IOSR Journal of Engineering

Displaying 321-360 of 481 results

  • White Papers // Aug 2012

    Performance Evaluation for V-Blast MIMO Systems Under Various Modulation Schemes Using Ricean Channel

    Wireless communication system with multi-antenna arrays has been a field of intensive research on the last years. The use of multiple antennas at both the transmitter and the receiver sides can drastically improve the channel capacity and data rate. The paper of the performance limits of MIMO system becomes very...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Embedded System Design for a Multi Variable Input Operations

    There are several multivariable input systems with one or more outputs exist in nature or designed and implemented successfully artificially. The input parameters of the system may or may not bear any relationship with each other however, output or outputs of the system definitely possess fixed relationship with input parameters....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Amplify-Forward & Distributed Space Time-Coded Cooperation to Exploiting CD Based Robust MAC Protocol in Ad-hoc Network

    Cooperative Diversity MAC, it exploits the cooperative communication promising of the physical layer to get enhanced strength in wireless ad hoc networks. In CD-MAC every terminal is aggressively selects a relay for partnership and lets it transmit at the same time so that this mitigates intrusion from near terminals and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Application Based Route Optimization

    All the traffic seen by the internet is treated equally which is generally known as Internet neutrality. Internet neutrality enforces that all network traffic should be treated as equal and best effort routing policy should be followed. But with the advent of smart applications this is drastically changing. Each network...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Compact Double-T Monopole Antenna for Dual Wideband Wireless Communications Systems

    In this paper, the authors carry a dual band monopole antenna design specially meant for wireless applications. The proposed antenna consists of a rectangular patch monopole in which a slot is cut in order to obtain a dual band operation and size reduction. The antenna operates in frequency band 2.3...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Data Leakage Detection: A Survey

    This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Securing Cloud Data Storage

    Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has led to the innovation of Cloud Computing. One fundamental aspect of this new computing is that data...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Swot Analysis of Software Quality Metrics for Global Software Development: A Systematic Literature Review Protocol

    Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Systematic Literature Review Protocol for Software Outsourcing Partnership (SOP)

    Software Outsourcing Partnership (SOP) is a relationship between client and vendor organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually a successful outsourcing relationship may lead to outsourcing partnership. The paper is to identify factors via Systematic Literature Review (SLR), that are significant to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Message Passing Algorithm: A Tutorial Review

    This paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the message that has been corrupted by the noisy channel. These block codes can be graphically represented...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Evaluation of WLAN by Varying Pcf, Dcf and Enhanced Dcf Slots to Improve Quality of Service

    Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, the authors evaluate the performance of wireless network using PCF, DCF & EDCF. They perform simulations using OPNET IT GURU Academic Edition simulator....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Hybrid Web Mining Framework

    With the dramatically quick and explosive growth of information available over the Internet, World Wide Web has become a powerful platform to store, disseminate and retrieve information as well as mine useful knowledge. A user interacts with the Web; there is a wide diversity of user's content they prefer and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Finger Print Analysis and Matching Using Fuzzy Logic Design

    Fingerprint authentication is implemented using many algorithms, which are based either on minutiae analysis or non minutiae analysis. Preprocessing of the fingerprints is important for better accuracy. Preprocessing includes segmentation and noise removal, which are considered two major steps in preprocessing. In this paper segmentation is performed by using fuzzy...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Authentication of Document Image With Data Repairing

    In this paper, the authors are introducing a blind authentication method which is based on the secret sharing technique with a data repair capability for document images with the use of the PNG image. They generate an authentication signal for each block of a document image which, together with the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Electrostatic Discharge on Digital and Analog Circuits

    A comparative study of the effects of ElectroStatic Discharge (ESD) on digital and analog circuits is carried out. Direct and Indirect discharge is performed on the circuit having both analog and digital circuitry. First the Indirect discharge on the ground plane is done for different voltages and distances. Then the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadband Cpw Fed Slotted Ground Antenna

