The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In November 2014, a massive cyber-attack on a major company leaked sensitive data including thousands of personal records. Despite the fact that a lot of research and development has gone in the past decade to develop robust encryption algorithms, hackers have managed to break them. Effective information security is an important aspect and cannot be undermined in today's times. When an adversary intercepts...
Wireless sensor networks are characterized by a limited availability of resources such as the power required for data transmission. Cooperative communication enables transmission of data without using too much power. The fading of data is considerably less when the nodes are engaged in a cooperative communication protocol, rather than a competitive game. The quintessential concern for each node is...
Coverage and capacity are the two most vital aspects of any cellular technology. Coverage, in particular, is of prime importance in a Long Term Evolution network. However, both come at a significant cost. Deployment of additional eNodeBs (macro layer) to cover small dead zones might often result in a negative return on investment. Instead a scheme that augments the macro layer by making use of low...
The wireless communication system frequency diversity can be exploited with the help of Space frequency coding. In order to gain maximum frequency diversity various environment criteria needs to be considered. This paper proposes a practical approach of Distributed Space Frequency Coding [DSFC] for non-identically distributed [i.n.d] fading environment. As the geographical location of nodes is different,...
Wireless Power Transfer (WPT) systems are considered as sophisticated alternatives for modern day wired power transmission. Resonance based wireless power delivery is an efficient technique to transfer power over a relatively long distance. This paper presents a summary of a two-coil wireless power transfer system with the design theory, detailed formulations and simulation results using the coupled...
Due to the Human Visual System (HVS) the response to well brightened images is frequency dependent. The Discrete Cosine Transform (DCT) - based compression schemes are capable of separating the perceptually significant information in an image from the information that the eye cannot perceive. Hence in image compression, DCT is most widely used transform. In this paper, an algorithm for compressing...
Nowadays, Direct Sequence Code Division Multiple Access (DS/CDMA) still represents the core technology for the physical layer of several commercially-remunerative applications and standards, ranging from cellular networking, radiolocalization, satellite communications, automotive radar, etc. A very critical issue of Spread Spectrum and CDMA is still represented by the necessity of keeping the probability...
Big data recently has gained tremendous importance in the way information is being disseminated. Transaction based data, unstructured data streaming to and fro from social media, increasing amounts of sensor and machine-to-machine data and many such examples rely on big data in conjunction with cloud computing. It is desirable to create wireless networks on-the-fly as per the demand or a given situation...
The problem that needs to be consider in a multi user distributive and decentralized network is the interception of transmitted signals by an undesirable node. A decentralized system is nothing but a data processing system in which all information is processed locally without the need for a Central Processing Facility where various effects like multipath and scattering causes non- orthogonality of...
Wireless security is an important concern in todays technological world. Wireless devices are used to access data and private applications. From broadband to Wi-Fi, 3G to LTE Advanced, WiMAX to satellite communication every network demands on-the-air security from attacks. Tapping or Jamming attacks leak the secret data, while Service Disruption Attacks affecting QoS (Quality of Service) are relatively...
There has been a decade of extensive research on application specific wireless sensor networks (WSNs). The recent development in communication network technologies makes it practical to realize a new WSN paradigm or controlling the control plane with the new group of by software defined networking (SDN) based on Open Flow. The Open Flow technology which is known for standardization and compatibility...
Wireless Power Transmission (WPT) can provide solutions for power transfer in complex environment and topologically challenging locations. This technology is mainly affected by the range and efficiency of transmission. Specially, bulk power transfer using WPT is also a challenging task. WPT using resonant coupling can provide an effective solution for power transfer to sensors and monitoring meters...
Wireless Power Transfer (WPT) systems are considered as sophisticated alternative for modern day wired power transmission. In long range WPT systems, power is transmitted through microwaves. Highly directive antenna systems assure effective power transmission. This paper presents a Micro-strip rectangular patch antenna incorporated with meta-material based graded refractive index lens. Using micro-strip...
In the field of communication, coding the data is the most crucial part. Since transmission channel is very much susceptible to noise, it becomes imperative to channel code the data to be transmitted. This paper presents an improved and faster Low Density Parity Check (LDPC) based algorithm, for channel coding grayscale images of 'n*n' dimension. It constructs the encoded image, by arranging bits...
The prime necessity in communication system is utilizing the available bandwidth efficiently. Hence, compression of data to be sent over the link has become inevitable. In this paper, an algorithm for compressing hyperspectral space images based on ZigZag 3D-DCT (Discrete Cosine Transform) technique is proposed. This method converts 2D gray-scale images into a 3 dimensional cube formation of 8*8*8...
Wireless Power Transfer (WPT) system is a suitable alternative for power transmission where conventional wired power transfer faces geographical challenges. In a long range wireless power transmission system, power is transmitted through microwaves. A highly directive antenna is required for an effective transmission through this system. This paper talk about a circularly polarized microstrip rectangular...
Wireless Power Transmission (WPT) can provide solutions for power transfer in complex environment and topologically challenging locations. This technology is mainly affected by the range and efficiency of transmission. Specially, bulk power transfer using WPT is also a challenging task. WPT using resonant coupling can provide an effective solution for power transfer to sensors and monitoring meters...
The intent of the paper is to propose a new set of scrambling codes at the physical layer in a manner that provides much higher security and reliability. In Vehicular Communication system at the physical layer the neighboring node search procedure consist of series of synchronization stages by which the client determines time and frequency parameter necessary to demodulate the downlink and to transmit...
The intent of the paper is to propose a new set of scrambling codes to spread information in a manner that provides superior physical layer security. In wireless communication systems, physical layer elements are vulnerable to possible security-related attacks by undesired entities. Basic premise of a reliable communication infrastructure is to mitigate risks related to violations of the user information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.