IOSR Journal of Engineering

Displaying 241-280 of 498 results

  • White Papers // Oct 2012

    Design and Construct of Broadband Printed Rectangular Monopole Antenna

    In this paper, the authors have investigated an rectangular monopole antenna that was printed on a Printed Circuit Board (PCB). The antenna consists of a rectangular patch and a ground plane so that the antenna acts as a planar monopole antenna which is broadband. Broadband planar monopole antennas have all...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Bandwidth Allocation in Wireless Networks With Multiple Degradable Quality of Service

    In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Handset Antenna Design for Mobile Communication System

    Monopole slot antenna is suitable for handset applications due to its simple planar structure. Besides that, it is compact, low cost, low profile and easy to manufacture. It also has wide bandwidth and omnidirectional charatriesticts. The monopole antenna is obtained by cutting monopole slot at the edge of the ground...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Networking and Ad Hoc Routing Protocols Validation

    In this paper, the authors describe mobile network and efficient routing protocol for wireless ad hoc networks. They report on its implementation, on performance comparisons and on a formal validation result. Moreover, they discuss cellular system design, global system for mobile communication, formal protocol verification and operating over infrared or...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Heuristic Route Discovery for Shared Firewall Network

    In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This paper lists the constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Secure Model for Cloud Computing Based Storage and Retrieval

    Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hybrid Algorithm for Clustering Mixed Data Sets

    Clustering is one of the data mining techniques used to group similar objects into different meaningful classes known as clusters. Objects in each cluster have maximum similarity while the objects across the clusters have minimum or no similarity. This kind of partitioning of objects into various groups has many real...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Application of VLSI in Artificial Intelligence

    This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By combining VLSI technology, a very powerful...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones

    The mobile applications are one of the most important utilities of modern communication world. Currently this technology is getting compact to provide compatibility and accessibility to the users with a better option of handling. This research is based on the mobile and m-commerce technology, a fastest growing technology of today....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of VoIP by Communicating Two Systems

    VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. In this paper, the authors introduce and explore the problems that occur in the people day to day life in sending voice and data with different windows. The paper evolves in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Computing Platform for Virtual University Providing E-Learning

    According to the present scenario, cost of the electronics is decreasing day-by-day and the cost of services provided by it is also decreasing. So, no one wants to pay a high cost for any service. For that purpose, the authors tried to corporate their educational services of any e-learning website...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cryptography on Android Message Application Using Look Up Table and Dynamic Key (cama)

    Most popular shortest and cheapest textual form of communication is Short Message Service (SMS).To ensure the security of the texts which is sent, many algorithm are available. In this paper, the authors propose an efficient algorithm for cryptography which is based on static Look Up table and Dynamic Key. Symmetric...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Approach of Automatic Data Mining Algorithm for Intrusion Detection and Prevention System

    The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Artificial Intelligence Algorithms

    Artificial Intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus, strong AI claims that in near future the authors will be surrounded by such kinds of machine which can completely works like human being and machine could have human...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Micro-Sensor Network Models

    Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Dash7: Performance

    A new wireless sensor networking technology, DASH7 uses the ISO/IEC 18000-7 standard for active RFID. It operates in the 433 MHz unlicensed spectrum. DASH7 provides many advantages over other wireless technologies such as multi-year battery life, dynamic range of up to 2 Km (potentially farther) etc.DASH7 is the name of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Complementary Cumulative Distribution Function for Performance Analysis of OFDM Signals

    Peak-to-Average Power Ratio (PAPR) is an important parameter for the analysis of Orthogonal Frequency Division Multiplexing (OFDM) signals. CCDF curves are known to have great importance in the study of signal performance on the basis of power level. This paper presents the CCDF performance of the OFDM signal with different...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

    A Mobile Ad hoc NETwork (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Concerted Routing Metrics Evaluating and Distributed Rate Adaptation in Wireless Mesh Networks

    This paper proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multibiometric Identification System Based on Score Level Fusion

