IOSR Journal of Engineering

Displaying 281-320 of 498 results

  • White Papers // Oct 2012

    Handset Antenna Design for Mobile Communication System

    Monopole slot antenna is suitable for handset applications due to its simple planar structure. Besides that, it is compact, low cost, low profile and easy to manufacture. It also has wide bandwidth and omnidirectional charatriesticts. The monopole antenna is obtained by cutting monopole slot at the edge of the ground...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Networking and Ad Hoc Routing Protocols Validation

    In this paper, the authors describe mobile network and efficient routing protocol for wireless ad hoc networks. They report on its implementation, on performance comparisons and on a formal validation result. Moreover, they discuss cellular system design, global system for mobile communication, formal protocol verification and operating over infrared or...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Heuristic Route Discovery for Shared Firewall Network

    In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This paper lists the constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Architecture and Evaluation on Cooperative Caching in Wireless P2P

    All researches shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. And all these studies have been done up to some level only. So for that purpose now the author using an protocol technique called Dynamic Source routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Virtual Class Room Using Six Sense Technology

    Sixth Sense is a revolutionary technology that can be used to access digital information in the world with wearable gestures. This paper focuses on various applications of six sense technology in educational purpose and how a virtual classroom, can be conducted anywhere, anytime with the help of six sense technology....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Design of Framework for AGRI-CLOUD

    Information technology is used in various fields like education, business, medicine, Weather forecasting systems, communications etc., but not used vastly in agriculture sector which is main livelihood for majority of people in rural areas and which also drives economy in developing countries like India, China, Brazil etc., and also over...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Secure Model for Cloud Computing Based Storage and Retrieval

    Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Hybrid Algorithm for Clustering Mixed Data Sets

    Clustering is one of the data mining techniques used to group similar objects into different meaningful classes known as clusters. Objects in each cluster have maximum similarity while the objects across the clusters have minimum or no similarity. This kind of partitioning of objects into various groups has many real...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Application of VLSI in Artificial Intelligence

    This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By combining VLSI technology, a very powerful...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones

    The mobile applications are one of the most important utilities of modern communication world. Currently this technology is getting compact to provide compatibility and accessibility to the users with a better option of handling. This research is based on the mobile and m-commerce technology, a fastest growing technology of today....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of VoIP by Communicating Two Systems

    VoIP is a technology that digitizes voice packets and enables telephony communication by using internet as a backbone. In this paper, the authors introduce and explore the problems that occur in the people day to day life in sending voice and data with different windows. The paper evolves in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Computing Platform for Virtual University Providing E-Learning

    According to the present scenario, cost of the electronics is decreasing day-by-day and the cost of services provided by it is also decreasing. So, no one wants to pay a high cost for any service. For that purpose, the authors tried to corporate their educational services of any e-learning website...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cryptography on Android Message Application Using Look Up Table and Dynamic Key (cama)

    Most popular shortest and cheapest textual form of communication is Short Message Service (SMS).To ensure the security of the texts which is sent, many algorithm are available. In this paper, the authors propose an efficient algorithm for cryptography which is based on static Look Up table and Dynamic Key. Symmetric...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Approach of Automatic Data Mining Algorithm for Intrusion Detection and Prevention System

    The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Artificial Intelligence Algorithms

    Artificial Intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus, strong AI claims that in near future the authors will be surrounded by such kinds of machine which can completely works like human being and machine could have human...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Micro-Sensor Network Models

    Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Requirements and Challenges for Securing Cloud Applications and Services

    Adopting cloud computing is a complex decision involving many factors. This paper focuses on the central issues of cloud computing security. The cloud computing architectural framework provides a conceptual framework to help evaluate initial cloud risks and inform security decisions. It's a quick method for evaluating the tolerance for moving...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Implementing of Serial Ports to Ethernet Gateway on Embedded System

    The use of the multi-serial/Ethernet conversion gateway simplifies the networked control and distributed management of information for serial devices. So the design of a new type of gateway for data converting from serial ports to Ethernet based on embedded system is highlighted in this paper. The design is based on...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Harms Associated with Cellular Towers (CDMA vs GSM)

