IOSR Journal of Engineering

Displaying 321-360 of 485 results

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    SERA Noise Estimation for Speech Enhancement

    A practical single channel speech enhancement system consists of two major components, estimation of noise power spectrum and the estimation of speech. Therefore, a crucial component of any algorithm is the estimation of the noise power spectrum for highly non stationary noise environments. The performance of noise estimation algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Bandwidth Assignment Technique (Optimizing Technique) for Reliable Microwave Backhaul

    The design of wireless networks differs fundamentally from wired network design. First, the radio frequency spectrum is a limited natural resource which has been regulated worldwide to promote its efficient use. Second, the radio channel is a random and difficult communication medium. Actually, environment conditions can introduce instantaneously variations into...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Optimization of Energy Consumption by Fuzzy Based Routing in Wireless Sensor Network

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. WSN consists of sensor nodes which sense the physical parameters such as temperature, humidity, pressure and light etc and send them to a fusion center namely Base Station (BS) from where one can get the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Algorithm for Power Saving and Over Head Reduction in the Wireless Networks

    The majority of the nodes connected and operating as an today are Wireless networks, because of its own advantage. In the Adhoc networks nodes are not connected with any fixed infrastructure and are operated by battery power. Each node consumes a large amount of energy while transmission or reception of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Vlsi Design of Cache Compression in Microprocessor Using Pattern Matching Technique

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multi processors are used in the system design, more processors require more accesses to memory. Thus it raises a 'wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Analysis of Channel Assignment Scheme in Wimax

    Along with information technology of flourishing, the popularization rate of wireless communication equipment is higher. However, WiMAX is the one of new broadband wireless technologies. The performance of mobile WiMAX system is highly dependent on channel assignment scheme because frequency spectrum is finite in wireless communication systems. There are two...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Analysis of Quad-Band Rectangular Microstrip Patch Antenna

    This paper proposes the rectangular microstrip patch antenna suitable to operate in different frequency bands. The rectangular microstrip patch antenna is designed and simulated using IE3D simulation software. The result obtained shows that the designed antenna is suitable for operation in four different frequency bands with bandwidth of 6.90%, 2.33%,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Qos Parameters Comparison for 802.11 B, A&G Standards

    The use of wired local area networks has become ever more common place, even in situations where only a few computers need to be connected together. Advantages like cost reduction, High robustness and easy system configuration making WLAN more popular. Three different PHY layers are available for the IEEE 802.11...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Assuage Bandwidth Utilization DDoS Attacks by Using Prototype Analyzer and Transfer Scheduling Scheme

    Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Risk Chain Prediction Metrics for Predicting Fault Proneness in Software Systems

    The paper presents two atypical risk chain prediction metrics for barometer coupling and accord in software systems. The authors' aboriginal metric, Ideal Coupling Between Object classes (ICBO), is based on the acclaimed CBO coupling metric, while the added metric, Ideal Lack of Cohesion On Methods (ILCOM5), is based on the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation for V-Blast MIMO Systems Under Various Modulation Schemes Using Ricean Channel

    Wireless communication system with multi-antenna arrays has been a field of intensive research on the last years. The use of multiple antennas at both the transmitter and the receiver sides can drastically improve the channel capacity and data rate. The paper of the performance limits of MIMO system becomes very...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Embedded System Design for a Multi Variable Input Operations

    There are several multivariable input systems with one or more outputs exist in nature or designed and implemented successfully artificially. The input parameters of the system may or may not bear any relationship with each other however, output or outputs of the system definitely possess fixed relationship with input parameters....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

    Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. In CD-MAC every terminal is aggressively selects a relay for partnership and lets it transmit at the same time so that this mitigates intrusion from near terminals and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Compact Double-T Monopole Antenna for Dual Wideband Wireless Communications Systems

    In this paper, the authors carry a dual band monopole antenna design specially meant for wireless applications. The proposed antenna consists of a rectangular patch monopole in which a slot is cut in order to obtain a dual band operation and size reduction. The antenna operates in frequency band 2.3...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

    Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. In CD-MAC every terminal is aggressively selects a relay for partnership and lets it transmit at the same time so that this mitigates intrusion from near terminals and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Compact Double-T Monopole Antenna for Dual Wideband Wireless Communications Systems

