IOSR Journal of Engineering

Displaying 201-240 of 498 results

  • White Papers // Dec 2012

    A Design of RF - Based Programmable Frequency Divider for IEEE 802.11a Wireless Access

    Frequency being a parameter of the electronic signal give the researchers, a wide scope to improve & standardize the electronics & telecommunication system in the most productive & efficient way. As the telecommunication system is flourishing, it uses frequency as one of the most important parameter for its development. In...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation of FPGA Based Low Power Digital FIR Filter

    Finite Impulse Response (FIR) filters are widely used in various DSP applications. The low-power or low-area techniques developed specifically for digital filters can be found in. Many applications in digital communication (channel equalization and frequency channelization), speech processing (adaptive noise cancelation), seismic signal processing (noise elimination), and several other areas...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Maximizing the Lifetime of Query Based Wireless Sensor Networks Using Ftqc Algorithm

    Data sense and recovery in wireless sensor systems have a general request in areas such as defense and inspection monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would subject a question and expect a answer to be returned within the limit. While the use...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey over VANET Routing Protocols for Vehicle to Vehicle Communication

    VANET (Vehicular Ad-hoc NETwork) is an emerging new technology with some unique characteristics that makes it different from other ad hoc network. Due to rapid topology changing and frequent disconnection it is also difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Transaction Security Using Input Based Shared Key Cryptography

    Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Civilizing Energy Efficiency in Wireless Sensor Network Using Bacteria Foraging Algorithm

    WSN has the potentiality to join the physical world with the virtual world by creating a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy reduction of sensor nodes is a major design issue. To extend the network's lifetime, minimization of energy consumption should be...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementing Security on a Voice over Internet Protocol (VoIP) Network: A Practical Approach

    The internet has been undergoing rapid and continuous growth over the past few years. The most significant development the telecommunication industry has witnessed is the evolution of Voice over IP technology. This technology uses the internet as a medium for transmitting voice during a telephone conversation between two or more...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Study on Various Protocols Developed Under Intrusion Detection System in Adhoc Networks

    In Computer Networks a number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activities and previous known attacks...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Active Source Routing Protocol in Mobile Network

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad-hoc NETworking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. The authors address the problem of secure and fault-tolerant communication in the presence of adversaries across...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Preventing Spoofing Attacks in Mobile Banking Based on User Input Pattern - Based Authentication

    Mobile banking has become very attractive and useful facility from customers and services provider point of view. However, this domain has evidenced many security threats. Attackers target this domain for financial or other benefits. In spite of many security measures being taken by mobile service providers and application providers, still...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparison LEACH and HEED Cluster Based Protocol for Wireless Senser Network

    In the present paper wireless sensor network for hierarchical network protocol of LEACH and HEED this is theory concept that how to data gathering. The authors' protocol aims to dynamically change the data Gathering period according to the Gathering quality. The timing scheme will find the minimum Gathering period that...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Securing Data Using Pre-Filtering and Traceback Method

    In this paper, the authors propose RegEx-Filter (pre-filtering approach) and IP traceback method to trace unauthorized access incidents in the Internet; the current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Privacy Protection in Cloud Computing by Using Cryptographic Technique.

    Cloud computing technology is very useful in present day to day life, this cloud computing techniques uses the internet and central remote servers to the maintain data as well as applications. Cloud computing permits consumers and businesses to use such applications without getting any installation and can access their data...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    An Adaptive Secure Fuzzy Multicast Communication in Large Scale Mobile Ad Hoc Networks

    Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. Now-a-days Multicast protocols extended with Cluster based approach. Cluster based multicast tree formation is still research issues. The tree reconstruction of cluster-based multicast routing protocol will...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Secure Outsourcing of Linear Optimization in Cloud Computing

    Cloud computing has become a reality which is capable of enabling general public and organizations to make use of huge computational resources without capital investment in pay per use fashion. This new paradigm allows customers who have no much computational resources to outsource their expensive computational workloads to cloud and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Design and Implementation of Mobile Learning using 3G Technology

    Mobile learning is new. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes another very important complement to the traditional ways of learning after digital learning. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    MMSE-V-BLAST Optimal-Ordering In Different Channels

    The Bell Labs lAyered Space-Time (BLAST) algorithm is simple, and hence, a popular choice for a Multiple-Input-Multiple-Output (MIMO) receiver. Because of the difficulties that arise due to the optimal ordering in terms of BER, while considering real analytical evaluations, the one and only solution is by introducing OSIC schemes to...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Data Clustering with Leaders and Subleaders Algorithm

