Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 10 Nov 2024Bibliometrics
research-article
Salp swarm algorithm and phasor measurement unit based hybrid robust neural network model for online monitoring of voltage stability
Abstract

Incessant assessment of voltage stability is lively aspect to safeguard the electrical power system operation. The traditional methods for online assessment in terms of voltage stability analysis are extremely time consuming and also difficult for ...

research-article
Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization
Abstract

Recent developments in dynamic mobile ad-hoc network enhance the network speed and reliability. The nodes in the dynamic ad-hoc network are moving in nature. Due to the increased subscribers in this network, the network traffic has increased to ...

research-article
The performance analysis of dual-inverter three phase fed induction motor with open-end winding using various PWM schemes
Abstract

Induction motor with scheme open end winding (OEW) has attract many attention in the recent time as a compromising alternative of multi-level inverter. The structure contains of simplicity in generating multi-level inverter and has potential ...

research-article
Reliable service availability and access control method for cloud assisted IOT communications
Abstract

Information access and retrieval from cloud resources in an Internet of Things (IoT) paradigm is a challenging task due to synchronization and availability issues. IoT devices and user equipment access resources in a ubiquitous manner irrespective ...

research-article
Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET
Abstract

Ensuring Quality of Service (QoS) and providing seamless connectivity are challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves between Access Service Network (ASNs), the authentication delay incurred during inter-ASN ...

research-article
Unified power quality conditioner with reduced switch topology for distributed networks
Abstract

A unified power quality conditioner (UPQC) is a combination of shunt and series converter used to mitigate various power quality issues. In this work the shunt and series converters are designed with reduced number of switches. The new UPQC with ...

research-article
False alarm detection using dynamic threshold in medical wireless sensor networks
Abstract

Sensor networks suffer from various sensor faults and false measurements in healthcare application and this vulnerability of the delay should handle efficiently and timely response in various application of WSN. For instance, in healthcare ...

research-article
Design and development of planar antenna array for mimo application
Abstract

Multi-Input Multi-Output (MIMO) is the need for recent communication system for the enhancement of channel capacity. While the number of antenna array elements increased, the spacing between the array elements and size of the antenna reduced. ...

research-article
Lightweight PUF based authentication scheme for fog architecture
Abstract

Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly ...

research-article
Threshold selection analysis of spectrum sensing for cognitive radio network with censoring based imperfect reporting channels
Abstract

An appropriate threshold selection scheme is one of the main components to adjudicate the performance of energy detection spectrum sensing (EDSS) technique for cognitive radio network. In this paper, we have employed two different threshold ...

research-article
Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment
Abstract

The exponential rise in software computing and internet technologies have broadened the horizon of cloud computing applications serving numerous purposes like business processes, healthcare, finance, socialization, etc. In the last few years the ...

research-article
Uniform thresholding based transmission policy for energy harvesting wireless sensor nodes in fading channel
Abstract

The work presents a novel computationally efficient transmission policy for throughput maximization over point-to-point sensor links employing harvest-use-store protocol with finite storage capacity battery. In these settings, under finite ...

research-article
Providing interoperability in Bluetooth mesh with an improved provisioning protocol
Abstract

Different versions of Bluetooth Low Energy (BLE) have been standardized with point-to-point and broadcast topologies. Recently Bluetooth mesh specification provides BLE with mesh topology, highly demanded by Internet of Things (IoT) and numerous ...

research-article
Efficient user pairing algorithm for enhancement of spectral efficiency and interference cancelation in downlink NOMA system
Abstract

A new subcarrier-user allocation algorithm for the downlink non-orthogonal multiple access system is presented in this paper. The proposed algorithm aims to enhance the spectral efficiency of the system and the successive interference cancelation ...

research-article
Analysis and modelling the effects of mobility, Churn rate, node’s life span, intermittent bandwidth and stabilization cost of finger table in structured mobile P2P networks
Abstract

Today P2P (Peer-to-Peer) networks are gaining popularity for sharing the contents. Due to massive spreading of Internet, these networks are also growing fast. MP2P (Mobile P2P) networks are attracting many users due to increase in the Internet-...

research-article
Equality test with an anonymous authorization in cloud computing
Abstract

With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by protecting sensitive information becomes a matter of grave concern. The most effective and sensible way to address this issue is to encrypt the data ...

research-article
An improved cluster formation process in wireless sensor network to decrease energy consumption
Abstract

Wireless sensor network has special features and many applications, which have attracted attention of many scientists. High energy consumption of these networks, as a drawback, can be reduced by a hierarchical routing algorithm. The proposed ...

research-article
Joint resource allocation over licensed and unlicensed spectrum in U-LTE networks
Abstract

By sharing unlicensed spectrum with Wi-Fi networks, unlicensed LTE (U-LTE) is one of the promising approaches to further improve LTE network throughput. However, the problem of coexistence with Wi-Fi networks is one of the main challenges of U-LTE ...

research-article
Adjacent channel compatibility between IMT and ubiquitous FSS Earth Stations in the 3.4–3.8 GHz frequency band
Abstract

This study has investigated the mitigations necessary for successful compatibility between International Mobile Telecommunications (IMT) services and Fixed Satellite Service (FSS) Earth Stations operating in adjacent frequency bands. We consider a ...

research-article
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA)
Abstract

Data aggregation is a promising solution for minimizing the communication overhead by merging redundant data thereby prolonging the lifetime of energy starving Wireless Sensor Network (WSN). Deployment of heterogeneous sensors for measuring ...

research-article
A comprehensive review of cooperative MIMO WSN: its challenges and the emerging technologies
Abstract

The distributed nodes of a Wireless Sensor Network (WSN) cooperate among themselves to emulate a virtual multi-antenna system to get similar benefits as the conventional MIMO systems. In WSN, such a system is known as the Cooperative Multiple ...

research-article
Multi-attribute profile-cast in mobile opportunistic networks
Abstract

Profile-cast provides a novel data dissemination paradigm in mobile opportunistic networks, allowing messages to be disseminated to nodes based on their profiles rather than network identities. Profile-cast has attracted increasing attention, but ...

research-article
Enhancing multicast security of cognitive radio networks with antenna correlations over Nakagami-m fading channels
Abstract

In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of ...

research-article
A clustering detector with graph theory for blind detection of spatial modulation systems
Abstract

This paper considers the blind detection of spatial modulation systems multiple-input multiple-output systems. In this system, we propose a clustering detection framework with graph theory that conducts signal detection without the training of ...

research-article
Compact microstrip lowpass filter with very sharp roll-off using meandered line resonators
Abstract

In this paper, a new compact size microstrip lowpass filter (LPF) with a very sharp roll-off is presented to apply in the modern wireless networks. The proposed LPF is designed using the series main resonators with meandered lines based on ...

research-article
User cooperation to mitigate the jamming in OFDMA networks
Abstract

In this paper, jamming and anti-jamming in a time slotted orthogonal frequency division multiple access (OFDMA) are investigated. The users of the network cooperate to mitigate the jamming effect. Interactions among the network users and the ...

research-article
Secure multiple target tracking based on clustering intersection points of measurement circles in wireless sensor networks
Abstract

The problem of tracking multiple targets simultaneously using a wireless sensor network is studied in this paper. We introduce a new algorithm, based only on the received signal power measurements, to estimate the location of multiple ...

research-article
BER and channel capacity analysis of wireless system over κ-μ/inverse gamma and η-μ/inverse gamma composite fading model
Abstract

The κ-μ/Inverse Gamma (KMIG) and η-μ/Inverse Gamma (EMIG) are recently introduced composite fading distributions for the precise design of the wireless systems, where multipath fading and shadowing occur concomitantly. Further, these composite ...

research-article
Intrusion detection techniques in network environment: a systematic review
Abstract

The entire world relates to some network capabilities in some way or the other. The data transmission on the network is getting more straightforward and quicker. An intrusion detection system helps distinguish unauthorized activities or intrusions ...

Comments