The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The excessive use of the communication networks, rising of Internet of Things leads to increases the vulnerability to the important and secret information. advance attacking techniques and number of attackers are increasing radically. Intrusion is one of the main threats to the internet. Hence security issues had been big problem, so that various techniques and approaches have been presented to address...
Object tracking in real time is one of the most important topics in the field of computer Vision. The work undertaken in this dissertation is mainly focused on development of a reliable and robust real time tracking system that can track the object of interest in the video acquired from a stationary or moving camera. The proposed algorithm is a real time algorithm that operates in 25 frames per second...
Target Localization using small unmanned aerial vehicles (UAVs) has emerged in the recent decades as an effective and essential option in surveillance, military and other fields. Often, UAV holds a camera and with the aid of different sensors it can determine the target location. This research represents a mathematical method for calculating the distance between the UAV and the target using UAV coordinates...
For efficient network applications, it's necessary to build security mechanisms for a secure communication. End-to-end security plays a crucial role for the communication in the network, to provide the confidentiality, the authentication and mostly the prevention from DOS attacks at high level. The main downside of the key generation and key exchange are that, the attackers might access the transmitted...
Image Histogram is useful in wide range of applications, it shows the image intensity distribution which is used in many image processing techniques. The processing time is very critical in real time applications, so the optimized and robust techniques are preferred. This paper is discussing a simple method for calculating histogram of the image with sampled Histogram which is similar to the histogram...
In this paper, we introduce dual-band micro strip patch antenna design for WiMax and WiFi implementation by mean of 3.5 GHz and 5.2 GHz central frequencies, respectively. The antenna system is been designed anchored in adds C-slot design on the patch and two parallel slit on the ground plane. The favor of this technique is that it puts forward low profile, high gain and wide bandwidth for the entire...
Wireless telecommunication technologies are flattering the foremost structure of information transmission, and considered one of the majority active research area. Ad hoc Networks for vehicles communications (VANET) emerged as a detachment of the Mobile Ad hoc Network (MANET), but they are at variance from MANET by their architecture, challenges, characteristics and applications. VANET believed to...
In this paper we design a new protocol for confidentiality which can be applied in three scenarios. The first scenario does not need too many database modifications. We found that this protocol can offer a confident method for registration and all other messages between master/mode II devices and TV white space database (WSDB). The second scenario is tried to overcome of the delay of the first scenario...
Due to the transition to digital TV (DTV); recently, many countries allow TV white spaces to be used by unlicensed devices. TV White Spaces is considered as an important step towards providing broadband access to millions of digital dividend household around the world and enabling a wide range of innovative wireless devices and services. The key challenge of TV white space systems is to have capabilities...
In this chapter we discussed various spectrum sensing aspects and issues related to TV white space. Special attention has been paid to ongoing TV white space standards i.e. IEEE 802.22 and the IEEE 802.11af. These standards were studied based on their ability to detect primary user (PU) or TV incumbent users and coexistence with other's signals and to avoid transmission in the busy and adjacent channels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.