Version-1 (March-April 2015)
Version-1 Version-2 Version-3 Version-4
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of K-Means Clustering Based Image Segmentation |
Country | : | India |
Authors | : | Priya P, Dony A.D‟souza |
Abstract: This paper presents a new approach for image segmentation by applying k-means algorithm. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means clustering algorithm is one of the most widely used algorithm in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means. This paper proposes a color-based segmentation method that uses K-means clustering technique. The k-means algorithm is an iterative technique used to partition an image into k clusters. The standard K-Means algorithm produces accurate segmentation results only when applied to images defined by homogenous regions with respect to texture and color since no local constraints are applied to impose spatial continuity. At first, the pixels are clustered based on their color and spatial features, where the clustering process is accomplished. Then the clustered blocks are merged to a specific number of regions. This approach thus provides a feasible new solution for image segmentation which may be helpful in image retrieval. The experimental results clarify the effectiveness of our approach to improve the segmentation quality in aspects of precision and computational time. The simulation results demonstrate that the proposed algorithm is promising.
Keywords: K-means Algorithm, Clustering, local minimum, global minimum, Segmentation.
[1] J. A. Hartigan and M. A. Wong, "A K-Means Clustering Algorithm", Journal of the Royal Statistical Society. Series C (Applied Statistics), Vol. 28, No. 1 (1979), pp. 100-108
[2] S. P. Lloyd, "Least squares quantization in PCM", IEEE Trans. Inf.Theory, vol. IT-28, no. 2, pp. 129–136, Mar.1982.
[3] J. Shi and J. Malik, "Normalized cuts and image segmentation", IEEE Trans. Pattern Anal.Mach. Intell., vol. 22, no. 8, pp. 888–905, Aug.2000.
[4] S.Mary Praveena and Dr.IlaVennila, "Optimization Fusion Approach for Image Segmentation using K-Means Algorithm", International Journal of Computer Applications (0975 – 8887) Volume 2 – No.7, June 2010
[5] M. Brindha and M. Annie Flora, "A Label Field Fusion Using ICM Optimization in Image Segmentation", IJMIE, volume 2, issue 12, ISSN: 2249-0558, December 2012.
[6] Julian Besag, "On the Statistical Analysis of Dirty Pictures",Journal of the Royal Statistical Society, Series B (Methodological), Vol. 48, No. 3. (1986), pp. 259-302.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | UMTS VoIP Codec QoS Evaluation |
Country | : | Sudan |
Authors | : | Eng.Mohamed Abdelmotalab Abdelrahman Suliman || Dr. Amin Babiker A /Nabi Mustafa |
Abstract: Voice over Internet Protocol (VoIP) has been an interactive subject chosen by most studies. The increase of using Real Time Applications service such as (VoIP) is resulting in the high growth of Telecom and broadband field to meet the request of providing high quality of VoIP at any place, the prime Goal of this paper is to analyze and evaluate of an appropriate voice (CODEC) schemes depending on the Quality of service (QoS) of VoIP in Universal Mobile Telecommunication system (UMTS), network was implemented in OPNET Modeler 14.5. The quality is evaluated based on some QoS parameters such as Jitter , MOS, end-to-end delay and packet loss to investigate the performance of different codecs QoS scheme in UMTS VoIP network. The VoIP codecs used in the measurements of QoS are: G.711, G.723.1, GSM-FR and G.729A. Simulations showed that G.711 and GSM-FR are the best schemes provide best quality of voice. G.723.1 can be selected and use in UMTS depending on conditions. The results analyzed and the performance evaluated will give network Planners an opportunity to select the codec for VoIP performance enhancement which lead to the satisfactions of customers .
1] T. Wallingford, "Switching to VoIP", Publisher: O'Reilly, ISBN: 0-596-00868-6, Pub Date: June 2005
[2] A. Samukic, UMTS Universal Mobile Telecommunications System Development of Standards for the Third Generation, 1998
[3] T. Kwok, "Residential broadband Internet services and applications requirements" Communi- cations Magazine, IEEE Volume 35, Issue 6, June1997 Page(s):76 - 83
[4] S. Jadhav, Z. Haibo and H. Zhiyi, Performance E valuation of Quality of VoIP in WiMAX and UMTS, 12th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2011, pp. 375380.
