IOSR Journal of Engineering

Displaying 281-320 of 498 results

  • White Papers // Oct 2012

    An Approach of Automatic Data Mining Algorithm for Intrusion Detection and Prevention System

    The network security system plays a major role in the communication world, here every one's need security and assurance for their communication. Normally the hacking, Intrusion software's are using threats, malicious to enter in to the network and they are keep recording or monitoring the communication for this action the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Artificial Intelligence Algorithms

    Artificial Intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus, strong AI claims that in near future the authors will be surrounded by such kinds of machine which can completely works like human being and machine could have human...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Micro-Sensor Network Models

    Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Mobile Networking and Ad Hoc Routing Protocols Validation

    In this paper, the authors describe mobile network and efficient routing protocol for wireless ad hoc networks. They report on its implementation, on performance comparisons and on a formal validation result. Moreover, they discuss cellular system design, global system for mobile communication, formal protocol verification and operating over infrared or...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Heuristic Route Discovery for Shared Firewall Network

    In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This paper lists the constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Analysis of Data Mining Algorithms in Weka

    The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multicast Routing Protocol With Group-Level Congestion Prediction and Permanence Under Constrained Energy Utilization for Mobile Ad Hoc Networks

    A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence cross-layered obstruction management routing topology. The projected...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Security in MANET Based on PKI Using Fuzzy Function

    In mobile adhoc network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multiband Microstrip Patch Antenna for Microwave Applications

    In this paper, the authors present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Secure Surveillance Using Virtual Intelligent Agent With Dominating Influence

    As it is known embedded system is a special-purpose computer system designed to perform a dedicated function. As a spice the authors also included robotics domain and achieved this project successfully. In this project, an automation surveillance system is achieved using PIR sensor which detects the human. Also the robot...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    RR-MAC: Receiver Reservation MAC Protocol With Time-Division for Wireless Sensor Networks

    Wireless sensors networks are potentially employed in various fields such as defense system, target tracking, target monitoring, wildlife monitoring and disaster management. The node's of a wireless sensor network consists of three main parts-processor, transmitter/receiver and memory unit. For these parts to be operational in an efficient way, the battery...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Performance Evolution for Frequency Invariance for Double Differential Detection System

    The Evolution of Multiple Symbol Differential Detection (MSDD) of double differential QAM signal is studied in the presence of frequency offset, phase offset and additive white Gaussian noise. It is shown that in the case of nonzero frequency offset distorts the transmitted signal through attenuating its amplitude and MSDD receiver...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Optimization of ECAT Through DA-DCT

    Discrete Cosine Transform (DCT) is a widely used tool in image and video compression applications. Recently, the high-throughput DCT designs have been adopted to fit the requirements of real-time application. Operating the shifting and addition in parallel, an Error-Compensated Adder-Tree (ECAT) is proposed to deal with the truncation errors and...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Patch Antenna Array Fault Modeling and Its Monitoring

    The On/Off faults are among the most prominent hazards observed in antenna arrays. They behave like a catalyst towards steady degradation of the circuit's performance. This paper is regarding fault monitoring in the microstrip patch antenna array. The fault modeling, included here is single and double fault models of the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Broadband Rectangular Ring Slot Microstrip Antenna With High Return Loss and Also Compare With Rectangular MSA

    Antennas are a very important component of communication systems. By definition, an antenna is a device used to transform an RF signal, traveling on a conductor, in to an electromagnetic wave in free space the broadband circularly polarized MSA, play a vital role in wireless communication due to its low-profile,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Comparative Analysis of Bandwidth Enhancement of Microstrip Patch Antennas Using Various Geometries

    This paper discusses the comparative study of BandWidth (BW) enhancement technique of Microstrip Patch Antenna (MSA) using various geometries. A simple Rectangular Microstrip Patch Antenna (RMSA) was designed and simulated using Zeland's Method of Moment (MoM) based EM simulation package IE3D and its various parameters such as return loss, VSWR...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of BER and Q-Factor in Intersatellite Optical Wireless Communication System

    The system performance plays a great role in analyzing the characteristics of optical wireless communication link. This paper describes the effect of bit error ratio and quality factor in communication system. The effect of diameter antennae with received power and distance is also analyzed in this paper. The value of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Three Dimensional-Chips

    This paper illustrates the performance advantages of 3D integrated circuits with two specific examples, namely 3D-FPGA and 3D-SRAM. Three-dimensional Chip (3D IC, 3D-IC, or 3-D IC) is a chip in which two or more layers of active electronic components are integrated both vertically and horizontally into a single circuit. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Synthesis of Linear and Circular Array Antennas Using Gatool

    The main aim of this paper is to reduce the first four Side Lobe Levels (SLLs) of the linear and circular array antennas using gatool, which is the one of the simplest and efficient tool in MATLAB. This is employed in Radars and communications in order to reduce jamming effects,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Performance Analysis of Log Periodic Dipole Antenna at Uhf Band

    The paper described the design and performance analysis of log periodic dipole antenna at frequency 1800MHz -2500MHz (Ultra High Frequency Band), the antenna has been modeled using ADS layout and the S parameter was presented. A good impedance match in a wide frequency range has been achieved by a suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Investigation Into the Performance Enhancement and Salient Features of AMR-WB Speech Codec Used in GSM Communication

    The 3rd Generation Partnership Project (3GPP) along with European Telecommunication Standard Institute (ETSI) recommended new speech coding scheme, called Adaptive Multi Rate (AMR) in 2000 and 2001. The proposed scheme has two variants: AMR-Narrowband (AMR-NB) and AMR-WB (AMR-WideBand). The speech quality of AMR-WB in GSM systems is remarkably high compared...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Beam Forming Using KLMS, KRLS and CGM Algorithms

    In this paper adaptive beam forming using KLMS, CGM and KRLS algorithm has been proposed. In CGM algorithms has reduced the interference and convergence is better when number of antennas increased. In CGM algorithm the weight of antenna arrays can be adjusted to form certain amount of adaptive beam to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Peak-To - Average Power Ratio Reduction of Ofdm Siganls

    Orthogonal Frequency Division Multiplexing (OFDM) is a form of multicarrier modulation technique with high spectral efficiency and immunity to interference. Despite of many advantages the main disadvantage of OFDM is that the time domain of OFDM signal which is a sum of subcarrier sinusoids leads to high Peak-to-Average Power Ratio...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Identification and Modeling of Dominant Causes of Congestion in a Cellular Network

    In telecommunications networks, congestion is the condition that arises when a system or a network experiences a level of offered calling activity or message traffic that exceed its capacity. In data networks, congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Efficient Implementation of Fast Fourier Transform Using NOC

    In this paper, improved algorithms for radix-8 FFT are presented. Various schemes have been proposed for computing FFT. It has Different target domains of applications and different tradeoffs between flexibility and performance. Typically, they need reconfigurable array of processing elements .The applications have been restricted to domains based on floating...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Efficient Security for Mobile Ad-Hoc Network

    An ad-hoc network is a dynamically changing network of mobile nodes that communicate without the support of a fixed network. Due to lack of centralized control, secured communication in mobile Ad-hoc network is important matter due to dynamic nature of the network topology. MANETs is affected by new security problems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Ftp Implementation With Arm Processor and Gprs for Real Time Applications

    In this paper, the authors present the principles of a low-cost Internet-based data processing system. The main h e a r t of the system is an embedded hardware (ARM 9) running with a Linux OS. The embedded device communicates through General Packet Radio Service (GPRS) module, which makes it...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Selective State-Transition Decoding: A Combined Approach for Trellis Coded Modulation Scheme

    The authors are presenting a new suboptimum decoding strategy, namely, Adaptive Selective State-Transition Decoding (ASSTD) for Trellis Coded Modulation schemes transmission over band-limited ISI channels. The ASSTD is a combined approach provides an improved error performance over Reduced State Sequence Estimation (RSSE) techniques which are in practical use. The ASSTD...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Printed Microstrip Antenna for RADAR Communication

    A single layer, single feed compact slotted patch antenna is thoroughly simulated in this paper. Resonant frequency has been reduced drastically by cutting two different slots. The first one is the combinations of two triangular and another rectangular slot at the upper right corner and rest is bilateral triangle at...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Literature Survey on Performance of Free Space Optical Communication Links Under Strong Turbulence

    Free space optical communication has widespread use because of its advantages such as high modulation bandwidth, enhanced security and low power. In free space optical communication, laser beam signals are transmitted through air. Due to atmospheric turbulence, signals are affected. This atmospheric turbulence leads to fading of the channel. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Fading Channels on OFDM

    High data rates are demanded a lot in modern communications. It is the huge development in the communications industry that led to this demand. One of the essential components of recent communications is Orthogonal Frequency Division Multiplexing (OFDM). Handling bad conditions, high bandwidth and using the available spectral efficiently are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Factors of Cloud Computing Data Centers Using M/G/m/m+r Queuing Systems

    Cloud computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing systems fundamentally provide access to large amounts of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    An Analysis of V-Blast Detection Schemes for MIMO Wireless Communications

    Vertical Bell Laboratories lAyered Space Time (V-BLAST) is a Multiple Input Multiple Output (MIMO) wireless communication system that uses multiple antenna elements at transmit and receive to offer high spectral efficiency and increased capacity in a rich multipath environment without increasing the use of the spectrum. Whereas, the detection schemes...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Intelligent Reconfigurable Computing Systems

    Every new technology comes with a scope of research on making it more economical in terms of money and time. Intelligent reconfigurable computing systems follow a similar trend by implementing the applications over the available reconfigurable hardware. Reconfigurability basically aims at reuse of the hardware for similar problems or sub...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Tree-Based Parity Check for an Optimal Data Hiding Scheme

    Reducing distortion between the cover object and the stego object is an important issue for steganography. The tree-based parity check method is very efficient for hiding a message on image data due to its simplicity. Based on this approach, the authors propose a majority vote strategy that results in least...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Implementation of Embedded Web Server with Light weight TCP/IP on Mini 2440

    In this paper, the authors analyses the Light-weight TCP/IP stack and gives the detailed processing of every layer first, then selecting the hardware platform as Samsung Mini2440 and the software platform as RT-Thread, porting of LwIP is done based on them. Then a thin web server is designed and stored...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis on Different Modulation Techniques of MIMO in Multipath Fading Channel

    This paper presents performance comparison of various modulation techniques in Rayleigh fading channel. In the comparison, the space time coding has been used. The performance comparison are made on the basis of Bit Error Rate(BER) and Symbol Error Rate(SER) performance matrices over Rayleigh fading channel with BPSK,QPSK,8PSK and QAM modulation...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance Analysis for Different Interleavers in Various Modulation Schemes With OFDM Over an AWGN Channel

    The next generation wireless communications systems need to be of a higher standard in order to provide the customers with the multitude of high quality services they demand. In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has been successfully used in terrestrial digital video broadcasting and showed it is a...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secure Data Entry in Operational Systems for Data Warehouse

    A 'Data warehouse' is a repository of an organization's electronically stored data. Emergence of huge data warehouses has also put a big challenge in these data entry processing systems. Data warehouses contain a wide variety of data that present a coherent picture of business conditions at a single point in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Secured Transaction with Efficient Mining and Prediction in Mobile Commerce

    In this paper, the authors explore a new data mining capability and security for a mobile commerce environment. M-commerce is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. To achieve effective mobile commerce...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    A VHDL Implementation of Low Power Virus Detection Processor

    Now-a-days, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Abstract Syntax Tree Based Clone Detection for Java Projects

    A large amount of unavoidable money is spent on the maintenance of any existing software systems. Software maintenance cost is generally higher than the development cost therefore reducing maintenance cost is a necessary task of today's software industries. Software system includes similar bugs at different places which makes system inefficient...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    A Novel Technique in stegnanalysis using S-DES and Back propagation Algorithm

    In this paper, the authors propose a new algorithm by improving and combining S-DES and back propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Study of Webcrawler: Implementation of Efficient and Fast Crawler

    A focused crawler is a web crawler that attempts to download only web pages that are relevant to a pre-defined topic or set of topics. Focused crawling also assumes that some labeled examples of relevant and not relevant pages are available. The topic can be represent by a set of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Enhance Accuracy in Software Development's Planning & Estimation Process by Adopt Uncertainty Analysis and Assessment" in the System Modeling Process" - A Review

    In the process of software project development prediction of effort and estimate it is very challenging task. So it is referred as intricate "Brain tester". Though the authors have several cost and effort estimating method. They are not got success to find a method which will give accurately estimation of...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Android Speech to Text Converter for SMS Application

    The mobile phone users are increase day by day and everyone wants to develop new things which are improved version of existing one. The SMS user might want the faster SMS technology which can convert their voice into text and SMS will be transferred. This paper is based on evaluating...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform

    While many solutions for making backup and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the differentiating in devices, vendors, operating system and version available in mobile market. The authors introduce a new backup and restore approach for mobile devices, which helps...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Indexing of Query on Spatial Data in P2P Systems

    Peer-To-Peer technology plays an important role in spatial data sharing .In spatial P2P each peer stores part of the available spatial information and runs software with equivalent functionality rather than through a central server. Spatial P2P is dynamic in nature. Spatial objects are having distinct properties like identity location and...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Mitigating Denial-of-Service Attacks Using Genetic Approach

    Denial-of-Service attacks are considered as very dangerous. These attacks have crashed many computers on internet recently. Detecting Denial-of-Service (DoS) attacks has been a difficult problem to solve. Security of computers from DoS attacks has become a crucial issue. Recognition of attacks is becoming a harder problem to crack in the...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Effect of Noise on image steganography based on LSB insertion and RSA encryption

    This project simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security about hidden data, than the previous work. The main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2012

    Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

    Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and nitty-gritties such as the software's physical hosting location, hardware specifications, efficiency of data processing. Recently many works focus on providing data dynamics and/or public verifiability to the protocols...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analysis of Optimum Software Quality Factors

    Software quality has emerged as pivotal aspects of any software development process. Quality of software depends on the process followed during its development. Factors affecting the quality of software are identified from among the quality models, on the basis of the most common, crucial and critical ones. Further, understanding of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Overview on Clustering Methods

    Clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the process of grouping similar objects into different groups, or more precisely, the partitioning of a data set into subsets, so that...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Cloud-Assisted Video Streaming Over QoS-Enabled Wireless Networks

    With the proliferation of inexpensive broadband connections, video streaming services over the Internet are growing rapidly. Delivering video over wireless networks is a challenging task, especially when high definition is required, due to its high bit rate, delay, and loss sensitivity. This paper presents a modified slicing scheme that can...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Neural Networks for Iris Recognition: Comparisons between LVQ and Cascade Forward Back Propagation Neural Network Models, Architectures and Algorithm

    In this paper, Iris recognition is a proven, accurate means to identify people. In this paper, it includes the preprocessing system, segmentation, feature extraction and recognition of an iris recognition system was suggested based on two Artificial Neural Network (ANN) models separately: Cascade Forward (CFBPNN) and Linear Vector Quantization (LVQ)....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Digital Radio Over Fiber Link to Overcome Impairments in Fiber Wireless Networks

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. This architecture provides flexibility, mobility and high Bandwidth. A digitized RF-over-Fiber transmission scheme based on Band-pass Sampling theory is being introduced. Various Impairments of Analog Radio over...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Analysis of Dropped Packets for Location Aided Routing Protocol Using Artificial Intelligence

    Location Aided Routing protocol (LAR) is an on demand protocol in MANET which uses GPS in mobile nodes to find the location of node. It calculates routing when it is needed. LAR protocol has two zones namely expected zone and request zone. The expected zone is circular in shape while...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Interference and Noise Detection in a Cognitive Radio Environment

    Now-a-days cellular and handheld devices hold up most of the data exchange services that is one currently and they widely use high speed data links causing increased usage of available spectrum. However these devices are not always in use so the links stays void sometime and using those void links...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design of High Speed Reconfigurable Coprocessor for Multiplier/Adder and Subtractions Operations

    As the quantity of data transmission and reception increases, there is a gradual increase in bandwidth on demand and quality of service. This further increases data traffic which leads to loss of information, reduced accuracy and reliability. To overcome this drawback, the authors proposed coprocessor can be used for communication...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Security Framework for Wireless Sensor Networks: IBE-Trust

    The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Wireless Sensor Network: An Emerging Technology

    Wireless sensor network is a special kind of network that differs from the conventional communication networks in terms of architecture and deployment. Dynamic in nature, the wireless sensor networks have added a new dimension not only to the further exploration in a hard-to-reach environment, but also to the complexity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Construct of Broadband Printed Rectangular Monopole Antenna

    In this paper, the authors have investigated an rectangular monopole antenna that was printed on a Printed Circuit Board (PCB). The antenna consists of a rectangular patch and a ground plane so that the antenna acts as a planar monopole antenna which is broadband. Broadband planar monopole antennas have all...

    Provided By IOSR Journal of Engineering