IOSR Journal of Engineering

Displaying 281-320 of 481 results

  • White Papers // Oct 2012

    Comparative Analysis of Bandwidth Enhancement of Microstrip Patch Antennas Using Various Geometries

    This paper discusses the comparative study of BandWidth (BW) enhancement technique of Microstrip Patch Antenna (MSA) using various geometries. A simple Rectangular Microstrip Patch Antenna (RMSA) was designed and simulated using Zeland's Method of Moment (MoM) based EM simulation package IE3D and its various parameters such as return loss, VSWR...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of BER and Q-Factor in Intersatellite Optical Wireless Communication System

    The system performance plays a great role in analyzing the characteristics of optical wireless communication link. This paper describes the effect of bit error ratio and quality factor in communication system. The effect of diameter antennae with received power and distance is also analyzed in this paper. The value of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Three Dimensional-Chips

    This paper illustrates the performance advantages of 3D integrated circuits with two specific examples, namely 3D-FPGA and 3D-SRAM. Three-dimensional Chip (3D IC, 3D-IC, or 3-D IC) is a chip in which two or more layers of active electronic components are integrated both vertically and horizontally into a single circuit. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Printed Microstrip Antenna for RADAR Communication

    A single layer, single feed compact slotted patch antenna is thoroughly simulated in this paper. Resonant frequency has been reduced drastically by cutting two different slots. The first one is the combinations of two triangular and another rectangular slot at the upper right corner and rest is bilateral triangle at...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Literature Survey on Performance of Free Space Optical Communication Links Under Strong Turbulence

    Free space optical communication has widespread use because of its advantages such as high modulation bandwidth, enhanced security and low power. In free space optical communication, laser beam signals are transmitted through air. Due to atmospheric turbulence, signals are affected. This atmospheric turbulence leads to fading of the channel. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Characteristics of Low Base Station Antenna in Respect of Propagation Loss

    The environment between the transmitter and receiver in a wireless communication system has a significant effect on the performance and to maintain quality of service of the system. Propagation loss is an important element which must be kept within predefined range in order to get expected performance of the system....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Novel Octagonal UWB Antenna for Cognitive Radio

    This paper presents about a new antenna design of ultra wide band antenna for cognitive radio wireless communication. This antenna consists of an irregular octagon (polygon with 8 sides) aperture on a printed circuit board; ground plane. This antenna was simulated in ADS (Advanced Design System) Momentum. The feeding point...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Dynamic Network Reconstruction Approach Using ACO

    Energy efficiency and reliability are always the main concern in wireless sensor networks. In a sensor network the nodes are present with limited energy and with each transmission they loss some energy. It is required to minimize the rerouting to save the energy loss. The authors proposed an algorithm to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Review on Substrate Integrated Waveguide and Its Microstrip Interconnect

    Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    To Study the Effect of Center Frequency and Bandwidth on Quality Factor of Microstrip Interdigital Bandpass Filter

    Bandpass filter is a device that can be used in both transmitter and receiver in several communication systems, such as mobile phones, terrestrial network, satellite communication and many other applications. In this paper inter-digital bandpass filter with under coupled quarter wavelength resonator is proposed. In this paper, the authors studied...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multiband Microstrip Patch Antenna for Microwave Applications

    In this paper, the authors present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Synthesis of Linear and Circular Array Antennas Using Gatool

    The main aim of this paper is to reduce the first four Side Lobe Levels (SLLs) of the linear and circular array antennas using gatool, which is the one of the simplest and efficient tool in MATLAB. This is employed in Radars and communications in order to reduce jamming effects,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Performance Analysis of Log Periodic Dipole Antenna at Uhf Band

    The paper described the design and performance analysis of log periodic dipole antenna at frequency 1800MHz -2500MHz (Ultra High Frequency Band), the antenna has been modeled using ADS layout and the S parameter was presented. A good impedance match in a wide frequency range has been achieved by a suitable...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Investigation Into the Performance Enhancement and Salient Features of AMR-WB Speech Codec Used in GSM Communication

    The 3rd Generation Partnership Project (3GPP) along with European Telecommunication Standard Institute (ETSI) recommended new speech coding scheme, called Adaptive Multi Rate (AMR) in 2000 and 2001. The proposed scheme has two variants: AMR-Narrowband (AMR-NB) and AMR-WB (AMR-WideBand). The speech quality of AMR-WB in GSM systems is remarkably high compared...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Beam Forming Using KLMS, KRLS and CGM Algorithms

    In this paper adaptive beam forming using KLMS, CGM and KRLS algorithm has been proposed. In CGM algorithms has reduced the interference and convergence is better when number of antennas increased. In CGM algorithm the weight of antenna arrays can be adjusted to form certain amount of adaptive beam to...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Peak-To - Average Power Ratio Reduction of Ofdm Siganls

    Orthogonal Frequency Division Multiplexing (OFDM) is a form of multicarrier modulation technique with high spectral efficiency and immunity to interference. Despite of many advantages the main disadvantage of OFDM is that the time domain of OFDM signal which is a sum of subcarrier sinusoids leads to high Peak-to-Average Power Ratio...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Identification and Modeling of Dominant Causes of Congestion in a Cellular Network

    In telecommunications networks, congestion is the condition that arises when a system or a network experiences a level of offered calling activity or message traffic that exceed its capacity. In data networks, congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Efficient Implementation of Fast Fourier Transform Using NOC

    In this paper, improved algorithms for radix-8 FFT are presented. Various schemes have been proposed for computing FFT. It has Different target domains of applications and different tradeoffs between flexibility and performance. Typically, they need reconfigurable array of processing elements .The applications have been restricted to domains based on floating...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Efficient Security for Mobile Ad-Hoc Network

    An ad-hoc network is a dynamically changing network of mobile nodes that communicate without the support of a fixed network. Due to lack of centralized control, secured communication in mobile Ad-hoc network is important matter due to dynamic nature of the network topology. MANETs is affected by new security problems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    An Ftp Implementation With Arm Processor and Gprs for Real Time Applications

    In this paper, the authors present the principles of a low-cost Internet-based data processing system. The main h e a r t of the system is an embedded hardware (ARM 9) running with a Linux OS. The embedded device communicates through General Packet Radio Service (GPRS) module, which makes it...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Selective State-Transition Decoding: A Combined Approach for Trellis Coded Modulation Scheme

    The authors are presenting a new suboptimum decoding strategy, namely, Adaptive Selective State-Transition Decoding (ASSTD) for Trellis Coded Modulation schemes transmission over band-limited ISI channels. The ASSTD is a combined approach provides an improved error performance over Reduced State Sequence Estimation (RSSE) techniques which are in practical use. The ASSTD...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Factors of Cloud Computing Data Centers Using M/G/m/m+r Queuing Systems

    Cloud computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing systems fundamentally provide access to large amounts of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    An Analysis of V-Blast Detection Schemes for MIMO Wireless Communications

    Vertical Bell Laboratories lAyered Space Time (V-BLAST) is a Multiple Input Multiple Output (MIMO) wireless communication system that uses multiple antenna elements at transmit and receive to offer high spectral efficiency and increased capacity in a rich multipath environment without increasing the use of the spectrum. Whereas, the detection schemes...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Intelligent Reconfigurable Computing Systems

    Every new technology comes with a scope of research on making it more economical in terms of money and time. Intelligent reconfigurable computing systems follow a similar trend by implementing the applications over the available reconfigurable hardware. Reconfigurability basically aims at reuse of the hardware for similar problems or sub...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Fading Channels on OFDM

    High data rates are demanded a lot in modern communications. It is the huge development in the communications industry that led to this demand. One of the essential components of recent communications is Orthogonal Frequency Division Multiplexing (OFDM). Handling bad conditions, high bandwidth and using the available spectral efficiently are...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Assuage Bandwidth Utilization DDoS Attacks by Using Prototype Analyzer and Transfer Scheduling Scheme

    Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Risk Chain Prediction Metrics for Predicting Fault Proneness in Software Systems

    The paper presents two atypical risk chain prediction metrics for barometer coupling and accord in software systems. The authors' aboriginal metric, Ideal Coupling Between Object classes (ICBO), is based on the acclaimed CBO coupling metric, while the added metric, Ideal Lack of Cohesion On Methods (ILCOM5), is based on the...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Based ATM Security by Using ARM7

    The purpose of this paper is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    High Speed Data Acquisition System With Ethernet Interface

    This paper introduces a high speed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind this effort. Using standard...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sigfree: Buffer Overflow Attack Detection

    Sigfree act as a Defender or protective shield for the today's Information world from insider or outsider attacker. Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Buffer Overflow attack is an attack which gives rise to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Design & Simulation of Circular Microstrip Antenna With Defected Ground Structure (DGS) for WLAN Applications

    In this paper, a circular microstrip patch antenna with Defected Ground Structure (DGS) has been analyzed and simulated for the WLAN applications. The proposed antennas have been simulated at 2.45 GHz frequency using co-axial feeding technique. Actually, the authors design two circular microstrip antennas i.e. conventional CMSA and CMSA with...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Beam Pattern Improvement in CMA Using a Prefilter

    The demand for wireless mobile communications services is growing at an explosive rate; the high demand for 3G services needs increased in system capacity. The most elementary solution would be to increase bandwidth; however, this becomes challenging as the electromagnetic spectrum is becoming increasingly congested. The frequency reuse concept increases...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Development of OFDM Space Coded Outdoor Wireless Link

    Orthogonal Frequency-Division Multiplexing, or OFDM, is a process of digital modulation that is used in computer technology today. Essentially, OFDM is configured to split a communication signal in several different channels. Each of these channels is formatted into a narrow bandwidth modulation, with each channel operating at a different frequency....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the Embedded system makes it secure, table and reliable. Embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper describes...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Location Aided Routing in Mobile Ad Hoc Networks

    A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review on Methodologies of Remote Sensing, GPS and GIS

    Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans)...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Advance Scheme for Localization Using Curvilinear Component Analysis

    The performance of applications of wireless sensor network depend upon the precise location of the nodes. The localization protocol patches together the relative coordinate, local maps into a global coordinate map. These protocols require some nodes that know their absolute coordinates, called anchor nodes. While many factors influence the node...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Automatic Restaurant Order System Using Zigbee

    Automation is the Technology Concerned with Application of Mechanical, electronics & computer based systems to operate & control production. Due to advancement in technology the people have seen atomization of many things. They have seen an atomized vending machine which will serve a hot or soft drinks, Chocolates &many things....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Blind Channel Estimation Using Maximum Likelihood in OFDM Systems

    new blind channel estimation scheme for OFDM systems is based on the Maximum Likelihood (ML) principle. The approach combines different modulation schemes on adjacent subcarriers, such as BPSK and QPSK, to resolve phase ambiguity. By avoiding the use of second- and higher-order statistics, a very fast convergence rate is achieved....

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    BPSK Transmitter Design Using FPGA With DAC and Pulse Shaping Filter to Minimize Inter-Symbol Interference(ISI)

    In contrast to the sophisticated implementation of Binary Phase Shift Keying (BPSK) transmitter using Application Specific Integrated Circuit (ASIC), mixer, and Local Oscillator(LO) for carrier signal; Software Defined Radio (SDR) provides a high performance, efficient and re-configurable platform to integrate all these individual functions of BPSK transmitter. This paper presents...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed Localization in Wireless Ad-Hoc Networks

    Localization has newly received research interest due to the success of the emerging Wireless Sensor Network (WSN) technology. This interest is expected to grow further with the proliferation of wireless sensor network applications such as medicine, military, transport. In this context routing, protocols and technologies of communication on those wireless...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Energy Efficient Routing Protocols for Mobile Ad HocNetworks

    Ad hoc on demand distance vector routing protocol is specially designed for mobile ad hoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, the authors propose an energy efficient route...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fingerprint Liveness Detection Using Wavelet

    Fingerprint verification is one of the most reliable personal identification methods. It plays a very important role in forensic and civilian applications. In this paper, the authors propose a simple and effective approach for fingerprint liveness detection based on the wavelet analysis of the finger tip surface texture. In present...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Nonlinear Companding Transform Algorithm for Peak -to-Average Power Ratio Reduction of OFDM Signal

    Orthogonal Frequency Division Multiplexing (OFDM) is digital multicarrier Modulation access system for high data rate transfer .But it has high PEAK To Average Power Ratio which increases complexity of A/D Converter and D/A Converters and lowers the efficiency of power amplifiers. In this paper Repeated Clipping and Filtering (RCF) distortion...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    FPGA Implementation of MB-OFDM Using Biorthogonal Encoder

    UWB is a high data rate, short range technology .It transmits the information over a minimum bandwidth of 500 MHZ. Modern UWB systems use Modulation techniques such as OFDM (Orthogonal Frequency Division Multiplexing). The MB-OFDM proposal is selected for UWB system model. MultiBand OFDM (MB-OFDM) is a short-range wireless technology...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    New Fault Injection Approach for Network on Chip

    Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Study and Analysis of Fractal Linear Antenna Arrays

    A fractal is a recursively generated object having a fractional dimension. They have no characteristic size, and are constructed of many copies of themselves at different scales. In this paper, the authors primarily focus on design of fractal linear array antenna for even number of elements and comparison of fractal...

    Provided By IOSR Journal of Engineering

  • White Papers // Mar 2013

    Parametric Study for Rectangular Microstrip Patch Antennas

    Physically, MSA consists of a metallic radiating patch backed up by a dielectric substrate and a ground plane below that. These days, MSAs are widely used in many applications due to their inherent advantages such as low profile, lightweight, planer configuration and ease of fabrication. However, main limitation of MSAs...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    An Overview of Smart Antenna and a Survey on Direction of Arrival Estimation Algorithms for Smart Antenna

    Smart antenna systems is one of the most rapidly developing areas of communication. With effective Direction Of Arrival (DOA) and Beam forming techniques Smart Antenna Systems prove to be most efficient in terms of quality of signals in wireless communication. In this paper a brief overview of Smart Antenna along...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Data Quality Tools for Data Warehousing: Enterprise Case Study

    Ensuring data quality for an enterprise data repository various data quality tools are used that focus on this issue. The scope of these tools is moving from specific applications to a more global perspective so as to ensure data quality at every level. A more organized framework is needed to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey of EM Based Detection of Variable Subband Nulling Mode in OFDM based Cognitive Radio Systems

    Cognitive radio is a paradigm for wireless communication, in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. The OFDM based cognitive radio system is used for detection of signals. But in OFDM systems the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Literature Survey on Various Frequent Pattern Mining Algorithm

    Data mining discovers hidden pattern in data sets and association between the patterns. In this association, rule mining is one of the techniques used to achieve the objective of data mining. These rules are effectively used to uncover unknown relationships producing result that can give the authors a basis for...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A TMS DSP Processor Based Case Study of Grigoryan FFT Performance Over Cooley-Tukey FFT (TMS320C6748, TMS320C5515)

    Frequency analysis plays vital role in the applications like cryptanalysis, steganalysis, system identification, controller tuning, speech recognition, noise filters, etc. Discrete Fourier Transform (DFT) is a principal mathematical method for the frequency analysis. The way of splitting the DFT gives out various fast algorithms. In this paper, the authors present...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Document-Based and URL-Based Features for Automatic Classification of Cross-Site Scripting in Web Pages

    Dynamic websites comprised of objects such as HTML tags, script functions, hyperlinks and advanced features in browsers which provides numerous resources and interactiveness in services currently provided on the Internet. However, these features have also increased security risks and attacks since they allow malicious codes injection or XSS (Cross-Site Scripting)....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Dijkstra Algorithm for Feeder Routing of Radial Distribution System

    This paper proposes the application of Dijkstra algorithm for feeder routing of radial distribution system. A complete network of available routes is considered and the optimization goal is to find the routes that provide the minimal total annual cost, which is obtained by the proposed algorithm. Distribution system planning mainly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Informative Knowledge Discovery Using Multiple Data Sources, Multiple Features and Multiple Data Mining Techniques

    Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature....

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Sequential Pattern Mining Using Apriori Algorithm & Frequent Pattern Tree Algorithm

    The concept of Sequential Pattern Mining was first introduced by Rakesh Agrawal and Ramakrishnan Srikant in the year 1995. Sequential Patterns are used to discover sequential sub-sequences among large amount of sequential data. In web usage mining, Sequential Patterns are exploited to find sequential navigation patterns that appear in users'...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Cloud-Assisted Video Streaming Over QoS-Enabled Wireless Networks

    With the proliferation of inexpensive broadband connections, video streaming services over the Internet are growing rapidly. Delivering video over wireless networks is a challenging task, especially when high definition is required, due to its high bit rate, delay, and loss sensitivity. This paper presents a modified slicing scheme that can...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Neural Networks for Iris Recognition: Comparisons between LVQ and Cascade Forward Back Propagation Neural Network Models, Architectures and Algorithm

    In this paper, Iris recognition is a proven, accurate means to identify people. In this paper, it includes the preprocessing system, segmentation, feature extraction and recognition of an iris recognition system was suggested based on two Artificial Neural Network (ANN) models separately: Cascade Forward (CFBPNN) and Linear Vector Quantization (LVQ)....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Iris Recognition: An Emerging Biometric Technology

    Iris recognition is a well-known biometric technique. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Biometric Speech Watermarking Technique in Images Using Wavelet Transform

    The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cope With Black Hole Attacks in AODV Protocol in Manet by End to End Route Discovery

    Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

    Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Sensing Methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By IOSR Journal of Engineering