    The use of mobile phone is increasing enormously, and hence has become a subject of recent interest and study, due to use of ElectroMagnetic (EM) wave in the microwave range and produces radiation. Various physiological studies have found that the excessive Radio Frequency (RF) wave exposure affects the biological systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Memorized Window Consolidation (MWC) Based TCP Recovery for Vegas and B/w Based Congestion Control

    In this paper, the authors present a framework for unanimous TCP flow window size recovery, "Memorized flow recovery", which differs from most TCP algorithms by memorized window size consolidation as measure to control the window size increment post link recovery from disconnection. It identifies the window size in use during...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study and Performance Evaluation of Xilinx HDLC Controller and FCS Calculator

    In this paper, design, simulation and implementation design of HDLC Controller provides a high performance. This design is then coded in a Hardware Description Language (VHDL). The functioning of the coded design is to simulate on simulation software (e.g. ModelSim). After proper simulation, the design is synthesized and then translated...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Management of Future Internet with Autonomic Network Architecture and Model

    Research efforts a strong foundation towards standardization of architectural principals of the managing future Internet. Autonomic network engineering for managing Future Internet (AFI) has been established under the European Telecommunications Standards Institute (ETSI). AFI has been focusing on scenarios, use cases, and requirements for autonomic self managing future Internet, as...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Design Methodology for Time Domain Dead Beat Algorithm

    In this paper, the authors propose a way of implementing a deadbeat controller in FPGA. The focus is on the FPGA implementation of the digital controller. The emphasis is on the software tools for design and simulation of FPGA based hardware for control applications. The FPGA is interfaced to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    P2P Reputation Management Scheme Using a Cryptographic Protocol

    Reputation management in a Peer-To-Peer network is difficult as challenges are posed by lack of centralized authority. For this reason P2P (Peer-To-Peer) network is vulnerable which can facilitate non-cooperation, cheating, leaching on the network and propagation of malicious code. The security model used for centralized C/S systems is not suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

    A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. At the same time routers in the Internet do not perform any security verification of the source IP address contained in the packets. The lack of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Aviris Hyperspectral Images Compression Using 3D Spiht Algorithm

    Hyperspectral sequence image is compressed using 3D Discrete Wavelet Transform (3D DWT) to decorrelate the three dimensions of hyperspectral image. Than the sequence is encoded efficiently by the 3D SPIHT algorithm, which operates on the pyramid structure of wavelet coefficients obtained. After decompression, the image evaluated by the PSNR, are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Prevention of Attacks in Internet Controlled Embedded Applications

    Embedded systems are becoming a main solution to many specific tasks because of this high stability, minimal power consumption, portability and numerous useful. Now-a-days, many new applications are developed using embedded system. This paper deals with the issues related to embedded applications when they are implemented in Internet. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    FPGA Implementation of Systolic Array Architecture for 3D-DWT Optimizing Speed and Power

    Demand for high speed and low power architectures for image/video compression algorithms are increasing with scaling in VLSI technology. Video sequences are considered as 3D sequences and are compressed using 3D DWT architectures. In this paper, systolic array architectures for 2D DWT have been modified and have been used in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Hybrid Model On Data Clustering and Computational Intelligence for Bank Crisis Classification and Prediction

    The prediction of bank failures is an important academic topic of which many have used artificial intelligence methods to build an early warning system for this purpose. The objective of this paper is to enhance the accuracy in predicting bank failures by proposing two hybrid models. In this paper, two...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Survey on Object Detect, Track and Identify Using Video Surveillance

    Network video surveillance has been a popular security application for many years. Target tracking in a cluttered environment remains one of the challenging problems of video surveillance. The task of target tracking is a key component of video surveillance and monitoring systems. It provides input to high-level processing such as...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Fading Channels on OFDM

    High data rates are demanded a lot in modern communications. It is the huge development in the communications industry that led to this demand. One of the essential components of recent communications is Orthogonal Frequency Division Multiplexing (OFDM). Handling bad conditions, high bandwidth and using the available spectral efficiently are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Factors of Cloud Computing Data Centers Using M/G/m/m+r Queuing Systems

