IOSR Journal of Engineering

Displaying 321-360 of 498 results

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Survey on Offline Signature Recognition and Verification Schemes

    Signature has been a distinguishing biometric feature through ages. They are extensively used as a means of personal verification; therefore an automatic verification system is needed. Even today thousands of financial and business transactions are being authorized via signatures. Signature verification finds its application in a large number of fields...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    To Study Channel Estimation Techniques in MIMO OFDM System

    A Multiple-Input Multiple Output (MIMO) communication system is used with Orthogonal Frequency Division Multiplexing (OFDM) modulation technique to achieve high and reliable data rate transmission over broadband wireless channels. The need of MIMO OFDM is important because of only MIMO improves the system capacity without additional bandwidth. The performance of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Assuage Bandwidth Utilization DDoS Attacks by Using Prototype Analyzer and Transfer Scheduling Scheme

    Denial-of-Service (DoS) attacks occur when the attacks are from a single source, whereas Distributed Denial-of-Service (DDoS) attacks occur when many compromised systems flood the resources or bandwidth of a target system. Although the authors cannot alleviate the Denial-of-Service or Distributed Denial-of-Service attacks entirely, they can limit the attacks by controlling...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Risk Chain Prediction Metrics for Predicting Fault Proneness in Software Systems

    The paper presents two atypical risk chain prediction metrics for barometer coupling and accord in software systems. The authors' aboriginal metric, Ideal Coupling Between Object classes (ICBO), is based on the acclaimed CBO coupling metric, while the added metric, Ideal Lack of Cohesion On Methods (ILCOM5), is based on the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation for V-Blast MIMO Systems Under Various Modulation Schemes Using Ricean Channel

    Wireless communication system with multi-antenna arrays has been a field of intensive research on the last years. The use of multiple antennas at both the transmitter and the receiver sides can drastically improve the channel capacity and data rate. The paper of the performance limits of MIMO system becomes very...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Embedded System Design for a Multi Variable Input Operations

    There are several multivariable input systems with one or more outputs exist in nature or designed and implemented successfully artificially. The input parameters of the system may or may not bear any relationship with each other however, output or outputs of the system definitely possess fixed relationship with input parameters....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

    Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. In CD-MAC every terminal is aggressively selects a relay for partnership and lets it transmit at the same time so that this mitigates intrusion from near terminals and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Compact Double-T Monopole Antenna for Dual Wideband Wireless Communications Systems

    In this paper, the authors carry a dual band monopole antenna design specially meant for wireless applications. The proposed antenna consists of a rectangular patch monopole in which a slot is cut in order to obtain a dual band operation and size reduction. The antenna operates in frequency band 2.3...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    SERA Noise Estimation for Speech Enhancement

    A practical single channel speech enhancement system consists of two major components, estimation of noise power spectrum and the estimation of speech. Therefore, a crucial component of any algorithm is the estimation of the noise power spectrum for highly non stationary noise environments. The performance of noise estimation algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Bandwidth Assignment Technique (Optimizing Technique) for Reliable Microwave Backhaul

    The design of wireless networks differs fundamentally from wired network design. First, the radio frequency spectrum is a limited natural resource which has been regulated worldwide to promote its efficient use. Second, the radio channel is a random and difficult communication medium. Actually, environment conditions can introduce instantaneously variations into...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Optimization of Energy Consumption by Fuzzy Based Routing in Wireless Sensor Network

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. WSN consists of sensor nodes which sense the physical parameters such as temperature, humidity, pressure and light etc and send them to a fusion center namely Base Station (BS) from where one can get the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Algorithm for Power Saving and Over Head Reduction in the Wireless Networks

    The majority of the nodes connected and operating as an today are Wireless networks, because of its own advantage. In the Adhoc networks nodes are not connected with any fixed infrastructure and are operated by battery power. Each node consumes a large amount of energy while transmission or reception of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Vlsi Design of Cache Compression in Microprocessor Using Pattern Matching Technique

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multi processors are used in the system design, more processors require more accesses to memory. Thus it raises a 'wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Analysis of Channel Assignment Scheme in Wimax

