Salp swarm algorithm and phasor measurement unit based hybrid robust neural network model for online monitoring of voltage stability
Incessant assessment of voltage stability is lively aspect to safeguard the electrical power system operation. The traditional methods for online assessment in terms of voltage stability analysis are extremely time consuming and also difficult for ...
Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization
Recent developments in dynamic mobile ad-hoc network enhance the network speed and reliability. The nodes in the dynamic ad-hoc network are moving in nature. Due to the increased subscribers in this network, the network traffic has increased to ...
The performance analysis of dual-inverter three phase fed induction motor with open-end winding using various PWM schemes
Induction motor with scheme open end winding (OEW) has attract many attention in the recent time as a compromising alternative of multi-level inverter. The structure contains of simplicity in generating multi-level inverter and has potential ...
Reliable service availability and access control method for cloud assisted IOT communications
Information access and retrieval from cloud resources in an Internet of Things (IoT) paradigm is a challenging task due to synchronization and availability issues. IoT devices and user equipment access resources in a ubiquitous manner irrespective ...
Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET
Ensuring Quality of Service (QoS) and providing seamless connectivity are challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves between Access Service Network (ASNs), the authentication delay incurred during inter-ASN ...
Unified power quality conditioner with reduced switch topology for distributed networks
A unified power quality conditioner (UPQC) is a combination of shunt and series converter used to mitigate various power quality issues. In this work the shunt and series converters are designed with reduced number of switches. The new UPQC with ...
False alarm detection using dynamic threshold in medical wireless sensor networks
Sensor networks suffer from various sensor faults and false measurements in healthcare application and this vulnerability of the delay should handle efficiently and timely response in various application of WSN. For instance, in healthcare ...
Lightweight PUF based authentication scheme for fog architecture
Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly ...
Threshold selection analysis of spectrum sensing for cognitive radio network with censoring based imperfect reporting channels
An appropriate threshold selection scheme is one of the main components to adjudicate the performance of energy detection spectrum sensing (EDSS) technique for cognitive radio network. In this paper, we have employed two different threshold ...
Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment
The exponential rise in software computing and internet technologies have broadened the horizon of cloud computing applications serving numerous purposes like business processes, healthcare, finance, socialization, etc. In the last few years the ...
Uniform thresholding based transmission policy for energy harvesting wireless sensor nodes in fading channel
The work presents a novel computationally efficient transmission policy for throughput maximization over point-to-point sensor links employing harvest-use-store protocol with finite storage capacity battery. In these settings, under finite ...
Providing interoperability in Bluetooth mesh with an improved provisioning protocol
Different versions of Bluetooth Low Energy (BLE) have been standardized with point-to-point and broadcast topologies. Recently Bluetooth mesh specification provides BLE with mesh topology, highly demanded by Internet of Things (IoT) and numerous ...
Efficient user pairing algorithm for enhancement of spectral efficiency and interference cancelation in downlink NOMA system
A new subcarrier-user allocation algorithm for the downlink non-orthogonal multiple access system is presented in this paper. The proposed algorithm aims to enhance the spectral efficiency of the system and the successive interference cancelation ...
Analysis and modelling the effects of mobility, Churn rate, node’s life span, intermittent bandwidth and stabilization cost of finger table in structured mobile P2P networks
Today P2P (Peer-to-Peer) networks are gaining popularity for sharing the contents. Due to massive spreading of Internet, these networks are also growing fast. MP2P (Mobile P2P) networks are attracting many users due to increase in the Internet-...
Equality test with an anonymous authorization in cloud computing
With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by protecting sensitive information becomes a matter of grave concern. The most effective and sensible way to address this issue is to encrypt the data ...
An improved cluster formation process in wireless sensor network to decrease energy consumption
Wireless sensor network has special features and many applications, which have attracted attention of many scientists. High energy consumption of these networks, as a drawback, can be reduced by a hierarchical routing algorithm. The proposed ...
Joint resource allocation over licensed and unlicensed spectrum in U-LTE networks
By sharing unlicensed spectrum with Wi-Fi networks, unlicensed LTE (U-LTE) is one of the promising approaches to further improve LTE network throughput. However, the problem of coexistence with Wi-Fi networks is one of the main challenges of U-LTE ...
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA)
Data aggregation is a promising solution for minimizing the communication overhead by merging redundant data thereby prolonging the lifetime of energy starving Wireless Sensor Network (WSN). Deployment of heterogeneous sensors for measuring ...
A comprehensive review of cooperative MIMO WSN: its challenges and the emerging technologies
The distributed nodes of a Wireless Sensor Network (WSN) cooperate among themselves to emulate a virtual multi-antenna system to get similar benefits as the conventional MIMO systems. In WSN, such a system is known as the Cooperative Multiple ...
Multi-attribute profile-cast in mobile opportunistic networks
Profile-cast provides a novel data dissemination paradigm in mobile opportunistic networks, allowing messages to be disseminated to nodes based on their profiles rather than network identities. Profile-cast has attracted increasing attention, but ...
Enhancing multicast security of cognitive radio networks with antenna correlations over Nakagami-m fading channels
In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of ...
A clustering detector with graph theory for blind detection of spatial modulation systems
This paper considers the blind detection of spatial modulation systems multiple-input multiple-output systems. In this system, we propose a clustering detection framework with graph theory that conducts signal detection without the training of ...
Compact microstrip lowpass filter with very sharp roll-off using meandered line resonators
In this paper, a new compact size microstrip lowpass filter (LPF) with a very sharp roll-off is presented to apply in the modern wireless networks. The proposed LPF is designed using the series main resonators with meandered lines based on ...
User cooperation to mitigate the jamming in OFDMA networks
In this paper, jamming and anti-jamming in a time slotted orthogonal frequency division multiple access (OFDMA) are investigated. The users of the network cooperate to mitigate the jamming effect. Interactions among the network users and the ...
Secure multiple target tracking based on clustering intersection points of measurement circles in wireless sensor networks
The problem of tracking multiple targets simultaneously using a wireless sensor network is studied in this paper. We introduce a new algorithm, based only on the received signal power measurements, to estimate the location of multiple ...
BER and channel capacity analysis of wireless system over inverse gamma and inverse gamma composite fading model
Intrusion detection techniques in network environment: a systematic review
The entire world relates to some network capabilities in some way or the other. The data transmission on the network is getting more straightforward and quicker. An intrusion detection system helps distinguish unauthorized activities or intrusions ...