Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Unnikrishnan, Srija
- Vertical Handoffs in Wireless Heterogeneous Network
Abstract Views :138 |
PDF Views:3
Authors
Affiliations
1 Fr. Conceicao Rodrigues College of Engineering, IN
1 Fr. Conceicao Rodrigues College of Engineering, IN
Source
Wireless Communication, Vol 3, No 11 (2011), Pagination: 828-835Abstract
Handovers occur due to the movement of the mobile user from one area to another area. If we don‟t use handovers then whenever a user leaves the area of a particular cell then its ongoing call is immediately disconnected. The process of handovers requires a number of parameters e.g. what is the handover scheme we are using, how many channels are free. In the handover process we should also keep the QoS up to the standard. Vertical handover may be referred to as a process of transferring call connected to a network/data session from one channel connected in a cell to the core network of another. Vertical handover refers to automatic switching of the communication/ data session from one technology to the other. So, it‟s different from a horizontal handover among various wireless access points using the same technology. In future, people will have even more flexibility when true wireless internet and real-time multimedia are provided seamlessly over heterogeneous wireless networks. Optimally combining the capacity and services of the current and emerging networks requires a holistic view of mobility, resource and service management. A framework for the analysis of vertical handoff algorithm sensitivity to various mobility parameters including velocity, handoff delay and dwell time is introduced.Keywords
Dynamic Factors, Dynamic Decision Model, Simulation Topology, Vertical Handoff Decision.- Text Dependent Speaker Recognition Using Linear Prediction Coefficients-Dynamic Time Warping
Abstract Views :146 |
PDF Views:2
Authors
Affiliations
1 Industrial Electronics Department, Mumbai University, Fr. Conceicao Rodrigues College of Engineering, Bandstand, Bandra (W), Mumbai-400050, IN
1 Industrial Electronics Department, Mumbai University, Fr. Conceicao Rodrigues College of Engineering, Bandstand, Bandra (W), Mumbai-400050, IN
Source
Digital Signal Processing, Vol 3, No 7 (2011), Pagination: 353-357Abstract
This project proposes a text-dependent speaker identification system. Isolated digits 0-9 and their concatenations are used for speaking text. For each speech signal Linear Prediction Coefficients (LPC) are extracted and formed as feature vectors. Dynamic Time Warping (DTW) is used to measure distances between referenced and evaluated vectors. These distances, indicating nearness of unknown vectors to references, incorporated with K-Nearest Neighbor (K") decision technique are used for the identification process. In the verification test of the experiment. Consequently, we have experimented on the use of LPC with both DTW (using KNN as a decision rule) and ANN (a well-known Multilayer Perception (MLP) with back propagation learning algorithm). The systems were tested with 0-9 isolated digits. It has been shown that DTW with KNN gives better performance. It is affected by an attempt of ANN to recognize all of training patterns including any low quality voice. In this paper, further successive progress of our system is to deeply experiment on the use of DTW with KNN with concatenated digit, which will be a form of speaking-text in our application at last. This research will also purpose in selection of some acceptable digits to be included in our text-prompted speaker identification system.Keywords
LPC, DTW.- M/G/1 QUEUE-BASED REDUCTION OF POWER CONSUMPTION AND LATENCY IN WIRELESS SENSOR NETWORKS
Abstract Views :182 |
PDF Views:94
Authors
Affiliations
1 Thakur College of Engineering and Technology, IN
2 Fr. Conceicao Rodrigues College of Engineering, IN
1 Thakur College of Engineering and Technology, IN
2 Fr. Conceicao Rodrigues College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 12, No 1 (2021), Pagination: 2272-2279Abstract
Longevity of wireless sensor networks (WSN) is dependent on the optimal utilization of power supply. To make optimal utilization of power and increase the operational life of the network, we present two techniques with the goal of decreasing the consumption of power in a sensor node by incorporating queuing theory. We analyze the performance of wireless sensor networks that implement a M/G/1 queue with two different queuing policies. The analysis is done with respect to two important aspects: power consumption and latency delay. The results of the analysis illustrate the fact that the power consumed at a wireless sensor node can be reduced significantly by optimal selection of thresholds. We also compare the two policies in terms of power consumption and latency and find that the Min (N, T) policy is better equipped to not only reduce the power consumption but also reduces the latency delay caused due to the introduction of the queuing thresholds. The results indicate that the schemes studied can be implemented in practical scenarios as they are effective in reducing power consumption and increasing the operational life of a WSN.Keywords
Energy, Latency, Probability, Queuing Analysis, Wireless Sensor Networks.References
- Sheetal Kokare and R.D. Kamble, “Spectrum Sensing Techniques in Cognitive Radio Cycle”, International Journal of Engineering Trends and Technology, Vol. 9, 2014.
- Ejaz Ahmed, Abdullah Gani, Liu Jie Yao and Samee U. Khan, “Channel Assignment Algorithms in Cognitive Radio Networks: Taxonomy, Open Issues, and Challenges”, IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 795-823, 2016.
- Manal El Tanab and Walaa Hamouda, “Resource Allocation for Underlay Cognitive Radio Networks: A Survey”, IEEE Communications Surveys and Tutorials, Vol. 19, No. 2, pp. 1249-1276, 2017.
- Anna Wisniewska, “Spectrum sharing in Cognitive Radio Networks: A Survey”, PhD Dissertation, Department of Computer Science, City University of New York Graduate Center, pp. 1-245, 2014.
- Tulika Mehta, Naresh Kumar and Surender S Saini, “Comparison of Spectrum Sensing Techniques in Cognitive Radio Networks”, International Journal of Electronics and Communication Technology, Vol. 4, No. 1, pp. 1-12, 2013.
- Mansi Subhedar and Gajanan Birajdar, “Spectrum Sensing Techniques in Cognitive Radio Networks: A Survey”, International Journal of Next-Generation Networks, Vol. 3, No. 2, pp. 23-29, 2011.
- Ying Chang Liang, Yonghong Zeng, Edward C.Y. Peh and Anh Tuan Hoang, “Sensing-Throughput Tradeoff for Cognitive Radio Networks”, IEEE Transactions on Wireless Communications, Vol. 7, No. 4, pp. 1326-1337, 2008.
- Steven M. Kay, “Fundamentals of Statistical Signal Processing: Detection Theory”, Prentice Hall, 1998.
- Zan Li, Wen Wu, Xiangli Liu and Peihan Qi, “Improved Cooperative Spectrum Sensing Model based on Machine Learning for Cognitive Radio Networks”, IET Communications, Vol. 12, No. 1, pp. 1-23, 2018.
- Jaewoo So and Wonjin Sung, “Group-Based Multi-Bit Cooperative Spectrum Sensing for Cognitive Radio Networks”, IEEE transactions on Vehicular Technology, Vol. 65, No. 12, pp. 10193-10198, 2016.
- Ian F. Akyildiz, Brandon F. Lo and Ravikumar Balakrishnan, “Cooperative Spectrum Sensing in Cognitive Radio Networks: A Survey”, Physical Communications, Vol. 4, pp. 40-62, 2010.
- Madushan Thilina Karaputugala, Kae Won Choi and Ekram Hossain, “Pattern Classification Techniques for Cooperative Spectrum Sensing in Cognitive Radio Networks: SVM and W-KNN Approaches”, Proceedings of International Conference on Global Communications, pp. 145-156, 2012.
- Karaputugala Madushan Thilina, Kae Won Choi, Nazmus Saquib and Ekram Hossain, “Machine Learning Techniques for Cooperative Spectrum Sensing in Cognitive Radio Networks”, IEEE Journal on Selected Areas in Communications, Vol. 31, No. 11, pp. 2209-2221, 2013.
- Ian F. Akyildiz, Won Yeol Lee, Mehmet C. Vuran and Shantidev Mohanty, “A Survey on Spectrum Management in Cognitive Radio Networks”, IEEE Communications Magazine, Vol. 46, No. 4, pp. 40-48, 2008.
- Khaled Ben Letaief and Wei Zhang, “Cooperative Communications for Cognitive Radio Networks”, Proceedings of the IEEE, Vol. 97, No. 5, pp. 878-893, 2009.
- M. Usha, B. Ramakrishnan and J. Sathiamoorthy, “Performance Analysis of Spectrum sensing Techniques in Cognitive Radio based Vehicular Ad Hoc Networks (VANET)”, Proceedings of International Conference on Computing and Communications Technologies, pp. 1-12, 2017.
- Luis Miguel Gato Diaz, Liset Martinez Marrero and Jorge Torres, “Performance Comparison of Spectrum Sensing Techniques in Cognitive Radio Networks”, Proceedings of International Conference on Telecommunications, pp. 1-8, 2016.
- P. Trinatha Rao and B. Anil Kumar, “Optimized Design and Analysis Approach of User Detection by Non-Cooperative Detection computing methods in CR Networks”, Cluster Computing, Vol. 22, pp. 1-9, 2017.
- Caio Henrique Azolini Tavares, “Machine Learning Applied to Co-Operative Spectrum Sensing in Cognitive Radios”, Master Thesis, Dept. of Electrical Engineering, State University of Londrina, pp. 1-119, 2019.
- Sun Yuhang, “Spectrum Sensing in Cognitive Radio Systems using Energy Detection”, Master Thesis, Department of Electronics, University of Gavle, pp. 1-98, 2011.
- Youness Arjoune and Naima Kaabouch, “A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions”, Sensors, Vol. 19, No. 1, pp. 126-134, 2019.
- R. Gill and A. Kansal, “Comparative Analysis of the Spectrum Sensing Techniques Energy Detection and Cyclostationary Feature Detection”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, No. 1, pp. 1-13, 2014.
- M. Anirudh Rao, B.R. Karthikeyan, Dipayan Mazumdar and Govind R. Kadamba, “Energy Detection Technique for Spectrum Sensing in Cognitive Radio”, SASTech, Vol. 9, No. 3, pp. 43-49, 2010.
- P. Trinatha Rao and K. Venkata Vara Prasad, “Adaptive Cooperative Sensing in Cognitive Radio Networks with Ensemble model for Primary User Detection”, International Journal of Communication Systems, Vol. 3, No. 2, pp. 16- 24, 2019.
- Rohitha Ujjinimatad and R. Siddarama Patil, “Mathematical Analysis for Detection Probability in Cognitive Radio Networks over Wireless Communication Channels”, Journal of Engineering, Vol. 13, No. 2, pp. 445-449, 2014.
- Waqas Khalid and Heejung Yu, “Optimal Sensing Performance for Cooperative and Non-Cooperative Cognitive Radio Networks”, International Journal of Distributed Sensor Networks, Vol. 13, No. 2, pp. 1-15, 2017.
- P. Trinatha Rao and K. Venkata Vara Prasad, “Performance of Blind Detection Frame Work using Energy Detection Approach for Local Sensing in Intelligent Networks”, International Journal of Computers and Applications, Vol. 7, No. 2, pp. 1-14, 2018.
- Mahdi Ben Ghorbel, Haewoon Nam and Mohamed-Slim Alouini, “Soft Cooperative Spectrum Sensing Performance under Imperfect and Non-Identical Reporting Channels”, IEEE Communication Letters, Vol. 19, No. 2, pp. 227-230, 2015.
- INTERFERENCE CANCELLERS FOR SPREAD SPECTRUM MODULATION BASED MULTIPLE ACCESS SYSTEMS
Abstract Views :155 |
PDF Views:101
Authors
Affiliations
1 Fr. Conceicao Rodrigues College of Engineering, IN
1 Fr. Conceicao Rodrigues College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 12, No 1 (2021), Pagination: 2231-2238Abstract
Systems based on spread spectrum technique are inherently interference resistant. However, asynchronous transmission and multipath propagation causes manifestation of multiuser interference. Multiuser interference in a multiple access system limits the capacity of the system. Hence, it becomes imperative to mitigate the interference. This work presents the design and mathematical analysis of Hybrid Interference Cancellation (HIC) detector for direct-sequence code division multiple access (DS-CDMA). The detector is analysed for single path as well as multipath propagation over a Rayleigh fading channel. Simulation results are compared with the results of Successive Interference Canceller (SIC). Furthermore, the SIC and HIC detectors are tested for convergence. An HIC detector is proposed for MC-CDMA system. The interference canceller discussed in this paper dispenses with the RAKE receiver for diversity combining and data estimation, which averts the likelihood of errors because of incorrect data estimates.Keywords
DS-CDMA, MC-CDMA, HIC, Multipath Propagation, Convergence.References
- D. Maresch and J. Gartner, “Make Disruptive Technological Change Happen-The Case of Additive Manufacturing”, Technological Forecasting and Social Change, Vol. 155, pp. 1-15, 2020.
- M.E. Ahmed and H. Kim, “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, Proceedings of International Conference on Big Data Computing Service and Applications, pp. 6-9, 2017.
- T. Karthikeyan and K. Praghash, “An Improved Task Allocation Scheme in Serverless Computing using Gray Wolf Optimization (GWO) based Reinforcement Learning (RIL) Approach”, Wireless Personal Communications, Vol. 117, No. 3, pp. 1-19, 2020.
- S. Kannan, G. Dhiman, and M. Gheisari, “Ubiquitous Vehicular Ad-Hoc Network Computing using Deep Neural Network with IoT-Based Bat Agents for Traffic Management”, Electronics, Vol. 10, no. 7, pp. 785-796, 2021.
- L. Atzori and A. Iera, “The Internet of Things: A Survey”, Computer Networks, Vol. 54, No. 15, pp. 2787-2805, 2010.
- M. El Hajj, M. Chamoun, A. Fadlallah and A. Serhrouchni, “Analysis of Authentication Techniques in Internet of Things (IoT)”, Proceedings of International Conference on Cyber Security in Networking, pp. 1-3, 2017.
- L. Celia and Y. Cungang, “Authenticated Key Management Protocols for Internet of Things”, Proceedings of International Conference on Internet of Things, pp. 126-129, 2018.
- Steve R. Gunn and Basel Halak, “Lightweight PUF-Based Authentication Protocol for IoT Devices”, Proceedings of International Conference on Verification and Security, pp. 38-43, 2018.
- T. Kothmayr, C. Schmitt, W. Hu, M. Br and G. Carle, “DTLS based Security and Two-Way Authentication for the Internet of Things”, Ad Hoc Networks, Vol. 11, No. 8, pp. 2710-2723, 2013.
- Amiya Kumar, Suraj Sharma, Deepak Puthal, AbhishekPandey and Rathin Shit, “Secure Authentication Protocol for IoT Architecture”, Proceedings of International Conference on Information Technology, pp. 220-224, 2017.
- B. Hong Jin, Walter Guttmann and Dog Seong Kim, “A Framework for Automating Security Analysis of the Internet of Things”, Journal of Network and Computer Applications, Vol. 83, pp. 12-27, 2017.
- J. Jiang and L. Shu, “Authentication protocols for Internet of Things: A Comprehensive Survey”, Security and Communication Networks, Vol. 2017, pp. 1-18, 2017.
- M.N. Aman, M.H. Basheer and B. Sikdar, “Two-Factor Authentication for IoT with Location Information”, IEEE Internet of Things, Vol. 6, No. 2, pp. 3335-3351, 2018.
- P. Gope and B. Sikdar, “Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices”, IEEE Internet of Things, Vol. 6, No. 1, pp. 580-589, 2018.
- N.G. Veerappan Kousik, K. Suresh, R. Patan and A.H. Gandomi, “Improving Power and Resource Management in Heterogeneous Downlink OFDMA Networks”, Information, Vol. 11, No. 4, pp. 203-216, 2020.
- R. Amin, N. Kumar and G.P. Biswas, “A Light Weight Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment”, Future Generation Computer Systems, Vol. 78, pp. 1005-1019, 2018.
- Yong Li and Lijun Liao, “Flexible Certificate Revocation List for Efficient Authentication in IoT”, Proceedings of International Conference on Internet of Things, pp. 1-7, 2018.
- P. Mahalle, S. Babar, N. Prasad and R. Prasad, “Identity Management Framework Towards Internet of Things (IoT): Roadmap and Key Challenges”, Proceedings of International Conference on Virtual Local Area Network Technology and Applications, pp. 430-439, 2010.
- K.W. Kim, Y.H. Han and S.G. Min, “An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks”, Sensors, Vol. 17, No. 10, pp. 1-20, 2017.
- G. Dhiman, K. Somasundaram and K. Sharma, “NatureInspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking”, Mathematical Problems in Engineering, Vol. 2021, pp. 1- 21, 2021.
- P.K. Dhillon and S. Kalra, “Multi-Factor User Authentication Scheme for IoT-Based Healthcare Services”, Journal of Reliable Intelligent Environments, Vol. 4, No. 3, pp. 141-160, 2018.
- M. Wazid, A.K. Das, V. Odelu and N. Kumar, “Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks, IEEE Internet of Things, Vol. 5, No. 1, pp. 269-282, 2017.
- N.V. Kousik, P. Johri and M.J. Divan, “Analysis on the Prediction of Central Line-Associated Bloodstream Infections (CLABSI) using Deep Neural Network Classification”, Proceedings of International Conference on Computational Intelligence and Its Applications in Healthcare, pp. 229-244, 2020.
- T. Song, R. Li, B. Mei, J. Yu, X. Xing and X. Cheng, “A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes”, IEEE Internet of Things, Vol. 4, No. 6, pp. 1844-1852, 2017.
- A.K. Das, P. Sharma, S. Chatterjee and J.K. Sing, “A Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks”, Journal of Network and Computer Applications, Vol. 35, No. 5, pp. 1646-1656, 2012.
- P. Johri, “Improved Energy Efficient Wireless Sensor Networks using Multicast Particle Swarm Optimization”, Proceedings of International Conference on Innovative Advancement in Engineering and Technology, pp. 1-6, 2020.
- O.R. Vincent and O. Folorunso, “A Descriptive Algorithm for Sobel Image Edge Detection”, Proceedings of International Conference on Informing Science and IT Education, pp. 97-107, 2009.
- J.H. Lin, C.W. Chou and C.H. Yang, “A Chaotic Levy Flight Bat Algorithm for Parameter Estimation in Nonlinear Dynamic Biological Systems”, Computer and Information Technology, Vol. 2, No. 2, pp. 56-63, 2012.
- M. Abdalla, P. Fouque and D. Pointcheval, “Password Based Authenticated Key Exchange in the Three-Party Setting”, Proceedings of International Conference on Theory and Practice in Public Key Cryptography, pp. 65-84, 2005.