    In this paper, a broadband rectangular microstrip patch antenna fed by coplanar waveguide feed with two slots in the ground plane is proposed. Investigations are carried out using coplanar waveguide feed with slotting in the ground plane to optimize the broadband operation. A sensitivity analysis shows the variation of return...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Dielectric Resonator Antenna Array for Wideband Applications

    A resonant antenna was proposed by Professor S. A. Long in 1983. The Dielectric Resonator Antennas (DRAs) offer several advantages, such as small size, low dissipation loss. Since the DRA has negligible metallic loss, it is highly efficient when operated at millimeter wave frequencies. The shapes of DRAs are various-simple...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Dynamic Spectrum Sensing by Channel Information Table in Cognitive Radios

    The spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In cognitive radio networks, the secondary (unlicensed) users need to find idle channels via spectrum sensing for their transmission. Adaptive Spectrum Sensing...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Verification of Five Port Router for Network on Chip Using VERILOG

    The focus of this paper is the actual implementation of network router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, hardware verification languages and EDA tools and qualifies the design for Synthesis and implementation. This router design contains Four output...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Channel Estimation Algorithm Using an Improved DFT for MIMO-OFDM Systems

    The Improved DFT-based Channel Estimation Algorithm for MIMO-OFDM System uses the symmetric property to extend the LS estimate in frequency domain, and calculates the changing rate of the leakage energy, and selects useful paths by the changing rate. The conversion from a very long (or infinite) sequence to a manageable...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Effect of Traffic Pattern on Packet Delivery Ratio in Reactive Routing Protocol of Manet

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In such a scenario a mobile host can act as both a host and a...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Detection of Intruders and Flooding in VoIP Using IDS, Jacobson Fast and Hellinger Distance Algorithms

    VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Wireless Communication and Security in Wimax

    Wireless communication deals with data transmission over air as interfacing medium between the transmitting and receiving stations posing data security as biggest challenge. Although, technologies other than wireless introduced earlier pay significant service to users, the broadband wireless, with mobility is the first choice of people all over. In this,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Non Linear Optimum Interacting Multiple Model Smoother for GPS Navigation System

    The navigation problem is to direct the movement of vehicle so as to arrive at a given destination. The single model unscented filter gives better accuracy for non-linear navigation problems using unscented transform. But it fails to address noise variations in vehicle dynamics. Hence the multiple model filtering is required...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    SERA Noise Estimation for Speech Enhancement

    A practical single channel speech enhancement system consists of two major components, estimation of noise power spectrum and the estimation of speech. Therefore, a crucial component of any algorithm is the estimation of the noise power spectrum for highly non stationary noise environments. The performance of noise estimation algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Bandwidth Assignment Technique (Optimizing Technique) for Reliable Microwave Backhaul

    The design of wireless networks differs fundamentally from wired network design. First, the radio frequency spectrum is a limited natural resource which has been regulated worldwide to promote its efficient use. Second, the radio channel is a random and difficult communication medium. Actually, environment conditions can introduce instantaneously variations into...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Optimization of Energy Consumption by Fuzzy Based Routing in Wireless Sensor Network

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. WSN consists of sensor nodes which sense the physical parameters such as temperature, humidity, pressure and light etc and send them to a fusion center namely Base Station (BS) from where one can get the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Algorithm for Power Saving and Over Head Reduction in the Wireless Networks

    The majority of the nodes connected and operating as an today are Wireless networks, because of its own advantage. In the Adhoc networks nodes are not connected with any fixed infrastructure and are operated by battery power. Each node consumes a large amount of energy while transmission or reception of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Vlsi Design of Cache Compression in Microprocessor Using Pattern Matching Technique

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multi processors are used in the system design, more processors require more accesses to memory. Thus it raises a 'wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Analysis of Channel Assignment Scheme in Wimax

    Along with information technology of flourishing, the popularization rate of wireless communication equipment is higher. However, WiMAX is the one of new broadband wireless technologies. The performance of mobile WiMAX system is highly dependent on channel assignment scheme because frequency spectrum is finite in wireless communication systems. There are two...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Analysis of Quad-Band Rectangular Microstrip Patch Antenna