    In this paper, an efficient hierarchical clustering algorithm, suitable for large data sets is proposed for effective clustering and prototype selection for pattern classification. It is another simple and efficient technique which uses incremental clustering principles to generate a hierarchical structure for finding the subgroups/subclusters within each cluster. As an...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Survey of Related Technologies for Improved Spectrum Efficiency

    The most noted effect of rapid growth in wireless networks in recent years has been the issues of spectrum usage and management because of its importance in wireless communication as the medium of data transmission. Efficient utilization of spectrum has been the major concerns in spectrum management over recent years...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Cloud Computing and ACPI: An Approach to Implement Better Energy Management Towards Green IT

    Cloud computing has proved to be a major breakthrough in terms of green computing. Cloud computing is one of the few technologies which offers the possibility of reducing energy consumption and carbon releases with almost negligible disturbance to business activities. The positives of this technology in terms of servicing and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    A Study of Diverse Wireless Network

    Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Service-Oriented Architecture based Global Positioning System

    The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information, anywhere on or near the Earth. The GPS provides critical capabilities to military, civil and commercial users around the world. This paper present a Service Oriented Architecture (SOA) based Global Positioning System (GPS)....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hardware/Software Co-Simulation of BPSK Modulator Using Xilinx System Generator

    In this paper, the authors present a theoretical background overview of the digital communication systems and the BPSK modulation. The BPSK modulation represents an important modulation technique in terms of signal power. The BPSK system is simulated using Mat lab/ Simulink environment and system generator, a tool from Xilinx used...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Vehicle Obstacles Avoidance Using Vehicle-To Infrastructure Communication

    VANET is a technology where vehicles are considered as mobile nodes to create a mobile network. In the existing model, vehicle obstructs the communication between other vehicles will not be considered as an obstacle. Due to existing model the impact on the LOS (Line Of Sight) obstruction, received signal power,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Electromagnetic Band Gap Coupled Microstrip Antenna for UWB Applications

    In this paper Electromagnetic Band Gap structure with microstrip antenna has been proposed. Many small and compact periodic EBGs have been investigated to design the antenna. Simulation is done on the HFSS software tool. The antenna is designed on the 21x31mm FR4 substrate with the dielectric constant of 4.4. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    High Speed Data Acquisition System With Ethernet Interface

    This paper introduces a high speed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind this effort. Using standard...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Dash7: Performance

    A new wireless sensor networking technology, DASH7 uses the ISO/IEC 18000-7 standard for active RFID. It operates in the 433 MHz unlicensed spectrum. DASH7 provides many advantages over other wireless technologies such as multi-year battery life, dynamic range of up to 2 Km (potentially farther) etc.DASH7 is the name of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Complementary Cumulative Distribution Function for Performance Analysis of OFDM Signals

    Peak-to-Average Power Ratio (PAPR) is an important parameter for the analysis of Orthogonal Frequency Division Multiplexing (OFDM) signals. CCDF curves are known to have great importance in the study of signal performance on the basis of power level. This paper presents the CCDF performance of the OFDM signal with different...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

    A Mobile Ad hoc NETwork (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Concerted Routing Metrics Evaluating and Distributed Rate Adaptation in Wireless Mesh Networks

    This paper proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multibiometric Identification System Based on Score Level Fusion

    Biometric identification systems, which use physical features to check a person's identity, ensures much greater security than password and number systems. Multi-biometric system is being increasingly deployed in much large scale application because they provide lower error rate, large population coverage compared to uni-biometric. In this paper, multi-biometric identification system...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Survey on Object Detect, Track and Identify Using Video Surveillance

    Network video surveillance has been a popular security application for many years. Target tracking in a cluttered environment remains one of the challenging problems of video surveillance. The task of target tracking is a key component of video surveillance and monitoring systems. It provides input to high-level processing such as...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Design and Implementation of Mobile Learning using 3G Technology

    Mobile learning is new. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes another very important complement to the traditional ways of learning after digital learning. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    MMSE-V-BLAST Optimal-Ordering In Different Channels

    The Bell Labs lAyered Space-Time (BLAST) algorithm is simple, and hence, a popular choice for a Multiple-Input-Multiple-Output (MIMO) receiver. Because of the difficulties that arise due to the optimal ordering in terms of BER, while considering real analytical evaluations, the one and only solution is by introducing OSIC schemes to...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Data Clustering with Leaders and Subleaders Algorithm

    In this paper, an efficient hierarchical clustering algorithm, suitable for large data sets is proposed for effective clustering and prototype selection for pattern classification. It is another simple and efficient technique which uses incremental clustering principles to generate a hierarchical structure for finding the subgroups/subclusters within each cluster. As an...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Survey of Related Technologies for Improved Spectrum Efficiency

