IOSR Journal of Engineering

Displaying 321-360 of 498 results

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    SERA Noise Estimation for Speech Enhancement

    A practical single channel speech enhancement system consists of two major components, estimation of noise power spectrum and the estimation of speech. Therefore, a crucial component of any algorithm is the estimation of the noise power spectrum for highly non stationary noise environments. The performance of noise estimation algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Bandwidth Assignment Technique (Optimizing Technique) for Reliable Microwave Backhaul

    The design of wireless networks differs fundamentally from wired network design. First, the radio frequency spectrum is a limited natural resource which has been regulated worldwide to promote its efficient use. Second, the radio channel is a random and difficult communication medium. Actually, environment conditions can introduce instantaneously variations into...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Optimization of Energy Consumption by Fuzzy Based Routing in Wireless Sensor Network

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. WSN consists of sensor nodes which sense the physical parameters such as temperature, humidity, pressure and light etc and send them to a fusion center namely Base Station (BS) from where one can get the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Algorithm for Power Saving and Over Head Reduction in the Wireless Networks

    The majority of the nodes connected and operating as an today are Wireless networks, because of its own advantage. In the Adhoc networks nodes are not connected with any fixed infrastructure and are operated by battery power. Each node consumes a large amount of energy while transmission or reception of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Vlsi Design of Cache Compression in Microprocessor Using Pattern Matching Technique

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multi processors are used in the system design, more processors require more accesses to memory. Thus it raises a 'wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Analysis of Channel Assignment Scheme in Wimax

    Along with information technology of flourishing, the popularization rate of wireless communication equipment is higher. However, WiMAX is the one of new broadband wireless technologies. The performance of mobile WiMAX system is highly dependent on channel assignment scheme because frequency spectrum is finite in wireless communication systems. There are two...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Analysis of Quad-Band Rectangular Microstrip Patch Antenna

    This paper proposes the rectangular microstrip patch antenna suitable to operate in different frequency bands. The rectangular microstrip patch antenna is designed and simulated using IE3D simulation software. The result obtained shows that the designed antenna is suitable for operation in four different frequency bands with bandwidth of 6.90%, 2.33%,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Qos Parameters Comparison for 802.11 B, A&G Standards

    The use of wired local area networks has become ever more common place, even in situations where only a few computers need to be connected together. Advantages like cost reduction, High robustness and easy system configuration making WLAN more popular. Three different PHY layers are available for the IEEE 802.11...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Construct of Broadband Printed Rectangular Monopole Antenna

    In this paper, the authors have investigated an rectangular monopole antenna that was printed on a Printed Circuit Board (PCB). The antenna consists of a rectangular patch and a ground plane so that the antenna acts as a planar monopole antenna which is broadband. Broadband planar monopole antennas have all...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Bandwidth Allocation in Wireless Networks With Multiple Degradable Quality of Service

    In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Handset Antenna Design for Mobile Communication System

    Monopole slot antenna is suitable for handset applications due to its simple planar structure. Besides that, it is compact, low cost, low profile and easy to manufacture. It also has wide bandwidth and omnidirectional charatriesticts. The monopole antenna is obtained by cutting monopole slot at the edge of the ground...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud

    Cloud computing, the next generation architecture of IT enterprises, offers the users with a flexible computing environment. In cloud, the virtualized resources are provided as a service over the internet. Typical applications that have already been thought of are SaaS (Software as a Service), PaaS (Platform as a Service), IaaS...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Forensics-An IS Approach

    The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level Agreement (SLA) bounded only by the capacity of the data center. Hence,...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Entrepreneurial Idea Development to Business Start-Up: Teaching Methodological Approach

    The crucial issue on entrepreneurship training in the tertiary institutions of learning is teaching students how to develop innovative business idea to the business venture start-up stage. This is the ability of the students to develop ideas that are out of the theoretical teaching of the academic environment. Several scholars...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Detecting and Prevention Cross -Site Scripting Techniques

    Cross-site scripting is one of the main problems of any Web-based service. Since Web browsers support the execution of commands embedded in Web pages to enable dynamic Web pages attackers can make use of this feature to enforce the execution of malicious code in a user's Web browser. To augment...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Hidden Web Indexing Using HDDI Framework

    There are various methods of indexing the hidden web database like novel indexing, distributed indexing or indexing using map reduce framework. The authors' goal is to find an optimized indexing technique keeping in mind the various factors like searching, distribute database, updating of web, etc. Here, they propose an optimized...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    New Trends in Real Time Operating Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence embedded systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Best Information Search Using Probabilistic Flooding in Unstructured Peer-to-Peer Networks

