The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-wing chaotic attractors are highly complex nonlinear dynamical systems with higher number of index-2 equilibrium points. Due to the presence of several equilibrium points, randomness of the state time series for these multi-wing chaotic systems is higher than that of the conventional double wing chaotic attractors. A real coded Genetic Algorithm (GA) based global optimization framework has been...
In this paper we analyze the performance of different channel estimators under different antenna correlation conditions. This analysis is performed for various spatial multiplexing techniques considered in 3GPP Long term evolution (LTE) Release 8 (R8) using extensive simulations. By considering the LTE downlink system parameters and the LTE channel model, we measure the performance of channel estimators...
A microstrip antenna couplet on a periodic patterned ground plane is proposed to provide circularly polarized tilted beam. Circular polarization is achieved by employing two wide microstrip antenna elements designed to operate in C-band. The elements are fed at the corners with 900 phase difference along a travelling wave microstrip feed line. A novel concept of patterned slotted ground plane is utilized...
Data mining is a technique used to extract un-known patterns from large volume of data. Privacy has be-come a major concern in data mining. The data which are stored in the organization's database may have some confi-dential information and hence it has to be protected from any unauthorized usage. In order to overcome the privacy problem in this paper we propose a new technique called shearing based...
The frequent failures in Wireless Mesh Networks (WMNs) cause severe performance degradations during their lifetime. This increases the need of re-routing of links in WMNs. Expensive manual network management is required for their real-time recovery. This paper presents a Streamlined Re-routing Algorithm (SRA) that enables a multi-radio WMN to autonomously recover from local link failures to preserve...
Scheduling can be defined as a problem of finding an optimal sequence to execute a finite set of operations satisfying most of the constraints. So they are generally treated as NP - complete combinatorial optimization problems. Exact methods such as the branch and bound method and dynamic programming take considerable computing time if an optimum solution exists. Stochastic search techniques can be...
As we know the Domain Name System (DNS) is one of the most successful and critical part of the internet infrastructure today. Of the many network protocols we use in networking today, it is one of the most fundamental. Yet there are a number of potential problems where there is a need for additional mechanisms and security. One of such problems is securing the DNS dynamic update when combined with...
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of heterogeneous resources that are geographically distributed. The heterogeneous nature of the grid makes it more vulnerable to faults which lead to either the failure of the job or delay in completing the execution of the job. Checkpointing is one of the many fault tolerance techniques which...
As a promising renewable alternative, the wind power is one of the significant source of generation. Reactive power compensation in a low voltage distribution networks for integration of wind power to the grid is the main concern of this paper. This paper proposes a control scheme based on instantaneous pq theory for compensating the reactive power requirement of a three phase grid connected wind...
For the next generation wireless local area networks (WLAN) and wireless personal area networks (WPAN), 60 GHz radio channel propagation characteristics in typical indoor corridor environments are addressed in this paper using Matlab simulations of ray-tracing, ITU-R model and full-3D ray-tracing model of Wireless Insite. Pathloss and rms delay spreadobtained through simulations of models foromnidirectional...
Knowledge Management (KM) is the latest buzzword that is becoming a growing field of interest. There is a strong belief that Higher Education Institutions (HEI) would have a tremendous value when they develop initiatives to create and share knowledge to achieve their objectives. KM typically focuses on institutions' objectives such as improved performance, competitive advantage, innovation, the sharing...
Many web applications can be exposed to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both theoretical and practical advantages over most existing techniques...
Wireless sensor networks are mainly designed for environment monitoring. The lifetime of wireless sensor networks depends on the durability of the battery resource sensors, so it is crucial for sensors to efficiently use their limited battery resources. The energy expends by sensors in data communication makes up a significant quantum of their total amount of energy consumption. In the existing research,...
This paper presents a method to recognize the action being performed by a human in a video. Applications like video surveillance, highlight extraction and video summarization require the recognition of the activities occurring in the video. The analysis of human activities in video is an area with increasingly important consequences from security and surveillance to entertainment and personal archiving...
Network security has become an important issue due to the evolution of internet. It brings people not only together but also provides huge potential threats. Intrusion detection technique is considered as the immense method to deploy networks security behind firewalls. An intrusion is defined as a violation of security policy of the system. Intrusion detection systems are developed to detect those...
A Microstrip triple-band band pass filter for GSM 900, GPS - L1 band and 2.4 GHz -WLAN applications is designed and simulated using Agilent® ADS software. Three transmission zeros are inserted at frequencies of 1.31 GHz, 1.96 GHz and 2.89 GHz, to achieve good out of band rejection. Insertion loss of 3.88 dB, 3.78 dB and 4.8 dB at central frequencies of 925 MHz, 1.575 GHz and 2.4475 GHz are observed...
This paper presents the design of 4X1 and 4X2 microstrip array antenna structures for 10GHz applications. The antennas with inset feed structures and micro strip line corporate feeding network is developed and simulated using Advanced Design System (ADS) software. Both the schemes provide better gain, i.e. 12.56dBi and 13.89dBi. However, the 4X2 inset feed antenna shows a 1.3dB improvement in the...
In this paper a technique based on Discrete Wavelet Transform has been applied to characterize the sounds produced by some traditional Indian musical instruments, viz. sarangi, harmonium and tumbi. It is observed that when the sound signal is decomposed for different levels and the energy in the wavelet coefficients is calculated for each level. The energy retained in wavelet coefficients varies with...
Cognitive Radio Ad Hoc Networks (CRAHNs) constitute a viable solution to solve the current problems of inefficiency in the spectrum allocation, and to deploy highly reconfigurable and self-organizing wireless networks. Cognitive Radio (CR) devices are envisaged to utilize the spectrum in an opportunistic way by dynamically accessing different licensed portions of the spectrum[1]. However the phenomena...
Resource allocation and scheduling are great challenge in grid environment. As the number of grid system component increases, the probability of a failure in the grid computing becomes higher. Users not only expect to commitment to perform a task in minimum time but also expect commitments to the level of Quality of Service (QoS). The aim of this paper is to utilize the resource to improve the throughput...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.