The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Wireless transceivers are rapidly being used for monitoring wide variety of physical world phenomenon. Other than military and civil applications like monitoring, surveillance, home automation nowadays low power and cost effective wireless transceivers are being used for indoor wireless connectivity especially for Internet of Things (IoT). The main objective of this paper is the link budget analysis,...
Microwave Oven (MWO) and Wireless Local Area Network (WLAN) both operate in the 2.4 GHz Industrial, Scientific and Medical (ISM) Band. Microwave oven does not take care of Wi-Fi channel usage; its operation in the same band of frequency can cause degradation of Wi-Fi network performance. This novel experimental arrangement investigates the performance of the WLAN network under the effect of simultaneous...
Process reuse has gained much attention recently due to its tangible benefits. Similar benefits can also be obtained by reusing frameworks of existing standards. One such example is ISO 27001 standard that has a generic framework which can be used for improvement of areas other than information security. This paper presents the results of a case study in which we performed a mapping of ISO 27001 standard...
In this paper Orthogonal Frequency Division Multiplexing (OFDM) has been implemented on Multipath Rayleigh Fading Channel and AWGN channel models. An in depth comparison of BER enhancement using Viterbi Decoder, Frequency and Time Interleaving has been executed. It has been demonstrated through the simulation result how the use of the Viterbi decoder in conjunction with both time and frequency interleaving...
In this paper a single stage power amplifier is designed at 1 GHz frequency. This amplifier provides high output Gain using optimized input and Output matching circuits using lumped components. The amplifier is used along with a VCO in order to increase the total output gain needed for the antenna measurement system. This Power amplifier is provided with a Vcc Supply of 5 Volts. Input and output circuits...
Internet of things (IoT) is the biggest innovation after smartphones. It operates in an environment where objects interact with one another in a continuous and unpredictable manner. The innovative generation will perceive the IoT using sensing apparatus like sensors, RFID, infrared, Bluetooth, GPS, laser scanner, cameras and network protocols for connection of entire objects to acquire smart identification,...
Refraction through the atmosphere is one of the propagation mechanisms of wireless signals traversing the atmosphere. Different refractive conditions can be prevalent at a particular place, height and time, depending on the weather conditions. Ducting and sub-refractive conditions can lead to Anomalous Propagation (ANAPROP). There could be evaporation ducts, surface ducts, surface-based ducts and...
Software testing is the process of testing, verifying and validating the user's requirements. During whole software development, testing is an ongoing process. Black Box, White Box testing and grey box testing are the three main types of software testing. In Black box testing, user doesn't know intrinsic logics and design of system. In white box testing, Tester knows the intrinsic logic of code. In...
People have been using mobile phones since the last two decades. To a certain extent, these mobile phones have replaced the traditional computational devices and some people even prefer to use mobile phones for their daily tasks and entertainment. Games are a good source of entertainment and mobile games provide the opportunity for enjoyment on the go. Development of these mobile games, however, is...
Agile methodology is an innovative and iterative process that supports changing requirements and helps in addressing changes throughout the development process. Requirements are elicited at the beginning of every software development process and project (product) and latter are prioritized according to their importance to the market and to the product itself. One of the most important and influencing...
Systems that were developed in the reign when there were no modern techniques of software development are said to be legacy systems. These systems have a greater business value for several organizations and have significantly served the organizations and delivered the intended result. However these systems have weak requirement engineering process which makes its understanding difficult and also makes...
Steganography is one of the most important fields of information security. Spatial domain steganography technique hides secret information in the least significant bits of cover image. Security of hidden information and hiding efficiency are two main objectives of a steganographic technique. High data hiding efficiency and good visual quality of stego image are always attempted to be achieved. However,...
Applications well-defined with high Fault Tolerance index are considered reliable and trustworthy to drive quality. Fault Tolerance metrics for web mobile applications are neither defined formally nor are they organized at a single place for measurement to researchers and quality engineers. Fault Tolerance metrics determines the quality of web mobile applications provided they are measured accurately...
Network security attacks are the major and very common problem being faced by the security researchers as well as the network users. Different solution and techniques as well as tools and technologies have been developed and tested for the complete provision of tight security of data over the network but still hundred percent securities is not assured by any tool or technology. SIEM is the latest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.