This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
Abstract-- The next generation of computers will be embossed by ubiquitous systems. The computer will disappear behind daily artifacts and will support people in their everyday lif...
Faruk Bagci, Julian Wolf, Theo Ungerer, Nader Bagh...
Abstract-- The reliable delivery of services in service oriented architectures often entails the underlying basis of having well structured system and communication network models....
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
In this paper we consider MIMO system with Mt transmitting and Mr receiving antennas, when channel state information (CSI) is known on the transmitter side. The Reyleigh fading cha...
The energy constrained wireless sensor nodes need very efficient localization algorithm for event detection. We propose a method for localizing the wireless sensor nodes using the ...
Abstract-- The power of wireless sensor network techonology has provided the capability of developing large scale systems for real-time monitoring.This paper describes the evolutio...
Maneesha V. Ramesh, Sangeeth Kumar, P. Venkat Rang...