    The most noted effect of rapid growth in wireless networks in recent years has been the issues of spectrum usage and management because of its importance in wireless communication as the medium of data transmission. Efficient utilization of spectrum has been the major concerns in spectrum management over recent years...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Cloud Computing and ACPI: An Approach to Implement Better Energy Management Towards Green IT

    Cloud computing has proved to be a major breakthrough in terms of green computing. Cloud computing is one of the few technologies which offers the possibility of reducing energy consumption and carbon releases with almost negligible disturbance to business activities. The positives of this technology in terms of servicing and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Comparative Study of Prototype Model for Software Engineering with System Development Life Cycle

    The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. Many models were suggested like waterfall, prototype, rapid application development, V-shaped etc. In this paper, the authors focus on the comparative analysis of these software...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Knowledge Based Analysis of Statistical Tools in Attack Detection

    With the network playing more and more important effect in the modern society, crimes using computer network are presenting the obvious trend of escalation. In order to ensure network security, one technique adopted for detecting abnormal or unauthorized behavior is the Intrusion Detection System (IDS). Various data mining techniques are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Managing Child-to-Parent (Reverse) Relationship Instead of Parent-to-Child During Execution of a Transaction in Oracle

    Most of the computer professionals, academicians and students know the traditional way of handling one too many relationship using parent and child table. Whenever, there is a one-to-many relationship in a database, the authors used to define a primary or composite key in the parent table and it is referred...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme

    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. This scheme provides the ability to hide the data into a host image and then recover the host image without losing any information when the secret data is extracted. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Symmetric Key Based Steganography Algorithm for Secured Data Transfer

    Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Assuage Bandwidth Utilization DDoS Attacks by Using Prototype Analyzer and Transfer Scheduling Scheme

    Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Risk Chain Prediction Metrics for Predicting Fault Proneness in Software Systems

    The paper presents two atypical risk chain prediction metrics for barometer coupling and accord in software systems. The authors' aboriginal metric, Ideal Coupling Between Object classes (ICBO), is based on the acclaimed CBO coupling metric, while the added metric, Ideal Lack of Cohesion On Methods (ILCOM5), is based on the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation for V-Blast MIMO Systems Under Various Modulation Schemes Using Ricean Channel

    Wireless communication system with multi-antenna arrays has been a field of intensive research on the last years. The use of multiple antennas at both the transmitter and the receiver sides can drastically improve the channel capacity and data rate. The paper of the performance limits of MIMO system becomes very...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Embedded System Design for a Multi Variable Input Operations

    There are several multivariable input systems with one or more outputs exist in nature or designed and implemented successfully artificially. The input parameters of the system may or may not bear any relationship with each other however, output or outputs of the system definitely possess fixed relationship with input parameters....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

    Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. In CD-MAC every terminal is aggressively selects a relay for partnership and lets it transmit at the same time so that this mitigates intrusion from near terminals and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    A Study of Diverse Wireless Network

    Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Control of Binary Input Systems

    Now-a-days many systems are controlled by items of commutation, mainly in powers electronics and hydraulic. This Boolean input system has increased in the electric industry. Power supply includes such system and there is represented by power converter. The goal of this paper is to propose a methodology to design a...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Factors affect on Requirement Prioritization

    Software engineering research is yet in its early stages hence it needs evaluation. So, software engineers think about experimental research and try to adopt analytical approaches to validate results like in other sciences. It should be asserting that requirement engineering process is to use requirements prioritization. The use of requirements...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Tree-Based Parity Check for an Optimal Data Hiding Scheme

    Reducing distortion between the cover object and the stego object is an important issue for steganography. The tree-based parity check method is very efficient for hiding a message on image data due to its simplicity. Based on this approach, the authors propose a majority vote strategy that results in least...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of Embedded Web Server with Light weight TCP/IP on Mini 2440

    In this paper, the authors analyses the Light-weight TCP/IP stack and gives the detailed processing of every layer first, then selecting the hardware platform as Samsung Mini2440 and the software platform as RT-Thread, porting of LwIP is done based on them. Then a thin web server is designed and stored...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Abstract Syntax Tree Based Clone Detection for Java Projects

    A large amount of unavoidable money is spent on the maintenance of any existing software systems. Software maintenance cost is generally higher than the development cost therefore reducing maintenance cost is a necessary task of today's software industries. Software system includes similar bugs at different places which makes system inefficient...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Novel Technique in stegnanalysis using S-DES and Back propagation Algorithm

