The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design challenges that could be faced by radiation pattern reconfigurable antenna in the Gigahertz (GHz) frequencies. This is due to the close relationship between the antenna radiation mechanism to the insertion loss and isolation loss contributed by RF switch at ON and OFF state respectively. Apart from that, the size of the antenna at higher frequencies especially above...
Wireless sensor network (WSN) is commonly used for localization analysis. Through sniffing receive signal strength indication (RSSI) in WSN system, localization of higher RSSI is connected automatically. This paper proposes the Raspberry-Pi (RasPi) based sensor node to sniffing RSSI and automatically connect the device to strongest RSSI. The RasPi brings the advantages of a personal computer (PC)...
A wide-angle scanning reconfigurable beamsteering parasitic patch array antenna is introduced in this paper. For beam-steering antennas using microstrip, the beam scanning range is very limited where the typically achieved scanning is in the range of −30° to +30°. Increasing the parasitic elements does not provide significant improvement in terms of the beam scanning where only additional 3° to 5°...
A wide-angle scanning reconfigurable beamsteering parasitic patch array antenna is introduced in this paper. For beam-steering antennas using microstrip, the beam scanning range is very limited where the typically achieved scanning is in the range of −30° to +30°. Increasing the parasitic elements does not provide significant improvement in terms of the beam scanning where only additional 3° to 5°...
Awareness of the physical location of each node is required by the many wireless sensor network (WSN) applications. There are various tracking schemes available such as time-of-flight, time difference of arrival and angle of arrival. This review paper focuses and describes previous related work regarding of the angle of arrival (AOA) estimations in particular through received signal strength indication...
Currently, solar energy has turned into a popular alternative energy source to meet certain demands around the world due to the instability of oil and coal prices with global warming issues. The aim of this paper is to develop of a simple and cost-effective solar system for the rural areas where grid electricity is not available. To fulfil this objective, a 5-Watt PV (photovoltaic) stand-alone solar...
In order to meet the increasing demand and stringent design requirements for coverage expansion, throughput and capacity enhancement relay Node (RNs) has been considered as a promising solution to LTE-A Point-to-Multi-Point (PMP) networks. In this paper two scenarios are proposed, at the first scenario this work introduced the performance analysis of two-way Multiuser system of half duplex to AF (Amplify...
This paper demonstrates a novel architecture of hybrid subcarrier multiplexing Wavelength Division Multiplexing network combining laser and light emitting diodes (LED) as the light sources. The performances are simulated using Optisys software and analyzed based on bit error rates (BER) and the eye pattern of the received signals. Results proved that the combination of the laser and LED light sources...
Simulation platforms have become important tools in the design and evaluating of protocols for Wireless Sensor Networks. Thus the use of realistic models in simulation is important for the development of protocols. However, most of the reported studies based on simulations tend to use simple or non-realistic parameters and assumptions. This paper proposes a transmit power control algorithm with a...
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented...
A novel fractal planar inverted F antenna (F-PIFA) based on the self affinity design is presented in this paper. The procedure for designing a Fractal Planar Inverted F Antenna is explained and the 2nd iteration of Sierpinski Carpet is chosen to use in mobile phones. The F-PIFA has a total dimension 27 mm ?? 27 mm are designed and optimized in order to receive GSM (global system for mobile communication)...
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also...
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher...
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher...
This paper describes the design and implementation of a Web-based portable network traffic monitoring system (PNtMS) on an embedded Linux platform, based on single board computer (SBC). The functionality of the monitoring system constitutes processing of TCP/IP network traffic in respect of network protocol analysis and traffic monitoring. The structural breakdown of this system can be generically...
A new code of optical code division multiple access (OCDMA) based on spectral amplitude coding (SAC) is described and analyzed. The coding technique is called random diagonal ldquoRDrdquo code. One of the important properties of this code is that the cross correlation at data segment is always zero, which means that phase intensity induced noise (PIIN) is reduced. From the construction of RD code...
The computation of a mobile robot position and orientation is a common task in the area of computer vision and image processing. For a successful application, it is important that the position and orientation of a mobile robot must be determined properly. In this paper, a simple procedure for determining the orientation of the mobile robot using two cameras is presented. The two cameras are used to...
The purpose of this paper is to realize possible usage on embedded Linux platform for intrusion detection (port scan detection). The approach was to develop the software which performs port scan using half-open and udp technique. The software is then executed on Linux based single board computer (SBC) where run TS-Linux 2.4.23 kernel. Results show that the embedded port scan detector (EPSD) unit managed...
A mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without a reliance on a fixed base station or a wired backbone network. Because of these characteristics, path connecting source nodes with destination may be very unstable and go down at any time, making communication over ad hoc networks difficult. In most cases, the...
Embedded system is known for its limitation in terms of processing power, memory, and power consumption. Incorporating solution into an embedded system, which requires optimum usage of these limitation, is thus a challenge. The aim of this study is to see how Embedded Linux could cope with those limitations in producing reliable embedded web-based traffic monitoring system. The approach to the study...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.