The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: radiocommunication; telecommunication security; underwater communication; network routing; MAC protocols; and network reliability.
On behalf of the Organizing Committee I welcome you to the first International Conference on Wireless Communication and Sensor Computing ICWCSC 2010 held in SSN College of Engineering, Chennai, India on 02 – 04 January 2010.
We propose an autonomous algorithm for mobile agents in multisensor fusion. Our algorithm is based on the concept of mutual information (MI) and the bounds obtained for correlated information. The bounds are obtained by our technique of Determinant Inequalities to maximize the mutual information to achieve the conditions for autonomy. We demonstrate the superiority our autonomous algorithm over the...
Fountain codes which have been utilized extensively in deep-space communication can solve the problems, such as the asymmetry between the uplink and downlink, the enormous time delay and long distance. LT codes are the first codes fully realizing the digital fountain concept. The girth of the generator matrix is a key element, and short cycles in the generator matrix cause the degeneration of performance...
In recent years mobile ad-hoc networks have become very popular because of their widespread usage. Cooperation among the nodes in ad-hoc networks is an important issue for communication to be possible. In the literature there are many routing protocol for ad-hoc networks. This paper proposes a routing protocol based on mobile agents which identifies the best possible routes between nodes using reputation...
A major drawback of orthogonal frequency division multiplexing (OFDM) is the high peak to average power ratio (PAPR) of the transmit signal which can significantly impact power efficiency and performance of a high power amplifier (HPA). This paper proposes a new novel scheme based on orthogonal greedy algorithm (OGA) to reduce PAPR. By performing simple transformations on sub-optimum partial transmit...
This paper provides the performance analysis of Multi Input Multi Output (MIMO) Multi carrier (MC) interleaver based multiple-access system with multiuser detection. Interleave-division multiple access (IDMA) is a scheme in which users are separated by employing different interleavers instead of different signatures as in a conventional code-division multiple-access (CDMA) scheme. The basic principle...
Cognitive radio is a new concept that utilizes the spectrum efficiently by shifting the frequency bands with time and availability. This puts a challenge on the antenna design to meet the demands of cognitive radio. This paper reviews the possible antenna configurations like wideband antennas, polarization and frequency reconfigurable antennas. Whilst there are many possible ways in which such systems...
An UWB LNA that employs the differential topology with a cascode common gate stage as the core amplifier is proposed for lower band of ultra wideband (UWB) applications. This differential LNA is designed to obtain a power gain greater than 15dB and a noise figure less than 1dB. The common gate stage at the input offers input matching and the output matching is attained using a common drain buffer...
Multi-protocol label switching is a best technique for efficient utilization of network resources, a small overhead labels. The Internet Protocol is the dominant protocol in computer networks today. MPLS adds the flavor of virtual circuits in computer networks. Which transport layer protocol (TCP Vegas, TCP New Reno, SCTP) performs the best when it is used along with MPLS is still an open question...
As devices in sensor network are energy limited so energy efficiency is the most critical parts of this network. To have energy efficient network, efficient routing plays very important role. In this paper, an energy efficient modified hybrid adaptive intra cluster routing is proposed which provides best solution for the problem offered by traditional and simple adaptive routing algorithms. Quantitative...
During a long period, there have been a lot of switch problems between TD-SCDMA which is Chinese standard and GSM networks. How to keep their promises to provide users with seamless high-quality coverage, diversification, as well as high-speed business experience? This is the commercial problem that 3G network operators must to overcome in the future. By using K1205 signaling analyzer, the signaling...
Error control codes are used to protect information from errors that can occur during transmission. Reed Solomon (RS) code is one of the most important and best known classes of nonbinary Bose-Chaudhuri-Hocquenqhen (BCH) codes which are capable of correcting burst errors (C. Xu, 2007)[2]. RS code is a type of forward error correction (FEC) codes used in data transmission for real time applications...
Underwater channel characterized by multipath propagation requires focusing of acoustic signal to overcome delay spread. This is achieved by time reversal. This paper simulates underwater acoustic communication using passive time reversal technique with transmitter and receiver separated in range by 4 Km in 120m deep water. The Passive Time Reversal (PTR) system is simulated for both singleuser and...
Mobile nodes in a MANET incur much overload having to forward the packets of the adjacent nodes. Each node is expected to behave within the boundaries delineated by the underlying protocol. Each node in a MANET is expected to wait for a pre specified time interval generally termed as the back off interval. This back off interval is supposed to be chosen from a range, at random. But some nodes in an...
Detection of event is a prominent application of wireless sensor networks. In this paper, the problem of distributed detection in a wireless sensor network over multi access fading channel is considered. The detection performance of Neyman-Pearson detection scheme, which uses a constructive interference technique is analyzed for different channel conditions. The detection performance is characterized...
In this paper, a security architecture is designed based on the artificial immune system by using multi-agents in mobile ad hoc networks. There are two types of immunity-based agents: one is detection agent and the other is counterattack agent. Detection agents take charge of monitoring the nodes in the network, detecting the anomaly activities, and taking response to the invader, which may be viewed...
Wireless sensor networks are catching up as the primary mode for monitoring and collecting data in physically challenging environments. They find applications in various fields varying from environment monitoring, military applications to monitoring patients in hospitals. The constraints due to their inherent features make routing in wireless sensor networks a big challenge. This paper covers Genetic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.