The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is important to characterize the noise accurately before including its structure in the formulations of algorithms. The distribution suggested in this paper is suitable for the ambient noise having kurtosis between 2.30 and 3. The ambient noise having low kurtosis is mainly dominated by shipping traffic which is having low frequency range.
This paper proposes a CMOS charge sharing dynamic latch comparator along with the Buffer stage in 130nm and 90nm technologies. The supply voltage for this comparator is 1.3v and 0.9v for 130nm and 90nm respectively. Various analysis of different characteristics of the comparator such as offset, ICMR, propagation delay, power dissipation has been carried out in both the technologies and the result...
In this paper a CMOS Differential current sensing comparator along with the Buffer stage has been introduced. The simulation is carried out in 130nm and 90nm technologies. The supply voltage for this comparator is 1.3v and 0.9v for 130nm and 90nm respectively. Various analysis of different characteristics of the comparator such as offset, ICMR, propagation delay, power dissipation has been carried...
In the 21st century network security is rated as one of most demanding domain in computer science and engineering where numerous organizations and researchers are giving their contribution to enhance the existing network security framework in various ways. This paper is aimed at discussing about the enhancement of firewalls policies in the network. The network security and firewalls are two words...
This paper proposes a steganography method using the digital images. Here, we are embedding the data which is to be secured into the digital image. Human Visual System proved that the changes in the image edges are insensitive to human eyes. Therefore we are using edge detection method in steganography to increase data hiding capacity by embedding more data in these edge pixels. So, if we can increase...
Internet Protocol version 6 (IPv6) is a new generation protocol that is designed to solve the issues which arises in IPv4. The introduction of IPv6 may pose additional security risks and give potential vulnerabilities in addition to those which are provided by IPv4. This paper analyzes the security vulnerabilities exist, network security improvements and implementation, and the distributed security...
The probability of error is calculated for general systems employing asymmetric prime-hop codes (APHCs). The effect of shot noise on the performance of 1D/2D wavelength hopping/time spreading CDMA dynamic noisy system is analyzed. A comparison is held between the performance of dynamic: 1D, 2D, and 1D/2D (C2DMA) correlation receivers under the effect of shot noise. The analysis reveals that the performance...
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack...
Energy Efficiency is important role of the Wireless Sensor Networks Researchers. The Energy Efficiency is one of the roles where the data is transmitted to the base station. Energy Techniques is used to improve the reliability of a link. When the data is transmitted communicates to the nodes at exact power to the clustering technique algorithm using graph theory approaches. Secure data aggregation...
Wireless sensor networks plays a vital role in emerging technologies, but the major problem regarding the sensor nodes is the limited energy provided. In order to utilize the energy efficiently a MAC protocol with duty cycle mechanism is being adopted to reduce idle listening problem by periodically putting the sensors to sleep and waking up. It is important to understand which type of duty cycled...
Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly. In this paper, we implement methods aimed at improving the odds of detecting such leakages when a distributer's sensitive data has been leaked...
This paper is mainly focused on computer simulation techniques used to simulate a standalone communication system which is used to transmit voice data on a specifically designed radio channel. Evaluation has been done on how much signal energy the system can transmit outside the radio spectrum range. Experimental results have been plotted for a voice over a simulated channel, which is capable of transmitting...
Computational grids have the potential for solving large scale scientific problems using heterogeneous and geographically distributed resources. Before this potential is realized, there are several technical overheads that must be overcome. This paper introduces PRAG — a resource allocation technique that is pre-emptive in nature. The critical problem for grid users is efficient allocation of resources...
In this study, we advocate the importance of robust local features that allow object form to be distinguished from other objects for detection purpose. We start from the grid of Histogram of oriented gradients (HOG) and integrate Scale Invariant Feature Transform (SIFT) within them. In HOG features an object's appearance is detected by the distribution of local intensity gradients or edge directions...
In Wireless Sensor Networks, sensor nodes depends on battery power thus energy efficiency plays a major role as critical challenge in the lifetime improvement of networks. The lifetime of network is also based the key characteristics like number of nodes, mobility, coverage area and connectivity of nodes in the network. Recent research works says that the important of Wireless Sensor Network in various...
Extraction of link context is used to know the theme of the target web page. This Link Context is used in many tasks like categorization of the web page, focused crawling. In this paper we have proposed a method to extract the link context with the help of tag tree approach and parsing method. Tag tree approach will help to find the concept of the anchor text and this concept will be used by LALR...
Machine Type Communication (MTC) introduced from the release 10 of 3rd generation partnership project (3GPP). MTC is about enabling the machines to share their data and signalling information. The paper deals with modelling of complex scenario of machine to machine communication. The model is based on the assumption that different devices will use different protocols. The proposed model uses Zigbee,...
A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A to B, side B does not need to send separate ACK, it may wait for a period of time is less than the sender's time of period to avoid the retransmission at sender and send a piggyback frame...
In this paper a procedure for construction of full order observer for linear time invariant system represented by state space description is proposed. The construction procedure makes use of the theory of generalized matrix inverse and does not presuppose the observer structure and impose no restriction on the structure of the system output matrix. The construction is straightforward and easy. Illustrative...
Due to the dynamic nature of the web plenty of webpages are deleted and added newly and as the web is large collection of data in form of the webpages or in the group of webpages as websites. So every time a surfer searches the web using the search engine, the data should be fresh and relevant. Due to the large size of web, corresponding to any query made by the user number of pages are being retrieved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.