    This paper proposes the rectangular microstrip patch antenna suitable to operate in different frequency bands. The rectangular microstrip patch antenna is designed and simulated using IE3D simulation software. The result obtained shows that the designed antenna is suitable for operation in four different frequency bands with bandwidth of 6.90%, 2.33%,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Qos Parameters Comparison for 802.11 B, A&G Standards

    The use of wired local area networks has become ever more common place, even in situations where only a few computers need to be connected together. Advantages like cost reduction, High robustness and easy system configuration making WLAN more popular. Three different PHY layers are available for the IEEE 802.11...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    VLSI Based Implementation of Single Round AES Algorithm

    This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Factors of Cloud Computing Data Centers Using M/G/m/m+r Queuing Systems

    Cloud computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing systems fundamentally provide access to large amounts of...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    An Analysis of V-Blast Detection Schemes for MIMO Wireless Communications

    Vertical Bell Laboratories lAyered Space Time (V-BLAST) is a Multiple Input Multiple Output (MIMO) wireless communication system that uses multiple antenna elements at transmit and receive to offer high spectral efficiency and increased capacity in a rich multipath environment without increasing the use of the spectrum. Whereas, the detection schemes...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Intelligent Reconfigurable Computing Systems

    Every new technology comes with a scope of research on making it more economical in terms of money and time. Intelligent reconfigurable computing systems follow a similar trend by implementing the applications over the available reconfigurable hardware. Reconfigurability basically aims at reuse of the hardware for similar problems or sub...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    High Quality Monitoring with Location Anonymization for WSN

    Due to technological advances in sensor technologies, Wireless Sensor Networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This is the potential risk to be...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Full Proof Secured Environment for Wireless Sensor Networks

    Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications

    In this paper, the authors introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (aps) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    BCOM: Best Constraints for Overlay Network Maintainance

    In an overlay network for routing or peer-to-peer file sharing, each node must select a fixed number of overlay neighbors for routing traffic. A selfish node entering such network would select adjacent nodes so as to reduce the weighted sum of expected access costs to all its destinations. Previous work...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Iobs-Adding Intelligence to Real-Life Objects

    Ubiquitous computing systems are useful in developing technology to realize a vision of computation everywhere, where computer technology seamlessly integrates into everyday life, supporting users in their daily tasks. By embedding sensors, computation and communication into common artifacts, future computing applications can adapt to human users rather than the other...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Performance Evaluation of OFDM Transceiver for BPSK & QAM Modulation Techniques

    WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) which is designated by 802.16 to provide worldwide interoperability for microwave access. There are fixed (802.16d) and mobile (802.16e) WiMAX. The telecommunication industries insisted on new technology with high transmission abilities standardized by IEEE 802.16 also referred as...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Dash7: Performance

    A new wireless sensor networking technology, DASH7 uses the ISO/IEC 18000-7 standard for active RFID. It operates in the 433 MHz unlicensed spectrum. DASH7 provides many advantages over other wireless technologies such as multi-year battery life, dynamic range of up to 2 Km (potentially farther) etc.DASH7 is the name of...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Complementary Cumulative Distribution Function for Performance Analysis of OFDM Signals

    Peak-to-Average Power Ratio (PAPR) is an important parameter for the analysis of Orthogonal Frequency Division Multiplexing (OFDM) signals. CCDF curves are known to have great importance in the study of signal performance on the basis of power level. This paper presents the CCDF performance of the OFDM signal with different...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

    A Mobile Ad hoc NETwork (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Concerted Routing Metrics Evaluating and Distributed Rate Adaptation in Wireless Mesh Networks

    This paper proposes MARA, a joint method for automatic rate selection and route quality evaluation in Wireless Mesh Networks. This method targets at avoiding the problem of inaccurate link quality estimates, common to main existing proposals of multi-hop wireless routing metrics. In this proposal, the statistics collected by the routing...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Multibiometric Identification System Based on Score Level Fusion

