The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In cognitive radio network (CRN) three types of spectrum sensing techniques are widely used: matched filter detection, cyclostationary detection, and energy detection. Matched filter detection technique provides maximum SNR at receiving end but the detector need to be matched with the input signal i.e. impulse response of the system need to be made as the delayed version of mirror image of input signal...
The relation between offered traffic and the length of frame taking the batch size as a parameter are nonlinearly related under Batch Markovian Arrival Process (BMAP). Therefore the prediction of carried traffic and blocking probability against the length of frames or the batched size becomes more complicated compared to conventional packet or circuit switched traffic. The previous literature deals...
The prime objective of LTE (Long-term evolution) mobile cellular network is to ensure high speed data with good QoS. In LTE femtocellular network the tiny femtocell are integrated with macrocell to transfer overflow traffic (off loading) from macrocell to femtocell. A dense femtocellular network experiences frequent handover and huge interferences. Therefore in traffic modelling two parameters: the...
In recent days intense research is taking place on energy efficiency (EE) of a multi-user wireless network. In this paper we propose a model to detect EE based on limited user traffic model. We observe the variation of EE against the number of users and energy signal to noise ratio engaged by the user. The impact of enhancement of subcarriers on EE and channel capacity is also analyzed to reach an...
Protecting the database from malicious insider is the major challenge for the organizations now-a-days. The organizations are eager to adopt the advanced security solutions to prevent the theft of data. Most of the existing database IDS (intrusion detection system) apply high profile matching constraint. Due to this there is probability of high false positive rate. In this paper we propose a novel...
To find sequential sequence from the database, several sequential sequence mining techniques are developed. We have proposed the series of MySSM algorithms. These algorithms generate a sequential sequence from given database by considering time interval. Our new proposed a sequential sequence mining technique produces sequential sequences from the large database. It considers the time gap between...
One of the most widely used neural networks (NN) is the feedforward neural network (FNN). The most frequent application of FNN is in recognizing nonlinear patterns and, as a nonparametric method, in the estimation of functions especially in forecasting. In this study we will attempt to illustrate how a new metaheuristic algorithm known as Unconscious Search (US) may be utilized to train any feedforward...
In Orthogonal Frequency Division Multiplexing (OFDM) carriers among users are orthogonally related. Hence no guard band is necessary like Frequency Division Multiplexing even spectrums of users can overlap, enhances the spectrum efficiency of the network. In this paper different window functions in frequency domain are considered in pulse shaping of OFDM data symbols which are considered uncorrelated...
An increasing demand for wireless access to packet-based services has, in turn, driven the need for call admission control strategies to make network roaming more seamless. This paper investigates the optimal call admission control (CAC) policy for heterogeneous wireless networks based on Markov Decision Process (MDP) and Value Iteration Algorithm (VIA). We concentrate on the optimization problems...
Vertical handoff plays an important role in guaranteeing users to be always connected in an overlapped multi-network environment. During the vertical handoff procedure, handoff decision is the most important step that affects the normal working of communication. An incorrect handoff decision or selection of a non-optimal network may result in undesirable effects such as higher costs, poor quality...
We evaluate performance of hierarchical network (overlay-underlay cellular system) based on convolution method under mixed offered traffic. In most of the cases, different offered traffic of a network follows different probability density functions and they are correlated in sharing channel environment and cannot be analyzed by equivalent random theory (ERT) model. Here, three different types of offered...
This paper discusses the design and development of Text-to-Speech for Bengali language. The major modules of our system are Normalization, Phonetic analysis, Prosodic analysis and Wave synthesis. In normalization process, we have used some modules for example token identification, lookup table, expansion rules for analysing a sentence. Using these modules, we can recognize the type of each word clearly...
This paper describes two different neural networks models for autonomous underwater vehicles (AUVs). The online multilayer perceptron neural networks (OMLPNN) have been designed to perform modeling of AUVs of which the dynamics are highly nonlinear and time varying. The online recurrent multilayer perceptron neural networks (ORMLPNN) have been additionally designed to generate a memory to pervious...
Some antennas like bowtie, spiral, log-periodic array and conical spiral are known as frequency independent in context of antenna parameters like input impedance, reflection coefficient, gain and radiation pattern. In this paper, the work is done on bowtie and spiral antenna due to their easy construction and implementation. Although both the antennas are considered as frequency independent but shows...
Question matching is a key stone in web intelligent question answering system. A novel question matching algorithm based on ontology and description logic is presented in the paper. Domain knowledge represented by ontology is very important in question matching. Concepts and relations between concepts are extracted from both standard and user questions, then the concepts and relations in standard...
In this paper the operation of Bipolar Junction Transistor (BJT) with self-heating effect is simulated by 3-dimensional Finite-Difference Time-Domain (FDTD) method. A three-dimensional simulation program is developed in which the effect of the operating point on the BJT internal temperature rise is included. The simulation software works out the change in temperature by calculating the BJT power dissipation...
A distributed scheduling approach for fast deployable tactical IEEE 802.16e networks is presented where distributed base stations with dual radios form a mesh backhaul and mobile battle units communicate through these base-stations. The mesh backhaul is formed via an IEEE 802.16e mesh mode radio on each base station, while mobile units communicate with base stations via PMP mode radios. The scheduling...
Karenia brevis (K. brevis) blooms regularly in the Gulf of Mexico. However, detection from space still remains a challenge using standard bio-optical retrieval algorithms because of the uncertainties of atmospheric correction and spectral interferences arising in optically complex coastal waters from high concentrations of organic and inorganic materials. We propose a simple red band difference (RBD)...
Lossy multimedia transmissions need efficient channel coding schemes. This paper proposes a specific classification of JPEG2000 data for progressive quality image transmission. It has been deduced that hierarchical channel coding schemes providing Unequal Error Protection (UEP) can be used. In particular, the use of RCPC codes has been focused in this paper.
The demand of digital information compression is increasing dramatically because of the dominance of multimedia technology and the limitations of the physical media for handling huge amount of information. Compression reduces the storage and transmission burdens of raw information by reducing the ubiquitous redundancy without losing its entropy significantly. The image manipulation that occupies a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.