Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1739

Full-Text Articles in Computer Engineering

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov Aug 2020

A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov

Chemical Technology, Control and Management

The issues of continuity, accuracy, speed and reliability of signal conversion, which are the main problems of quality control and management of production processes, remain relevant. Research shows that in practice there are different signal variables, the study of which is highly formalized in a number of modeling tasks and basic classification studies, in particular transients in converters, its sources and elements requires a unified mathematical approach, that is, visual, highly formalized modeling and research based on it. The paper presents a graph model of multifunctional signal converters that provide microprocessor and electronic devices with signals in the form of ...


Nb-Jncd Coding And Iterative Joint Decoding Scheme For A Reliable Communication In Wireless Sensor Networks With Results, Kishore Kumar R, S Nayana Aug 2020

Nb-Jncd Coding And Iterative Joint Decoding Scheme For A Reliable Communication In Wireless Sensor Networks With Results, Kishore Kumar R, S Nayana

International Journal of Smart Sensor and Adhoc Network

Privacy threat is a very serious issue in multi-hop wireless networks (MWNs) since open wireless channels are vulnerable to malicious attacks. A distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes. However, the simple deployment of network coding cannot achieve the goal once enough packets are collected by the adversaries. This paper proposes non-binary joint network-channel ...


A New Approach For Implementation And Simulation Study Of Digital Circuits Using Cedar Logic, Prabhat K. Patnaik, Peddiniti Ajay, M.Manoj Varma Aug 2020

A New Approach For Implementation And Simulation Study Of Digital Circuits Using Cedar Logic, Prabhat K. Patnaik, Peddiniti Ajay, M.Manoj Varma

International Journal of Smart Sensor and Adhoc Network

This paper advocates the use of free and open source interactive computerized design tool "Cedar Logic” for the design of combinational and sequential logic circuits. This tool provides a modern approach to fill the gap in the currently available computer based teaching software, with the purpose of providing alternative-mode subject delivery. The Cedar Logic is used to show the link between Boolean algebra and combinatorial and sequential circuits. Each circuit introduces new concepts and produces the complete design of a stand-alone apparatus that is fun and interesting to use.


Implementation Of Genetic Algorithm Based Artificial Neural Network To Identify Vegetables With Physiological Diseases, Bibhu Prasad, Ashima Sindhu Mohanty, Ami Kumar Parida Aug 2020

Implementation Of Genetic Algorithm Based Artificial Neural Network To Identify Vegetables With Physiological Diseases, Bibhu Prasad, Ashima Sindhu Mohanty, Ami Kumar Parida

International Journal of Smart Sensor and Adhoc Network

We synthetically applied computer vision, genetic algorithm and artificial neural network technology to automatically identify the vegetables (tomatoes) that had physiological diseases. Initially tomatoes’ images were captured through a computer vision system. Then to identify cavernous tomatoes, we analyzed the roundness and detected deformed tomatoes by applying the variation of vegetable’s diameter. Later, we used a Genetic Algorithm (GA) based artificial neural network (ANN). Experiments show that the above methods can accurately identify vegetables’ shapes and meet requests of classification; the accuracy rate for the identification for vegetables with physiological diseases was up to 100%. [Nature and Science. 2005 ...


Dual Polarized Aperture Coupled Stacked Element For Base Station Antenna, Kunal Ghosh, Radhanath Patra, Biswajit Karan Aug 2020

Dual Polarized Aperture Coupled Stacked Element For Base Station Antenna, Kunal Ghosh, Radhanath Patra, Biswajit Karan

International Journal of Smart Sensor and Adhoc Network

The demand towards broad band efficient antennas for base station and mobile wireless applications have increased dramatically over the last few years. Today there is a huge increase in the number of subscribers and demand for equipments that is capable of handling cost-effective network capacity solutions in Spectrum limited markets. Our Paper describes the design of dual polarized antenna element which can be implemented in a base station antenna array using IE3D Zeland Software. The Element is based on aperture

coupled architecture with stacked patch, maintaining the symmetry needed for dual polarization operation. Most of common antenna elements are linearly ...