    Biometric identification systems, which use physical features to check a person's identity, ensures much greater security than password and number systems. Multi-biometric system is being increasingly deployed in much large scale application because they provide lower error rate, large population coverage compared to uni-biometric. In this paper, multi-biometric identification system...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Fingerprint Recognition Using Gabor Filter and Frequency Domain Filtering

    Fingerprint recognition is one of the most popular methods used for identification with greater degree of success. The fingerprint has unique characteristics called minutiae, which are points where a curve track finishes, intersect or branches off. In this paper a novel method for Fingerprint recognition is considered using a combination...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Enhancement of Gain of Rectangular Micro Strip Antenna Using Multilayer Multidielectric Structure

    In rapidly developing market in Personal Communication Systems (PCS), mobile satellite communications, Direct Broadband Television (DBS) Wireless Local Area Networks (WLANs) suggest that demand for Microstrip antennas and array will increase even further. In this paper the gain of microstrip patch antenna is enhanced by using covered dielectric layer which...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Speech/Data Discrimination in Communication Systems

    This paper proposes a discrimination algorithm, which discriminates speech and data on a multiplexed input signal. Commercial communication networks may use single voice band channel for transmission of both speech and data. Also, for optimum utilization of channel, the pauses in voice signal are being utilized. At receiver side the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design of Sierpinski Gasket Multiband Fractal Antenna for Wireless Applications

    The multiband behavior of the Fractal Sierpinski Gasket Antenna is described in this paper. An analysis is performed to examine the parameters of an antenna with a frequency range in between 1 GHz to 6 GHz. The behaviors of an antenna are investigated such as return loss and bandwidth. Simulations...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Voice Controlled Data Acquisition Car Based on Zigbee Technology

    This paper is to design a voice controlled car and use it as a platform for obtaining feedback from a critically controlled environment. The system comprises of a user interface module and a Robocar. The user interface includes an electret microphone through which the voice commands will be accepted by...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    DCE Cradle: Simulate Network Protocols With Real Stacks for Better Realism

    Reusing real protocol implementations of the kernel network stack in network simulators can increase the realism of network experimentations as well as decrease the cost of protocol development. In this paper, the authors introduce DCE Cradle, a novel framework that allows to use any features of Linux kernel network stack...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Electromagnetic Band Gap Coupled Microstrip Antenna for UWB Applications

    In this paper Electromagnetic Band Gap structure with microstrip antenna has been proposed. Many small and compact periodic EBGs have been investigated to design the antenna. Simulation is done on the HFSS software tool. The antenna is designed on the 21x31mm FR4 substrate with the dielectric constant of 4.4. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    SERA Noise Estimation for Speech Enhancement

    A practical single channel speech enhancement system consists of two major components, estimation of noise power spectrum and the estimation of speech. Therefore, a crucial component of any algorithm is the estimation of the noise power spectrum for highly non stationary noise environments. The performance of noise estimation algorithm is...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Bandwidth Assignment Technique (Optimizing Technique) for Reliable Microwave Backhaul

    The design of wireless networks differs fundamentally from wired network design. First, the radio frequency spectrum is a limited natural resource which has been regulated worldwide to promote its efficient use. Second, the radio channel is a random and difficult communication medium. Actually, environment conditions can introduce instantaneously variations into...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Optimization of Energy Consumption by Fuzzy Based Routing in Wireless Sensor Network

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. WSN consists of sensor nodes which sense the physical parameters such as temperature, humidity, pressure and light etc and send them to a fusion center namely Base Station (BS) from where one can get the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Algorithm for Power Saving and Over Head Reduction in the Wireless Networks

    The majority of the nodes connected and operating as an today are Wireless networks, because of its own advantage. In the Adhoc networks nodes are not connected with any fixed infrastructure and are operated by battery power. Each node consumes a large amount of energy while transmission or reception of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Vlsi Design of Cache Compression in Microprocessor Using Pattern Matching Technique

