The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Effective underwater communication can be carried out when the masking effect of underwater ambient noise is reduced. The main objective of this paper is to develop an optimum adaptive algorithm for accurate detection of the underwater acoustic signal buried due to the effect of ambient noises in the near and far seas. A comparative analysis on various algorithms using MATLAB is performed and to validate...
A simulation model for the analysis of MEMS capacitor has been developed using mechanical equivalencies. The capacitor structure used in this paper has four parallel plates to improve the tuning range. Two of the plates are suspended and the other two plates are fixed. The developed mechanical model is validated with the help of structure simulations performed using PolyMumps process. The simulation...
This paper presents the solution of Optimal Power Flow (OPF) with different objective functions i.e. fuel cost minimization and active power loss minimization using Genetic Algorithm (GA). The basic OPF solution is obtained with fuel cost minimization as the objective function and the optimal settings of the power system are determined. For reactive power optimization, active power loss has been taken...
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. As the network is wireless, security...
Mobile nodes in a MANET incur much overload having to forward the packets of the adjacent nodes. Each node is expected to behave within the boundaries delineated by the underlying protocol. Each node in a MANET is expected to wait for a pre specified time interval generally termed as the back off interval. This back off interval is supposed to be chosen from a range, at random. But some nodes in an...
Detection of event is a prominent application of wireless sensor networks. In this paper, the problem of distributed detection in a wireless sensor network over multi access fading channel is considered. The detection performance of Neyman-Pearson detection scheme, which uses a constructive interference technique is analyzed for different channel conditions. The detection performance is characterized...
Mobile ad hoc networks are networks of mobile hosts with wireless interfaces that can dynamically form a network without the aid of any pre-existing infrastructure or centralized administration. Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. Security is the one of the major issue in mobile ad hoc network some of the attacks...
On behalf of the Organizing Committee I welcome you to the first International Conference on Wireless Communication and Sensor Computing ICWCSC 2010 held in SSN College of Engineering, Chennai, India on 02 – 04 January 2010.
In Wireless Sensor Networks, mostly nodes are deployed in random fashion and it has to be ensured that a backbone network should be connected at any given point of time to maintain connectivity. The selection of these backbone nodes plays a vital role while deciding the topology as by carefully selecting backbone nodes, the forwarding energy consumption can be reduced. The topology control in wireless...
Mobile ad hoc networks are a wireless network in which each node is vested with the responsibility to act as a router. The individual nodes are constrained by the resources such as battery power. To achieve maximum throughput with the available resources the nodes might behave selfishly. This could lead to severe performance degradation in network throughput, packet delivery ratio, packet loss increment,...
Wireless sensor networks are becoming increasingly popular, as their usage is extended to a wide range of applications. Security plays a pivotal role in wireless sensor networks, as the data handled by the network are often sensitive. Since the network is vulnerable to various types of attacks there is a need to build efficient security services in them for secure data communication. The processing...
A Mobile Ad-hoc NETwork (MANET) is a wireless network set up temporarily without a wired infrastructure (routers, switches, servers, cables, access points, etc.). The wireless nodes in a MANET may move around and each one of them may need to forward packets for other components in the network. Several routing protocols such as DSR, AODV and DSDV have been proposed to facilitate communication in such...
The main aim of the paper is to design a voltage controlled oscillator that can be later fabricated and used for high frequency applications such as the frequency synthesizer to generate the local oscillating signal for the modulation and demodulation of the RF signal. Among the building blocks of a wireless transceiver, the voltage-controlled oscillator (VCO) is an important block since it affects...
Power management is the key issue in the design and operation of wireless network applications like sensor networks, pervasive computing and ubiquitous computing where the network is primarily driven by battery-powered embedded devices. This paper studies network coding as power minimization technique. Network coding is a new research area that may have interesting applications in practical networking...
In the past few years it has become a popular technology for wireless sensor networks, in which one can implement different types of protocols for communication. The protocol employed depends on the application in which the sensor is meant to be used. A basic communication protocol consists of different layers dealing with the packets of data including the headers for identification of devices, data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.