IOSR Journal of Engineering

Displaying 241-280 of 498 results

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Networking and Ad Hoc Routing Protocols Validation

    In this paper, the authors describe mobile network and efficient routing protocol for wireless ad hoc networks. They report on its implementation, on performance comparisons and on a formal validation result. Moreover, they discuss cellular system design, global system for mobile communication, formal protocol verification and operating over infrared or...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Heuristic Route Discovery for Shared Firewall Network

    In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This paper lists the constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Secure Model for Cloud Computing Based Storage and Retrieval

    Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hybrid Algorithm for Clustering Mixed Data Sets

    Clustering is one of the data mining techniques used to group similar objects into different meaningful classes known as clusters. Objects in each cluster have maximum similarity while the objects across the clusters have minimum or no similarity. This kind of partitioning of objects into various groups has many real...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Application of VLSI in Artificial Intelligence

    This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By combining VLSI technology, a very powerful...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones

    The mobile applications are one of the most important utilities of modern communication world. Currently this technology is getting compact to provide compatibility and accessibility to the users with a better option of handling. This research is based on the mobile and m-commerce technology, a fastest growing technology of today....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of VoIP by Communicating Two Systems

    VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. In this paper, the authors introduce and explore the problems that occur in the people day to day life in sending voice and data with different windows. The paper evolves in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Computing Platform for Virtual University Providing E-Learning

    According to the present scenario, cost of the electronics is decreasing day-by-day and the cost of services provided by it is also decreasing. So, no one wants to pay a high cost for any service. For that purpose, the authors tried to corporate their educational services of any e-learning website...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cryptography on Android Message Application Using Look Up Table and Dynamic Key (cama)

    Most popular shortest and cheapest textual form of communication is Short Message Service (SMS).To ensure the security of the texts which is sent, many algorithm are available. In this paper, the authors propose an efficient algorithm for cryptography which is based on static Look Up table and Dynamic Key. Symmetric...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Approach of Automatic Data Mining Algorithm for Intrusion Detection and Prevention System

    The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Artificial Intelligence Algorithms

    Artificial Intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus, strong AI claims that in near future the authors will be surrounded by such kinds of machine which can completely works like human being and machine could have human...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Micro-Sensor Network Models

    Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Dash7: Performance

    A new wireless sensor networking technology, DASH7 uses the ISO/IEC 18000-7 standard for active RFID. It operates in the 433 MHz unlicensed spectrum. DASH7 provides many advantages over other wireless technologies such as multi-year battery life, dynamic range of up to 2 Km (potentially farther) etc.DASH7 is the name of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Complementary Cumulative Distribution Function for Performance Analysis of OFDM Signals

    Peak-to-Average Power Ratio (PAPR) is an important parameter for the analysis of Orthogonal Frequency Division Multiplexing (OFDM) signals. CCDF curves are known to have great importance in the study of signal performance on the basis of power level. This paper presents the CCDF performance of the OFDM signal with different...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

    A Mobile Ad hoc NETwork (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Concerted Routing Metrics Evaluating and Distributed Rate Adaptation in Wireless Mesh Networks

    This paper proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multibiometric Identification System Based on Score Level Fusion

    Biometric identification systems, which use physical features to check a person's identity, ensures much greater security than password and number systems. Multi-biometric system is being increasingly deployed in much large scale application because they provide lower error rate, large population coverage compared to uni-biometric. In this paper, multi-biometric identification system...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Recognition Using Gabor Filter and Frequency Domain Filtering

    Fingerprint recognition is one of the most popular methods used for identification with greater degree of success. The fingerprint has unique characteristics called minutiae, which are points where a curve track finishes, intersect or branches off. In this paper a novel method for Fingerprint recognition is considered using a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Enhancement of Gain of Rectangular Micro Strip Antenna Using Multilayer Multidielectric Structure

    In rapidly developing market in Personal Communication Systems (PCS), mobile satellite communications, Direct Broadband Television (DBS) Wireless Local Area Networks (WLANs) suggest that demand for Microstrip antennas and array will increase even further. In this paper the gain of microstrip patch antenna is enhanced by using covered dielectric layer which...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Speech/Data Discrimination in Communication Systems

