IOSR Journal of Engineering

Displaying 201-240 of 481 results

  • White Papers // Dec 2012

    Review of Various Aspects of Radio Frequency IDentification (RFID) Technology

    Radio Frequency IDentification (RFID) is essentially a wireless method of identification of physically placed objects in a certain state space. It is the most emerging technology these days which is becoming the alternate for barcode. Hence this technology is receiving lot of attention comparatively over past few years. RFID technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Survey of Routing Protocols for Mobile Ad Hoc Networks

    In this paper, the authors represent a survey of various existing secure routing protocols for MANET's. A mobile ad hoc network is a self configuring mobile nodes network. Significant progress has been made for making mobile ad hoc network secure and dynamic. Its infrastructure less and absence of any centralized...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Investigation of Dual Meander Slot to Microstrip Patch Antenna

    A dual microstrip meander slot antenna is presented for Wireless Local Area Network (WLAN) application. The proposed antenna comprises a rectangular microstrip patch element embedded with two meander slots. The parametric study is performed to investigate the characteristic of microstrip patch antenna with double meandered slots compared to the same...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of ALU Using Asynchronous Design

    Power consumption has become one of the biggest challenges in design of high performance microprocessors. In this paper, the authors present a design technique using GALs (Globally-Asynchronous Locally-Synchronous) for implementing asynchronous ALUs, which aims to eliminate the global clock. Here ALUs are designed with delay insensitive dual rail four phase...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Mobile Robot Navigation System Using RFID Technology

    Skilled navigation in mobile robotics usually requires solving two problems pertaining to the knowledge of the position of the robot, and to a motion control strategy. When no prior knowledge of the environment is available, the problem becomes even more challenging, since the robot has to build a map of...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Cloud Deployment Model and Cost Analysis in Multicloud

    Cloud computing is a revolution in the way it offers computational capability. The information technology organizations do not need to oversize the infrastructure anymore, potentially reducing the cost of deploying a service. The two main objective of this paper is to study a cloud deployment model which involves user, broker,...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Gain Enhancement of Circular Microstrip Patch Antenna Using Dual-FSS Superstrate Layer for ISM Band

    In this paper, an effort is made to optimize the gain to show better performance analysis on the basis of design and simulation results by implementing FSS structured superstrate layer with circular microstrip patch antenna at operating frequency of 5.8 GHz for ISM Band applications. In this proposed antenna, co-axial...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Performance Improvement of OFDM Using Subcarrier Frequency Diversity

    Orthogonal Frequency-Division Multiplexing (OFDM) uses a large number of closely spaced orthogonal sub-carrier signals to carry data. The orthogonality allows for efficient modulator and demodulator implementation using the Fast Fourier Transforms (FFT) algorithm on the receiver side, and inverse FFT on the sender side. The primary advantage of OFDM over...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation Based on Amba4.0 of Apb Bridge

    ARM introduced the Advanced Microcontroller Bus Architecture (AMBA) 4.0 specifications which includes Advanced eXtensiable Interface (AXI) 4.0. AMBA bus protocol has become the de facto standard SoC bus. That means more and more existing IPs must be able to communicate with AMBA4.0 bus. Based on AMBA 4.0 bus, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Design and Implementation of Mobile Learning using 3G Technology

    Mobile learning is new. It is currently difficult to define, conceptualize and discuss. It could perhaps be a wholly new and distinct educational format, needing to set its own standards and expectations. Mobile learning has becomes another very important complement to the traditional ways of learning after digital learning. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Secure Outsourcing of Linear Optimization in Cloud Computing

    Cloud computing has become a reality which is capable of enabling general public and organizations to make use of huge computational resources without capital investment in pay per use fashion. This new paradigm allows customers who have no much computational resources to outsource their expensive computational workloads to cloud and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    MMSE-V-BLAST Optimal-Ordering In Different Channels

