IOSR Journal of Engineering

Displaying 201-240 of 485 results

  • White Papers // Dec 2012

    Optimization of Emergency Response System Using Cellular Network

    VANET is a specific class of Ad-hoc network. Applications of VANET vary from safety applications like warning signals, keeping safe distance among vehicles to non-safety applications like traffic congestion, route information, Internet access. Timely help in emergencies like fire, medical etc. is of utmost importance. Response time can be reduced...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Cloud Computing Framework for Ethiopian Higher Education Institutions

    Educational institutions throughout the World have become highly dependent on information technology for their teaching-learning, service delivery and business requirements. Procuring and maintaining a wide range of hardware and software require substantial, ongoing investment and the skills to support them. In the current financial crisis and being challenged by growing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    DTADA: Distributed Trusted Agent Based Detection Approach for Doline and Sensor Cloning Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and do-line attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, irregular...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Control of Binary Input Systems

    Now-a-days many systems are controlled by items of commutation, mainly in powers electronics and hydraulic. This Boolean input system has increased in the electric industry. Power supply includes such system and there is represented by power converter. The goal of this paper is to propose a methodology to design a...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Factors affect on Requirement Prioritization

    Software engineering research is yet in its early stages hence it needs evaluation. So, software engineers think about experimental research and try to adopt analytical approaches to validate results like in other sciences. It should be asserting that requirement engineering process is to use requirements prioritization. The use of requirements...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Tree-Based Parity Check for an Optimal Data Hiding Scheme

    Reducing distortion between the cover object and the stego object is an important issue for steganography. The tree-based parity check method is very efficient for hiding a message on image data due to its simplicity. Based on this approach, the authors propose a majority vote strategy that results in least...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of Embedded Web Server with Light weight TCP/IP on Mini 2440

    In this paper, the authors analyses the Light-weight TCP/IP stack and gives the detailed processing of every layer first, then selecting the hardware platform as Samsung Mini2440 and the software platform as RT-Thread, porting of LwIP is done based on them. Then a thin web server is designed and stored...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Abstract Syntax Tree Based Clone Detection for Java Projects

    A large amount of unavoidable money is spent on the maintenance of any existing software systems. Software maintenance cost is generally higher than the development cost therefore reducing maintenance cost is a necessary task of today's software industries. Software system includes similar bugs at different places which makes system inefficient...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Novel Technique in stegnanalysis using S-DES and Back propagation Algorithm

    In this paper, the authors propose a new algorithm by improving and combining S-DES and back propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Study of Webcrawler: Implementation of Efficient and Fast Crawler

    A focused crawler is a web crawler that attempts to download only web pages that are relevant to a pre-defined topic or set of topics. Focused crawling also assumes that some labeled examples of relevant and not relevant pages are available. The topic can be represent by a set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Capital Market and the Development of the Small and Medium - Scale Enterprises in Nigeria

    This paper looked at the need to incorporate the Small and Medium Scale Enterprises (SMEs) into the capital market in Nigeria as a means of raising capital for their operations. The findings of the paper found that the growth in the transactions of the quoted companies has been fluctuating over...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Secure Outsourcing of Linear Optimization in Cloud Computing

    Cloud computing has become a reality which is capable of enabling general public and organizations to make use of huge computational resources without capital investment in pay per use fashion. This new paradigm allows customers who have no much computational resources to outsource their expensive computational workloads to cloud and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Cloud Computing and ACPI: An Approach to Implement Better Energy Management Towards Green IT

    Cloud computing has proved to be a major breakthrough in terms of green computing. Cloud computing is one of the few technologies which offers the possibility of reducing energy consumption and carbon releases with almost negligible disturbance to business activities. The positives of this technology in terms of servicing and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    A Study of Diverse Wireless Network

    Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Design and Implementation of Mobile Learning using 3G Technology

    Mobile learning is new. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes another very important complement to the traditional ways of learning after digital learning. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    MMSE-V-BLAST Optimal-Ordering In Different Channels

    The Bell Labs lAyered Space-Time (BLAST) algorithm is simple, and hence, a popular choice for a Multiple-Input-Multiple-Output (MIMO) receiver. Because of the difficulties that arise due to the optimal ordering in terms of BER, while considering real analytical evaluations, the one and only solution is by introducing OSIC schemes to...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Data Clustering with Leaders and Subleaders Algorithm

    In this paper, an efficient hierarchical clustering algorithm, suitable for large data sets is proposed for effective clustering and prototype selection for pattern classification. It is another simple and efficient technique which uses incremental clustering principles to generate a hierarchical structure for finding the subgroups/subclusters within each cluster. As an...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Survey of Related Technologies for Improved Spectrum Efficiency

    The most noted effect of rapid growth in wireless networks in recent years has been the issues of spectrum usage and management because of its importance in wireless communication as the medium of data transmission. Efficient utilization of spectrum has been the major concerns in spectrum management over recent years...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Service-Oriented Architecture based Global Positioning System

