The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security services have become an inseparable feature of almost all digital transactions. A crucial module of these scheme isintegrity, which is performed using a cryptographic hash function. Secure Hash Algorithm can be an efficient hashing technique.SHA-3 is the most recent and efficient Secure Hash Algorithm. Keccak has been chosen as the official algorithm for SHA-3 in2012. In this paper we propose...
The Elliptic Curve cryptosystem has replaced the prevailing first generation public key algorithms – RSA and Diffie - Hellman due to its shorter key size requirement. This paper presents a modified Elliptic Curve and RSA cryptosystem by incorporating a newly designed Montgomery multiplier algorithm for better efficiency. The inherent disadvantage of delay due to the large number of computations in...
To help unlicensed users to use the maximum available licensed bandwidth, an opportunistic communication technology called cognitive radio, (CR) is developed. It has recently attracted a great deal of research interest. Even though the majority of future wireless devices will be mobile, mobility is yet unexplored in the context of CR. There is no proper framework for mobile CRs to effectively use...
Cognitive Radio (CR) is viewed as a revolutionary potential radio technology capable of offering dynamic spectrum access. CR Networks (CRNs) with such spectrum aware devices is a hopeful solution to the spectrum scarcity issue in wireless communication sector. In this paper, an effective routing solution with a cross layer design is proposed for the multi-hop CRNs. Most of the existing work uses Ad-hoc...
Mobile Wireless Sensor Network(MWSN) is a spring up field of research in contrast to their well established predecessor-static WSN. The advantages of mobile wireless sensor network over static wireless sensor networks include better energy efficiency, improved coverage, enhanced target tracking, and superior channel capacity. They are much more versatile than WSN because they can be deployed in any...
Cognitive radio is a potential technique for future wireless communications to mitigate the spectrum scarcity issue. One of the most important challenge of a cognitive radio system is to identify the presence of primary (licensed) users over a wide range of frequency spectrum at a particular time and specific geographic location. In this paper, a spectrum sensing technique for cognitive radios based...
Cognitive Radio (CR) is a novel promising approach proposed to ensure efficient spectrum utilization. It is the obvious solution to the spectral congestion problem. Spectrum sensing is the most essential functionality required for the practical implementation of cognitive radio networks. An efficient spectrum sensing method must detect very weak primary user signals while being sufficiently fast and...
Radio spectrum is being underutilized. Cognitive Radio acts as a solution to the problem of spectrum under-utilization. Spectrum sensing is the most important feature of Cognitive Radio. Cooperative spectrum sensing improves sensing performance by including a number of cognitive users rather than a single one. In cooperative spectrum sensing, each cognitive radio performs individual spectrum sensing...
According to recent studies, most of the radio spectrum is being underutilized. Cognitive radio has been proposed as a solution to address the problem of spectrum underutilization. It allows the secondary users to occupy spectrum allocated to primary users if primary users do not use the allocated spectrum at the current time and location. To detect unused spectrum cognitive radio must perform spectrum...
This paper presents a novel algorithm based on Chaotic sequences that embeds authentication information into color JPEG 2000 images. The algorithm uses low frequency coefficients on to which the authentication information is embedded by means of sequences generated from a chaotic machine which essentially depends on the initial conditions. This fragile algorithm allows detection and identification...
The orthogonal frequency division multiplexing (OFDM) has become the most popular technique for wireless communication nowadays because of its high spectral efficiency and robustness against frequency selective fading. The rateless codes can provide better performance when the channel characteristics are time varying in nature. Fountain codes are class of rateless codes with forward error correction...
The novel algorithm proposed in this paper is an optimal algorithm, both blind and training data based channel estimation algorithms are described; however, the issue of computationally efficient multiuser detection is not addressed. The multiuser detection is investigated in a long code CDMA system over frequency selective multipath channel. The issue of channel estimation is not addressed here,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.