    The Bell Labs lAyered Space-Time (BLAST) algorithm is simple, and hence, a popular choice for a Multiple-Input-Multiple-Output (MIMO) receiver. Because of the difficulties that arise due to the optimal ordering in terms of BER, while considering real analytical evaluations, the one and only solution is by introducing OSIC schemes to...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Data Clustering with Leaders and Subleaders Algorithm

    In this paper, an efficient hierarchical clustering algorithm, suitable for large data sets is proposed for effective clustering and prototype selection for pattern classification. It is another simple and efficient technique which uses incremental clustering principles to generate a hierarchical structure for finding the subgroups/subclusters within each cluster. As an...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Survey of Related Technologies for Improved Spectrum Efficiency

    The most noted effect of rapid growth in wireless networks in recent years has been the issues of spectrum usage and management because of its importance in wireless communication as the medium of data transmission. Efficient utilization of spectrum has been the major concerns in spectrum management over recent years...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    Cloud Computing and ACPI: An Approach to Implement Better Energy Management Towards Green IT

    Cloud computing has proved to be a major breakthrough in terms of green computing. Cloud computing is one of the few technologies which offers the possibility of reducing energy consumption and carbon releases with almost negligible disturbance to business activities. The positives of this technology in terms of servicing and...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2012

    A Study of Diverse Wireless Network

    Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Service-Oriented Architecture based Global Positioning System

    The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information, anywhere on or near the Earth. The GPS provides critical capabilities to military, civil and commercial users around the world. This paper present a Service Oriented Architecture (SOA) based Global Positioning System (GPS)....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hardware/Software Co-Simulation of BPSK Modulator Using Xilinx System Generator

    In this paper, the authors present a theoretical background overview of the digital communication systems and the BPSK modulation. The BPSK modulation represents an important modulation technique in terms of signal power. The BPSK system is simulated using Mat lab/ Simulink environment and system generator, a tool from Xilinx used...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Vehicle Obstacles Avoidance Using Vehicle-To Infrastructure Communication

    VANET is a technology where vehicles are considered as mobile nodes to create a mobile network. In the existing model, vehicle obstructs the communication between other vehicles will not be considered as an obstacle. Due to existing model the impact on the LOS (Line Of Sight) obstruction, received signal power,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Prevention of Attacks in Internet Controlled Embedded Applications

    Embedded systems are becoming a main solution to many specific tasks because of this high stability, minimal power consumption, portability and numerous useful. Now-a-days, many new applications are developed using embedded system. This paper deals with the issues related to embedded applications when they are implemented in Internet. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Implementation of Systolic Array Architecture for 3D-DWT Optimizing Speed and Power

    Demand for high speed and low power architectures for image/video compression algorithms are increasing with scaling in VLSI technology. Video sequences are considered as 3D sequences and are compressed using 3D DWT architectures. In this paper, systolic array architectures for 2D DWT have been modified and have been used in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Hybrid Model On Data Clustering and Computational Intelligence for Bank Crisis Classification and Prediction

    The prediction of bank failures is an important academic topic of which many have used artificial intelligence methods to build an early warning system for this purpose. The objective of this paper is to enhance the accuracy in predicting bank failures by proposing two hybrid models. In this paper, two...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Implementing of Serial Ports to Ethernet Gateway on Embedded System

    The use of the multi-serial/Ethernet conversion gateway simplifies the networked control and distributed management of information for serial devices. So the design of a new type of gateway for data converting from serial ports to Ethernet based on embedded system is highlighted in this paper. The design is based on...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Harms Associated with Cellular Towers (CDMA vs GSM)

    The use of mobile phone is increasing enormously, and hence has become a subject of recent interest and study, due to use of ElectroMagnetic (EM) wave in the microwave range and produces radiation. Various physiological studies have found that the excessive Radio Frequency (RF) wave exposure affects the biological systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Memorized Window Consolidation (MWC) Based TCP Recovery for Vegas and B/w Based Congestion Control

