Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 103, Issue 2November 2018
Reflects downloads up to 05 Mar 2025Bibliometrics
article
An Unambiguous Tracking Technique for Sine-BOC(kn,n) Modulated GNSS Signals

Binary offset carrier modulation is applied in several signals of the global navigation satellite system (GNSS). It enhanced the robustness of GNSS against the impact of multipath and make the compatibility of GNSS better. However, it has the main ...

article
Fractal Dual-Mode Open-Loop Quasi-Elliptic Bandpass Filter with Source-Load Coupling

To realize the feature of small size and high selectivity, a microstrip miniature fractal quasi-elliptic bandpass filter (BPF) with two transmission zeros (TZs) near each skirt is investigated in this paper. The TZs are created by source-load coupling ...

article
The Application of Bayesian Learning in the Search Engine

Bayesian theory provides a method of calculating the assumed probability, based on the past records of the user who visit the Website we can calculate the probability of the information which the user will visit next time. According to the probability ...

article
Energy Efficient Raptor Codes for Error Control in Wireless Body Area Networks

WBAN consists of several tiny sensors that are located inside and outside human body for continuous monitoring of vital parameters of patients suffering from chronic diseases. The wearable sensor unit consists of transmitter, receiver and central ...

article
A Novel Web Image Retrieval Method

Traditional image retrieval methods, make use of color, shape and texture features, are based on local image database. But in the condition of which much more images are available on the internet, so big an image database includes various types of image ...

article
Secure Disintegration Protocol for Privacy Preserving Cloud Storage

Cloud service providers offer infrastructure, network services, and software applications in the cloud. The cloud services are hosted in a data center that can be used by users with the help of network connectivity. Hence, there is a need for providing ...

article
HIoTPOT: Surveillance on IoT Devices against Recent Threats

Honeypot Internet of Things (IoT) (HIoTPOT) keep a secret eye on IoT devices and analyzes the various recent threats which are dangerous to IoT devices. In this paper, implementation of a research honeypot is presented which is used to learn the recent ...

article
Improving Deep Learning Feature with Facial Texture Feature for Face Recognition

Face recognition in the reality, is a challenging problem, due to varieties in illumination, background, pose etc. Recently, the deep learning based face recognition algorithm is able to learn effective face features to obtain a very impressive ...

article
Adaptive Sliding Mode Control of Robot Manipulator Based on Second Order Approximation Accuracy and Decomposed Fuzzy Compensator

A kind of adaptive sliding mode control scheme for tracking control of robot manipulator which has structured uncertainties and unstructured uncertainties is proposed in this paper. Multi-input Multi-output fuzzy logical system (FLS) is used as a ...

article
An Investigation of Failure Envelope for Skirted Foundations in Soft Clay Based on Computer-Aided Analyses

The stability of skirted foundations subjected to combined vertical, horizontal and moment loading is of importance to the offshore engineering. The paper reports a computer-aided study on the effects of strength anisotropy and foundation embedment ...

article
Stability Analysis of Switched Linear Systems with Uncertainty and Delays

Combining the common quadratic Lyapunov functional approach and free-weighting matrix approach, this paper is devoted to the stability analysis of continuous-time switched linear systems (CTSLS) with uncertainty and time-delays. A particular class of ...

article
CEMulti-core Architecture for Optimization of Energy over Heterogeneous Environment with High Performance Smart Sensor Devices

Nowadays, it is unusual for an electronic system to be without sensors, thus sensing plays an important part in everyday life. To this, the field of image processing is an added advantage as it stores image data and makes it readily available for ...

article
Establishment of Communication Engineering Optimization Model Based on Data Mining

With the development of economy and technology, network communication has become one of the important tools of national life and needs to be kept stable and safe at all times. Based on data mining, this paper studied and analyzed the communication ...

article
Feasibility Analysis of the Scheme of Internet of Things Based on Two-Level Supply Chain Dynamics

At this stage, due to the continuous development of computer technology, whether in the online shopping or a variety of commercial exchanges with a use of the network, Internet of things is one of the most important operating intermediaries. But as ...

article
One Secure Attribute-Based Proxy Signature

Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy ...

article
Network Control System (NCS) for Performance Improvement of Dual Converter Power Supply System Using Adaptive Inverse Dynamic Mode (AIDMC) Control Technique

With recent advances in power electronics, dual converter power supply based electric variable-speed drives are significantly used in many industries uses. Power electronic motor drivers are becoming able to efficiently read the inflexible ...

article
Smart Internet of Things (IOT) System for Performance Improvement of Dual Bridge LLC Resonant Converter by Using Sophisticated Distribution Control Method (SDC)

A resonant converter is a kind of electric power converter that contains a system of inductors and capacitors called a resonant tank, tuned to resonate at a particular frequency in this work recommends a better-quality dual bridge LLC resonant converter ...

article
Performance Analysis of Novel Compact Octagonal Shaped Fractal Antenna for Broadband Wireless Applications

Antenna plays an important role in any part of the communication system. It has to be designed very cautiously to provide improved system performance to meet the developments in wireless technologies with various design constraints such as small size, ...

article
Computer Aided Segmentation of Blockages in Coronary Heart Images Using Canfis Classifier

Coronary vessel blockage segmentation is the fundamental component which extracts significant features from angiogram images to detect heart disease. This paper proposes an automated method of blockage segmentation from coronary angiogram images using ...

article
Detecting Streaming of Twitter Spam Using Hybrid Method

Twitter, the social network which evolving faster and regular usage by millions of people and who become addicted to it. So spam playing a major role for Twitter users to distract them and grab their attention over them. Spammers actually detailed like ...

article
SIM-RPM: Secure Incentive Mechanism for Crowdsourcing-Based Road Pavement Monitoring System

Crowdsourcing-based road pavement monitoring is a new computing paradigm, where some drivers detect road surface information and publish it to the data center, while other drivers download it for use. However, current road pavement monitoring schemes ...

article
A New Modified Short-Multipath-Insensitive Code Loop Discriminator

Multipath error is one of the most significant error sources that degrade the performance of global positioning system (GPS) receiver. Several studies have been carried out to reduce its effects. However, most of these studies achieve only acceptable ...

article
Efficient Hybrid Modulation/Demodulation Scheme Using Differential Encoding/Decoding for UWB-IR

An efficient hybrid modulation/demodulation scheme using a short duration pulse in the time-domain for ultra wideband-impulse radio (UWB-IR) systems is proposed. The proposed modulation scheme is pulse position modulation (PPM) of the UWB-IR standard ...

article
Integrated Sized-Based Buffer Management Policy for Resource-Constrained Delay Tolerant Network

Delay tolerant network is a type of network where the end-to-end path is not available from source to destination due to the node mobility, dynamic topology and network partitioning or such a path is highly unstable and may split almost immediately ...

article
Performance Analysis of 3D Localization for a Launch Vehicle Using TOA, AOA, and TDOA

In general, a ground telemetry station for a launch vehicle (LV) includes a tracking function only; therefore, position measurements for LV depend on received navigation data from on-board systems of LV or depend on estimated position from ground radar ...

article
Low-Complexity Equalization for SC-FDMA Uplink Systems Over Time and Frequency Selective Channels

In this paper, we propose novel equalization schemes for compensating the adverse effects caused by carrier frequency offsets (CFOs), timing errors and doubly selective channels (DSCs) in high mobility single carrier frequency division multiple access (...

article
Fine-Grained Video Traffic Classification Based on QoE Values

The paper proposes a set of features suitable for fine-grained traffic classification of network video, with data collected from real network. These features are parameters related to quality of experience (QoE), which reflects the user's perception. ...

article
Design Analysis of Broadband Stacked Microstrip Patch Antenna for WLAN Applications

A novel configuration of stacked microstrip patch antenna is designed, simulated and fabricated for WLAN applications. Return loss is calculated below ýý10 dB scale, to indicate that the projected antenna has bandwidth of 1.34 GHz when simulated and ...

article
Enhanced Service Discovery Protocol for MANET by Effective Cache Management

With the increasing pervasiveness of the mobile nodes, service discovery has become inevitable. In the resource constrained mobile nodes, caching is being used to reduce the access cost. The enhanced service discovery protocol presented in this paper is ...

article
RA-OABC: An Optimal Framework for Resource Assignment in WCDMA Networks Using Oppositional Artificial Bee Colony Algorithm with Repair Strategies

In this paper, we propose a new optimal framework with repair strategy to resolve major issues in the assignment of resources to mobile terminals (plainly to users) in WCDMA networks. The main goal of this proposed approach is to tackle the issues in ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.