Browse Conferences

Neural Network Approach to Pisarenko's Harmonic Retrieval Method
Pisarenko's Harmonic Retrieval (PHR) Method Is Perhaps The First Eigenstructure Based Spectral Estimation Technique. The Basic Step In This Method Is The Computation Of The Eigenvector Corresponding To The Minimum Eigenvalue Of The Autocorr...
ACE '90 [front matter]
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents...
Allocation and access mechanisms for spectrum sharing in CRNs - a brief review
Radio spectrum perceives the need for a new paradigm considering its ineffectual use. With such an incentive, Cognitive Radio (CR) paved its way to exploit unused frequency bands in an opportunistic fashion. CR extends different functionali...
A brief review of cooperative spectrum sensing: Issues and challenges
Spectrum sensing is a key function in cognitive radio network (CRN) to avoid harmful interference with licensed users and identify the free spectrum to improve spectrum utilization. However, major challenge arises when detection of license ...
Binary countdown anti-collision protocol for RFID tag collision problem
The rapid proliferation of the Internet of Things (IoT) entails the ubiquitous tagging of millions of objects. Radio frequency identification (RFID) are used to uniquely tag and automatically identify objects without human interference. RFI...
QoS enhancement using blind and data aided approaches in cooperative wireless channels
The increasing demands by even expanding networks of wireless and mobile devices have put huge strains on the allotted spectrum where challenges are related to providing better quality of service (QoS) and higher channel capacity. Though in...
Differential cryptanalysis of Substitution Permutation network
Differential cryptanalysis observes the effect of differences of input pairs of a cipher on the differences of its resultant output pairs. The difference of two cipher text is expressed as function of their corresponding plain text differen...
A group-based authentication scheme for vehicular Moving Networks
Uninterrupted mobile connectivity in fast moving public transportation systems like bus and train is difficult to achieve. Frequent handovers and security procedures for a large number of mobile users travelling together in these mass trans...
DoS attacks prevention using IDS and data mining
Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the serv...
Malware detection vectors and analysis techniques: A brief survey
Over the last decade, a war has been taking place which involves the computer security community and the black hat hackers. The security community uses every possible routine and strategies in order to cease and also to remove the damage ca...