The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cluster-based Mobile Wireless Sensor Networks (CMWSN) has become promising research domain for researchers in the field of ICT. CMWSN has found its way directly into the real world applications only because of the availability of low-cost Sensor nodes. In the last decade, most of the researchers assumed WSN as a collection of homogeneous and stationary sensor nodes. Mobility and heterogeneity of the...
In order to get the benefit of multiple antenna systems with less hardware complexity and increased data rate, Transmit Antenna Selection (TAS) is popular in Multiple Input Multiple Output (MIMO) Systems. The performance TAS systems can be further enhanced with Orthogonal Space Time Block Codes. In this paper, we present Transmit Antenna Selection (TAS) technique based on Maximal Ratio Combining (MRC)...
In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in centralized systems are not suited for P2P computing systems because there is no central point of authority. The working of a P2P computing...
The development in anomaly and misuse detection in this decade is crucial as web services grow vast. Managing secure network is a challenge today. The objectives vary according to the infrastructure management and security policy. There are various ways to check stateful packet inspection and Deep Packet inspection (DPI). Identify payload traffic using DPI, Network security, Privacy and QoS. The functions...
The amount of malicious mobile application targeting Android based smartphones has increase rapidly. In addition, these malicious apps are capable of downloading modules from servers which are run by malicious users, meaning that unexpected events can be activated inside of smartphones. Therefore, the attacker can control and get personal information and data stored inside of smartphone illegally...
In this paper a 1×2 miniature wide-band rectangular patch antenna is proposed. The antenna is designed for the IEEE 802.16a (5GHz to 6GHz) and 802.16b (2GHz to 11GHz) frequency band. The miniaturization of antenna has been achieved by monopole configuration and implementation of Electronic Band-gap Structure (EBGs) in between the two identical antennas. To achieve the wide-band response a partial...
Identity-based cryptography (IBC) was introduced into peer-to-peer (P2P) networks for identity verification and authentication purposes. However, current IBC-based solutions are unable to solve the problem of secure private key issuing. In this paper, we propose a secure key issuing system by using an IBC for P2P networks. We present an IBC infrastructure setup phase, peer registration solution by...
In this paper, the methodology for performance assessment of five different detection techniques from spectrum sensing perspective in cognitive radio networks is proposed and implemented using the realistic implementation oriented model (R-model). The signal detection in CR networks under a non-parametric multisensory detection scenario is considered for performance comparison under the presence of...
Mobility Aware Health Care Monitoring System is specially designed for providing real-time information to the doctor. It is used to provide feedback to the patient from the doctor. This system is most useful for the older people because they suffer from many diseases. For older people regular monthly check up is necessary also regular checkup is needed for those people who are under observation, which...
Huge data transmission rate is the key requirement in 5th Generation of wireless communication for various applications like sports, video, Medical etc. To meet high data rate one can increase the bandwidth by using higher frequency bands which is not possible due to limited availability of frequency spectrum and constraint put by Standard on available spectrums. Another method is to use available...
This paper is for transmission of video data using optical code division multiple access (OCDMA) system over WDM. OCDMA system is proposed for supporting large numbers of subscriber in optical access network. The system performance is analyzed using Modified Double Weight (MDW) Code because it help to decrease the Multiple Access interference (MAI) to great extend at the transmitter side. Also at...
The research and application of digital watermark is being paid more focus for content authentication. In recent times, the fast growth of the Internet has made copyright protection of digital contents a critical issue. Watermarking of multimedia content is important to authenticate, copy-control and ownership detection. The scheme used in this paper used two different categories of the watermark...
Wireless Sensor Network (WSN) is a network of sensor nodes that can sense the environment and send the information through wireless links to a sink. Wireless sensor nodes possess limited processing capability, storage and energy resources. The existence of sensor network depends on the life of sensor nodes i.e. ultimately on the energy consumption during its operation. Thus, in WSN, the efficient...
Private Branch Exchange system is the hardware that is used to controls the phone lines and exchanges calls between the internal phone extensions within a private network. The major benefit of the Private Branch Exchange system is the availability of the variety of features and it uses standard voice over internet protocols to work over the internet. There are more companies providing Private Branch...
Cloud providers offer computing resources to their customers using either the reservation or on-demand plan. However, reservation plan is cheaper than the on-demand plan since the cost of utilizing the resources is low. Cloud providers provision their resources into virtual machine which are then allocated to the users as per the request for a specific period of time. The problem that arises is related...
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels internet traffic through worldwide network having number of relays to hide user's usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.