Intelligent Controller: An Alternative Approach For Nonlinear System Control, Kengua Manikanth, Ashish Tiwary Aug 2020

Intelligent Controller: An Alternative Approach For Nonlinear System Control, Kengua Manikanth, Ashish Tiwary

International Journal of Smart Sensor and Adhoc Network

Control of non liner systems is difficult in the absence of a systematic procedure as available for linear systems. Mathematical model that we use for nonlinear system control needs very expensive and sophisticated instrument. Intelligent system which is suppose to posses humanlike expertise within a specific domain, adopts itself and learn to do better in any condition. Soft computing an approach for constructing computationally intelligent system consist of several computing techniques, including neural network, fuzzy set theory and derivate free optimization method such as genetic algorithms and simulated annealing. As it incorporate human knowledge effectively, to deal with imprecision and ...


Effect Of Four Wave Mixing In Wdm Systems For Higher Number Of Channels, A. Panda, D. P. Mishra Aug 2020

Effect Of Four Wave Mixing In Wdm Systems For Higher Number Of Channels, A. Panda, D. P. Mishra

International Journal of Smart Sensor and Adhoc Network

The integration of wireless and optical networks increases the capacity and mobility as well as decreases costs in the access networks. However, there are nonlinearity and obstacles preventing them from being perfect media. A serious issue for WDM systems is the presence of resonant four wave mixing (FWM) terms, as a result of interactions between different channels. FWM presents a major source of non-linear cross talk since they often fall near or on top of the desired signals. So the best solution is to avoid the FWM generation from early design stages. The effect of four wave mixing (FWM) as ...


For Secure Medical Care: Uses Of Sensors & Wireless Communication, Shankha Mitra Sunani, Bandana Malliick Aug 2020

For Secure Medical Care: Uses Of Sensors & Wireless Communication, Shankha Mitra Sunani, Bandana Malliick

International Journal of Smart Sensor and Adhoc Network

Biological, chemical, and radiological agents can tamper with the activities of medical care providers, patient samples, and medicine administration. Which brings patients to a major risk? The challenge is to use the concepts of sensors to detect and monitor any violations in the medical care environment. Wireless devices must communicate multimedia data such as patient information, laboratory results, prescriptions, and X- ray and ECG reports. A discussion of sensors in patient rooms, clinics/wards, hospitals, and measurements of safety and security is presented. The available devices for sensor and wireless communication are also briefly included.


Design Methodology Of Bidirectional Barrel Shifter Based On Reversible Logic, V. Srujana, G. Babu Aug 2020

Design Methodology Of Bidirectional Barrel Shifter Based On Reversible Logic, V. Srujana, G. Babu

International Journal of Smart Sensor and Adhoc Network

Data shifting is required in many key computer operations from address decoding to computer arithmetic. Full barrel shifters are often on the critical path, which has led most research to be directed toward speed optimizations. With the advent of quantum computer and reversible logic, design and implementation of all devices in this logic has received more attention. Rotating and data shifting are required in many operations such as logical and arithmetic operations, indexing and address decoding etc. Hence barrel shifters which can shift and rotate multiple bits in a single cycle have become a common choice of design for high ...


Security In Wireless Sensor Networks Using Assymetric Key Based Techniques, Rashmi Mothkur, George Philip C Aug 2020

Security In Wireless Sensor Networks Using Assymetric Key Based Techniques, Rashmi Mothkur, George Philip C

International Journal of Smart Sensor and Adhoc Network

Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications in our lives ranging from military applications to civilian ones.. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional ...


Coverage Hole Removal In Wsns, Rajat Bhardwaj Bhardwaj, Hitesh Sharma, Aman Singh Aug 2020

Coverage Hole Removal In Wsns, Rajat Bhardwaj Bhardwaj, Hitesh Sharma, Aman Singh

International Journal of Smart Sensor and Adhoc Network

The intention of this paper is to remove coverage holes in wireless sensor networks. Coverage holes are formed during the random deployment of sensor networks. In this paper we will discuss what are coverage holes, how they are formed, reasons for their formation and algorithm proposed for the removal of coverage holes.


Slot Loaded Shorted Gap Coupled Broadband Microstrip Antenna, Sarthak Singhal Aug 2020

Slot Loaded Shorted Gap Coupled Broadband Microstrip Antenna, Sarthak Singhal

International Journal of Smart Sensor and Adhoc Network

In this paper the bandwidth of a conventional rectangular microstrip antenna has been enhanced by locating capacitively excited λm/4 short circuit parasitic elements at its radiating and non-radiating edges along with the circular polarization and loading the parasitic elements with the rectangular slots. An impedance bandwidth of 1.53513 GHz to 1.843438 GHz (308.3MHz). It has three resonances at 1.56GHz, 1.67GHz and 1.8 GHz. The result are simulated by MOM based IE3D software.