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multi processors are used in the system design, more processors require more accesses to memory. Thus it raises a 'wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Analysis of Channel Assignment Scheme in Wimax

    Along with information technology of flourishing, the popularization rate of wireless communication equipment is higher. However, WiMAX is the one of new broadband wireless technologies. The performance of mobile WiMAX system is highly dependent on channel assignment scheme because frequency spectrum is finite in wireless communication systems. There are two...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Design and Analysis of Quad-Band Rectangular Microstrip Patch Antenna

    This paper proposes the rectangular microstrip patch antenna suitable to operate in different frequency bands. The rectangular microstrip patch antenna is designed and simulated using IE3D simulation software. The result obtained shows that the designed antenna is suitable for operation in four different frequency bands with bandwidth of 6.90%, 2.33%,...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Qos Parameters Comparison for 802.11 B, A&G Standards

    The use of wired local area networks has become ever more common place, even in situations where only a few computers need to be connected together. Advantages like cost reduction, High robustness and easy system configuration making WLAN more popular. Three different PHY layers are available for the IEEE 802.11...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Implementation of Wimax Simulator in Simulink

    The needs of high speed broadband wireless access at lower cost and easy deployment to meet the modern mobile services leads in the emergence of an another IEEE standard called Worldwide Interoperability for Microwave AccesS (WiMAX). The limitations of conventional broadband wireless access have been overcome with the scalable features...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Java-Based Applications and SAP's Business Framework

    As the leading vendor of enterprise business standard software, SAP has recognized the need to adapt their R/3 system to current trends in software development and to meet market needs for speed of development, flexibility, openness and interoperability. In this paper, the authors first present SAP's approach to object-oriented and...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Performance Study of Dymo On Demand Protocol Using Qualnet 5.0 Simulator

    Wireless adhoc network support rapid on demand and adaptive communication among the nodes due to their self configurable and autonomous nature and lack of fixed infrastructure. Since adhoc network rely on the collaboration principle the issue of key distribution and effective group by management in such networks represents two of...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Broadcasting and It's Receiving Agent Based M-Commerce Business Model Functioning In The Market

    In this paper, the authors elaborately implies the broadcasting agent and it's receiving agent based m-commerce business model functioning in the market. The paper introducing recently invented m-commerce model and their related driving factor. Broadcasting and it's receiving agent based m-commerce business model stimulating business transaction which proves business model....

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    A Novel Secure Protocol, IES, for Mobile Voting

    Mobile voting is a kind of electronic voting, or maybe is new generation that use of cell phone that is user interface for sending. As for construction of cell phone and its limitation, so the authors need to define a different and new security protocol that can observe max requirement...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Enhancing The Website Structure by Reconciling Website

    In this modern world www grows tremendously. It increases the complexity of web applications and web navigation. Existing website systems are not easier for user to extract information and having some shortcomings. To enhance these shortcomings the authors propose a new reconciling website system. Recommendations play an important role towards...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Effects of Caching on The Performance of DSR Protocol

    Route cache strategy is important in an on demand routing protocol in wireless mobile ad hoc networks. In on demand routing protocol the route discovery mechanism is used to transmit packets from one mobile node to other. In order to avoid such route discovery mechanism each time when the packet...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    CDMA Coding Techniques for Interconnect Between IP Cores

    NoC (Network on Chip) is an efficient approach to design the communication subsystem between IP Cores in SoC (System on Chip). In this paper, a CDMA (Code Division Multiple Access)bus is proposed as a communication interconnect for different IP cores. CDMA has been proposed as an alternative way for interconnect...

    Provided By IOSR Journal of Engineering

  • White Papers // Sep 2012

    Clipping and Filtering Technique for Reducing PAPR in OFDM

    Recently, Orthogonal Frequency Division Multiplexing (OFDM), as a multi-carrier, and a single carrier transmission systems are used widely in the communications industrial systems. Each one of these two techniques has their own advantages and disadvantages. To maintain a high data rate, OFDM is preferred over the single-carrier transmission system due...

    Provided By IOSR Journal of Engineering