The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks are mainly constrained by energy resources as sensors are battery powered which is limited and limited memory and functionality to support communications. Hence increasing the network lifetime and achieving energy efficiency is the important challenging issue to consider while designing routing protocol for wireless sensor networks. Here we propose a WSN routing protocol based...
Network providers are the one which allows all type of emails for communication purpose. While transferring the messages some malicious emails are received by the users this causes many problems either at the server side or at the user side. This type of emails may contain unsolicited content, or it could be due to the message being crafted. Persistent threat features, such as threat actor locale...
Network simulator version 2 globally known as NS2 is an open source event-driven simulator tool gained very much popularity in communication network field due to its flexibility nature. Till the day there are number of projects tried to tell us how to use this tool effectively. An issue about performance evaluation process needs to be considered. A trace file which comes as an output of one-time simulation...
Web services and cloud computing have gained wide range of popularity. Cloud and web services are used anywhere, by anyone, on any platform. In these fields, Extensible Markup Language (XML) has been identified as conventional standard for data sharing among the communicating parties. XML Security has become an important concern in the field of information and data sharing. In this paper, a variant...
We introduces a new 3-D video dataset to assess the performance of Human Activity Recognition system in indoor and outdoor environment. This dataset also help to check the performance of activity recognition algorithms against the effect of varying illumination, background and viewpoint. The available dataset for activity recognition are simple and most of them contain RGB information only as well...
Ever since India has stepped into cellular wireless communications, serving the hotspot areas has always been a critical challenge for the service providers. Typical Indian hotspot areas are usually densely packed by both concrete/brick/stone old structures and potential subscribers, thereby creating a tug-of-war between need of more and more sites and suitability of locations for installation of...
Security and Quality are the two major aspects in MANETs to be addressed. Many articles have addressed these aspects independently. Very few have concentrated on the trade off between security and quality of MANETs, but lost their performance. The proposed method WBTQ (Weightage Based Trusted QoS Protocol) focuses on both the issues in parallel, it is providing secure environment by evaluating each...
The IPv6-enabled network architecture has recently attracted much attention due to a security issue in MANET. Cryptographically Generated Addresses (CGAs) were used to approve the owner of the address. It can thwart the stealing of prevailing IPV6 addresses by attaching public key of the owner. The owner uses a corresponding private key to prove the ownership with the help of signed messages originated...
Data Caching on mobile clients is widely seen as an effective solution to increase data availability. A population is a “group of plant, group of people, and group of animal etc.” all is same species that live together and reproduce. Here a group of cached data items at clients in mobile ad hoc network called Group of Cached Data items (GCD). In this paper, the growth rates of cached data items at...
In a wireless sensor networks, there are large numbers of sensor that are used to collect data from the network whenever any event occurs. These sensor nodes are placed at large distance from the base station. The data transmission range of sensor node is limited, so the clusters of sensor nodes are formed with the help of any optimizing algorithm. Genetic algorithm (GA), artificial bee Colony (ABC)...
ECG is the main tool used by the physicians for identifying and for interpretation of Heart condition. The ECG should be free from noise and of good quality for the correct diagnosis. In real time situations ECG are corrupted by many types of artifacts. The high frequency noise is one of them. The present paper deals with removing of noise from ECG of high frequency contents with help of Low pass...
Wireless communication has reached to such a peak level that it becomes basic need of day to day life. The basic operation involved in such networks is the information sharing. The information sharing schemes proposed earlier does not focuses on the mobile nature of the MANET. Delay Tolerant Mechanism still allows nodes in such environment to share the information. The earlier cooperation enhancement...
The location estimation techniques based on wireless local area network (WLAN) have received increasing attention in recent years. To obtain location information, localization methods employing received signal strength (RSS) are widely used. This paper describes Cramer -Rao lower bounds (CRLB) of WLAN user location estimation in an auditorium. The physical layout of the auditorium is substantially...
Near Field Communication (NFC) is a standards-based, short range wireless communication technology which validates two-way interaction between electronic devices allowing contactless transactions and provides an ease to connect devices with a single touch. NFC allows exchange of information between devices within 10 cm range. NFC technology is also available in form of tags. These NFC tags can store...
The primary principle of Software Defined Radio based system is to support a multiple wireless communication services in a single system design. The RF transmission supports multiple channel communication. The channelizers used in SDR, extracts expected channels from received RF frequency band and perform baseband processing. This paper proposes the power efficient channelizers for selection of the...
This paper presents new design of artificial magnetic conductor structure along with feed line. 4 × 1 microstrip patch antenna array using AMC improves performance of antenna. AMC structures are used in design low profile antennas. High gain, minimum size and larger band width required for communication system. This leads to design patch antenna array. So this paper presents four element microstrip...
The paper includes the embedded on-board diagnostics system which continuously monitors the system parameters and generates the DTCs (Diagnostics Trouble Codes). The system consists of master-slave communication implemented through CAN network. Sensors are interfaced to slave microcontroller for monitoring various parameters of the system. Master microcontroller produces DTCs to indicate the causes...
This paper discusses the performance evaluation of the Content Based Image Retrieval (CBIR) system using the optimality in selection of feature vector elements. The performance of the CBIR system may be improved by appropriate analysis of the image. Image analysis is still facing problems related to the detection of the objects. In spite of the noticeable achievements using the part based model, the...
Monitoring, communication and controlling are the main systems which can transform the conventional grid into the Smart Grid. Numeric meter, Availability Based Tariff (ABT) meter is the most important parameter of the Smart Grid. By giving incentives for enhancing input capacity of power generation it enables more consumer load to be met during the peak hours. (ABT) controls the frequency and ensures...
This paper presents the design of an ultra wideband slot antenna for MIMO diversity applications. The antenna has an asymmetric rectangular slot to achieve the broad band impedance matching. The simulated band width of the antenna is 3.0 to 12.0 GHz which is beyond the FCC band. For MIMO, the antenna is implemented in four different configurations. To assess the diversity performance, the envelope...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.