    In this paper, the authors carry a dual band monopole antenna design specially meant for wireless applications. The proposed antenna consists of a rectangular patch monopole in which a slot is cut in order to obtain a dual band operation and size reduction. The antenna operates in frequency band 2.3...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Fading Channels on OFDM

    High data rates are demanded a lot in modern communications. It is the huge development in the communications industry that led to this demand. One of the essential components of recent communications is Orthogonal Frequency Division Multiplexing (OFDM). Handling bad conditions, high bandwidth and using the available spectral efficiently are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Factors of Cloud Computing Data Centers Using M/G/m/m+r Queuing Systems

    Cloud computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing systems fundamentally provide access to large amounts of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    An Analysis of V-Blast Detection Schemes for MIMO Wireless Communications

    Vertical Bell Laboratories lAyered Space Time (V-BLAST) is a Multiple Input Multiple Output (MIMO) wireless communication system that uses multiple antenna elements at transmit and receive to offer high spectral efficiency and increased capacity in a rich multipath environment without increasing the use of the spectrum. Whereas, the detection schemes...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Performance of TCP, UDP and SCTP on Sensor Network with Different Data Reporting Intervals

    The performance of the congestion control algorithms of most of the reliable transport protocol of internet, particularly wireless networks and mobile ad-hoc networks, are not satisfactory under a high density sensor network applications, since they are designed mainly for wired networks and not for sensor networks. In this paper, the...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Throughtput Competitive Advance Reservation Using Polynomial Time

    In response to the high throughput needs of grid and cloud computing applications, several production networks have recently started to support advance reservation of dedicated circuits. An important open problem within this paper is to devise advance reservation algorithms that can provide provable throughput performance guarantees independently of the specific...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Information Integration for Heterogeneous Data Sources

    Information retrieval from heterogeneous information systems is required but challenging at the same as data is stored and represented in different data models in different information systems. Information integrated from heterogeneous data sources into single data source are faced upon by major challenge of information transformation-were in different formats and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Integrating Virtual Reality in Education Using Intranet Grids

    In recent years there has been increase in diverse views in relation to the use of Virtual Reality (VR) to enhance learning and cognition. Besides, there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. On the other hand, the advent of grid...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2012

    Optimized Self Reconfigurable Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications, such as public safety, environment monitoring, and citywide wireless Internet services. They have also been evolving in various forms e.g., using multiradio/channel systems to meet the increasing capacity demands by the above-mentioned and other...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Preserving Privacy in Horizontally Partitioned Databases Using Hierarchical Model

    Now-a-days, business organizations and government sectors need to maintain large amounts of data to be integrated in distributed databases for storing from scientific experiments, daily transactions in businesses etc. The data may contain personal information as well. It is necessary to preserve information about the individuals in many organizations. So...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study on Performance Evaluation of Peer-to-Peer Distributed Databases

    The design phase of the distributed database environment holds a vital part in affecting the performance. The Peer-to-Peer architecture gives a great degree of hope to handle the data in an efficient manner. This paper analyses a cluster based Peer-to-Peer architecture named FlexiPeer for the distributed databases to address the...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Security Against Selective Forward Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are being increasingly deployed for various applications such as object tracking and monitoring, precision agriculture, controlling nuclear reactors, detecting seismic activities, security and surveillance, navigational activities, industrial automation, and so on. In selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Transmission of MIMO - OFDM Signal Using Optical Link

    Wireless networks have quickly become part of everyday life. Wireless LANs, cell phone networks, and personal area networks are just a few examples of widely used wireless networks. However, wireless devices are range and data rate limited. The research community has spent a great deal of effort on finding ways...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cryptography Playfair Cipher Using Linear Feedback Shift Register

    In this paper, the authors present a new approach for secure transmission of message by modified version of Play fair cipher combining with random number generator methods. To develop this method of encryption technique, one of the simplest methods of random number generator methods called Linear Feedback Shift Register (LFSR)...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Designing a Secure Protocol for Mobile Voting Through SMS