    This paper proposes a discrimination algorithm, which discriminates speech and data on a multiplexed input signal. Commercial communication networks may use single voice band channel for transmission of both speech and data. Also, for optimum utilization of channel, the pauses in voice signal are being utilized. At receiver side the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study of ICI Cancellation Techniques in OFDM

    OFDM (Orthogonal Frequency Division Multiplexing) is a well known technique in 4G Broadband wireless communication systems. OFDM has high spectral efficiency but it suffers from frequency offset problem due to the difference between transmitter and receiver local oscillator frequencies which causes loss of orthogonality between subcarriers leading to ICI. This...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Based ATM Security by Using ARM7

    The purpose of this paper is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    High Speed Data Acquisition System With Ethernet Interface

    This paper introduces a high speed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind this effort. Using standard...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multiband Microstrip Patch Antenna for Microwave Applications

    In this paper, the authors present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Secure Surveillance Using Virtual Intelligent Agent With Dominating Influence

    As it is known embedded system is a special-purpose computer system designed to perform a dedicated function. As a spice the authors also included robotics domain and achieved this project successfully. In this project, an automation surveillance system is achieved using PIR sensor which detects the human. Also the robot...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    RR-MAC: Receiver Reservation MAC Protocol With Time-Division for Wireless Sensor Networks

    Wireless sensors networks are potentially employed in various fields such as defense system, target tracking, target monitoring, wildlife monitoring and disaster management. The node's of a wireless sensor network consists of three main parts-processor, transmitter/receiver and memory unit. For these parts to be operational in an efficient way, the battery...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Evolution for Frequency Invariance for Double Differential Detection System

    The Evolution of Multiple Symbol Differential Detection (MSDD) of double differential QAM signal is studied in the presence of frequency offset, phase offset and additive white Gaussian noise. It is shown that in the case of nonzero frequency offset distorts the transmitted signal through attenuating its amplitude and MSDD receiver...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Data Mining Approach Using Apriori Algorithm: The Review

    In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions. As is common in association rule mining, given a set of itemsets, the algorithm attempts to find subsets which are common to at least a minimum...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Software Redefined Communication System

    Beginning with practical difficulties in teaching communication systems in class room, this paper describes a set of innovative experimental demonstrations developed using SDR. Communication engineering is one of the interesting, at the same time difficult subject to learn if the concept is not clear or well explained. Normal practice is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Radix4 Configurable Booth Multiplier for Low Power and High Speed Applications

    Portable multimedia and Digital Signal Processing (DSP) systems, which typically require flexible processing ability, low power consumption, and short design cycle, have become increasingly popular over the past few years. Many multimedia and DSP applications are highly multiplication intensive so that the performance and power consumption of these systems are...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Fabrication of 456 MHz Bandpass Filter

    Bandpass filter is a passive component which is able to select signals inside a specific bandwidth at a certain center frequency and reject signals in another frequency region, especially in frequency regions, which have the potential to interfere the information signals. A bandpass filter must be used in transmitter and...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    The Performance of Saturated Packet Queue System on Broadband PLC Network

    The latest development of Broadband Power Line Communication Network may offer a platform for synchrophasor-sensor network in power distribution networks to establish a smart grid. Random data traffic passing through the slave-station of synchrophasor-sensor network can be viewed as packet entering of a queue. Since the length of queue is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Design of RF - Based Programmable Frequency Divider for IEEE 802.11a Wireless Access

    Frequency being a parameter of the electronic signal give the researchers, a wide scope to improve & standardize the electronics & telecommunication system in the most productive & efficient way. As the telecommunication system is flourishing, it uses frequency as one of the most important parameter for its development. In...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Implementation of FPGA Based Low Power Digital FIR Filter

    Finite Impulse Response (FIR) filters are widely used in various DSP applications. The low-power or low-area techniques developed specifically for digital filters can be found in. Many applications in digital communication (channel equalization and frequency channelization), speech processing (adaptive noise cancelation), seismic signal processing (noise elimination), and several other areas...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Synthesis of Linear and Circular Array Antennas Using Gatool