    In this paper, the authors present a framework for unanimous TCP flow window size recovery, "Memorized flow recovery", which differs from most TCP algorithms by memorized window size consolidation as measure to control the window size increment post link recovery from disconnection. It identifies the window size in use during...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study and Performance Evaluation of Xilinx HDLC Controller and FCS Calculator

    In this paper, design, simulation and implementation design of HDLC Controller provides a high performance. This design is then coded in a Hardware Description Language (VHDL). The functioning of the coded design is to simulate on simulation software (e.g. ModelSim). After proper simulation, the design is synthesized and then translated...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Management of Future Internet with Autonomic Network Architecture and Model

    Research efforts a strong foundation towards standardization of architectural principals of the managing future Internet. Autonomic network engineering for managing Future Internet (AFI) has been established under the European Telecommunications Standards Institute (ETSI). AFI has been focusing on scenarios, use cases, and requirements for autonomic self managing future Internet, as...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Survey on Object Detect, Track and Identify Using Video Surveillance

    Network video surveillance has been a popular security application for many years. Target tracking in a cluttered environment remains one of the challenging problems of video surveillance. The task of target tracking is a key component of video surveillance and monitoring systems. It provides input to high-level processing such as...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Design Methodology for Time Domain Dead Beat Algorithm

    In this paper, the authors propose a way of implementing a deadbeat controller in FPGA. The focus is on the FPGA implementation of the digital controller. The emphasis is on the software tools for design and simulation of FPGA based hardware for control applications. The FPGA is interfaced to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    P2P Reputation Management Scheme Using a Cryptographic Protocol

    Reputation management in a Peer-To-Peer network is difficult as challenges are posed by lack of centralized authority. For this reason P2P (Peer-To-Peer) network is vulnerable which can facilitate non-cooperation, cheating, leaching on the network and propagation of malicious code. The security model used for centralized C/S systems is not suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

    A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. At the same time routers in the Internet do not perform any security verification of the source IP address contained in the packets. The lack of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Aviris Hyperspectral Images Compression Using 3D Spiht Algorithm

    Hyperspectral sequence image is compressed using 3D Discrete Wavelet Transform (3D DWT) to decorrelate the three dimensions of hyperspectral image. Than the sequence is encoded efficiently by the 3D SPIHT algorithm, which operates on the pyramid structure of wavelet coefficients obtained. After decompression, the image evaluated by the PSNR, are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Secure Model for Cloud Computing Based Storage and Retrieval

    Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hybrid Algorithm for Clustering Mixed Data Sets

    Clustering is one of the data mining techniques used to group similar objects into different meaningful classes known as clusters. Objects in each cluster have maximum similarity while the objects across the clusters have minimum or no similarity. This kind of partitioning of objects into various groups has many real...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Application of VLSI in Artificial Intelligence

    This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By combining VLSI technology, a very powerful...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of limited capability (power and processing) Micro Electro Mechanical Systems (MEMS) capable of measuring and reporting physical variables related to their environment. In surveillance applications, sensors are deployed in a certain field to detect and report events like presence, movement, or...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Web Personalization Using Ontology: A Survey

    This paper contains concept of ontologies on the basis of user behaviour being analyzed. Ontologies are the structural frameworks for organizing information and are used in artificial intelligence, the Semantic Web, systems engineering, software engineering, biomedical informatics, library science, enterprise bookmarking, and information architecture as a form of knowledge representation...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) comprises set of mobile nodes which forms different networking infrastructure in ad hoc manner. Multicasting a group oriented communication approach plays a vital role in this mobile infrastructure less networks as it finds applications in major fields such as military warfare, emergency situations, Conventions etc....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Comparative Analysis on Mobility Aware and Stateless Multicast Routing Protocols in Mobile Ad-Hoc Networks

    In this paper, the author has studied the performance of multicast routing protocols in wireless mobile ad-hoc networks. In MANET, for a protocol to be more efficient and high robust is a difficult task, due to the mobility of nodes and dynamic topology. It discovers the routing path by broadcasting...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A New Approach to Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. As volunteer clouds are allowed to communicate with each other and with other commercial clouds also, it's necessary to implement an enhanced interoperable environment. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Requirements and Challenges for Securing Cloud Applications and Services