    In this paper, the authors cover a novel scheme to solve the issue of holding fair electoral verdict indications of people in a country or in an organization through proposing the design and development of mobile voting protocol which is not only very easy to use but is also robust,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    A Study of the Modified KDD 99 Dataset by Using Classifier Ensembles

    Network security has been an important research area. KDD 99 dataset has been used to analyze various network security methods. However, it has been shown that this dataset has redundant data points that make the analysis bias for these data points. New modified data sets are proposed that overcome these...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Adaptive Coding and Energy Efficient Packet Rate Transmission Over Wireless LAN Friendly VOIP

    Energy efficiency takes important in wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. Current wireless network power management often substantially degrades performance and may increase overall energy usage when used with latency-sensitive applications. The authors propose power management that adapts its behavior...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Concealing Encrypted Iris Templates in Images Using Quantized DCT Coefficients

    In this paper, the authors introduce a novel steganography-based approach to protect the iris data by hiding it into a digital image for personal identification purpose. Transformations are done to encrypt the biometric data before hiding. JPEG quantization blocks in diagonal sequence are investigated for exploring an efficient hiding algorithm...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Cloud Agile Manufacturing

    In this paper, the authors propose a new manufacturing paradigm called Cloud Agile Manufacturing, and its principal objective is to offer industrial production systems as a service. Thus users can access any functionality available in the cloud of manufacturing (process design, production, management, business integration, factories virtualization, etc.) without knowledge...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2012

    Component Identification From Existing Object Oriented System Using Hierarchical Clustering

    One of the important tasks in software engineering is software architecture modeling. High level software architecture is useful in all phases of software life cycle. Component based software architecture is beneficial as it is useful for reusing system parts represented as components. Most of the existing object-oriented systems do not...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Hardware Implementation of Modified RC4 Stream Cipher Using FPGA

    In this paper, an efficient hardware implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Implementation of Artificial Intelligence Techniques for Economic Load Dispatch

    In this paper, the authors present the applications of computational intelligence techniques to economic load dispatch problems. The fuel cost equation of a thermal plant is generally expressed as continuous quadratic equation. In real situations the fuel cost equations can be discontinuous. In view of the above, both continuous and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Power Efficient Energy-Aware Routing Protocol for Wireless Sensor Networks

    The most important issue that must be solved in designing a data transmission algorithm for Wireless Sensor Networks (WSNs) is how to save sensor node energy while meeting the needs of applications/users as the sensor nodes are battery limited. While satisfying the energy saving requirement, it is also necessary to...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Data Transmission at 16.8kb/s Over 32kb/s ADPCM Channel

    In this paper, the authors present three models of Quadrature Amplitude Modulation (QAM) modem operating at data rate of 16.8kb/s to be transmitted over 32kb/s Adaptive Differential Pulse Code Modulation (ADPCM) channel. These modems operate at symbol rates of 2400, 2800, and 3360 baud with associated number of bits per...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Improving the Quality of Service in Wireless Body Area Networks Using Genetic Algorithm

    Wireless Body Area Sensor Networks are the highly distributed network, in which its nodes are the organizer itself and each of them has the flexibility of gathering and sending patient biomedical knowledge to a terminal that referred to as sink. When knowledge sent to sink from a path that doesn't...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Performance Evaluation Method Proposal for High Performance ICT Systems and Networks

    In this paper, the authors present a predicted functional architecture of an emerging application of High Performance Computing and Communication (HPCC) application: the integrated manufacturing and management system. The computer network was defined for a case study of big manufacturer of household appliances. To evaluate and/or predict performance of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Implementation of WSN Node Using Hardware Specialization

    Wireless Sensor Networks holds space in wide range of application ranging from tracking to monitoring health, environment etc. The power (energy consumption) attribute for WSN requires special attention as WSN has to work unattended for long durations. Till now WSN nodes has been designed using low-power micro-controller. But still its...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Improving Computational Efficiency of Tentative Data Set

    The aim of data mining is to find novel, interesting and useful patterns from data using algorithms that will do it in a way that is more computational efficient than previous method. Current data mining practice is very much driven by practical computational concerns. In focusing almost exclusively on computational...

    Provided By IOSR Journal of Engineering