    The main aim of this paper is to reduce the first four Side Lobe Levels (SLLs) of the linear and circular array antennas using gatool, which is the one of the simplest and efficient tool in MATLAB. This is employed in Radars and communications in order to reduce jamming effects,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Performance Analysis of Log Periodic Dipole Antenna at Uhf Band

    The paper described the design and performance analysis of log periodic dipole antenna at frequency 1800MHz -2500MHz (Ultra High Frequency Band), the antenna has been modeled using ADS layout and the S parameter was presented. A good impedance match in a wide frequency range has been achieved by a suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Investigation Into the Performance Enhancement and Salient Features of AMR-WB Speech Codec Used in GSM Communication

    The 3rd Generation Partnership Project (3GPP) along with European Telecommunication Standard Institute (ETSI) recommended new speech coding scheme, called Adaptive Multi Rate (AMR) in 2000 and 2001. The proposed scheme has two variants: AMR-Narrowband (AMR-NB) and AMR-WB (AMR-WideBand). The speech quality of AMR-WB in GSM systems is remarkably high compared...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Beam Forming Using KLMS, KRLS and CGM Algorithms

    In this paper adaptive beam forming using KLMS, CGM and KRLS algorithm has been proposed. In CGM algorithms has reduced the interference and convergence is better when number of antennas increased. In CGM algorithm the weight of antenna arrays can be adjusted to form certain amount of adaptive beam to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Peak-To - Average Power Ratio Reduction of Ofdm Siganls

    Orthogonal Frequency Division Multiplexing (OFDM) is a form of multicarrier modulation technique with high spectral efficiency and immunity to interference. Despite of many advantages the main disadvantage of OFDM is that the time domain of OFDM signal which is a sum of subcarrier sinusoids leads to high Peak-to-Average Power Ratio...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Identification and Modeling of Dominant Causes of Congestion in a Cellular Network

    In telecommunications networks, congestion is the condition that arises when a system or a network experiences a level of offered calling activity or message traffic that exceed its capacity. In data networks, congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Efficient Implementation of Fast Fourier Transform Using NOC

    In this paper, improved algorithms for radix-8 FFT are presented. Various schemes have been proposed for computing FFT. It has Different target domains of applications and different tradeoffs between flexibility and performance. Typically, they need reconfigurable array of processing elements .The applications have been restricted to domains based on floating...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Efficient Security for Mobile Ad-Hoc Network

    An ad-hoc network is a dynamically changing network of mobile nodes that communicate without the support of a fixed network. Due to lack of centralized control, secured communication in mobile Ad-hoc network is important matter due to dynamic nature of the network topology. MANETs is affected by new security problems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Ftp Implementation With Arm Processor and Gprs for Real Time Applications

    In this paper, the authors present the principles of a low-cost Internet-based data processing system. The main h e a r t of the system is an embedded hardware (ARM 9) running with a Linux OS. The embedded device communicates through General Packet Radio Service (GPRS) module, which makes it...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Selective State-Transition Decoding: A Combined Approach for Trellis Coded Modulation Scheme

    The authors are presenting a new suboptimum decoding strategy, namely, Adaptive Selective State-Transition Decoding (ASSTD) for Trellis Coded Modulation schemes transmission over band-limited ISI channels. The ASSTD is a combined approach provides an improved error performance over Reduced State Sequence Estimation (RSSE) techniques which are in practical use. The ASSTD...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Printed Microstrip Antenna for RADAR Communication

    A single layer, single feed compact slotted patch antenna is thoroughly simulated in this paper. Resonant frequency has been reduced drastically by cutting two different slots. The first one is the combinations of two triangular and another rectangular slot at the upper right corner and rest is bilateral triangle at...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Literature Survey on Performance of Free Space Optical Communication Links Under Strong Turbulence

    Free space optical communication has widespread use because of its advantages such as high modulation bandwidth, enhanced security and low power. In free space optical communication, laser beam signals are transmitted through air. Due to atmospheric turbulence, signals are affected. This atmospheric turbulence leads to fading of the channel. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Comparison and Analysis of PAPR Reduction Techniques in OFDM

