Object location Services (OLS) in MANET is a challenging issue due to limitation of the applications of MANET such as bandwidth, mobility, battery power, memory etc., For more significance and efficient results we hav...
详细信息
This paper presents a novel technique of obtaining the Region of Interest (ROI) which is square-shaped. After palm print segmentation, we perform texture feature extraction using Local Binary Pattern (LBP) based on th...
详细信息
In this paper, Quantitative Feedback Theory (QFT) based robust controller for AC-AC buck converter is proposed whose transfer function involves complex load term. The proposed design would give the robust control acti...
详细信息
In this paper, Quantitative Feedback Theory (QFT) based robust controller for AC-AC buck converter is proposed whose transfer function involves complex load term. The proposed design would give the robust control action against the uncertainty in the parameters of AC-AC buck converter and the desired specifications bound. The proposed design is illustrated using QFT-Terasoft toolbox.
This paper proposes a Friend-based security scheme for efficient routing in mobile networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in real l...
详细信息
ISBN:
(纸本)9781565553415
This paper proposes a Friend-based security scheme for efficient routing in mobile networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in real life scenarios. The algorithm provides authentication of nodes by sending challenges and creating friend lists of nodes that complete the challenge. Friends are rated on the basis of the amount of data they transfer through themselves and according to the rating of other friends, which is obtained during the friend list sharing process. The data is finally routed through the route with the greatest number of trusted friends. One of the greatest advantages of this technique is that the nodes do not need to work in the promiscuous mode. The information about the malicious nodes is gathered effectively by using challenges. This reduces the overhead on the network significantly. Through various simulation experiments it has been found that the proposed algorithm works very efficiently in terms of detecting the malicious nodes and also allowing lesser number of packets to be routed through these detected malicious nodes.
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networ...
详细信息
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networks (WSNs), more widespread, used in applications such as area monitoring, industrial monitoring, vehicle detection or military monitoring. Sensor nodes have made it possible to collect data even in hostile environments, but because of the severe security and energy constraints faced by sensor networks, their deployment on a large scale is still a tricky job. A secure energy efficient routing algorithm is thus the need of the hour. SPIN, Sensor Protocol for Information via Negotiation, is one of the widely used energy efficient routing protocol in WSNs that completely ignores the security aspect. This paper involves proposing an alternate routing protocol, MS-SPIN, which incorporates the best features of SPIN while also addressing the security issue. The implementation of MS-SPIN in NS2 has shown that, for a larger number of nodes, its energy performance characteristics are comparable to those of SPIN while providing security features.
In this paper the performance of coded cooperation has been analyzed for independent flat Nakagami-m fading channels. The outage behavior of the cooperative system has been presented and analyzed with two instantaneou...
详细信息
In this paper the performance of coded cooperation has been analyzed for independent flat Nakagami-m fading channels. The outage behavior of the cooperative system has been presented and analyzed with two instantaneous variable (i.e. one with instantaneous Signal to noise ratio (SNR) and other with instantaneous received power). Finally we have presented an analytical approach to calculate the critical cooperation ratio. This gives the value of cooperation ratio (α) at which the total outage probability is minimum.
In this paper, CMOS active inductor with extended bandwidth using a compensation resistor is presented. This active inductor is used as an active component in the designing of bandpass filter. Moreover, the quality fa...
详细信息
In this paper, CMOS active inductor with extended bandwidth using a compensation resistor is presented. This active inductor is used as an active component in the designing of bandpass filter. Moreover, the quality factor of the CMOS active inductor is almost independent of signal swing. The bandwidth of the active inductor is increased from 19 MHz to 60 MHz with resonant frequency f 0 =148.59 MHz. Simulation is done using SPICE, 0.5μm CMOS technology.
Several video watermarking schemes have been proposed in recent years, but most of them are applied to uncompressed video. In this paper, a compressed video watermarking procedure is proposed to reduce the number of c...
详细信息
Several video watermarking schemes have been proposed in recent years, but most of them are applied to uncompressed video. In this paper, a compressed video watermarking procedure is proposed to reduce the number of computations. In a video frame, luminance component contains more crucial information than chrominance. Also P-frames appear more frequently in the compressed video and therefore have higher watermark hiding capacity. In MPEG videos, the direct coefficient (DC) of chroma discrete cosine transform (DCT) in P frame of video is a parameter which always exists in video streams and has a high robustness. The proposed algorithm embeds the watermark data in DC component of chroma DCT of video P frames using QIM. The quality and robustness of watermarked video is evaluated under various attacks.
The area of sensor network has a long history and many kind of sensor devices are used in various real life applications. Here, we introduce Wireless sensor network which when combine with other areas then plays an im...
详细信息
The area of sensor network has a long history and many kind of sensor devices are used in various real life applications. Here, we introduce Wireless sensor network which when combine with other areas then plays an important role in analyzing the data of forest temperature, bioinformatics, water contamination, traffic control, telecommunication etc. Due to the advancement in the area of wireless sensor network and their ability to generate large amount of spatial/temporal data, always attract researchers for applying data mining techniques and getting interesting results. Wireless sensor networks in monitoring the environmental activities grows and this attract greater interest and challenge for finding out the patterns from large amount of spatial/temporal datasets. These datasets are generated by sensor nodes which are deployed in some tropical regions or from some wearable sensor nodes which are attached with wild animals in wild life centuries. Sensor networks generate continuous stream of data over time. So, Data mining techniques always plays a vital role for extracting the knowledge form large wireless sensor network data. In this paper, we present the detection of sensor data irregularities, Sensor data clustering, Pattern matching and their interesting results and with these results we can analyze the sensor node data in different ways.
Major constraints to be kept in mind while designing a routing protocol for ad hoc networks are battery power consumption, congestion control, time delay and the transmission range of the nodes. In this paper, we aim ...
详细信息
Major constraints to be kept in mind while designing a routing protocol for ad hoc networks are battery power consumption, congestion control, time delay and the transmission range of the nodes. In this paper, we aim to develop an energy efficient and angular routing protocol, named Efficient Reactive and Angular - Optimized Link State Routing (ERA-OLSR). ERA-OLSR is an enhanced protocol designed over the well known Optimized Link State Routing (OLSR). ERA-OLSR is a reactive protocol which omits the use of routing table from OLSR and decides the next hop on the basis of angular concept. The proposed protocol has been compared with well established reactive protocols namely Ad-hoc On Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR). The results achieved after implementing the proposed protocol establishes the fact that ERA-OLSR shows a better performance than both AODV and DSR in terms of End-to-end delay and Average Energy Consumption during the simulation.
暂无评论