    The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information, anywhere on or near the Earth. The GPS provides critical capabilities to military, civil and commercial users around the world. This paper present a Service Oriented Architecture (SOA) based Global Positioning System (GPS)....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hardware/Software Co-Simulation of BPSK Modulator Using Xilinx System Generator

    In this paper, the authors present a theoretical background overview of the digital communication systems and the BPSK modulation. The BPSK modulation represents an important modulation technique in terms of signal power. The BPSK system is simulated using Mat lab/ Simulink environment and system generator, a tool from Xilinx used...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Vehicle Obstacles Avoidance Using Vehicle-To Infrastructure Communication

    VANET is a technology where vehicles are considered as mobile nodes to create a mobile network. In the existing model, vehicle obstructs the communication between other vehicles will not be considered as an obstacle. Due to existing model the impact on the LOS (Line Of Sight) obstruction, received signal power,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Application of VLSI in Artificial Intelligence

    This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By combining VLSI technology, a very powerful...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones

    The mobile applications are one of the most important utilities of modern communication world. Currently this technology is getting compact to provide compatibility and accessibility to the users with a better option of handling. This research is based on the mobile and m-commerce technology, a fastest growing technology of today....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of VoIP by Communicating Two Systems

    VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. In this paper, the authors introduce and explore the problems that occur in the people day to day life in sending voice and data with different windows. The paper evolves in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Computing Platform for Virtual University Providing E-Learning

    According to the present scenario, cost of the electronics is decreasing day-by-day and the cost of services provided by it is also decreasing. So, no one wants to pay a high cost for any service. For that purpose, the authors tried to corporate their educational services of any e-learning website...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cryptography on Android Message Application Using Look Up Table and Dynamic Key (cama)

    Most popular shortest and cheapest textual form of communication is Short Message Service (SMS).To ensure the security of the texts which is sent, many algorithm are available. In this paper, the authors propose an efficient algorithm for cryptography which is based on static Look Up table and Dynamic Key. Symmetric...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Approach of Automatic Data Mining Algorithm for Intrusion Detection and Prevention System

    The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Artificial Intelligence Algorithms

    Artificial Intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus, strong AI claims that in near future the authors will be surrounded by such kinds of machine which can completely works like human being and machine could have human...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Micro-Sensor Network Models

    Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Networking and Ad Hoc Routing Protocols Validation

    In this paper, the authors describe mobile network and efficient routing protocol for wireless ad hoc networks. They report on its implementation, on performance comparisons and on a formal validation result. Moreover, they discuss cellular system design, global system for mobile communication, formal protocol verification and operating over infrared or...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Heuristic Route Discovery for Shared Firewall Network

    In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This paper lists the constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Design Methodology for Time Domain Dead Beat Algorithm

    In this paper, the authors propose a way of implementing a deadbeat controller in FPGA. The focus is on the FPGA implementation of the digital controller. The emphasis is on the software tools for design and simulation of FPGA based hardware for control applications. The FPGA is interfaced to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multiband Microstrip Patch Antenna for Microwave Applications

    In this paper, the authors present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Investigation of Dual Meander Slot to Microstrip Patch Antenna

    A dual microstrip meander slot antenna is presented for Wireless Local Area Network (WLAN) application. The proposed antenna comprises a rectangular microstrip patch element embedded with two meander slots. The parametric study is performed to investigate the characteristic of microstrip patch antenna with double meandered slots compared to the same...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of ALU Using Asynchronous Design

    Power consumption has become one of the biggest challenges in design of high performance microprocessors. In this paper, the authors present a design technique using GALs (Globally-Asynchronous Locally-Synchronous) for implementing asynchronous ALUs, which aims to eliminate the global clock. Here ALUs are designed with delay insensitive dual rail four phase...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Multiple Symbol Differential Detection of MPSK Which Is Invariant to Frequency Offset Using Maximum-Likelihood Detection

    It is well-known that classical differential detection of MPSK signals, wherein the information is encoded as the first order phase difference, is a simple and robust form of communication in environments not subject to frequency variation. For channels that introduce into the carrier a random frequency shift, e.g., those associated...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Digital Pheromone Scheme in Wireless Sensor and Robot Networks

    In this paper, the authors design a bio-inspired patrolling algorithm based on digital pheromone. As events have different importance, they refer to them as having different priorities. In their patrolling schemes, robots efficiently handle as many high priority events as possible. Inspired by the pheromone-based communication among ants, they introduce...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    CEMR: Congestion Evasion Multicast Routing to Maximize Throughput for Mobile Ad Hoc Networks

    This paper is focused on a new solution for congestion evasion in ad hoc multicast routing that referred as Congestion Evasion Multicast Routing short CEMR. CEMR is aimed at Congestion Evasion in Multicast Mobile Ad hoc routing protocol. The current MAC level routing strategy is independent which can work with...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Computing: Overview & Current Research Challenges

    Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually Cloud Computing services are delivered by a third party provider who owns the infrastructure. Cloud Computing...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

    In this paper, the authors propose an optimized version of the FCFS scheduling algorithm to address the major challenges of task scheduling in cloud. The incoming tasks are grouped on the basis of task requirement like minimum execution time or minimum cost and prioritized (FCFS manner). Resource selection is done...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones

    Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Service Based Content Sharing in the Environment of Mobile Ad-Hoc Networks

    The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. The authors holds the short range...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey on Identification of Closed Frequent Item Sets Using Intersecting Algorithm for Transaction in Data Mining

    Most known frequent item set mining approaches enumerate candidate item sets, determine their support, and prune candidates that fail to reach the user-specified minimum support. Apart from this scheme, the authors can use intersection approach for identifying frequent item set. But the intersection approach of transaction is the less researched...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Power Optimization in MIMO-CN with MANET

    Cooperative communication has derived an interest for wireless network. Most existing papers on cooperative communications are focused on link-level physical layer issues such as topology control, routing and network capacity are largely ignored Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

    In this paper, adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long distances. The aim of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Fabrication of 456 MHz Bandpass Filter

    Bandpass filter is a passive component which is able to select signals inside a specific bandwidth at a certain center frequency and reject signals in another frequency region, especially in frequency regions, which have the potential to interfere the information signals. A bandpass filter must be used in transmitter and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    The Performance of Saturated Packet Queue System on Broadband PLC Network

    The latest development of Broadband Power Line Communication Network may offer a platform for synchrophasor-sensor network in power distribution networks to establish a smart grid. Random data traffic passing through the slave-station of synchrophasor-sensor network can be viewed as packet entering of a queue. Since the length of queue is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Design of RF - Based Programmable Frequency Divider for IEEE 802.11a Wireless Access

    Frequency being a parameter of the electronic signal give the researchers, a wide scope to improve & standardize the electronics & telecommunication system in the most productive & efficient way. As the telecommunication system is flourishing, it uses frequency as one of the most important parameter for its development. In...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation of FPGA Based Low Power Digital FIR Filter

    Finite Impulse Response (FIR) filters are widely used in various DSP applications. The low-power or low-area techniques developed specifically for digital filters can be found in. Many applications in digital communication (channel equalization and frequency channelization), speech processing (adaptive noise cancelation), seismic signal processing (noise elimination), and several other areas...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Virtual Wi-Fi for Single Hopping

    Single hopping is implemented by using software approach over IEEE802.11WLAN card using orthogonality concept and protocol. Most feature of single hopping is to achieve virtual Wi-Fi network. Design parameters of this approach are time delay and energy consumption .There are many scenarios where a wireless device connect to virtual Wi-Fi...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Performance Analysis of Different M-ARY Modulation Techniques Over Wireless Fading Channel

    Cellular communication systems are the most widely used wireless communication systems. It is the people primary need today to achieve the higher data rates in limited spectrum bandwidth to improve the performance of signals. The authors know digital communication system outperforms analog ones in terms of noise performance and flexibility....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Data Link Control in Data Communication

    DLC is the service provided by the Data Link layer of function defined in the Open Systems Interconnection OSI model for network communication. The Data Link layer is responsible for providing reliable data transfer across one physical link (or telecommunications path) within the network. Technical communication systems are developed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    A Review on Designing of the Dual Reflector Axially Symmetric Cassegrain Antenna

    Dual reflector antennas are considered as pencil beam antennas that can produce radiation identical to searchlight. Cassegrain Reflector Antenna Design consists of various effects caused by blockage by primary feed or by the sub-reflector and its effect on overall performance. The objective of the paper is to provide the overview...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Secure Surveillance Using Virtual Intelligent Agent With Dominating Influence

    As it is known embedded system is a special-purpose computer system designed to perform a dedicated function. As a spice the authors also included robotics domain and achieved this project successfully. In this project, an automation surveillance system is achieved using PIR sensor which detects the human. Also the robot...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    RR-MAC: Receiver Reservation MAC Protocol With Time-Division for Wireless Sensor Networks

    Wireless sensors networks are potentially employed in various fields such as defense system, target tracking, target monitoring, wildlife monitoring and disaster management. The node's of a wireless sensor network consists of three main parts-processor, transmitter/receiver and memory unit. For these parts to be operational in an efficient way, the battery...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Evolution for Frequency Invariance for Double Differential Detection System

    The Evolution of Multiple Symbol Differential Detection (MSDD) of double differential QAM signal is studied in the presence of frequency offset, phase offset and additive white Gaussian noise. It is shown that in the case of nonzero frequency offset distorts the transmitted signal through attenuating its amplitude and MSDD receiver...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Optimization of ECAT Through DA-DCT

    Discrete Cosine Transform (DCT) is a widely used tool in image and video compression applications. Recently, the high-throughput DCT designs have been adopted to fit the requirements of real-time application. Operating the shifting and addition in parallel, an Error-Compensated Adder-Tree (ECAT) is proposed to deal with the truncation errors and...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Patch Antenna Array Fault Modeling and Its Monitoring

    The On/Off faults are among the most prominent hazards observed in antenna arrays. They behave like a catalyst towards steady degradation of the circuit's performance. This paper is regarding fault monitoring in the microstrip patch antenna array. The fault modeling, included here is single and double fault models of the...

    Provided By IOSR Journal of Engineering