    In this paper, the authors propose a new algorithm by improving and combining S-DES and back propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Study of Webcrawler: Implementation of Efficient and Fast Crawler

    A focused crawler is a web crawler that attempts to download only web pages that are relevant to a pre-defined topic or set of topics. Focused crawling also assumes that some labeled examples of relevant and not relevant pages are available. The topic can be represent by a set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Enhance Accuracy in Software Development's Planning & Estimation Process by Adopt Uncertainty Analysis and Assessment" in the System Modeling Process" - A Review

    In the process of software project development prediction of effort and estimate it is very challenging task. So it is referred as intricate "Brain tester". Though the authors have several cost and effort estimating method. They are not got success to find a method which will give accurately estimation of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Android Speech to Text Converter for SMS Application

    The mobile phone users are increase day by day and everyone wants to develop new things which are improved version of existing one. The SMS user might want the faster SMS technology which can convert their voice into text and SMS will be transferred. This paper is based on evaluating...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform

    While many solutions for making backup and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the differentiating in devices, vendors, operating system and version available in mobile market. The authors introduce a new backup and restore approach for mobile devices, which helps...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Indexing of Query on Spatial Data in P2P Systems

    Peer-To-Peer technology plays an important role in spatial data sharing .In spatial P2P each peer stores part of the available spatial information and runs software with equivalent functionality rather than through a central server. Spatial P2P is dynamic in nature. Spatial objects are having distinct properties like identity location and...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Preserving Privacy in Horizontally Partitioned Databases Using Hierarchical Model

    Now-a-days, business organizations and government sectors need to maintain large amounts of data to be integrated in distributed databases for storing from scientific experiments, daily transactions in businesses etc. The data may contain personal information as well. It is necessary to preserve information about the individuals in many organizations. So...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study on Performance Evaluation of Peer-to-Peer Distributed Databases

    The design phase of the distributed database environment holds a vital part in affecting the performance. The Peer-to-Peer architecture gives a great degree of hope to handle the data in an efficient manner. This paper analyses a cluster based Peer-to-Peer architecture named FlexiPeer for the distributed databases to address the...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Security Against Selective Forward Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are being increasingly deployed for various applications such as object tracking and monitoring, precision agriculture, controlling nuclear reactors, detecting seismic activities, security and surveillance, navigational activities, industrial automation, and so on. In selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Transmission of MIMO - OFDM Signal Using Optical Link

    Wireless networks have quickly become part of everyday life. Wireless LANs, cell phone networks, and personal area networks are just a few examples of widely used wireless networks. However, wireless devices are range and data rate limited. The research community has spent a great deal of effort on finding ways...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cryptography Playfair Cipher Using Linear Feedback Shift Register

    In this paper, the authors present a new approach for secure transmission of message by modified version of Play fair cipher combining with random number generator methods. To develop this method of encryption technique, one of the simplest methods of random number generator methods called Linear Feedback Shift Register (LFSR)...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Designing a Secure Protocol for Mobile Voting Through SMS

    In this paper, the authors cover a novel scheme to solve the issue of holding fair electoral verdict indications of people in a country or in an organization through proposing the design and development of mobile voting protocol which is not only very easy to use but is also robust,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study of the Modified KDD 99 Dataset by Using Classifier Ensembles

    Network security has been an important research area. KDD 99 dataset has been used to analyze various network security methods. However, it has been shown that this dataset has redundant data points that make the analysis bias for these data points. New modified data sets are proposed that overcome these...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Adaptive Coding and Energy Efficient Packet Rate Transmission Over Wireless LAN Friendly VOIP

    Energy efficiency takes important in wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. Current wireless network power management often substantially degrades performance and may increase overall energy usage when used with latency-sensitive applications. The authors propose power management that adapts its behavior...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Concealing Encrypted Iris Templates in Images Using Quantized DCT Coefficients

    In this paper, the authors introduce a novel steganography-based approach to protect the iris data by hiding it into a digital image for personal identification purpose. Transformations are done to encrypt the biometric data before hiding. JPEG quantization blocks in diagonal sequence are investigated for exploring an efficient hiding algorithm...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cloud Agile Manufacturing

    In this paper, the authors propose a new manufacturing paradigm called Cloud Agile Manufacturing, and its principal objective is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Component Identification From Existing Object Oriented System Using Hierarchical Clustering

    One of the important tasks in software engineering is software architecture modeling. High level software architecture is useful in all phases of software life cycle. Component based software architecture is beneficial as it is useful for reusing system parts represented as components. Most of the existing object-oriented systems do not...

    Provided By IOSR Journal of Engineering