    Adopting cloud computing is a complex decision involving many factors. This paper focuses on the central issues of cloud computing security. The cloud computing architectural framework provides a conceptual framework to help evaluate initial cloud risks and inform security decisions. It's a quick method for evaluating the tolerance for moving...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Improving Security for Data Migration in Cloud Computing Using Randomized Encryption Technique

    With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Green Cloud Computing: A Constructive Advent to Curtail the Carbon Emission Radiation Due to Servers

    This paper analytically scrutinizes the energy dissipation based on services and invades the conditions to promote green cloud computing to save energy crisis. In conventional, cloud computing emphasis on the data computing efficiency whereas green cloud computing accredit to the research and practice of applying computing resources in virtuous, adequate...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Comprehensive Parametric Analysis of Vertical Handoff in Next Generation Wireless Networks

    The science and technology is developing day by day leading to expand and forcing to reshape user's living standards. The main aspects leading to deployment of a wide array of wireless and mobile networks are advances in miniaturization, low power circuit design and development in radio access technologies and increase...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, and time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks. Large-scale networks mean that wireless network at the dynamic time. Propel...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since the highly dynamic nature of MANET coupled with limited bandwidth...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Research Paper on Comparison Between Energy Efficient Routing Protocol with Energy and Location in MANET

    Energy is an important issue in MANET (Mobile Ad-hoc NETwork). Nodes in network are working in presence of limited energy. So, energy efficient routing is needed for reducing energy consumption. Energy efficient routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Multipath routing protocol (AOMDV)...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Virtual Energy Based Encryption & Keying on Wireless Sensor Network

    Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this the authors introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that reduces the number of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols With Varying Number of Nodes and Traffic Applications Over MANETs

    Wireless Technology is at its peak when they talk about research and innovation. This field has become a hub of invention of new theories and structures. Mobile Ad-hoc Network is a special point of focus for the researchers. MANET is a collection of wireless mobile nodes which forms a dynamic...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Enhancement in Elimination of Security Threads using Trusted Proactive Routing

    Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Entrepreneurial Characteristics and Competency as Determinants of Business Performance in SMEs

    This paper is to empirically test the influence of entrepreneurial characteristics and competencies on business performance in Small and Medium Enterprises (SMEs). This study was conducted with 147 SMEs owner in Malang regency East Java Indonesia using survey instrument. Data analysis using the structural equation modelling. The results of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Capital Market and the Development of the Small and Medium - Scale Enterprises in Nigeria

    This paper looked at the need to incorporate the Small and Medium Scale Enterprises (SMEs) into the capital market in Nigeria as a means of raising capital for their operations. The findings of the paper found that the growth in the transactions of the quoted companies has been fluctuating over...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud

    Cloud computing, the next generation architecture of IT enterprises, offers the users with a flexible computing environment. In cloud, the virtualized resources are provided as a service over the internet. Typical applications that have already been thought of are SaaS (Software as a Service), PaaS (Platform as a Service), IaaS...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Forensics-An IS Approach

    The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level Agreement (SLA) bounded only by the capacity of the data center. Hence,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Entrepreneurial Idea Development to Business Start-Up: Teaching Methodological Approach

    The crucial issue on entrepreneurship training in the tertiary institutions of learning is teaching students how to develop innovative business idea to the business venture start-up stage. This is the ability of the students to develop ideas that are out of the theoretical teaching of the academic environment. Several scholars...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementing SAAS: Cloud Computing and Android Based Application Framework for C Programming

    Under The National Mission on Education through Information and Communication Technology (NMEICT) a lot of e-learning material, applications and other useful information have been made available on its web portal. MHRD has also taken initiatives for the dissemination of this knowledge by distributing Aakash Tablets to the students at free...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering