IOSR Journal of Engineering

Displaying 161-200 of 481 results

  • White Papers // Dec 2012

    Real-time Protection Mechanism for Social Networking Sites Using Proxy Server

    In the past few years, Social Networking (SN) websites such as Face book, Orkut, twitter and MySpace become very popular. SN sites are defined as interactive web-based applications that provide users with the ability to join groups, chat, share photos, and organize events and network with others in a similar-to-real-life...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Control of Binary Input Systems

    Now-a-days many systems are controlled by items of commutation, mainly in powers electronics and hydraulic. This Boolean input system has increased in the electric industry. Power supply includes such system and there is represented by power converter. The goal of this paper is to propose a methodology to design a...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Factors affect on Requirement Prioritization

    Software engineering research is yet in its early stages hence it needs evaluation. So, software engineers think about experimental research and try to adopt analytical approaches to validate results like in other sciences. It should be asserting that requirement engineering process is to use requirements prioritization. The use of requirements...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Tree-Based Parity Check for an Optimal Data Hiding Scheme

    Reducing distortion between the cover object and the stego object is an important issue for steganography. The tree-based parity check method is very efficient for hiding a message on image data due to its simplicity. Based on this approach, the authors propose a majority vote strategy that results in least...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of Embedded Web Server with Light weight TCP/IP on Mini 2440

    In this paper, the authors analyses the Light-weight TCP/IP stack and gives the detailed processing of every layer first, then selecting the hardware platform as Samsung Mini2440 and the software platform as RT-Thread, porting of LwIP is done based on them. Then a thin web server is designed and stored...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Abstract Syntax Tree Based Clone Detection for Java Projects

    A large amount of unavoidable money is spent on the maintenance of any existing software systems. Software maintenance cost is generally higher than the development cost therefore reducing maintenance cost is a necessary task of today's software industries. Software system includes similar bugs at different places which makes system inefficient...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Capital Market and the Development of the Small and Medium - Scale Enterprises in Nigeria

    This paper looked at the need to incorporate the Small and Medium Scale Enterprises (SMEs) into the capital market in Nigeria as a means of raising capital for their operations. The findings of the paper found that the growth in the transactions of the quoted companies has been fluctuating over...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Data Mining Approach Using Apriori Algorithm: The Review

    In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions. As is common in association rule mining, given a set of itemsets, the algorithm attempts to find subsets which are common to at least a minimum...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Software Redefined Communication System

    Beginning with practical difficulties in teaching communication systems in class room, this paper describes a set of innovative experimental demonstrations developed using SDR. Communication engineering is one of the interesting, at the same time difficult subject to learn if the concept is not clear or well explained. Normal practice is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Radix4 Configurable Booth Multiplier for Low Power and High Speed Applications

    Portable multimedia and Digital Signal Processing (DSP) systems, which typically require flexible processing ability, low power consumption, and short design cycle, have become increasingly popular over the past few years. Many multimedia and DSP applications are highly multiplication intensive so that the performance and power consumption of these systems are...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Fabrication of 456 MHz Bandpass Filter

    Bandpass filter is a passive component which is able to select signals inside a specific bandwidth at a certain center frequency and reject signals in another frequency region, especially in frequency regions, which have the potential to interfere the information signals. A bandpass filter must be used in transmitter and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    The Performance of Saturated Packet Queue System on Broadband PLC Network

    The latest development of Broadband Power Line Communication Network may offer a platform for synchrophasor-sensor network in power distribution networks to establish a smart grid. Random data traffic passing through the slave-station of synchrophasor-sensor network can be viewed as packet entering of a queue. Since the length of queue is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Design of RF - Based Programmable Frequency Divider for IEEE 802.11a Wireless Access

    Frequency being a parameter of the electronic signal give the researchers, a wide scope to improve & standardize the electronics & telecommunication system in the most productive & efficient way. As the telecommunication system is flourishing, it uses frequency as one of the most important parameter for its development. In...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation of FPGA Based Low Power Digital FIR Filter

    Finite Impulse Response (FIR) filters are widely used in various DSP applications. The low-power or low-area techniques developed specifically for digital filters can be found in. Many applications in digital communication (channel equalization and frequency channelization), speech processing (adaptive noise cancelation), seismic signal processing (noise elimination), and several other areas...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Virtual Wi-Fi for Single Hopping

    Single hopping is implemented by using software approach over IEEE802.11WLAN card using orthogonality concept and protocol. Most feature of single hopping is to achieve virtual Wi-Fi network. Design parameters of this approach are time delay and energy consumption .There are many scenarios where a wireless device connect to virtual Wi-Fi...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Multiple Symbol Differential Detection of MPSK Which Is Invariant to Frequency Offset Using Maximum-Likelihood Detection