    The "Peer-To-Peer" (P2P) networks refer to a class of systems and applications that employ distributed resources to perform a function in a decentralized manner. Unstructured Peer-To-Peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion. Ideally, unstructured P2P systems would...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    SEP Performance of MFSK in Rician Fading Channel Based on MGF Method

    Symbol Error Probability (SEP) of non-coherent frequency shift keying over slow flat Rician fading channel is calculated with Maximal Ratio diversity Combining (MRC) technique using Moment Generating Function(MGF). The authors assume that channel side information is known to the receiver. Error performance plots of modulation technique has been drawn for...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    An Analytical Approach to S-Box Generation

    The concept of concealing the meaning of a message from all but the intended recipients is the job of a crypto system. The development of digital computers allowed the complexity of encryption algorithms to increase and to be used in a wide range of applications, including civilian use. This paper...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Fault Tolerant Architecture in Decentralized Intrusion Detection System

    The aim of this paper is to detect anomalous usage of legitimate applications by authorized users in Windows environment and to implement a fault - tolerant architecture which can continue providing detection service even in case of failure of one or more detecting servers. This paper also aims to implementing...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    2x2 Array Multiplier Based on DCVS Logic

    The Array architecture is a popular technique to implement the multipliers due to its compact structure. In this paper, 2x2 array multiplier circuits using existing full adder and DCVS logic full adder have been designed, simulated, analyzed and compared. An extensive analysis of multipliers has been done. According to the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Efficient Implementation of Ogg Vorbis Decoder Using Soft Core Processor

    In this paper, the authors describe a design of Ogg vorbis decoder for an embedded platform. Ogg vorbis is an audio compression format developed by the Xiph.Org foundation, a non-profit organization working in the area of Internet multimedia technology. Since ogg vorbis decoding process incurs high computational complexity, a software...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Video Surveillance Based Traffic Monitoring System

    Visual analysis is concerned with detection and analysis of a target object in a sequential stream of images. While many algorithms are successful to detect objects effectively in controlled environments, they get bugged with the variations of the object's appearance or with the surrounding change. The ability to reliably detect...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Simulation Based Comparative Performance Study of AODV, DSR and ZRP in Mobile Ad Hoc Networks (MANETs) Using Qualnet 5.0.2

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration of the mobile networks .Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad-hoc NETworks (MANET's). Mobility...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Implementation of Unified Architecture of 802.11a and 802.16a PHY Layers Using Verilog HDL (R & D)

    WiFi and WiMAX are the well developed and standardized technologies working on OFDM platform. Their physical layer architecture are much similar accept WiMAX physical layer has RS encoder & decoder at transmitter and receiver respectively. WiFi and WiMAX are widely used wireless technologies for accessing internet. This paper elaborates the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Minimization of Time & Cost Factors with Optimized Program-States Using Exception-Handling Constructs in Java (During Analysis and Testing of Programs)

    It has been observed that 80% of development time and a lots of memory space is spend over handling the abnormal conditions and exceptions in any programming environment. It also affects the cost factor of program development also. The support for precise exceptions in optimizing Java program states, combined with...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Design and Implementing of Serial Ports to Ethernet Gateway on Embedded System

    The use of the multi-serial/Ethernet conversion gateway simplifies the networked control and distributed management of information for serial devices. So the design of a new type of gateway for data converting from serial ports to Ethernet based on embedded system is highlighted in this paper. The design is based on...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Harms Associated with Cellular Towers (CDMA vs GSM)

    The use of mobile phone is increasing enormously, and hence has become a subject of recent interest and study, due to use of ElectroMagnetic (EM) wave in the microwave range and produces radiation. Various physiological studies have found that the excessive Radio Frequency (RF) wave exposure affects the biological systems...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Memorized Window Consolidation (MWC) Based TCP Recovery for Vegas and B/w Based Congestion Control

    In this paper, the authors present a framework for unanimous TCP flow window size recovery, "Memorized flow recovery", which differs from most TCP algorithms by memorized window size consolidation as measure to control the window size increment post link recovery from disconnection. It identifies the window size in use during...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Study and Performance Evaluation of Xilinx HDLC Controller and FCS Calculator

    In this paper, design, simulation and implementation design of HDLC Controller provides a high performance. This design is then coded in a Hardware Description Language (VHDL). The functioning of the coded design is to simulate on simulation software (e.g. ModelSim). After proper simulation, the design is synthesized and then translated...

    Provided By IOSR Journal of Engineering