A Secure Packet Hiding Technique For Preventing Jamming Attacks, Annapoorna B.R, Mrs.Shanthi M. B, Dr.Jitendranath Mungara Aug 2020

A Secure Packet Hiding Technique For Preventing Jamming Attacks, Annapoorna B.R, Mrs.Shanthi M. B, Dr.Jitendranath Mungara

International Journal of Smart Sensor and Adhoc Network

Wireless Sensor Networks are exposed to serious security threat called jamming. This type of attacks with wireless transmission can be used as a catalyst for rising Denial-of-service attacks. This paper considers the problem of jamming under an internal threat model, where the attacker who is aware of all the network secrets and the details of implementation which results in the difficulty of detection. Jamming is broken down in to layers and this paper focuses on jamming at the Transport/Network layer. To overcome these attacks, we develop three schemes that prevent the attacker from attacking the packets. Then we evaluate ...


Multi-Channel Mac Protocol For Energy Saving In Wireless Sensor Networks, Geethanjali S, Pravin Renold A Aug 2020

Multi-Channel Mac Protocol For Energy Saving In Wireless Sensor Networks, Geethanjali S, Pravin Renold A

International Journal of Smart Sensor and Adhoc Network

Wireless Sensor Network (WSN) is a self-organizing and distributed collection of small sensor nodes with limited energy are connected wirelessly to the sink, where the information is needed. The significant trait for any Wireless Sensor Network is power consumption since WSNs finds its most of the applications in unsafe, risky areas like Volcano eruption identification, Warfield monitoring, where human intervention is less or not possible at all. Hence designing a protocol with minimum energy consumption as a concern is an important challenge in increasing the lifetime of the sensor networks. Medium Access Control (MAC) Layer of WSN consumes much of ...


Reliablity Control Using Loss Recovery Ratio In Wireless Sensor Network, Ketan Santosh Dhamanskar Aug 2020

Reliablity Control Using Loss Recovery Ratio In Wireless Sensor Network, Ketan Santosh Dhamanskar

International Journal of Smart Sensor and Adhoc Network

In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment each sensor senses the information and forwarded to its cluster head and cluster head will forward that data packet towards the sink. But the cluster heads are one hop from sink node so that they acts as intermediate nodes and hence there are more chances of congestion and leads to packet drop i.e. nothing but data loss. In my model I recover this ...


Implementation Of Service Oriented Wearable System For Preventive Healthcare, Ogunduyile O. Oluwagbenga, Kgoete S. Frans Aug 2020

Implementation Of Service Oriented Wearable System For Preventive Healthcare, Ogunduyile O. Oluwagbenga, Kgoete S. Frans

International Journal of Smart Sensor and Adhoc Network

as an emerging state-of-art technology, wearable systems have been applied to various real life situations and healthcare is one of such important areas. This study reports the implementation of a prototype Service Oriented Wearable System (SOWS). After detailed analysis of healthcare requirements, a system based on Service Oriented Architecture (SOA), wearable devices and sensor networks is implemented to provide continuous remote monitoring, diagnosis, immediate response and treatment for the purpose of preventive healthcare. Technologies based on SOA and sensor networks can support cost effective ubiquitous access to healthcare services, real time service provisioning and processing of heterogeneous data for various ...


A Secure Data Forwarding Schema For Cloud Storage Systems, G.Chinna Pullaiah, Dilip Venkata Kumar Vengala Aug 2020

A Secure Data Forwarding Schema For Cloud Storage Systems, G.Chinna Pullaiah, Dilip Venkata Kumar Vengala

International Journal of Smart Sensor and Adhoc Network

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a threshold proxy re-encryption, on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction ...


