The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In general, to mitigate the effect multipath fading in a wireless communication systems, the Rake receiver is used. In this work DTCWT (Dual Tree Complex Wavelet Transform) based rake received is designed for UWB (Ultra-Wide Band) system. UWB transmission is based on pulse position or time modulation as the system transmits data by generating radio energy at specific time interval. DTCWT, templet...
Visible Light communication is a modern communication system. The system consists of a LED and a photo-detector. The white LED can be used to transmit modulated data sequence without any harmful microwave radiation along with its primary purpose of illumination. So, the extra installation of medium for the data transmission can be avoided; leading to a low cost data transmission system. The transmitted...
Authentication means to verify the identity. It is the basis for any communication to take place as we do not want to reveal any information which must not be disclosed. In general, authentication requires the presentation of credentials to prove who the user really is. Authentication can be done either by a client, server or a third party. Authentication protocols allows the user to send or receive...
Rapid development of communications over internet such as online money transaction, transaction of E-mail with sensitive data (medical data) and so on has led to need for strong cryptographic technique. There has been continuous research going on to assure strong security by various cryptanalyst. However, performance, computation time and ease of use play a significant role in using the algorithm...
In this article we present a study in regards to the actualization of a phased array antenna utilizing digital beamforming. Digital beam forming comprises of the spatial permeation of a signal where the phase shifting, adding, and amplitude scaling are actualized digitally. The thought is to utilize a programmable and computational environment which forms a signal in the digital realm to supervise...
This article describes the outdoor mapping method of robot group using omnidirectional radio link communication. The issues of designing the radar system based on wearable radio communication devices with adding new functionality without changing the hardware are discussed. The method for providing the energetically concealed location of network objects detection is suggested. The calculations show...
A cryptographic system uses two dissimilar keys — a public key known to all and a private key known only to the receiver of the message. Encryption of the data uses public key while decryption uses both public and private keys. So in this method all parties need a key pair for conversing with any other interactive parties. RSA is a generally known asymmetric cryptography algorithm. Modified RSA is...
Existing image steganographic methods lack in the complexity, which can be utilized by the radical to decode the images and neutralize the operations. Several methods have been proposed in order to combat this. Perhaps the most efficient method is Block-based Edge Adaptive based on Least-Significant-bit Matched Revisited (LSBMR) approach. It is a famous type of steganographic methods in the spatial...
Public key Cryptography, also known as asymmetric encryption is a form of cryptosystem which uses two keys, public key and private key for encryption and decryption respectively. This type of cryptosystem helps in achieving confidentiality, authentication or both. Public key cryptography includes key exchange, digital signatures, and encryption of blocks of data. Among the public key cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.