    It is well-known that classical differential detection of MPSK signals, wherein the information is encoded as the first order phase difference, is a simple and robust form of communication in environments not subject to frequency variation. For channels that introduce into the carrier a random frequency shift, e.g., those associated...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Digital Pheromone Scheme in Wireless Sensor and Robot Networks

    In this paper, the authors design a bio-inspired patrolling algorithm based on digital pheromone. As events have different importance, they refer to them as having different priorities. In their patrolling schemes, robots efficiently handle as many high priority events as possible. Inspired by the pheromone-based communication among ants, they introduce...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    CEMR: Congestion Evasion Multicast Routing to Maximize Throughput for Mobile Ad Hoc Networks

    This paper is focused on a new solution for congestion evasion in ad hoc multicast routing that referred as Congestion Evasion Multicast Routing short CEMR. CEMR is aimed at Congestion Evasion in Multicast Mobile Ad hoc routing protocol. The current MAC level routing strategy is independent which can work with...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Interference and Noise Detection in a Cognitive Radio Environment

    Now-a-days cellular and handheld devices hold up most of the data exchange services that is one currently and they widely use high speed data links causing increased usage of available spectrum. However these devices are not always in use so the links stays void sometime and using those void links...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design of High Speed Reconfigurable Coprocessor for Multiplier/Adder and Subtractions Operations

    As the quantity of data transmission and reception increases, there is a gradual increase in bandwidth on demand and quality of service. This further increases data traffic which leads to loss of information, reduced accuracy and reliability. To overcome this drawback, the authors proposed coprocessor can be used for communication...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Security Framework for Wireless Sensor Networks: IBE-Trust

    The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Sensor Network: An Emerging Technology

    Wireless sensor network is a special kind of network that differs from the conventional communication networks in terms of architecture and deployment. Dynamic in nature, the wireless sensor networks have added a new dimension not only to the further exploration in a hard-to-reach environment, but also to the complexity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Construct of Broadband Printed Rectangular Monopole Antenna

    In this paper, the authors have investigated an rectangular monopole antenna that was printed on a Printed Circuit Board (PCB). The antenna consists of a rectangular patch and a ground plane so that the antenna acts as a planar monopole antenna which is broadband. Broadband planar monopole antennas have all...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Bandwidth Allocation in Wireless Networks With Multiple Degradable Quality of Service

    In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Handset Antenna Design for Mobile Communication System

    Monopole slot antenna is suitable for handset applications due to its simple planar structure. Besides that, it is compact, low cost, low profile and easy to manufacture. It also has wide bandwidth and omnidirectional charatriesticts. The monopole antenna is obtained by cutting monopole slot at the edge of the ground...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    ATLIST Method: Exploits Vulnerability in SOA

    The numbers of reported day to day increase Vulnerabilities in operating system and web applications. Vulnerability analysis approaches done several manual tasks so it's error prone and costly. Now, ATLIST is a new vulnerability analysis method to detect victims or weakness on client activities in single machine, shared resources and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Architecture to Achieve Anonymity and Traceability

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Monitoring Road Accidents Using Sensors and Providing Medical Facilities

    This paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need to develop such system which should inform automatically to medical rescue team that some...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

    For advanced streaming applications over wired-wireless networks TCP-Friendly Rate Control (TFRC) has been widely adopted nowadays to give smooth sending rate and unceasing quality in streaming applications TFRC applies an equation-based rate control scheme. However, TFRC tends to fail in wireless environment if packet lost event was done by poor...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Mobile Data Availability Similarity Between Cooperative Caching and Replication

    Mobile computing led to gain increased attention to people and to their ability and efficiency of its services at any time and place, example of this query for billing, and weather forecast, as well as retrieval of information through the database of bank accounts is done through different working environment,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Practical and Comparative Study of Call Graph Construction Algorithms

    A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the improvements over previous Call Graphs in terms of precision, cost and accuracy. In object oriented languages the Call...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Review on Diverse Ensemble Methods for Classification

    Ensemble methods for different classifiers like bagging and boosting which combine the decisions of multiple hypotheses are some of the strongest existing machine learning methods. The diversity of the members of an ensemble is known to be an important factor in determining its generalization error. DECORATE (Diverse Ensemble Creation by...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Cost Estimation of Maintenance Phase for Component Based Software

    Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Accurate estimation makes good understanding between the customer and user. Maintenance plays important role in various software developments like Iterative development, Agile development and Component Based Software Development...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Energy Efficient Anchor-Based Localization Algorithm for WSN

    Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. To solve the localization problem for find out the location of sensor nodes in wireless sensor network, a Anchor based...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing

    Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the software. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly...

    Provided By IOSR Journal of Engineering