[5] C. Jianguo and M. Gregory, Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network, Australasian Telecommunication Networks and Applications Conference (ATNAC), 2008, pp. 6771.
[6] Hira Sathu and Mohib A. Shah. Performance Comparison of VoIP Codecs on Multiple Operating Systems using IPv4 and IPv6 International Journal of e-Education, Vol. 2, No. 2, April 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | UMTS FTP Performance Enhancement Using Admission Control Algorithm |
Country | : | Sudan |
Authors | : | Eng.Mohamed Abdelmotalab Abdelrahman Suliman || Dr. Amin Babiker A /Nabi Mustafa |
Abstract: The Universal Mobile Telecommunication systems are one of the very important cellular phone technologies which are known as the 3G systems. It support the high speed data transfer, speech, web browsing, email, video telephony, multimedia and the audio streaming. The expected growth in real time application requires efficient spectrum usage. In UMTS, users share the same frequency. Thus, one user will cause interference for other users in the system. New users will only be granted access to the network if they do not cause too much interference for already active users. The idea is that it is much better to block the access of a user to the network than having to drop already active users. Such decisions are made by the admission control. In this paper, applying Admission control algorithm are studied in multiples scenarios with three levels of load, low load, medium load and high load compared. The aim is to compare the efficiency of the admission control algorithm to demonstrate the alternative, FTP performance via admission control algorithm and compare its performance against the performance of the default algorithm of the network. The scenarios implemented in the OPNET Modeler 14.5. Based on the obtained result, the throughput -based admission control algorithm performed better than the default admission control algorithm for the given network and configuration ,in the terms of application traffic throughput and application response time.
[1] R. Ramjee, D. Towsley, and R. Nagarajan, "On optimal call admission control in cellular networks," ACMWireless Networks, vol. 3, pp. 29–41, 1997
[2] A. Samukic, UMTS Universal Mobile Telecommunications System Development of Standards for the Third Generation, 1998
[3] M. H. Ahmed, "Call admission control in wireless networks: A comprehensive survey," IEEE Communications Surveys & Tutorials, vol. 7, no. 1, pp. 50–59, Jul. 2005.
[4] P. Frenger, S. Parkvall, and E. Dahlman, "Performance comparison of HARQ with chase combining and incremental redundancy for HSDPA," in Proc. of IEEE VTC Fall '01, Vancouver, Canada, Sep. 2001, pp. 1829–1833.
[5] H. Holma and J. Laakso, "Uplink Admission Control and Soft Capacity withMUD in CDMA," in Proc. of IEEE VTC Fall '99, vol. 1, Amsterdam, The Netherlands, Sep. 1999, pp. 431–435.
[6] Bernhard H. Walke, "Mobile Radio Networks", Second Edition, Wiley, 2002
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparision of Radiation Patterns for Thinned and Thicked Arrays |
Country | : | India |
Authors | : | D. Ramadevi || Dr.G.S.N.Raju |
Abstract: It is possible to thin an array as well as to improve radiation pattern characteristics with an appropriate spacing function. Array thinning plays a very important role in array synthesis. To analyze the effect of thinning by considering a modulated spacing function. Using a specified spacing function, radiation patterns are evaluated for different array lengths. It is found that the near-in-side lobe level is reduced for a modulated spacing function and that the main beam width is found to remain constant. These advantages are not found in the case of uniform spacing. Even after thinning the array, the modulated spacing function is found to improve the overall radiation pattern characteristics.
[1] Zoubir m. hamici, and taisir h.ismail ." optimization of thinned arrays using stochastic immunity genetic algorithm" published in
signal processing and information technology(isspit),ieee international symposium, isbn 978-1-4244-5949-0 , pp 378-383, dec 2009.
[2] Banani basu, g.k mahanti , "artificial bees colony optimization for synthesis of thinned mutually coupled linear array using inverse
fast fourier transform", international conference on devices and communications(icdecom),isbn 978-1-4244-9189-6, pp1-5, feb
2011.
[3] Ling Cen, Zhu Liang Yu, Wei Cen, "Linear Aperiodic Array Synthesis Using an Improved
[4] Genetic Algorithm" ieee transactions on antennas and propagation, vol. 60, no. 2, pp 895-902, FEBRUARY 2012.
[5] U.V. Ratna Kumari and Dr. G.s.n. raju. "Investigations on thinning and thickening linear arrays" International Journal of
Engineering Science and Technology (IJEST) ISSN : 0975-5462 , Vol. 5 No.11 Nov 2013, pp. 1808-1816.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Software Development for Electronic Policing Of a Typical Environment |
Country | : | Nigeria |
Authors | : | Olumuyiwa Oludare Fagbohun |
Abstract: Electronic policing of an environment is becoming more appreciated to curb indiscipline, unwholesome attitudes, as well as nib in the burled at early stages of terrorism. This work aims to develop a software to police an environment by acting as a reliable receiver end and document the detail report of incidence with security features for security agencies attention in real time. The environment to be policed is coded in the database with zone code definitions with their corresponding code numbers, names, streets, area and house numbers for easy access, with time of alert and date for concrete evidence as stored in the database with restricted access. . The development was tested and the input output response time was determine to be less than 2sec. The software performs well in accepting the digital coded signal from the input source to determine the distress point of call, and make a print out of the caller. The developed software, by its design makes it difficult for any erasure of the information received from its line, and stores it in the ROM, with the time of occurrence and date. The precision detailed information of events from distress point of call [DPOC], stored in the system for checks and verification, is expected to reduce the laxities and negligence of duties on the part of a Nigerian policeman, and claim of innocence of not being timely informed of any security break. It is also believed that crime rate with the use of software is expected to be highly reduced, thus creating a better image of the Nigerian nation as well as others implementing the scheme in their security outfits, and create a platform to strengthen the "caught- in the –act" scheme as against the present "after –the- act "investigations being adopted by the Nigerian police and other developing Nations to combat crime.
Keywords: Area, code numbers, database, policing, streets, zones
[1]. S.T. Andrew: Computer Networks , 2nd edition , Prentice –Hall international, inc. 1999
[2]. A. Atayero, et al: Designing a robust e-policing System for Developing Nations of the World. Proceedings on 5th1]. European conference on e-Government.2007, Pp 27-32
[3]. T. Balogun: Police welfares and state police agitation ; 2nd national workshop on security of life and property in Nigeria, Sheraton Hotel Abuja, 2002, 25-26th June.
[4]. P. Barry, and W. Barry: Crime free housing; Butterworth Architecture, Arnold publishers inc. 1991
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Inter cell Interference Issues on Cellular Networks Using OFDMA |
Country | : | India |
Authors | : | Bala Naga Vamsidhar Grandhi || K.Sravya Chowdary || N.Sai Sree Harish || Sri Harsha Kota || V S S S Pramod Pola || Rupesh Sasanka Chakka |
Abstract: In order to reduce interference and improve the capacity of the system the orthogonal frequency division multiplexing technique has been deployed in various cellular systems. But major problem in cellular systems is intercell interference especially at the cell edges. For reducing the impacts of ICI inter cell co-ordination techniques are investigated in this paper. The popular interference coordination technique is interference avoidance technique where the resources are divided between the users in all spatial, time, frequency domains to reduce the interference to some extent. This paper Provides comprehensive survey on the various ICIC avoidance schemes which consists of both static and dynamic schemes in OFDMA-based cellular networks.
Keywords: Avoidance, ICIC, ICI, OFDMA.
[1]. F. B. Mugdim, ―Interference Avoidance Concepts,‖ WINNER II project,2007.
[2]. D. Kim, J. Ahn, and H. Kim, ―Downlink Transmit Power Allocation in Soft Fractional Frequency Reuse Systems,‖ ETRI Journal, vol. 33, pp. 1-5, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhanced Network Lifetime Improvement by Effort and Anycast in Wsn |
Country | : | India |
Authors | : | A.Jothi || Mr.M.Sivakumar |
Abstract: Designing a lifetime-maximization routing in wireless sensor networks poses a great challenge mainly due to unreliable wireless links and limited power supply.The lifetime maximization can be achieved by EFFORT which is an opportunistic routing where the path diversity and the improvement of transmission reliability is improved. Besides, asynchronous sleep-wake scheduling is an effective mechanism named ANYCAST to reduce energy consumption by appropriately arranging sensor nodes to sleep. In this Paper we exploit two methods called EFFORT and ANYCAST to maximize the network lifetime in WSN.Simulation results show that both methods effectively achieves network lifetime extension compared with other routing schemes.
[1]. Chien-Chun Hung†, Kate Ching-Ju Lin§, Chih-Cheng Hsu†, Cheng-Fu Chou† and Chang-Jen Tu 2010, ICCCN 19th International conference, IEEE transaction "On Enhancing Network-Lifetime Using Opportunistic Routing in Wireless Sensor Networks".
[2]. Chih-Cheng Hsu, Ming-Shing Kuo, Shi-Chen Wang, and Cheng-Fu Chou 2014, IEEE Transactions On Computers, Vol. 63, No. 7 "Joint Design of Asynchronous Sleep-Wake Scheduling and Opportunistic Routing in Wireless Sensor Networks".
[3]. J. Park and S. Sahni, 2006 IEEE Trans. Comput., vol. 55, pp. 1048–1056, "An online heuristic for maximum lifetime routing in wireless sensor networks".
[4]. Priyanka M.Lokhande, A.P.Thakare, March 2013International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-1, "An Efficient Scheduling Technique for the Improvement of WSN with Network Lifetime & Delay Constraint"
[5]. Y.Wu, S. Fahmy, and N. Shroff, 2008,IEEE Conf. Comput. Commun. (INFOCOM), pp. 1013–1021, "On the construction of a maximum-lifetime data gathering tree in sensor networks: NP-completeness and approximation algorithm".
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Emotion Recognition System through Speech Signal Using KNN & GMM Classifier |
Country | : | India |
Authors | : | Chandra Prakash || Prof. V.B Gaikwad || Dr. Ravish R. Singh || Dr. Om Prakash |
Abstract: In machine interaction with human being is yet challenging task that machine should be able to identify and react to human non-verbal communication such as emotions which makes the human computer interaction become more natural. In present research area automatic emotion recognition using speech is an essential task which paid close attention. Speech signal is a rich source of information and it is an attractive and efficient medium due to its numerous features of expressing approach & extracting emotions through speech is possible. In this paper emotions is recognized through speech using spectral features such as Mel frequency cepstrum coefficient prosodic features like pitch , energy and were utilized & study is carried out using K- Nearest Neighbor classifiers and Gaussian mixture model classifier which is used for detection of six basic emotional states of speaker's such as anger ,happiness , sadness , fear , disgust and neutral using Berlin emotional speech database.
Keywords: Classifier , Emotion recognition, features generation , spectral features, prosodic features.
[1]. Ayadi M. E., Kamel M. S. and Karray F., "Survey on Speech Emotion Recognition: Features, Classification Schemes, and Databases‟, Pattern Recognition, 44 (16), 572-587, 2011.
[2]. A. S. Utane, Dr. S. L. Nalbalwar , "Emotion Recognition through Speech Using Gaussian Mixture Model & Support Vector Machine" International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May -2013
[3]. Chiriacescu I., "Automatic Emotion Analysis Based On Speech‟, M.Sc.Thesis, Department of Electrical Engineering, Delft University of Technology, 2009.
[4]. N. Thapliyal, G. Amoli "Speech based Emotion Recognition with Gaussian Mixture Model" international Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012
[5]. Zhou y., Sun Y., Zhang J, Yan Y., "Speech Emotion Recognition using Both Spectral and Prosodic Features‟, IEEE, 23(5), 545-549, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Modified Channel Shortener Filter Using Enhance Spectral Efficiency for OFDM System |
Country | : | India |
Authors | : | Ayappasamy. K || Marie Jenifer. D || Selvarani. S || Sharmila.s |
Abstract: In this paper, a modified CSF (MCSF) structure that exploits the null-space of an under-determined system of equations, and provides independent equivalent channels to the receiver. The SE of the MCSF is shown to be generally higher than the full-CP system when the chosen CP length is significantly smaller than the channel delay spread.
Keywords: cyclic prefix(CP).spectral efficiency(SE)
[1]. L. Hanzo, M.Münster, B. Choi, and T.Keller,OFDM and MC-CDMAfor Broadband Multi-user Communications, WLANs, and Broadcasting.Piscataway, NJ, USA: IEEE Press, 2003.
[2]. P. Melsa, R. Younce, and C. Rohrs, "Impulse response shortening fordiscrete multitone transceivers," IEEE Trans. Commun., vol. 44, pp.1662–1672, Dec. 1996.
[3]. N. Al-Dhahir, "FIR channel-shortening equalizers for MIMO ISI channels,"IEEE Trans. Commun., vol. 49, pp. 213–218, Feb. 2001.
[4]. R. Martin et al., "Implementation complexity and communication performancetradeoffs in discrete multitone modulation equalizers," IEEETrans. Signal Process., vol. 54, pp. 3216–3230, Aug. 2006.
[5]. I. Singh and K. Giridhar, "Null-space exploiting channel shorteningprefilter (NE-CSP) for MIMO-OFDM," in IEEE Nat. Conf. Commun.(NCC), Jan. 2010, pp. 1–5.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis of Wi-Fi Network |
Country | : | Sudan |
Authors | : | Ruqaia Abd Elrahman Younis Ali || Amin Babiker A/Nabi Mustafa |
Abstract: Recently, the wireless connection has become a preferred technology, due to its ease in use and for its mobility, therefore , a rapid development has emerged in the wireless technologies. Wi-Fi is the most common technology used today. This paper discusses the Performance of Wi-Fi network in three cases: No fading, flat fading and dispersive fading by measuring the bit rate and packet error rate ratio (PER). IEEE 802.11a WLAN Physical Layer model is taken to simulate these three cases using Matlab simulation. Keywords: Wi-Fi, Wireless, Performance, fading.
[1]. Eng. Tamer Mohamed Samir Khattab,"Performance Analysis of Wireless Local Area Networks (WLANs)", Faculty of engineering, Cairo University, Giza, 2000.
[2]. Munir A Abbasi "Interoperability of wireless communication technologies in hybrid networks: evaluation of end-to-end interoperability issues and quality of service requirements", May 2011, Brunel University London.
[3]. Luca Sanna Randaccio, "Resources optimization in multimedia communications", University of Cagliari, department of electrical and electronic engineering, 2007.
[4]. Teemu Alviola, "Energy efficiency in wireless networks", University of Jyväskylä, September 13, 2013.
[5]. Ning Zhang, "Wi-Fi Direct based Smart Set-up (WDSS) in lighting systems", Delft University of technology, May 2012
[6]. Dangerfield, B.A, "Wireless Network Measurement: VoIP and 802.11e" Hamilton Institute, National University of Ireland Maynooth, Co. Kildare, December 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis of Smart Antenna Beam forming Techniques |
Country | : | India |
Authors | : | Bindu Sharma || Indranil Sarkar |
Abstract: The wireless cellular base station antenna system employs switched beam technology which suffers from its inefficiency to track the user and limited capacity. The Smart antenna tracks the mobile user more efficiently by directing the main beam towards the user and forming nulls in the directions of the interfering signal. Smart antennas include the design of antenna array and adjusting the incoming signal by changing the weights of the amplitude and phase using efficient DSP algorithms [1]. This paper mainly focuses on the adaptive beam forming algorithms such as LMS, SMI, RLS, CGA, CMA and LSCMA applied for uniform linear array antenna. The above adaptive algorithms are simulated using MATLAB. Results obtained are then compared.
Keywords: Smart antenna, Adaptive beamforming, Switched beam, Uniform Linear Arrays, Interference, Least mean square, Recursive mean square, Sample matrix inversion, Constant modulus algorithm, CGA and LSCMA.
[1]. J.M.Samhan, "Design and Implementation of Smart Antenna System", IEEE Antennas and Wireless Propagation, Nov 2006.
[2]. Carl B.Dietrich,Jr., Warren L.Stutzman, Byung-Ki Kim, and Dietze, "Smart Antennas in Wireless Communications: Base-Stat ion Diversity and Handset Beamforming" lEEE Antennas and Propagation Magazine, Vol. 42, No. 5, October 2000.
[3]. Lal C. Godara, "Applications of Antenna Arrays to Mobile Communications, Part I: Performance Improvement, Feasibility, and System Considerations", Proceedings of the IEEE, VOL. 85, NO. 7, JULY 1997.
[4]. Paul Petrus, "Novel Adaptive Array Algorithms and Their Impact on Cellular System Capacity", PHD dissertation Blacksburg, Virginia 18, March 1997.
[5]. Raviraj "Switched and Sectored Beamforming",Adve 2005.
[6]. Kishore M, H M Guruprasad and Ramesh K "New Algorithms for Beam Formation and its Comparison", International Journal of Computer Applications (0975 – 8887) Volume 51– No.3, August 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis of Adaptive Multi User OFDM |
Country | : | India |
Authors | : | k,vanisree || V,Arun Associate || Y,Smruthi Assistant |
Abstract: The demand for high-speed mobile wireless communications is rapidly growing. OFDM technology promises to be a key technique for achieving the high data capacity and spectral efficiency requirements for wireless communication systems of the near future. In our proposed method Adaptive modulation techniques is used for maximizing the data throughput of subcarriers allocated to a user. It measures the SNR of each subcarrier in the transmission, then selecting a modulation scheme that will maximize the spectral efficiency, while maintaining an acceptable BER. This technique has been used in Asymmetric Digital Subscriber Line (ADSL) to maximize the system throughput.In addition Adaptive user allocation improves signal power of 3-5 dB. Also in the first techniques Crest Factor (CF)is reduced by using OFDM pilot symbols ,in the second techniques reduces the CF of data carrying symbols, by including additional subcarriers
Keywords: OFDM ,SNR, Spectral efficiency, throughput, BER,CF
[1]. K. W. Richard, "UMTS overview", IEE Electronics and CommunicationEngineering Journal, Vol. 12, No. 3, June 2000, pp. 93 - 100
[2]. Ermanno Berruto, Giovanni Colombo, Pantelis Monogioudis, Antonella Napolitano, Kyriacos Sabatakakis, "Architectural Aspects for the Evolution of Mobile Communications Toward UMTS", IEEE Journal on Selected Areas in Communications, Vol. 15, No. 8, October 1997,pp. 1477 - 1487
[3]. Erik Dahlman, Björn Gudmundson, Mats Nilsson, Johan Sköld, "UMTS/IMT-2000 Based on Wideband CDMA", IEEE Communications Magazine, September 1998, pp. 70 - 80
[4]. Fumiyuki Adachi, Mamoru Sawahasi, Hirohito Suda, "Wideband DS-CDMA for Next-Generation Mobile Communications Systems", IEEE Communications Magazine, September 1998, pp. 56 - 69
[5]. M. Fattouche, "Method and Apparatus for Multiple Access between Transceivers in Wireless Communications using OFDM spread spectrum", U.S. Patent 5,282,222, Filed Mar. 31, 1992, Issued Jan. 25, 1994
[6]. T. Williams, R. Prodan, "Multiple User Access Method Using OFDM", U. S. Patent 5,815,488, Filed Sep. 28, 1995, Issued Sep. 29, 1998
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Novel design method of 3 to 8 decoder |
Country | : | India |
Authors | : | A. FathimaThuslim || Dr. V. Kannan |
Abstract: One of the most sophisticated single electron devices (SED), single electron transistor (SET) is expected to be quite promising for future VLSI design due to its Nano scale feature size, ultra-low power dissipation and unique characteristics of Coulomb blockade oscillation. Circuits with SETs are also able to achieve a lot of new functionalities with less number of devices through novel design methodologies. However, pure SET based circuits have very limited applications due to SET's low current drivability, small voltage gain and extremely low temperature operation. Since CMOS devices have advantages that can compensate for the intrinsic drawbacks of SET, hybrid CMOS-SET architecture which combines the merits of both CMOS and SET devices promises to be a much practical implementation for nanometer scale circuit design.