    In this paper, different techniques for reducing Peak To Average Power Ratio (PAPR) is discussed. The performance of an Orthogonal Frequency Division Multiplexing (OFDM) system is degraded if the Peak-to-Average Power Ratio(PAPR) is high. An OFDM system dynamic range is typically two or four times larger than a single carrier...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Inpainting Realization of GUI in JAVA Using Exemplar Method

    Image In-painting technique is of filling in holes in an image to preserve its overall continuity. There are many applications of this technique include the restoration of old photographs and damaged film; removal of labeled text like dates, subtitles, or publicity; and the removal of entire objects from the image...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Compact UWB Antenna With T-Shaped Slots and Staircase Ground Plane for Enhanced Bandwidth

    In the coming years, there is great demand for high-speed data transmissions on cost effective basis. In order to achieve the same a new technology known as the Ultra WideBand (UWB) has been used. This technology has revolutionary advantages of an unlicensed service that can be used anywhere, anytime, by...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Throughput Improvement for Cell Edge Users

    Users at the cell edge in a cellular network suffer from low data rate due to low SINR Cooperative transmission schemes which are used in wireless networks to improve the spectral efficiency. In this paper, the authors study the downlink capacity of edge users in a cellular network and see...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Microstrip Antenna for WLAN Application Using Probe Feed

    Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. A low profile patch antenna for WLAN application is proposed in this paper. This proposed antenna is made by using the probe feeding and aperture...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Mm Waves Role in Satellite Communication

    The frequency band of Millimeter Wave (MM Wave) in Electromagnetic spectrum is 30-300 GHz and is sometimes called the Extremely High Frequency (EHF) range. Apart from Radar system, communication system is another important application of MM Waves which proved better than Microwaves/optics in certain features. Certain characteristics of the earth's...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Efficient Hand-Geometry System for Biometric Identifications

    In this paper, the authors propose an efficient hand geometry based system to recognize individuals. Hand geometry used in this verification system utilizes some hand geometry features which cannot vary with small variation of palm position. In this work, users can place their hands freely without the need for pegs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Embedded Ethernet Interface Using Arm Processor

    Currently device with microcontroller has been widely used in industrial field. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM processor-based embedded Ethernet interface is presented. In the design, an existing SPI serial device...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Novel Compact CPW- Fed Antenna for ULTRA WIDEBAND Applications

    RECENTLY, with the rapid development of wireless communication systems for local access networks including Personal Digital Assistants (PDA), portable PCs, and Bluetooth, the need for low profile and compact antenna has been on the rise. The demand was increased day by day in wireless communication, especially for the ULTRA WIDEBAND...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Reconfigurable Microstrip Patch Antenna Using MEMS Technology

    This paper proposes the design of a Reconfigurable Micro Strip Patch Antenna Using MEMS Technology A Reconfigurable Microstrip patch antenna of operating frequency in the range of 5-8 GHz (CBand), for the application of wireless communication has been designed. The term Re-configurability refers that it adaptively changes its characteristics. A...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    DFT Based MMSE Equaliser in MIMO-OFDM

    MIMO-OFDM is considered as a fast growing technology now days. OFDM is a multi carrier modulation technique in which the carriers are Orthogonal to each others as a result of which it provides high bandwidth efficiency and multiple carriers share the data among themselves. During the research equalizer is always...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2012

    Low Power H.264 Video Compression Achitecture for Mobile Communication

    This paper presents a method to reduce the computation and memory access for variable block size Motion Estimation (ME) using pixel truncation. Previous work has focused on implementing pixel truncation using a fixed-block size(16?16 pixels) ME. However, pixel truncation fails to give satisfactory results for smaller block partitions. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Iris Recognition: An Emerging Biometric Technology

    Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks

    Next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. One of the research challenges for next generation all-IP-based wireless systems is the design of intelligent mobility management techniques that take advantage of IP-based technologies to achieve global roaming among various access technologies....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Biometric Speech Watermarking Technique in Images Using Wavelet Transform

    The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cope With Black Hole Attacks in AODV Protocol in Manet by End to End Route Discovery

    Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

    Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sensing Methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By IOSR Journal of Engineering