Search
Now showing items 1-10 of 10
Smart prolong fuzzy wireless sensor-actor network for agricultural application
(Institute of Information Science, 2012-03)
The advances in pervasive communication, sensing and computing of wireless sensor networks technologies are leading to the emergence of wireless sensor-actor networks. The spreading merit of WSAN has led to increasing ...
Impact of freeway mobility pattern on routing performance of mobile Ad Hoc networks
(Advanced Institute of Convergence IT, 2013-05)
In all applications which are based on Mobile Ad-Hoc Networks, node mobility has a significant impact on the performance of routing protocols; consequently affect the usefulness of these applications. This paper presents ...
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
(Universiti Malaysia Perlis (UniMAP), 2012-02-27)
In this paper, a cipher system based on Chaotic Neural Network (CNN) is used to encrypt and construct a stream
cipher of compressed MPEG-2 video signal. The symmetric CNN cipher algorithm transforms the plaintext
(compressed ...
Channels estimation in OFDM system on block-type and comb-type pilot arrangement
(Universiti Malaysia Perlis (UniMAP), 2012-06-18)
In orthogonal frequency division multiplexing (OFDM) systems over time-varying and frequency-selective fading channel, channel estimation and tracking is generally carried out by transmitting known pilot symbols in given ...
Effect of relay location on two-way DF and AF relay for multi-user system in LTE-A cellular networks
(Institute of Electrical and Electronics Engineers (IEEE), 2013-04)
In order to meet the increasing demand and stringent design requirements for coverage expansion, throughput and capacity enhancement relay Node (RNs) has been considered as a promising solution to LTE-A Point-to-Multi-Point ...
Variable structure system with sliding mode controller
(Elsevier B.V., 2013)
This paper describes the application of sliding mode variable structure control (SMVSC) concept for DC motor position control. A mathematical procedure for determining the values of the gains of variable structure system ...
Secured and robust information hiding scheme
(Elsevier B.V., 2013)
The sensitivity of the digital work made it susceptible to many accidental dangers. Accordingly, it has become necessary for the secret data to be protected, identified and extracted. As a result, many researchers have ...
On coverage analysis for LTE-A cellular networks
(Engg Journals Publications, 2013)
In this paper we analyze the coverage area for LTE-A cellular network by taking into account the interference of first tier and frequency reuse planning. We considered the numerical calculations and simulation results to ...
Low complexity burst allocation algorithm with high frame utilization for Mobile WiMAX (802.16e)
(Institute of Electrical and Electronics Engineers (IEEE), 2013-04)
Burst allocation is one of the important parameter that affects the performance of the Mobile WiMAX systems. The burst allocation algorithm is responsible about calculating the appropriate dimensions and location of each ...
An embedded network traffic monitoring system for portable applications
(Medwell Journals, 2013)
This study presents an enhanced Embedded Network Traffic Monitoring (ENTM) system capable of capturing and analyzing network traffic information on data networks. The system incorporates an enhanced packet probing subsystem ...