Comparison Of Feasibility Of Risk Monitoring In Buildings In Two Wireless Sensor Network: Mica Mote And Mems, Vineeta Gupta, Komal Gupta Aug 2020

Comparison Of Feasibility Of Risk Monitoring In Buildings In Two Wireless Sensor Network: Mica Mote And Mems, Vineeta Gupta, Komal Gupta

International Journal of Smart Sensor and Adhoc Network

In this paper feasibility of risk monitoring of buildings in two wireless sensor network is presented,firstly by using MICA Mote and then by MEMS.Also,it will be verified that the MEMS sensors are superior as it provides high quality sensor data and no data loss as compared to MICA Mote.In order to assess earthquakes the structures is monitored firstly by using a smart sensor based on the Berkeley Moteplatform.The Mote has on-board microprocessor and ready-made wireless communication capabilities. In this paper, the performance of the Mote is investigated through shakingtable tests employing a two-story steel structur ...


Maximizing The Lifetime And Security Of Wireless Sensor Networks, Saranya. S, Gowri. V Aug 2020

Maximizing The Lifetime And Security Of Wireless Sensor Networks, Saranya. S, Gowri. V

International Journal of Smart Sensor and Adhoc Network

Recent technological advances have facilitated the widespread use of wireless sensor networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and so it’s necessary to understand however long the network sustains its networking operations. We can enhance the quality of monitoring in wireless sensor networks by increasing the WSNs lifetime. At the same time WSNs are deployed for monitoring in a range of critical domains such as military, healthcare etc. Accordingly, these WSNs are vulnerable to attacks. Now this proposed ...


Review On Hierarchical Routing In Wireless Sensor Networks, Er Neetika, Simarpreet Kaur Aug 2020

Review On Hierarchical Routing In Wireless Sensor Networks, Er Neetika, Simarpreet Kaur

International Journal of Smart Sensor and Adhoc Network

The Wireless Sensor Network(WSN) has become an interesting field of research of the 21st century. It is a type of the wireless ad-hoc network. This has brought about developing low cost, low-power and multi-function sensor nodes. The network life for wireless sensor network plays an important role in survivability. Energy efficiency is one of the critical concerns for wireless sensor networks. Sensor nodes are strictly constrained in terms of storage, board energy and processing capacity. For these reasons, many new protocols have been proposed for the purpose of data routing in sensor networks. These protocols can be classified into ...


Routing Protocol For Vehicular Adhoc Network, Likhita K. Waghdhare, T. H. Nagrare Aug 2020

Routing Protocol For Vehicular Adhoc Network, Likhita K. Waghdhare, T. H. Nagrare

International Journal of Smart Sensor and Adhoc Network

Vehicular Ad hoc network(VANET) are special type of Mobile Adhoc Networks(MANET) where wireless equipped vehicles from a network are continuously travelling along the road. Node movement feature of Vehicular ad hoc network (VANET) closely resembles with that of mobile ad hoc network (MANET) but its high speed mobility and unpredictable movement characteristics are the key contrasting feature from that of MANET. The similarity nature suggests that the prevailing routing protocol of MANET is very much applicable to VANET. However, on the same line, the dissimilarity characteristics result in frequent loss of connectivity. In VANET, topology changes rapidly and ...


Survey Of Vehicle Ad-Hoc Network, Deesha G. Deotale, Uma Nagaraj Aug 2020

Survey Of Vehicle Ad-Hoc Network, Deesha G. Deotale, Uma Nagaraj

International Journal of Smart Sensor and Adhoc Network

The communication is done in between cars that is based on the short range wireless technology. It become safety road and travel comfort using ad-hoc network. We see the different to communication mode in car network. Also we see the Geonetworking with car network. IPv6 is considered as the most appropriate technologies to support communication in VANET thanks to its extended address space, enhanced mobility support, ease of configuration and embedded security.


Design Issues And Classification Of Wsns Operating Systems, Anil Kumar Sharma, Surendra Kumar Patel, Gupteshwar Gupta Aug 2020

Design Issues And Classification Of Wsns Operating Systems, Anil Kumar Sharma, Surendra Kumar Patel, Gupteshwar Gupta

International Journal of Smart Sensor and Adhoc Network

Wireless Sensor Networks is an emerging area of research. Wireless Sensor networks (WSNs) face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are just some basic problems that have to be considered when designing or selecting a new operating system in order to evaluate the performance of wireless sensor nodes (motes). In this paper we focused on design issues, challenges and classification of operating systems for WSNs.


Overview Of Wireless Network Control Protocol In Smart Phone Devices, P.L. Ramteke, D.N. Choudhary Aug 2020

Overview Of Wireless Network Control Protocol In Smart Phone Devices, P.L. Ramteke, D.N. Choudhary

International Journal of Smart Sensor and Adhoc Network

The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with server management, Information Technology organizations begins the process of centralizing servers. It used with architecture principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced services in addition to just raw connectivity, distributed ...


Mobile Networking For “Smart Dust” With Rfid Sensor Networks, Shyam D. Bawankar, Sonal B. Bhople, Vishal D. Jaiswal Aug 2020

Mobile Networking For “Smart Dust” With Rfid Sensor Networks, Shyam D. Bawankar, Sonal B. Bhople, Vishal D. Jaiswal

International Journal of Smart Sensor and Adhoc Network

Large-scale networks of wireless sensors are becoming an active topic of research.. We review the key elements of the emergent technology of “Smart Dust” and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume. Smart Dust sensor networks – consisting of cubic millimetre scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station – are envisioned to fulfil complex large scale monitoring tasks in a wide variety of application areas. RFID technology can realize “smart-dust ...


Minimax Filtering In Wireless Sensor And Actor Networks, K. Ramesh, S. Vasundra Aug 2020

Minimax Filtering In Wireless Sensor And Actor Networks, K. Ramesh, S. Vasundra

International Journal of Smart Sensor and Adhoc Network

In this paper to handle the mobility of actors a hybrid strategy that includes location updating and location prediction is used.The usage of Kalman Filtering in location prediction high power and energy consumptions. To avoid the drawbacks of Kalman Filtering in location prediction, we make use of Minimax filtering (also Known as H∞ filtering). Minimax Filter has been used in WSANs by minimizing the estimation error and maximizing the worst case adversary noise. Minimax filtering will also minimize power and energy consumptions.


Adaptive Resource Allocation For Wireless Multicast Mimo-Ofdm Systems, Shanmugavel G, Prelly K.E Aug 2020

Adaptive Resource Allocation For Wireless Multicast Mimo-Ofdm Systems, Shanmugavel G, Prelly K.E

International Journal of Smart Sensor and Adhoc Network

Multiple antenna orthogonal frequency division multiple access (OFDMA) is a promissing technique for the high downlink capacity in the next generation wireless systems, in which adaptive resource allocation would be an important research issue that can significantly improve the performance with guaranteed QoS for users. Moreover, most of the current source allocation algorithms are limited to the unicast system. In this paper, dynamic resource allocation is studied for multiple antenna OFDMA based systems which provide multicast service. The performance of multicast system is simulated and compared with that of the unicast system. Numerical results also show that the propossed algorithms ...


Efficient E-Mrzt Algorithm Based Tree Construction Technique For Zigbee Mobile Wireless Networks, Hariram R M, Manjunatha S, Jitendranath Mungara Aug 2020

Efficient E-Mrzt Algorithm Based Tree Construction Technique For Zigbee Mobile Wireless Networks, Hariram R M, Manjunatha S, Jitendranath Mungara

International Journal of Smart Sensor and Adhoc Network

In Wireless Personal Area Networks (WPANs), the Zigbee protocol/IEEE 802.15.4 standard is a protocol specification for low range, less cost and low power systems. The Zigbee network is usually constructed using cluster trees for the purpose of performing data delivery among nodes and for power saving. Here the data delivery failures occur due to node mobility. In order to handle node movements so as to increase data delivery we use mobility-robust tree construction technique with clustering mechanism. In this paper we propose an E-MRZT (Extended MRZT) algorithm. We collect information about regularity of mobility patterns and by ...


Providing The Boundary Line Controlled Request With Adaptable Transmission Rates In Wdm Mesh Networks, Anusha Annapureddy, B. Balaji Aug 2020

Providing The Boundary Line Controlled Request With Adaptable Transmission Rates In Wdm Mesh Networks, Anusha Annapureddy, B. Balaji

International Journal of Smart Sensor and Adhoc Network

The mixture of applications increases and supported over optical networks, to the network customers new service guarantees must be offered .The partitioning the data into multiple segments which can be processed independently the useful data to be transferred before a predefined deadline .this is a deadline driven request. To provide the request the customer chooses the bandwidth DDRs provide scheduling flexibility for the service providers. It chooses bandwidth while achieving two objectives 1.satisfying the guaranteed deadline 2.decreasing network resource utilization .by using bandwidth allocation policies improve the network performance and by using mixed integer linear program allows choosing ...