    Along with information technology of flourishing, the popularization rate of wireless communication equipment is higher. However, WiMAX is the one of new broadband wireless technologies. The performance of mobile WiMAX system is highly dependent on channel assignment scheme because frequency spectrum is finite in wireless communication systems. There are two...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Analysis of Quad-Band Rectangular Microstrip Patch Antenna

    This paper proposes the rectangular microstrip patch antenna suitable to operate in different frequency bands. The rectangular microstrip patch antenna is designed and simulated using IE3D simulation software. The result obtained shows that the designed antenna is suitable for operation in four different frequency bands with bandwidth of 6.90%, 2.33%,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Qos Parameters Comparison for 802.11 B, A&G Standards

    The use of wired local area networks has become ever more common place, even in situations where only a few computers need to be connected together. Advantages like cost reduction, High robustness and easy system configuration making WLAN more popular. Three different PHY layers are available for the IEEE 802.11...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Adaptive Bandwidth Allocation in Wireless Networks With Multiple Degradable Quality of Service

    In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Handset Antenna Design for Mobile Communication System

    Monopole slot antenna is suitable for handset applications due to its simple planar structure. Besides that, it is compact, low cost, low profile and easy to manufacture. It also has wide bandwidth and omnidirectional charatriesticts. The monopole antenna is obtained by cutting monopole slot at the edge of the ground...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Improvement of Handoff Decision in GSM-Railway Using Fuzzy Logic

    In this paper, the authors present two algorithms, are based on fuzzy logic, conventional algorithm and Proposed algorithms. Both handoff algorithms are used average handoff factor to decide when to handoff and when not in case of high speed mobile terminals. Conventional algorithm is of two types, one is conventional...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Compact Size Reconfigurable Antenna for Ultra-Wideband Applications

    This paper presents a simpler method of designing a compact size reconfigurable antenna useful for ultra-wideband applications. The reconfigurability of the antenna designed was achieved by using the concept of open-circuit and short-circuit so only single structure was designed and reconfigurability of frequency was achieved. The substrate on which the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    ATLIST Method: Exploits Vulnerability in SOA

    The numbers of reported day to day increase Vulnerabilities in operating system and web applications. Vulnerability analysis approaches done several manual tasks so it's error prone and costly. Now, ATLIST is a new vulnerability analysis method to detect victims or weakness on client activities in single machine, shared resources and...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Architecture to Achieve Anonymity and Traceability

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Monitoring Road Accidents Using Sensors and Providing Medical Facilities

    This paper is to detect an accident in which immediately help is required to driver and driver is not in position to inform any medical rescue team. In this kind of situation there is a need to develop such system which should inform automatically to medical rescue team that some...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

    For advanced streaming applications over wired-wireless networks TCP-Friendly Rate Control (TFRC) has been widely adopted nowadays to give smooth sending rate and unceasing quality in streaming applications TFRC applies an equation-based rate control scheme. However, TFRC tends to fail in wireless environment if packet lost event was done by poor...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Mobile Data Availability Similarity Between Cooperative Caching and Replication

    Mobile computing led to gain increased attention to people and to their ability and efficiency of its services at any time and place, example of this query for billing, and weather forecast, as well as retrieval of information through the database of bank accounts is done through different working environment,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Practical and Comparative Study of Call Graph Construction Algorithms

    A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the improvements over previous Call Graphs in terms of precision, cost and accuracy. In object oriented languages the Call...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Review on Diverse Ensemble Methods for Classification

    Ensemble methods for different classifiers like bagging and boosting which combine the decisions of multiple hypotheses are some of the strongest existing machine learning methods. The diversity of the members of an ensemble is known to be an important factor in determining its generalization error. DECORATE (Diverse Ensemble Creation by...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Cost Estimation of Maintenance Phase for Component Based Software

    Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Accurate estimation makes good understanding between the customer and user. Maintenance plays important role in various software developments like Iterative development, Agile development and Component Based Software Development...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Energy Efficient Anchor-Based Localization Algorithm for WSN

    Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. To solve the localization problem for find out the location of sensor nodes in wireless sensor network, a Anchor based...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing

    Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the software. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of limited capability (power and processing) Micro Electro Mechanical Systems (MEMS) capable of measuring and reporting physical variables related to their environment. In surveillance applications, sensors are deployed in a certain field to detect and report events like presence, movement, or...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Web Personalization Using Ontology: A Survey

    This paper contains concept of ontologies on the basis of user behaviour being analyzed. Ontologies are the structural frameworks for organizing information and are used in artificial intelligence, the Semantic Web, systems engineering, software engineering, biomedical informatics, library science, enterprise bookmarking, and information architecture as a form of knowledge representation...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    An Algorithm to Simulate the Temporal Database Using Exponential Distribution

    Since the early eighties, an active temporal database research community has sought new insight into the management of time-referenced, or temporal, data and has developed concepts, tools and techniques that better support the management of such data. Much of this activity has been motivated by the observations that most databases...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Cryptography Using Genetic Algorithms (GAs)

    Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. Public key cryptography is one of the most important types of cryptography. In public key cryptography the key has to be unique. There are...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Detection of SQL Injection Attack in Web Applications Using Web Services

    Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks are extremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application's...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Impact of Personal Software Process on Software Quality

    Today, concern for quality has become an international movement. Even though most industrial organizations have now adopted modern quality principles, the software community has continued to rely on testing as the principal quality management method. Different decades have different trends in software engineering. The Personal Software Process (PSP) is an...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Optimal Route Search in Mobile Ad-Hoc Network Using Ant Colony Optimization With Power Saving Technique

    In ad-hoc networks the mobile nodes communicate with each other using multi-hop wireless links. The main drawback of such network is that there are no stationary infrastructures to route the packets. Hence, routing protocols have to adapt quickly and elegantly to frequent and unpredictable changes in network technology and they...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Web Based Solution for Thermal Printing of Bar Code

    A barcode is an optical machine-readable representation of data, which shows the relevant data about the material to which it is attached or fixed. With the help of bar code, the information can be assessed automatically, quickly and accurately. It is the fastest means of gathering data and can be...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2012

    Intrusion Detection Technique Based on Dendritic Cell Algorithm and Dempster Belief Theory

    Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    A Statistical Approach to Perform Web Based Summarization

    Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism of the search engines they use. Not surprisingly it in general consists...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    A New Algorithm to Find Best Splitting Criteria for Web Page Classification

    Web is popular as the availability of data is vast. It contains several billions of HTML documents, pictures and other multi media files. These documents reside on Internet servers and the information-exchange can be done through HTTP protocols. Individual HTML files having unique address is called Web page and collection...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2012

    Efficient Load Balancing in Cloud Computing Using Fuzzy Logic

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, software and web services. A cloud consists of several elements such as clients, data centers and distributed servers, internet and it includes fault tolerance, high availability, effectiveness, scalability, flexibility, reduced overhead for users,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jul 2011

    Challenging Computing Techniques - An Overview of Cloud Computing

    Cloud computing is an Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity. It is a new generation of computing that utilizes distant servers for data storage and management, allowing the device to use smaller and more efficient chips that consume...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Evaluation of UWB Interference on WiMAX

    This paper describes the analysis of UWB interference on WiMax systems. Co-existence between these two systems is important due to unlicensed use of 3.1 to 10.6 GHz frequency band by UWB. The interference impact of UWB devices entirely depends on the victim receiver characteristics. From the knowledge of noise density...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2011

    Rapid Growth of Customer Use and Adoption of the Broadcasting Agent and Receivers: A Driving M-Commerce Factor

    The success of M-commerce credit goes to the M-commerce driving factors. The driving factor instruct that the factor which is responsible and necessary for enabling the M-commerce. There are Radio broadcasting, telephone broadcasting, television broadcasting, cable radio broadcasting, satellite broadcasting and web casting considering as broadcasting agent. It is observed...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Secure Model for Cloud Computing Based Storage and Retrieval

    Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to...

    Provided By IOSR Journal of Engineering