The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
Abstract-- The next generation of computers will be embossed by ubiquitous systems. The computer will disappear behind daily artifacts and will support people in their everyday lif...
Faruk Bagci, Julian Wolf, Theo Ungerer, Nader Bagh...
Abstract-- The reliable delivery of services in service oriented architectures often entails the underlying basis of having well structured system and communication network models....
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
In this paper we consider MIMO system with Mt transmitting and Mr receiving antennas, when channel state information (CSI) is known on the transmitter side. The Reyleigh fading cha...
The energy constrained wireless sensor nodes need very efficient localization algorithm for event detection. We propose a method for localizing the wireless sensor nodes using the ...
Abstract-- The power of wireless sensor network techonology has provided the capability of developing large scale systems for real-time monitoring.This paper describes the evolutio...
Maneesha V. Ramesh, Sangeeth Kumar, P. Venkat Rang...