The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A to B, side B does not need to send separate ACK, it may wait for a period of time is less than the sender's time of period to avoid the retransmission at sender and send a piggyback frame...
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highly efficient encryption standard and unabating experience of compression techniques. The stream ciphers are chosen for their high encryption rate and they are mainly of bit-by-bit encryption...
Universal asynchronous receiver transmitter, abbreviated DART is a integrated circuit used for serial communications over a computer or peripheral device serial port. DARTs are now commonly included in microcontrollers. The universal designation indicates that the data format and transmission speeds are configurable and that the actual electric signaling levels and methods (such as differential signaling...
In this paper a method to detect two simultaneous bit errors and correct a single bit error during data transmission is devised. The proposed method is developed based on Hamming Code. The key point for the implementation of error-free data transmission is the encoding of the information to be transmitted in such a way that some extent of redundancy is included in the encoded data, and a method for...
Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of communication protocols, and transmission technologies. It is used for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Session Initiation Protocol (SIP) is a signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet...
DNA cryptography is a new field in cryptography that is emerging with the advancement on DNA research carried out in recent years. DNA is being used because of its vast parallelism, energy efficiency and the amount of information that the DNA can store. These properties of DNA are explored for cryptographic purposes such as encryption, authentication, signature, and various other applications in cryptography...
Broadcasting Gaussian sources over a Gaussian broadcast channel is a major problem in information theory. Consider the problem of sending a correlated Gaussian source S= (S1, S2 … …. Sm) over a power limited Gaussian broadcast channel. User i (1,2,… m) observes the transmitted signal which is affected by Gaussian noise with power σ2i and desires to estimate Si. This paper aims to analyze the distortion...
This paper presents a basic useful technique for carrier frequency offset (CFO) estimation in orthogonal frequency division multiplexing (OFDM) over frequency selective fading channel. The performance of OFDM system is very sensitive to CFO, which introduces inter-carrier interference (ICI). In cyclic prefix (CP) based estimation, the CFO can be found from the phase angle of the product of CP and...
Over the past few years a lot of research are going in the field of reversible watermarking. Reversible watermarking is a novel category of watermarking schemes. It completely recover the watermark along with the original image. In starting this technique is only used for the authentication, now it is used to send highly informative information through the original image. This technique is mostly...
Drill string acoustic telemetry is an effective transmission method to retrieve downhole data in drilling applications. In practice, pipes used for drilling deep wells have slight variation in length. The arrangement of downhole pipes plays a vital role for improving the transmission efficiency of extensional waves transmitted through the drill string. Finite-difference modeling produce the comb-filter-like...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.