lifetime

    To face the short lifetime of the WSN, the objective is to optimize energy consumption while maintaining the full sensing coverage. A major technique to save the energy is to use a wake-up scheduling protocol through which some nodes stay active whereas the others enter sleep state so as to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of MAC Protocol for Reliable Broadcast in VANETs

    Wireless communications are becoming the dominant form of transferring information, and the most active research field. In this dissertation, the authors will present one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc NETworks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review on Methodologies of Remote Sensing, GPS and GIS

    Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans)...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Advance Scheme for Localization Using Curvilinear Component Analysis

    The performance of applications of wireless sensor network depend upon the precise location of the nodes. The localization protocol patches together the relative coordinate, local maps into a global coordinate map. These protocols require some nodes that know their absolute coordinates, called anchor nodes. While many factors influence the node...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Automatic Restaurant Order System Using Zigbee

    Automation is the Technology Concerned with Application of Mechanical, electronics & computer based systems to operate & control production. Due to advancement in technology the people have seen atomization of many things. They have seen an atomized vending machine which will serve a hot or soft drinks, Chocolates &many things....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Blind Channel Estimation Using Maximum Likelihood in OFDM Systems

    new blind channel estimation scheme for OFDM systems is based on the Maximum Likelihood (ML) principle. The approach combines different modulation schemes on adjacent subcarriers, such as BPSK and QPSK, to resolve phase ambiguity. By avoiding the use of second- and higher-order statistics, a very fast convergence rate is achieved....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    BPSK Transmitter Design Using FPGA With DAC and Pulse Shaping Filter to Minimize Inter-Symbol Interference(ISI)

    In contrast to the sophisticated implementation of Binary Phase Shift Keying (BPSK) transmitter using Application Specific Integrated Circuit (ASIC), mixer, and Local Oscillator(LO) for carrier signal; Software Defined Radio (SDR) provides a high performance, efficient and re-configurable platform to integrate all these individual functions of BPSK transmitter. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed Localization in Wireless Ad-Hoc Networks

    Localization has newly received research interest due to the success of the emerging Wireless Sensor Network (WSN) technology. This interest is expected to grow further with the proliferation of wireless sensor network applications such as medicine, military, transport. In this context routing, protocols and technologies of communication on those wireless...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Efficient Routing Protocols for Mobile Ad HocNetworks

    Ad hoc on demand distance vector routing protocol is specially designed for mobile ad hoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, the authors propose an energy efficient route...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Liveness Detection Using Wavelet

    Fingerprint verification is one of the most reliable personal identification methods. It plays a very important role in forensic and civilian applications. In this paper, the authors propose a simple and effective approach for fingerprint liveness detection based on the wavelet analysis of the finger tip surface texture. In present...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Nonlinear Companding Transform Algorithm for Peak -to-Average Power Ratio Reduction of OFDM Signal

    Orthogonal Frequency Division Multiplexing (OFDM) is digital multicarrier Modulation access system for high data rate transfer .But it has high PEAK To Average Power Ratio which increases complexity of A/D Converter and D/A Converters and lowers the efficiency of power amplifiers. In this paper Repeated Clipping and Filtering (RCF) distortion...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    FPGA Implementation of MB-OFDM Using Biorthogonal Encoder

    UWB is a high data rate, short range technology .It transmits the information over a minimum bandwidth of 500 MHZ. Modern UWB systems use Modulation techniques such as OFDM (Orthogonal Frequency Division Multiplexing). The MB-OFDM proposal is selected for UWB system model. MultiBand OFDM (MB-OFDM) is a short-range wireless technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    New Fault Injection Approach for Network on Chip

    Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Study and Analysis of Fractal Linear Antenna Arrays

    A fractal is a recursively generated object having a fractional dimension. They have no characteristic size, and are constructed of many copies of themselves at different scales. In this paper, the authors primarily focus on design of fractal linear array antenna for even number of elements and comparison of fractal...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Mobile Robot Navigation System Using RFID Technology

    Skilled navigation in mobile robotics usually requires solving two problems pertaining to the knowledge of the position of the robot, and to a motion control strategy. When no prior knowledge of the environment is available, the problem becomes even more challenging, since the robot has to build a map of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Deployment Model and Cost Analysis in Multicloud

    Cloud computing is a revolution in the way it offers computational capability. The information technology organizations do not need to oversize the infrastructure anymore, potentially reducing the cost of deploying a service. The two main objective of this paper is to study a cloud deployment model which involves user, broker,...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Gain Enhancement of Circular Microstrip Patch Antenna Using Dual-FSS Superstrate Layer for ISM Band

    In this paper, an effort is made to optimize the gain to show better performance analysis on the basis of design and simulation results by implementing FSS structured superstrate layer with circular microstrip patch antenna at operating frequency of 5.8 GHz for ISM Band applications. In this proposed antenna, co-axial...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Performance Improvement of OFDM Using Subcarrier Frequency Diversity

    Orthogonal Frequency-Division Multiplexing (OFDM) uses a large number of closely spaced orthogonal sub-carrier signals to carry data. The orthogonality allows for efficient modulator and demodulator implementation using the Fast Fourier Transforms (FFT) algorithm on the receiver side, and inverse FFT on the sender side. The primary advantage of OFDM over...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation Based on Amba4.0 of Apb Bridge

    ARM introduced the Advanced Microcontroller Bus Architecture (AMBA) 4.0 specifications which includes Advanced eXtensiable Interface (AXI) 4.0. AMBA bus protocol has become the de facto standard SoC bus. That means more and more existing IPs must be able to communicate with AMBA4.0 bus. Based on AMBA 4.0 bus, the authors...

    Provided By IOSR Journal of Engineering