    Biometric identification systems, which use physical features to check a person's identity, ensures much greater security than password and number systems. Multi-biometric system is being increasingly deployed in much large scale application because they provide lower error rate, large population coverage compared to uni-biometric. In this paper, multi-biometric identification system...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Recognition Using Gabor Filter and Frequency Domain Filtering

    Fingerprint recognition is one of the most popular methods used for identification with greater degree of success. The fingerprint has unique characteristics called minutiae, which are points where a curve track finishes, intersect or branches off. In this paper a novel method for Fingerprint recognition is considered using a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Enhancement of Gain of Rectangular Micro Strip Antenna Using Multilayer Multidielectric Structure

    In rapidly developing market in Personal Communication Systems (PCS), mobile satellite communications, Direct Broadband Television (DBS) Wireless Local Area Networks (WLANs) suggest that demand for Microstrip antennas and array will increase even further. In this paper the gain of microstrip patch antenna is enhanced by using covered dielectric layer which...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Speech/Data Discrimination in Communication Systems

    This paper proposes a discrimination algorithm, which discriminates speech and data on a multiplexed input signal. Commercial communication networks may use single voice band channel for transmission of both speech and data. Also, for optimum utilization of channel, the pauses in voice signal are being utilized. At receiver side the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study of ICI Cancellation Techniques in OFDM

    OFDM (Orthogonal Frequency Division Multiplexing) is a well known technique in 4G Broadband wireless communication systems. OFDM has high spectral efficiency but it suffers from frequency offset problem due to the difference between transmitter and receiver local oscillator frequencies which causes loss of orthogonality between subcarriers leading to ICI. This...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Based ATM Security by Using ARM7

    The purpose of this paper is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    High Speed Data Acquisition System With Ethernet Interface

    This paper introduces a high speed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind this effort. Using standard...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multiband Microstrip Patch Antenna for Microwave Applications

    In this paper, the authors present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

    The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

    In this paper, adaptive modulation and coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The use of adaptive modulation allows higher throughputs and covering long distances. The aim of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

    Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey of Weight-Based Clustering Algorithms in MANET

    As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. Several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevailing routing algorithms don't utilize the potency that may be obtained by clustering a network. Clustering method involves in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Green Computing Under Cloud Environment Proposed Architecture Using Cloud Computing & Thin Client

    Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less power. Most cloud services run in browser based environment so the authors don't need a fat client to use in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Defending Against Replication Node Attack in Wireless Sensor Network

    In Wireless Sensor network, nodes are interconnected and information is shared among them. In a situation, many attacks are involved to misuse the wireless sensor network. One of the attacks is replica node replication attack, in which the adversary can detain and conciliation of sensor nodes by hacking IP address...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure Data Forwarding

    A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Analysis of Manhattan Mobility Model Without RSUs

    The vehicular communication is an important issue to the researchers who are engaged in preventing traffic accidents and traffic jams. The earlier vehicular models had discussed only communication among vehicles through the Road Side Units (RSU). Most of the researchers used IEEE 802.11 for vehicular communication in which the vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Comprehensive Parametric Analysis of Vertical Handoff in Next Generation Wireless Networks

    The science and technology is developing day by day leading to expand and forcing to reshape user's living standards. The main aspects leading to deployment of a wide array of wireless and mobile networks are advances in miniaturization, low power circuit design and development in radio access technologies and increase...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, and time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks. Large-scale networks mean that wireless network at the dynamic time. Propel...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since the highly dynamic nature of MANET coupled with limited bandwidth...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Research Paper on Comparison Between Energy Efficient Routing Protocol with Energy and Location in MANET

    Energy is an important issue in MANET (Mobile Ad-hoc NETwork). Nodes in network are working in presence of limited energy. So, energy efficient routing is needed for reducing energy consumption. Energy efficient routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Multipath routing protocol (AOMDV)...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Constrained Delaunay Triangulation for Wireless Sensor Networks

    Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. WSN has the potential of significantly enhancing user ability to monitor and interact with user's physical environment. Fault tolerance is one of the main issues in Wireless Sensor...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    High Performance Cloud Data Mining Algorithm and Data Mining in Clouds

    The authors describe the design and implementation of a high performance cloud that they have used to archive, analyze and mine large distributed data sets. By a cloud, they mean an infrastructure that provides resources and/or services over the Internet. A storage cloud provides storage services, while a compute cloud...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Application of Computational Intelligence Paradigm in the Probabilistic Routing for Intermittently Connected Network.

