- Home
- A-Z Publications
- International Journal of Sensors Wireless Communications and Control
- Previous Issues
- Volume 11, Issue 1, 2021
International Journal of Sensors Wireless Communications and Control - Volume 11, Issue 1, 2021
Volume 11, Issue 1, 2021
-
-
Substrate Integrated Waveguide Based Leaky Wave Antenna for High Frequency Applications and IoT
Authors: Manvinder Sharma and Harjinder SinghBackground & Objective: Internet of things devices managed by wireless networks so that higher data rates can be achieved. With increase in demand of usage of Internet microwave signals are capable for delivering the demand. However these high frequency waves needs a waveguide to propagate otherwise they get affected due to atmospheric attenuation and rain fade. A modified structure of rectangular waveguide i Read More
-
-
-
An Adaptive Fault-Tolerant and Congestion Controlled Selection Strategy for Networks on Chip
Authors: Ashima Arora, Neeraj K. Shukla and Shaloo KikanBackground & Objective: Networks on chip are being developed as a communication infrastructure in the design of multiprocessor SOCs. With the reduction in feature size, transient faults on the links are becoming a major issue on the performance of NOCs. Methods: In this paper, two fault-tolerant algorithms are proposed. In the first algorithm, a faulty link tolerant algorithm is designed which by measuring network loads on Read More
-
-
-
Performance Analysis of Energy Efficient Opportunistic Routing Protocols in Wireless Sensor Network
Authors: Premkumar Chithaluru, Rajeev Tiwari and Kamal KumarBackground: Energy Efficient wireless routing has been an area of research particularly to mitigate challenges surrounding performance in category of Wireless Networks. Objectives: The Opportunistic Routing (OR) technique was explored in recent times and exhibits benefits over many existing protocols and can significantly reduce energy consumption during data communication with very limited compromise on perfor Read More
-
-
-
Survey of Radio Propagation Models for Acoustic Applications in Underwater Wireless Sensor Network
Authors: Preeti Saini, Rishi P. Singh and Adwitiya SinhaBackground: Acoustic waves have a large range of applications in UWSNs from underwater monitoring to disaster management, military surveillance to assisted navigation. Acoustic waves are primarily used for wireless communication in water. But radio waves are more suitable than acoustic waves for many underwater applications (e.g. real-time applications, shallow water applications). Objectives: A propagation mo Read More
-
-
-
Performance Analysis of Cluster-Based DDoS Defense System with Different Reactive Routing Protocols
Authors: Deepa Nehra, Kanwalvir S. Dhindsa and Bharat BhushanBackground & Objective: DDoS attack poses a huge threat to the communication and security of mobile nodes in MANETs. The number of approaches proposed to defense against DDoS attacks in MANETs is much less as compared to those for the wire-based networks. The aim of this paper is to test the effectiveness of the proposed cluster-based DDoS attacks mechanism with various reactive routing protocols. Metho Read More
-
-
-
A Hybrid Approach for Automatic Licence Plate Recognition System
Authors: Nitin Sharma, Pawan K. Dahiya and Baldev Raj MarwahBackground: Automatic licence plate recognition system is used for various applications such as traffic monitoring, toll collection, car parking, law enforcement. Objective: In this paper, a convolutional neural network and support vector machine-based licence plate recognition system is proposed. Method: Firstly, from the input image of the vehicle, the characters are extracted and segmented. Then features of the segm Read More
-
-
-
An Energy-Efficient and Reliable Opportunistic Routing for Wireless Sensor Networks
Authors: Nagesh Kumar and Yashwant SinghBackground: Routing protocols in Wireless Sensor Networks (WSN) are of major concern because of the important factors like energy efficiency and reliability. Opportunistic Routing (OR) is the simplest and reliable routing technique for ad-hoc networks and WSN. The OR protocol guarantees data delivery in the network. As WSN need energy-efficient routing, therefore, energy- efficient OR protocols gained popularity in the last thre Read More
-
-
-
Brain Segmentation Using Deep Neural Networks
Authors: Vandana Mohindru, Ashutosh Sharma, Apurv Mathur and Anuj K. GuptaBackground: The determination of the tumor extent is a major challenging task in brain tumor planning and quantitative evaluation. Magnetic Resonance Imaging (MRI) is one of the non-intellectual technique that has emerged as a front-line diagnostic tool for a brain tumor with non-ionizing radiation. Objectives: In Brain tumors, Gliomas is the very basic tumor of the brain; they might be less aggressive or more aggre Read More
-
-
-
Trust Optimization for Byzantine Attacks in Cognitive Networks
Authors: Natasha Saini, Nitin Pandey and Ajeet P. SinghBackground & Objective: Cognitive Radio Network (CRN) is an emerging technology that provides ability of adapting operating parameters to wireless devices in order to overcome spectrum scarcity problems. However, involvement of numerous pervasive smart wireless devices introduces many security threats in CRN. The research work specifically highlights the different kinds of attacks that occur in cognitive n Read More
-
-
-
A Novel Modified Artificial Bee Colony for DOA Estimation
Authors: Seyed A. H. Parsa, Ataolah E. Zadeh and Seyed Javad KazemitabarAims: We consider the Direction of Arrival (DOA) estimation for code division multiple access (CDMA) signals. Background: Solving this problem requires non-linear optimization and thus the speed of convergence becomes crucial. Objective: A novel Modified Artificial Bee Colony (MABC) has been proposed. We use secondorder Taylor series expansion of the cost function to ameliorate the searchability of artificial bee colony ( Read More
-
-
-
Fusing Dynamic Images and Depth Motion Maps for Action Recognition in Surveillance Systems
Authors: Rajat Khurana and Alok K. S. KushwahaBackground: Identification of human actions from video has gathered much attention in past few years. Most of the computer vision tasks such as Health Care Activity Detection, Suspicious Activity detection, Human Computer Interactions etc. are based on the principle of activity detection. Automatic labelling of activity from videos frames is known as activity detection. Objective: Motivation of this work is to use most out of t Read More
-
-
-
TRIPLEPR-MAC: A Triple Queue Priority Based Medium Access Control Protocol for Wireless Sensor Network
Authors: Rinkuben N. Patel and Nirav V. BhattBackground: WSN is a network of smart tiny electromechanical devices named sensors. Sensors perform various tasks like sensing the environment as per its range, transmitting the data using transmission units, storing the data in the storage unit and performing an action based on the captured data. As they are installed in an unfriendly environment, recharging the sensors is not possible every time which leads to a Read More
-
-
-
Security and Trust Model Analysis for Banking System
Authors: Dinesh K. Saini, Hemraj Saini and Surjeet SinghBackground: There are mainly three types of banking includes Traditional banking, online banking, and mobile banking. The use of the latter two i.e, online banking and mobile banking, over traditional methods should rise exponentially among the people. This will be the implication only if the customers are made aware of the new technologies and advancements in the banking sector. Therefore, appropriate securities to be i Read More
-
Most Read This Month
Article
content/journals/swcc
Journal
10
5
false
en
