The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Increasing access to telecommunication services in rural parts of the world has the potential to alleviate the digital divide felt by the people of these regions. Recently, both public and private sector entities have shown more interest in tackling this problem on a global scale. In the United States, for example, the Federal Communications Commission (FCC) subsidizes large telecommunication companies...
Optimization techniques attracts researchers to formulate a problem and determine its optimum solution. This paper presents an Enhanced Harmony Search (ENHS) algorithm for solving optimization problems. The proposed algorithm increases the convergence and is more efficient than the standard harmony search (HS) algorithm. The paper discusses the novel techniques in detail and also provides the strategy...
This paper presents an overview of the stepper motor and its different types. The literature review is then carried out by highlighting the features of the stepper motor and then the types of the stepper motor are compared and discussed. The schemes of control theory for the controller of the stepper motor are also presented.
In computer network security, a Network Intrusion Detection (NID) is an Intrusion Detection mechanism that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity. There are many areas of research in this vast field of Network Intrusion Detection (NID) but in this survey paper, we will focus on its technology, development &...
The speed control of a switch reluctance motor (SRM) using feedback control method with the help of a proportional integral (PI) controller is presented in this paper. The paper proposes the design of a PI controller for a 6/4 SRM under different load conditions. The control mechanism is designed such that the motor runs at half of the rated speed for first few cycles and then attains the rated speed...
We consider a multiuser multi-way relay channel where all the users need to communicate with the help of a single relay terminal. All the links experience quasi-static Rayleigh fading and there is no CSI available at the transmitters. We propose a half-duplex rateless coded relaying protocol for this model and identify its benefits over fixed-rate relaying strategies. Using outage probability and...
LED lights used mainly for illumination purpose, can be simultaneously used for data transmission. In this paper, a visible light communications system is proposed that employs wavelength division multiplexing, to transmit multiple data streams from different data sources simultaneously, over the wireless channel. Successful implementation of a low cost prototype system is reported. The effect of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.