The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart antennas offer a broad range of ways to improve wireless system performance. It provides enhanced coverage through range extension, hole filling and better building penetration. Smart antennas use an array of low gain antenna elements which are connected by a network. Fractal concepts are used in antenna arrays recently. The important properties of fractal arrays are frequency independent multi-band...
In the wireless world, the demand for advanced information services is growing. Voice and low-rate data services are insufficient in a world where high-speed internet access is taken for granted. The trend is toward global information networks that offer flexible multimedia information services to users on demand, anywhere, anytime. The third-generation (3G) mobile communication (International Mobile...
Parallel programming languages, APIs and tools available today try to extract as much performance as possible from parallel programs. But when components are parallelized this way, and are composed inside parallelized sections of code, multiple instances of the component are created, each creating more parallel tasks, resulting in much higher overhead. In this paper we propose a method which forces...
In the era of information technology explosion in mobile communications, many computationally challenging problem are encountered on surfing of complex scene in the multi-window environment. In this paper, we address the issue of texture based multi-intensity analysis for multiwindow overlapping. In current literature, the various methods have suggested for texture analysis but there are abundant...
The focus of this paper is towards developing an application specific design methodology for low power solutions in recursive coding system. The methodology starts from high level models which can be used for software solution and proceeds towards high performance hardware solutions. Recursive encoder/decoder, a key component of the emerging 3G mobile communications is used for the implementation...
Wired Equivalent Privacy (WEP) protocol was adopted to protect authorized users from unauthorized access and eavesdropping in the IEEE 802.11 wireless LANs (WLAN). However, it has been proved that the WEP protocol fails to provide data confidentiality and authentication. The WEP provides encrypted communication using an encryption key between the client station and Access point (AP). All client stations...
The advent of mobile ad hoc (MANET) network had spurred in a new era of communication where users (nodes) communicate with each other via a self configuring infrastructure less network of mobile devices connected by wireless links. Nodes can participate both as a host as well as a router willing to forward packets for other nodes. So here arises the need of a routing protocol. Now the dynamic topology...
The kernel functions are playing a very important role in machine learning. In this paper, the speech recognition problem is considered as a machine learning problem. The new kernel function called Linear-Polynomial kernel (LP) used to design the support vector machines for speech recognition for improving the generalization performance of speech recognition. The LP kernel performance is very good...
A genetic algorithm approach for shortest routing path has been proposed in this paper. The different genetic operations have been modeled with co-ordinate based mobile networks. The simulation study confirms the convergence with the Dijkstra's Algorithm.
Multiple Input Multiple Output(MIMO) has been remained in much importance in recent past because of high capacity gain over a single antenna system. In this article, analysis over the capacity of the MIMO channel systems with spatial channel has been considered when the channel state information(CSI) is considered imperfect or partial. The dynamic CSI model has also been tried consisting channel mean...
Cognitive Radio Networks (CRNs) appear as a probable solution for the shortage of spectrum. However, the Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to general wireless network. These chances may cause degradation the network quality of service but currently there are no specific secure protocols...
Many emerging web and Internet applications are based on group communication model. In the Internet, multicast has been used successfully to provide an efficient, best-effort delivery service from a sender to a large group of receivers. Thus, securing group communication (i.e., providing confidentiality, authenticity, and integrity of messages delivered between group members) becomes an important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.