    In this project an approach is being made to use Fuzzy Logic (a computational intelligence paradigm) in the Probabilistic routing protocol for intermittently connected network: delay tolerant network. Communication between two mobile nodes in an infrastructure less network is possible if they are within the wireless communication range. Delay Tolerant...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Review on Snoop with Rerouting in Wired Cum Wireless Networks

    TCP (Transmission Control Protocol) has been performing well over the traditional wired networks. However it cannot react efficiently in wireless network where packet losses occur mostly because of congestion and wired cum wireless networks where the significant packet losses are due to bit errors or handoffs. In order to evaluate...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Design and Construction of a Mobile Security Surveillance System with Wireless Data Transmission

    The microcontroller based portable image acquisition and wireless data transmission is a security surveillance device. This can be used in monitoring of an area for effective image capturing and image data transmission. It combines the effectual hardware and software components and brings an output through blinking bulb and there is...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Evaluating and Modeling Proactive Routing Protocols with Route Stabilities Using 802.11 DCF and 802.11e EDCF

    This paper contributes modeling links and route stabilities in three diverse wireless routing protocols. For this purpose, the authors select three extensively utilized proactive protocols; Destination-Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Fish-eye State Routing (FSR). They also enhance the performance of these protocols by modifying their...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud

    Cloud computing, the next generation architecture of IT enterprises, offers the users with a flexible computing environment. In cloud, the virtualized resources are provided as a service over the internet. Typical applications that have already been thought of are SaaS (Software as a Service), PaaS (Platform as a Service), IaaS...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Forensics-An IS Approach

    The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level Agreement (SLA) bounded only by the capacity of the data center. Hence,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Entrepreneurial Idea Development to Business Start-Up: Teaching Methodological Approach

    The crucial issue on entrepreneurship training in the tertiary institutions of learning is teaching students how to develop innovative business idea to the business venture start-up stage. This is the ability of the students to develop ideas that are out of the theoretical teaching of the academic environment. Several scholars...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementing SAAS: Cloud Computing and Android Based Application Framework for C Programming

    Under The National Mission on Education through Information and Communication Technology (NMEICT) a lot of e-learning material, applications and other useful information have been made available on its web portal. MHRD has also taken initiatives for the dissemination of this knowledge by distributing Aakash Tablets to the students at free...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Analysis of Dropped Packets for Location Aided Routing Protocol Using Artificial Intelligence

    Location Aided Routing protocol (LAR) is an on demand protocol in MANET which uses GPS in mobile nodes to find the location of node. It calculates routing when it is needed. LAR protocol has two zones namely expected zone and request zone. The expected zone is circular in shape while...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Interference and Noise Detection in a Cognitive Radio Environment

    Now-a-days cellular and handheld devices hold up most of the data exchange services that is one currently and they widely use high speed data links causing increased usage of available spectrum. However these devices are not always in use so the links stays void sometime and using those void links...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design of High Speed Reconfigurable Coprocessor for Multiplier/Adder and Subtractions Operations

    As the quantity of data transmission and reception increases, there is a gradual increase in bandwidth on demand and quality of service. This further increases data traffic which leads to loss of information, reduced accuracy and reliability. To overcome this drawback, the authors proposed coprocessor can be used for communication...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Security Framework for Wireless Sensor Networks: IBE-Trust

    The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Sensor Network: An Emerging Technology

    Wireless sensor network is a special kind of network that differs from the conventional communication networks in terms of architecture and deployment. Dynamic in nature, the wireless sensor networks have added a new dimension not only to the further exploration in a hard-to-reach environment, but also to the complexity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering