Design and Development of Patient Care Voice Actuated Bed in Hospital
A Low Profile Dual U Shaped Monopole Antenna for WLAN/WiMAX/C Band Applications
A Miniaturized Dual L Shaped with Truncated Ground Rectangular Monopole Antenna for 5G and Wireless Communications
A Centre C-Shaped Dual Band Rectangular Monopole Antenna for Wi-Fi and Wireless Communication
Impact of Subchannel Symbol Rates on WSS Filtering Penalty in Elastic Optical Networks: A Comparative Study
Cognitive Radio Simulator for Mobile Networks: Design and Implementation
Reduced End-To-End Delay for Manets using SHSP-EA3ACK Algorithm
Light Fidelity Design for Audio Transmission Using Light Dependent Resistor
Dynamic Digital Parking System
Performance Analysis of Multi User Transmit Antenna Selection Systems over TWDP Fading Channels
Comparison of Wavelet Transforms For Denoising And Analysis Of PCG Signal
Video Shot Boundary Detection – Comparison of Color Histogram and Gist Method
Curvelets with New Quantizer for Image Compression
Comparison of Hybrid Diversity Systems Over Rayleigh Fading Channel
Design of Close Loop Dual-Band BPF Using CascadedOpen Loop Triangular Ring Resonator Loaded With Open Stubs
Cloud computing is designed to provide services to the end users and to the owners of organizations over internet with little cost and with little configuration effort. There are many concerns about cloud computing especially in terms of security, privacy, and trust. These main issues have prevented business from fully accepting cloud platforms. Some of the confidential Business-to-Bussiness (B2B) collaborations require secure tunnels to secure the messaging between the services that are deployed within the same cloud. As organizations participating in B2B collaborations deploy their services in single or multiple clouds, businesses face security threat to their sensitive data both from outside and inside the cloud. This work is proposed to contribute in solving such problems. This paper presents an electronic contract (econtract) based solution that provides a secure Connectivity as a Service (CaaS) for intra-cloud communications. Our proposed model interestingly handles secure messaging for the services deployed within the same cloud. The basicinterction model has further been enhanced by adding a new service layer (Authentication Service) which is responsible for offering a high level of trust between collaborating parties by preventing any unauthorized party from joining the connectivity service. Indeed, our proposed system can prevent any involved organization from launching masquerade attacks. The added layer basically facilitates the integration of the basic model with the Public-Key Infrastructure (PKI). The proposed system can also be helpful in solving other attacks such as man-in-the-middle attack and modification of the messages attack.
Digital representations of images usually require a very large number of bits. It is important to consider techniques for representing an image with fewer bits. In this context, we present a survey of Fractal image compression with parallel encoding scheme. The Fractal image compression (FIC) is a novel technique in the field of image compression that utilizes the existence of self symmetry of the image. The unique feature of the fractal image compression technique is its very good compression ratio, high decompression speed, high bit-rate and resolution independence. However, this technique of image compression requires large encoding time. We propose a parallel computing architecture to reduce the computational cost that is associated with encoding phase. We have discussed fractal image compression, Iterative function system and different encoding schemes along with their reviews. We have also suggested the concept of parallelization to be applied in compression methods for efficient implementation.
Space-Time Coding (STC)transmits and receives information at higher data rates with more reliability by using multiple antennas at both sides. In this paper, Multiple-Input–Multiple-Output (MIMO) systems with reduced complexity and the space–time block coding, for communication over Rayleigh fading channels using multiple transmit antennas have been considered. We have tested the performance of Alamouti coding technique for the Rayleigh channel. The signals on the transmit (Tx) antennas at one end and the receive (Rx) antennas at the other end are “combined” in such a way that the quality (bit-error rate or BER) or the data rate (bits/sec) of the communication for each MIMO user are improved. The simulation results are used to analyze and compare the performance.
Even though wireless communication has crossed 3G, today many of the industries transmit and receive data only by means of wired technology. In order to improve the performance of the power plant industry, wireless data transmission is introduced by designing a DS-CDMA transceiver. DS-CDMA is one type of spread spectrum communication, in which multiple single channels use different codes for communication. This paper proposes the design of a DS-CDMA transceiver with gold codes, tailored for the boiler data communication, to monitor and control the parameters of the boiler in the power plant. The process parameters of the boiler unit include mainly the Lignite Flow, Feed Water Flow, Steam Flow, Super Heater Spray Flow. The designed transceiver system is verified with real-time input data collected from the power plant and the BER performance is obtained. The simulation is performed using Matlab software.
This paper analyzed the user preference in the mobile telecommunication industry of Ghana. A study across the ten regions of Ghana, sought to find out the singular of multiple factors that influence users to subscribe to a particular network. The study also sought to reveal whether age, educational status and income level had any association or correlation with the choice of network. The paper revealed that there was no association between age, educational status and the selection of preferred network but rather a stronger correlation or association existed between the income level and the choice of network.
Today's microprocessors have need to operate at very high IO speed to cater the ever increasing computation need, so characterizing these IO's in a quick efficient and accurate manner is needed for us. The paper involves studying Transmitter( T ) and Receiver ( Rr ) blocks of memory interface of CPU and develop methods to characterized these IO's, X suitable feedback to design is provided after analyzing the data and receiving with design. In this paper involves some analog analysis and design. Here it needs some software tool to implementation. This paper implements new method to increase the speed of the IO operations of the memory interface of CPU. This contain the usage of the NIDAQ6008 and analog design and the circuit design concepts and here it deals with the calculation of the Rterm, Pull-up, Pull-down resistors and Jitter and the de-embedding of the signal loss.