The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the performance effect of hollow pyramidal microwave absorber that had been applied with slotted array principle. The Sierpinski triangle was used as the slotted on the hollow pyramidal microwave absorber. This paper includes the theories, simulation and measurement result. The simulation using CST Microwave Studio Suite used to predict the Sierpinski triangle design of microwave...
The ping-pong Handover (HO) in LTE is one of the most crucial problems which decrease the performance of the Handover. The impact of ping-pong HO on inter eNB handover in LTE networks is investigated. An object of the present work is to provide a mean for reducing the probability of ping-pong HOs in intra E-UTRA networks. A novel HO algorithm, based on keeping the old path between the source eNB and...
Sliding mode control (SMC) is recognized as robust controller with a high stability in a wide range of operating conditions, although it suffers from chattering problem. In addition, it cannot be directly applied to multiswitches power converters. In this paper, a high performance and fixed switching frequency sliding mode controller is proposed for a single-phase unipolar inverter. The chattering...
Neighbour discovery and maintenance of neighbourhood tables have importance in wireless sensor networks. Almost every upper layer application such as routing or self-organizing relies on neighbourhood tables. Imprecise tables may lead to failures that may be costly in terms of resources which are very limited in such networks. Neighbourhood tables are achieved thanks to the Hello protocol. Several...
Identity-Based Cryptography (IBC) offers the very interesting property that the user's public key is related directly to her/his identity. However, IBC suffers from key escrow because the user private key is generated by an external entity called the Private Key Generator (PKG). To resolve this problem, the Certificateless Cryptography CL-PKC was proposed. This mechanism uses a different method to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.