    Cloud computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing systems fundamentally provide access to large amounts of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    An Analysis of V-Blast Detection Schemes for MIMO Wireless Communications

    Vertical Bell Laboratories lAyered Space Time (V-BLAST) is a Multiple Input Multiple Output (MIMO) wireless communication system that uses multiple antenna elements at transmit and receive to offer high spectral efficiency and increased capacity in a rich multipath environment without increasing the use of the spectrum. Whereas, the detection schemes...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Intelligent Reconfigurable Computing Systems

    Every new technology comes with a scope of research on making it more economical in terms of money and time. Intelligent reconfigurable computing systems follow a similar trend by implementing the applications over the available reconfigurable hardware. Reconfigurability basically aims at reuse of the hardware for similar problems or sub...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    VLSI Based Implementation of Single Round AES Algorithm

    This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design of Enhanced LEACH Routing Protocol for Wireless Sensor Network

    A wireless network consists of a large number of small sensors. The sensor is low-power transceivers & can be an effective tool for gathering data in a variety of environments. The communication between the sensor nodes must be designed to conserve the limited energy resources within the sensor. LEACH clustering...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Finger Print Image Enhancement and Point Pattern Based Verification

    Fingerprints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Dash7: Performance

    A new wireless sensor networking technology, DASH7 uses the ISO/IEC 18000-7 standard for active RFID. It operates in the 433 MHz unlicensed spectrum. DASH7 provides many advantages over other wireless technologies such as multi-year battery life, dynamic range of up to 2 Km (potentially farther) etc.DASH7 is the name of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Complementary Cumulative Distribution Function for Performance Analysis of OFDM Signals

    Peak-to-Average Power Ratio (PAPR) is an important parameter for the analysis of Orthogonal Frequency Division Multiplexing (OFDM) signals. CCDF curves are known to have great importance in the study of signal performance on the basis of power level. This paper presents the CCDF performance of the OFDM signal with different...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

    A Mobile Ad hoc NETwork (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Concerted Routing Metrics Evaluating and Distributed Rate Adaptation in Wireless Mesh Networks

    This paper proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multibiometric Identification System Based on Score Level Fusion

    Biometric identification systems, which use physical features to check a person's identity, ensures much greater security than password and number systems. Multi-biometric system is being increasingly deployed in much large scale application because they provide lower error rate, large population coverage compared to uni-biometric. In this paper, multi-biometric identification system...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Recognition Using Gabor Filter and Frequency Domain Filtering

    Fingerprint recognition is one of the most popular methods used for identification with greater degree of success. The fingerprint has unique characteristics called minutiae, which are points where a curve track finishes, intersect or branches off. In this paper a novel method for Fingerprint recognition is considered using a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Enhancement of Gain of Rectangular Micro Strip Antenna Using Multilayer Multidielectric Structure

    In rapidly developing market in Personal Communication Systems (PCS), mobile satellite communications, Direct Broadband Television (DBS) Wireless Local Area Networks (WLANs) suggest that demand for Microstrip antennas and array will increase even further. In this paper the gain of microstrip patch antenna is enhanced by using covered dielectric layer which...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Speech/Data Discrimination in Communication Systems

    This paper proposes a discrimination algorithm, which discriminates speech and data on a multiplexed input signal. Commercial communication networks may use single voice band channel for transmission of both speech and data. Also, for optimum utilization of channel, the pauses in voice signal are being utilized. At receiver side the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Hardware Implementation and Analysis of BPSK System on Xilinx System Generator

    With the recent advent of hardware description languages (e.g., Verilog or VHDL) and digital implementation for Field-Programmable Gate Arrays (FPGAs), substantial academic digital design projects become practicable. In the present paper, the design of a digital Binary-Phase-Shift-Keying (BPSK) modulator and detector is described. The project details the design of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based Adaptive Traffic Control System

    Through this paper, the authors intend to present an improvement in existing traffic control system at intersection. System is made more efficient with addition of intelligence in term of artificial vision, using image processing techniques to estimate actual road traffic and compute time each time for every road before enabling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Performance Analysis of PM: Direction of Arrival Estimation Algorithm for Smart Antenna System

    This paper presents analysis of simulation results for Direction of arrival estimation for smart antenna system using non Eigen value decomposition based algorithm. Direction Of Arrival (DOA) estimation in smart antenna for identifying the directions of the desired signals and the null steering beamformer to adapts the antenna pattern to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Study of Arm Based Temperature Measurement and Control System Using CPLD

    In this paper a temperature measurement and control system is proposed using ARM processor S3C2440 as a controlling device. This system uses LM35D sensor and its related peripherals for temperature measurement. This temperature is filtered and transmitted to the ADC MCP3201. ARM and CPLD are used for processing and controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Viterbi Algorithm for Error Detection and Correction

    In the present world, communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Zigbee Based Sensor Networks for Temperature Monitoring and Controlling

    In Now-a-days, the people have many different types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and to save property from damage. There is need to develop wireless sensor network for temperature controlling. In this paper, the authors...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Based ATM Security by Using ARM7

    The purpose of this paper is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    High Speed Data Acquisition System With Ethernet Interface

    This paper introduces a high speed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind this effort. Using standard...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A New Approach to Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. As volunteer clouds are allowed to communicate with each other and with other commercial clouds also, it's necessary to implement an enhanced interoperable environment. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Requirements and Challenges for Securing Cloud Applications and Services

    Adopting cloud computing is a complex decision involving many factors. This paper focuses on the central issues of cloud computing security. The cloud computing architectural framework provides a conceptual framework to help evaluate initial cloud risks and inform security decisions. It's a quick method for evaluating the tolerance for moving...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Improving Security for Data Migration in Cloud Computing Using Randomized Encryption Technique

    With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Green Cloud Computing: A Constructive Advent to Curtail the Carbon Emission Radiation Due to Servers

    This paper analytically scrutinizes the energy dissipation based on services and invades the conditions to promote green cloud computing to save energy crisis. In conventional, cloud computing emphasis on the data computing efficiency whereas green cloud computing accredit to the research and practice of applying computing resources in virtuous, adequate...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Entrepreneurial Characteristics and Competency as Determinants of Business Performance in SMEs

    This paper is to empirically test the influence of entrepreneurial characteristics and competencies on business performance in Small and Medium Enterprises (SMEs). This study was conducted with 147 SMEs owner in Malang regency East Java Indonesia using survey instrument. Data analysis using the structural equation modelling. The results of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Capital Market and the Development of the Small and Medium - Scale Enterprises in Nigeria

    This paper looked at the need to incorporate the Small and Medium Scale Enterprises (SMEs) into the capital market in Nigeria as a means of raising capital for their operations. The findings of the paper found that the growth in the transactions of the quoted companies has been fluctuating over...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Analysis of Dropped Packets for Location Aided Routing Protocol Using Artificial Intelligence

    Location Aided Routing protocol (LAR) is an on demand protocol in MANET which uses GPS in mobile nodes to find the location of node. It calculates routing when it is needed. LAR protocol has two zones namely expected zone and request zone. The expected zone is circular in shape while...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Interference and Noise Detection in a Cognitive Radio Environment

    Now-a-days cellular and handheld devices hold up most of the data exchange services that is one currently and they widely use high speed data links causing increased usage of available spectrum. However these devices are not always in use so the links stays void sometime and using those void links...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design of High Speed Reconfigurable Coprocessor for Multiplier/Adder and Subtractions Operations

    As the quantity of data transmission and reception increases, there is a gradual increase in bandwidth on demand and quality of service. This further increases data traffic which leads to loss of information, reduced accuracy and reliability. To overcome this drawback, the authors proposed coprocessor can be used for communication...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Security Framework for Wireless Sensor Networks: IBE-Trust

    The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Sensor Network: An Emerging Technology

    Wireless sensor network is a special kind of network that differs from the conventional communication networks in terms of architecture and deployment. Dynamic in nature, the wireless sensor networks have added a new dimension not only to the further exploration in a hard-to-reach environment, but also to the complexity of...

    Provided By IOSR Journal of Engineering