Keywords: Single Electron Transistor (SET), Coulomb blockade oscillation, hybrid CMOS-SET
[1]. Likharev, K.K. 1987, Single electron Transistor: Electrostatics Analogs of the DCSQUIDS, IEEE Trans. Magn. 23: 1142-1145
[2]. Tucker, J.R. 1992. Complementary Digital Logic based on the Coulomb blockade. J. Appl. Phys. 72: 4399-4413
[3]. SantanuMahapatra, AdrinMihaiIonescu, " Hybrid CMOS single Electron Transistor Device and Circuit Design" Artech House, Inc. 2006
[4]. Zhang, T. Kasai, Novel hybrid voltage controlled ring oscillators using SET and MOS transistor, IEEE, Nanotechnology 6(2), 170-175, 2007
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | LTE FDD vs LTE TDD from a Qos Perspective |
Country | : | Sudan |
Authors | : | Eng. Dalia Abdalla Omer || Dr. Amin Babiker A/Nabi Mustafa |
Abstract: Long Term Evolution (LTE) is the next step (fourth generation) mobile radio communication technology that succeeds the HSPA 3GPP standardization body. LTE is expected to be the most competitive radio technology in the future to provide high-data-rate transmission, low latency, improved service and reduced costs. As known, mobile phone traffic is divided into two parts: an uplink and a downlink. This paper presents the LTE two duplexing modes: LTE-TDD (Time Division Duplexing) and LTE-FDD(Frequency Division Duplexing).
[1]. Progress In Electromagnetics Research Symposium Proceedings, KL, MALAYSIA, March 27-30, 2012 1467 LTE-FDD and LTETDD
for Cellular Communications A. Z. Yonis, M. F. L. Abdullah1, and M. F. Ghanim Faculty of Electrical and Electronic
Engineering, Department of Communication Engineering University of Tun Hussein Onn Malaysia, Johor, MalaysiaComputer
Engineering Department, College of Engineering, University of Mosul, Mosul, Iraq
agilent techonology Testing LTE FDD and TDD Performance \ http://cp.literature.agilent.com/litweb/pdf/5990-5657EN.pdf
[2]. Internet access performance in LTE TDD Riikka Susitaival1, Henning Wiemann3, Jessica Östergaard2, Anna Larmo1 Ericsson
Research 1Finland, 2Sweden, 3Germany
LTE TDD: The preferred choice for mobile broadband in unpaired bands Authored by Claus Hetting & Stefan Stanislawski, Ventura
Team LLP march 2010
[3]. TD-LTE and FDD-LTE A Basic Comparison Prepared by: Date: Document: Angel Ivanov 12 Jan 2012 NT11-1036 © Ascom (2012)
[4]. Using LTE to deliver mobile broadband applications that contribute to society Manuel Vexler, CMO IMS/NGN October 16, 2012
HUAWEI TECHNOLOGIES
[5]. Coverage and Capacity Analysis of LTE Radio Network Planning considering Dhaka City Nafiz Imtiaz Bin Hamid. Mohammad T.
Kawser Md. Ashraful Hoque Department of EEE Islamic University of Technology Gazipur-1704, Bangladesh.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Protection Augmentation in Mobile Ad Hoc Networks Using Game Theory |
Country | : | India |
Authors | : | Saravanan T || Mr.P.Rajkumar, M.E., |
Abstract: Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most of existing works on applying game theories to security only consider two players in the security game model: an attacker and a defender. While this assumption may be valid for a network with centralized administration, it is not realistic in MANETs, where centralized administration is not available. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach with multiple players for security in MANETs. The mean field game theory provides a powerful mathematical tool for problems with a large number of players. The proposed scheme can enable an individual node in MANETs to make strategic security defence decisions without centralized administration. In addition, since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. Moreover, each node in the proposed scheme only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
Index Terms: Mean field game, security, mobile ad hoc network (MANET).
[1]. M. Carvalho, "Security in mobile ad hoc networks," IEEE Security Privacy, vol. 6, no. 2, pp. 72–75, Mar. 2008.
[2]. F. R. Yu, H. Tang, S. Bu, and D. Zheng, "Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2013, no. 1, pp. 188–190, July 2013.
[3]. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE Trans. Wireless Commun., vol. 11, pp. 38–47, Feb. 2004.
[4]. Q. Guan, F. R. Yu, S. Jiang, and V. Leung, "Joint topology control and authentication design in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2674– 2685, July 2012.
[5]. J. Liu, F. R. Yu, C.-H. Lung, and H. Tang, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806–815, Feb. 2009.
[6]. S. Bu, F. R. Yu, X. P. Liu, and H. Tang, "Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks," IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3064–3073, Sept. 2011.