The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: satellite communications systems; E-and M-commerce; military application; information security; optical communications; MIMO; beam forming; OFDM; intelligent transportation systems; dynamic spectrum access networks; Internet applications; optical passive and active components; ultra wide band; RFID; wireless communication; network management; WLAN and mobile WiMax,...
Wireless Sensor Networks has gained increasing attention from both the research community and actual users. As sensor nodes are generally battery-powered devices, the critical aspect is to reduce the energy consumption of nodes so that the network lifetime can be extended. In this paper we tried to implement the cross-layer design between Physical, MAC and Network layer. Based on the above cross layer...
In Wireless Sensor Network, energy is the most critical resource constraint due to the limited battery power of each sensor node. Almost all applications of Wireless Sensor Network require the flow of sensed data from multiple sources to a sink. So, the optimal location of sink is an important topological consideration. In this work, we focus on the topological modification of Wireless Sensor Network...
We have analyzed the effect of innovations in Nanotechnology on Wireless Sensor Networks (WSN) and have modeled Carbon Nanotube (CNT) based system. We have shown the integration of CNT in WSN and formulated a Nano routing system. A proposition is put forward by us on the changes needed in the existing sensor node structure to improve its efficiency and to facilitate and enhance the assimilation of...
Solutions to security problems are proposed to protect the architecture (secure architecture) and to secure data (cryptography). Security is based on five essential principles which are supposed to guarantee the correct execution of both, the program and the communication. These five principles are confidentiality (encryption), integrity, availability, authenticity and nonrepudiations. Embedded systems...
The development of signal processing and coding techniques for magnetic recording channels has taken place in an environment of escalating demand for higher data transfer rates and storage density. The error probability of many magnetic-recording systems may be characterized in terms of the differences between the sequences that may be recorded. In fact, the bit-error rate is often dominated by a...
Two existing well-established routing protocols in wireless sensor network - Directed Diffusion and Rumor Routing use two different notions lying in the opposite extreme from each other. Directed Diffusion initiates the protocol from the sink, which propagates interest messages through the network in search of a matching event. In contrast, nodes themselves propagate the rumor of an event in Rumor...
Based on Internet and using artificial intelligence techniques to guild remote fault diagnosis expert system can provide expert-level fault diagnosis service for remote devices. Based on the introduction of general structure and related key techniques of fault diagnosis system, the expert system was introduced into fault diagnosis system in this paper. The architecture of an open fault diagnosis expert...
A digital-controlled oscillator (DCO) employing on-chip coplanar waveguide (CPW) resonator is proposed for 5 GHz-band wireless communication applications. A 10 bit DCO using on-chip designed, fabricated and tested. By comparing the measured results on the fabricated chip in 0.18 mum CMOS technology, it has noted that the proposed DCO employing on-chip CPW resonator is smaller in size and frequency-tuning...
WiMAX is the latest technology that has promised to offer broadband wireless access over long distance. The throughput of wireless communication such as WIMAX depends on number of parameters. These parameters include: packet size, transmission rate, signal to noise ratio, modulation techniques and channel conditions. All these variables are discussed using simulation, certain graphs have obtain optimum...
Antimony based materials have the advantage of having the capability of detecting the mid-infrared wavelength (2 to 5 mum) because of its interesting optoelectronic properties. In this paper we have theoretically studied the noise performance of an In0.10Ga0.90Sb avalanche photodiode to examine its suitability as a detector in optical receiver units. We show that at optimum gain such a device has...
Peer to Peer networks can be seen as truly distributed computing applications in which peers communicate directly with one another to exchange information, distribute tasks, or execute transactions. The issues with peer to peer network are that the resource is not centralized. Moreover, peers may not know about the trustworthiness of other, so the trust framework should be designed in such a way that...
The organizations are shifting from the desktop based solution to Web based platform to solve their business needs. The amass of these different systems poses problems for end-users, who must frequently provide their username/password across different systems, as well as for system administrators, who must manage security and access for those systems. Single sign-on mechanisms have become increasingly...
Design and simulation of novel all-optical fundamental X-NOR and NAND logic gates based on two dimensional photonic crystals are reported in this paper. In a photonic crystal self collimated beams are partially transmitted and partially reflected with a phase lag at a line defect in Gamma-X direction. The phase shifter is employed, the reflected and transmitted input beams are interfered constructively...
Space based Internets will be used to move earth observation data through satellite constellations to ground based receiving stations. Routing observation traffic in this environment is constrained by individual satellite orbits, individual satellite capabilities, observation schedules, ground station schedules, and rapidly evolving natural events. Among many global routing algorithms, Dijkstra algorithm...
Mobile WiMAX is a rapidly growing broadband wireless access (BWA) technology that is very applicable for the emerging mobile multimedia applications due to its packet based approach. In order to improve the performance of mobility, the concept of ASN anchored mobility is proposed by WiMAX Forum to keep the routing path prior to the anchor point unchanged during handover. However, the key management...
Position based routing protocols are kinds of routing protocols, which use nodes location information, instead of links information to routing. In position based routing protocols, it supposed that the packet source node has position information of itself and it's neighbors and the packet destination node. Greedy is a very important position based routing protocol. In one of it's kinds, named MFR...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.