An Unambiguous Tracking Technique for Sine-BOC(kn,n) Modulated GNSS Signals
Binary offset carrier modulation is applied in several signals of the global navigation satellite system (GNSS). It enhanced the robustness of GNSS against the impact of multipath and make the compatibility of GNSS better. However, it has the main ...
Fractal Dual-Mode Open-Loop Quasi-Elliptic Bandpass Filter with Source-Load Coupling
To realize the feature of small size and high selectivity, a microstrip miniature fractal quasi-elliptic bandpass filter (BPF) with two transmission zeros (TZs) near each skirt is investigated in this paper. The TZs are created by source-load coupling ...
The Application of Bayesian Learning in the Search Engine
Bayesian theory provides a method of calculating the assumed probability, based on the past records of the user who visit the Website we can calculate the probability of the information which the user will visit next time. According to the probability ...
Energy Efficient Raptor Codes for Error Control in Wireless Body Area Networks
WBAN consists of several tiny sensors that are located inside and outside human body for continuous monitoring of vital parameters of patients suffering from chronic diseases. The wearable sensor unit consists of transmitter, receiver and central ...
A Novel Web Image Retrieval Method
Traditional image retrieval methods, make use of color, shape and texture features, are based on local image database. But in the condition of which much more images are available on the internet, so big an image database includes various types of image ...
Secure Disintegration Protocol for Privacy Preserving Cloud Storage
Cloud service providers offer infrastructure, network services, and software applications in the cloud. The cloud services are hosted in a data center that can be used by users with the help of network connectivity. Hence, there is a need for providing ...
HIoTPOT: Surveillance on IoT Devices against Recent Threats
- Usha Devi Gandhi,
- Priyan Malarvizhi Kumar,
- R. Varatharajan,
- Gunasekaran Manogaran,
- Revathi Sundarasekar,
- Shreyas Kadu
Honeypot Internet of Things (IoT) (HIoTPOT) keep a secret eye on IoT devices and analyzes the various recent threats which are dangerous to IoT devices. In this paper, implementation of a research honeypot is presented which is used to learn the recent ...
Improving Deep Learning Feature with Facial Texture Feature for Face Recognition
Face recognition in the reality, is a challenging problem, due to varieties in illumination, background, pose etc. Recently, the deep learning based face recognition algorithm is able to learn effective face features to obtain a very impressive ...
Adaptive Sliding Mode Control of Robot Manipulator Based on Second Order Approximation Accuracy and Decomposed Fuzzy Compensator
A kind of adaptive sliding mode control scheme for tracking control of robot manipulator which has structured uncertainties and unstructured uncertainties is proposed in this paper. Multi-input Multi-output fuzzy logical system (FLS) is used as a ...
An Investigation of Failure Envelope for Skirted Foundations in Soft Clay Based on Computer-Aided Analyses
The stability of skirted foundations subjected to combined vertical, horizontal and moment loading is of importance to the offshore engineering. The paper reports a computer-aided study on the effects of strength anisotropy and foundation embedment ...
Stability Analysis of Switched Linear Systems with Uncertainty and Delays
Combining the common quadratic Lyapunov functional approach and free-weighting matrix approach, this paper is devoted to the stability analysis of continuous-time switched linear systems (CTSLS) with uncertainty and time-delays. A particular class of ...
CEMulti-core Architecture for Optimization of Energy over Heterogeneous Environment with High Performance Smart Sensor Devices
Nowadays, it is unusual for an electronic system to be without sensors, thus sensing plays an important part in everyday life. To this, the field of image processing is an added advantage as it stores image data and makes it readily available for ...
Establishment of Communication Engineering Optimization Model Based on Data Mining
With the development of economy and technology, network communication has become one of the important tools of national life and needs to be kept stable and safe at all times. Based on data mining, this paper studied and analyzed the communication ...
Feasibility Analysis of the Scheme of Internet of Things Based on Two-Level Supply Chain Dynamics
At this stage, due to the continuous development of computer technology, whether in the online shopping or a variety of commercial exchanges with a use of the network, Internet of things is one of the most important operating intermediaries. But as ...
One Secure Attribute-Based Proxy Signature
Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy ...
Network Control System (NCS) for Performance Improvement of Dual Converter Power Supply System Using Adaptive Inverse Dynamic Mode (AIDMC) Control Technique
With recent advances in power electronics, dual converter power supply based electric variable-speed drives are significantly used in many industries uses. Power electronic motor drivers are becoming able to efficiently read the inflexible ...
Smart Internet of Things (IOT) System for Performance Improvement of Dual Bridge LLC Resonant Converter by Using Sophisticated Distribution Control Method (SDC)
A resonant converter is a kind of electric power converter that contains a system of inductors and capacitors called a resonant tank, tuned to resonate at a particular frequency in this work recommends a better-quality dual bridge LLC resonant converter ...
Performance Analysis of Novel Compact Octagonal Shaped Fractal Antenna for Broadband Wireless Applications
Antenna plays an important role in any part of the communication system. It has to be designed very cautiously to provide improved system performance to meet the developments in wireless technologies with various design constraints such as small size, ...
Computer Aided Segmentation of Blockages in Coronary Heart Images Using Canfis Classifier
Coronary vessel blockage segmentation is the fundamental component which extracts significant features from angiogram images to detect heart disease. This paper proposes an automated method of blockage segmentation from coronary angiogram images using ...
Detecting Streaming of Twitter Spam Using Hybrid Method
Twitter, the social network which evolving faster and regular usage by millions of people and who become addicted to it. So spam playing a major role for Twitter users to distract them and grab their attention over them. Spammers actually detailed like ...
SIM-RPM: Secure Incentive Mechanism for Crowdsourcing-Based Road Pavement Monitoring System
Crowdsourcing-based road pavement monitoring is a new computing paradigm, where some drivers detect road surface information and publish it to the data center, while other drivers download it for use. However, current road pavement monitoring schemes ...
A New Modified Short-Multipath-Insensitive Code Loop Discriminator
Multipath error is one of the most significant error sources that degrade the performance of global positioning system (GPS) receiver. Several studies have been carried out to reduce its effects. However, most of these studies achieve only acceptable ...
Efficient Hybrid Modulation/Demodulation Scheme Using Differential Encoding/Decoding for UWB-IR
An efficient hybrid modulation/demodulation scheme using a short duration pulse in the time-domain for ultra wideband-impulse radio (UWB-IR) systems is proposed. The proposed modulation scheme is pulse position modulation (PPM) of the UWB-IR standard ...
Integrated Sized-Based Buffer Management Policy for Resource-Constrained Delay Tolerant Network
Delay tolerant network is a type of network where the end-to-end path is not available from source to destination due to the node mobility, dynamic topology and network partitioning or such a path is highly unstable and may split almost immediately ...
Performance Analysis of 3D Localization for a Launch Vehicle Using TOA, AOA, and TDOA
- Soonho Kwon,
- Daeoh Kim,
- Jihye Lee,
- Sangmi Moon,
- Myeonghun Chu,
- Sara Bae,
- Cheolwoo You,
- Huaping Liu,
- Jeong-Ho Kim,
- Dae Jin Kim,
- Hosung Park,
- Jin Young Kim,
- Cheol-Sung Kim,
- Intae Hwang
In general, a ground telemetry station for a launch vehicle (LV) includes a tracking function only; therefore, position measurements for LV depend on received navigation data from on-board systems of LV or depend on estimated position from ground radar ...
Low-Complexity Equalization for SC-FDMA Uplink Systems Over Time and Frequency Selective Channels
In this paper, we propose novel equalization schemes for compensating the adverse effects caused by carrier frequency offsets (CFOs), timing errors and doubly selective channels (DSCs) in high mobility single carrier frequency division multiple access (...
Fine-Grained Video Traffic Classification Based on QoE Values
The paper proposes a set of features suitable for fine-grained traffic classification of network video, with data collected from real network. These features are parameters related to quality of experience (QoE), which reflects the user's perception. ...
Design Analysis of Broadband Stacked Microstrip Patch Antenna for WLAN Applications
A novel configuration of stacked microstrip patch antenna is designed, simulated and fabricated for WLAN applications. Return loss is calculated below ýý10 dB scale, to indicate that the projected antenna has bandwidth of 1.34 GHz when simulated and ...
Enhanced Service Discovery Protocol for MANET by Effective Cache Management
With the increasing pervasiveness of the mobile nodes, service discovery has become inevitable. In the resource constrained mobile nodes, caching is being used to reduce the access cost. The enhanced service discovery protocol presented in this paper is ...
RA-OABC: An Optimal Framework for Resource Assignment in WCDMA Networks Using Oppositional Artificial Bee Colony Algorithm with Repair Strategies
In this paper, we propose a new optimal framework with repair strategy to resolve major issues in the assignment of resources to mobile terminals (plainly to users) in WCDMA networks. The main goal of this proposed approach is to tackle the issues in ...