Search Results - "2009 First Asian Himalayas International Conference on Internet"

Refine Results
  1. 1

    Performance analysis of EXP/PF and M-LWDF in downlink 3GPP LTE system by Basukala, R., Mohd Ramli, H.A., Sandrasegaran, K.

    “…This paper investigates the performance of exponential/proportional fair (EXP/PF) and maximum-largest weighted delay first (M-LWDF) scheduling algorithms in…”
    Get full text
    Conference Proceeding
  2. 2

    Combat with Black hole attack in AODV routing protocol in MANET by Medadian, M., Yektaie, M.H., Rahmani, A.M.

    “…A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of…”
    Get full text
    Conference Proceeding
  3. 3

    Signal processing techniques for spectrum sensing in cognitive radio systems: Challenges and perspectives by Rawat, D.B., Gongjun Yan

    “…Cognitive radio (CR) is regarded as an emerging technology to utilize the scarce RF (radio frequency) spectrum in opportunistic manner to increase the spectrum…”
    Get full text
    Conference Proceeding
  4. 4

    A QoS-based robust multipath routing protocol for mobile ad hoc networks by Venkatasubramanian, S., Gopalan, N.P.

    “…In mobile ad hoc networks, the unstable transport layer and inhibited amount of traffic being carried out by the network is owing to the high packet loss rates…”
    Get full text
    Conference Proceeding
  5. 5

    Low phase noise 10 bit 5 GHz DCO using on-chip CPW resonator in 0.18 µm CMOS technology by Pokharel, R.K., Uchida, K., Tomar, A., Kanaya, H., Yoshida, K.

    “…A digital-controlled oscillator (DCO) employing on-chip coplanar waveguide (CPW) resonator is proposed for 5 GHz-band wireless communication applications. A 10…”
    Get full text
    Conference Proceeding
  6. 6
  7. 7

    Notice of Violation of IEEE Publication Principles: Active noise control for real time blind speech mining using single-channel noise by Islam, Syed Foysol, Shameem, Mushfeq-Us-Saleheen, Islam, A.H.M. Saiful, Sagor, Sakeeb Adnan, Huda, T.M. Nazmul

    “…Spatial beamformers are capable of enhancing the quality of speech in extreme noisy environments. This research paper shows a result using a method called low…”
    Get full text
    Conference Proceeding
  8. 8

    Notice of Violation of IEEE Publication Principles: Active noise control for industrial applications by Huda, T.M. Nazmul, Islam, Syed Foysol

    “…We will show the construction of acoustic active noise control in hear defenders by the help of Filtered-x Least Mean Squares structure and using a low power…”
    Get full text
    Conference Proceeding
  9. 9

    An efficient k-means algorithm integrated with Jaccard distance measure for document clustering by Shameem, M.-U.-S., Ferdous, R.

    “…Document Clustering is a widely studied problem in Text Categorization. It is the process of partitioning or grouping a given set of documents into disjoint…”
    Get full text
    Conference Proceeding
  10. 10

    A novel approach for avoiding wormhole attacks in VANET by Safi, S.M., Movaghar, A., Mohammadizadeh, M.

    “…Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the…”
    Get full text
    Conference Proceeding
  11. 11

    Design of optical logic gates using photonic crystal by Kabilan, A.P., Christina, X.S., Caroline, P.E.

    “…Design and simulation of novel all-optical fundamental X-NOR and NAND logic gates based on two dimensional photonic crystals are reported in this paper. In a…”
    Get full text
    Conference Proceeding
  12. 12

    Security concerns in WiMAX by Hasan, S.S., Qadeer, M.A.

    “…WiMAX (Worldwide Interoperability for Microwave Access)/ IEEE 802.16 is a very promising 4G technology. WiMAX is now in the testing via implementation stage at…”
    Get full text
    Conference Proceeding
  13. 13

    HIP-tags architecture implementation for the Internet of things by Urien, P., Elrharbi, S., Nyamy, D., Chabanne, H., Icart, T., Lecocq, F., Pepin, C., Toumi, K., Bouet, M., Pujolle, G., Krzanik, P., Susini, J.-F.

    “…This paper describes a possible implementation for the innovative and highly secure networking architecture dedicated to the Internet of Things (IoT). We…”
    Get full text
    Conference Proceeding
  14. 14

    Single sign-on with one time password by Tiwari, P.B., Joshi, S.R.

    “…The organizations are shifting from the desktop based solution to Web based platform to solve their business needs. The amass of these different systems poses…”
    Get full text
    Conference Proceeding
  15. 15

    Recent trends in RFID and a java based software framework for its integration in mobile phones by Pathak, R., Joshi, S.

    “…Radio Frequency Identification (RFID) is generic term for technologies employing radio waves for detecting objects. We describe our approach with recent…”
    Get full text
    Conference Proceeding
  16. 16

    Symbol timing synchronization for IEEE 802.11n WLAN systems by Misuk Cho, Yunho Jung, Jaeseok Kim

    “…In this paper, we propose a robust symbol timing synchronization method for IEEE 802.11n wireless LAN (WLAN) systems. Symbol timing synchronization using a…”
    Get full text
    Conference Proceeding
  17. 17

    Interference evaluation and MS controlled handoff technique for femtocell by Habeeb, A.A., Qadeer, M.A.

    “…Femtocells (aka Home Node B) are low-power wireless access points that operate in licensed spectrum to connect standard mobile devices to a mobile operator's…”
    Get full text
    Conference Proceeding
  18. 18

    Gravitational emulation local search algorithm for advanced reservation and scheduling in grid systems by Barzegar, Behnam, Rahmani, Amir Masoud, Far, Kamran zamani

    “…The issue of the guarantee quality of service (QOS) for users can be provided by the advanced reservation. The advanced reservation is a kind of mechanism that…”
    Get full text
    Conference Proceeding
  19. 19

    Position based routing protocol with more reliability in Mobile Ad Hoc Network by Abdoos, M., Faez, K., Sabaei, M.

    “…Position based routing protocols are kinds of routing protocols, which use nodes location information, instead of links information to routing. In position…”
    Get full text
    Conference Proceeding
  20. 20

    Routing space Internet based on Dijkstra's algorithm by Xiang-ying Li, Guo-shun Li, Sheng-tian Zhang

    “…Space based Internets will be used to move earth observation data through satellite constellations to ground based receiving stations. Routing observation…”
    Get full text
    Conference Proceeding