ESTIJ

Displaying 1-5 of 5 results

  • White Papers // Apr 2012

    Biometric Authentication Using Gait Features

    Biometric Authentication systems are popular and effective for the greater degree of uniqueness among various people. Similar to any other biometric methodology, gait biometric is also an advanced biometric authentication methodology. Gait refers to the walking style of a person. The main advantage of gait authentication is that it is...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Wormhole Attack in Mobile Ad Hoc Networks: A Review

    Mobile Ad-Hoc NETwork (MANET) is a wireless network without infrastructure. Self configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. It generally works by broadcasting the information and used air as medium. It's broadcasting nature and transmission medium also help attacker, whose intention...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Analysis of PS Protocols Using Markov and Cluster Model in 802.11 WLANS

    In recent years, a series of Power Saving (PS) protocols has been proposed in the family of 802.11 standards to save energy for mobile devices. To evaluate their performance, many works have been carried out on test beds or simulation platforms. However, till now, there is a lack of accurate...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Performance Comparison of Ad-Hoc Network Routing Protocols Using NS-2 Simulator

    Ad-hoc networks are basically self organizing, self configuring and peer to peer multi-hop mobile wireless networks in which the information packets are transmitted in a 'Store and forward' manner from a source to an arbitrary destination via intermediate nodes. The main objective of this paper is to evaluate the performance...

    Provided By ESTIJ

  • White Papers // Feb 2012

    Co-Channel Interference Cancellation Based on MIMO Space-Time System

    This paper deals with the exploitation of Multiple Input Multiple Output (MIMO) systems for broadband wireless indoor applications. More specifically, multiple access channels with multiple antennas are considered. Aiming to improve the system performance, an interference cancellation scheme is proposed to eliminate the interference for each user. The decoding complexity...

    Provided By ESTIJ

  • White Papers // Feb 2012

    Co-Channel Interference Cancellation Based on MIMO Space-Time System

    This paper deals with the exploitation of Multiple Input Multiple Output (MIMO) systems for broadband wireless indoor applications. More specifically, multiple access channels with multiple antennas are considered. Aiming to improve the system performance, an interference cancellation scheme is proposed to eliminate the interference for each user. The decoding complexity...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Biometric Authentication Using Gait Features

    Biometric Authentication systems are popular and effective for the greater degree of uniqueness among various people. Similar to any other biometric methodology, gait biometric is also an advanced biometric authentication methodology. Gait refers to the walking style of a person. The main advantage of gait authentication is that it is...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Wormhole Attack in Mobile Ad Hoc Networks: A Review

    Mobile Ad-Hoc NETwork (MANET) is a wireless network without infrastructure. Self configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. It generally works by broadcasting the information and used air as medium. It's broadcasting nature and transmission medium also help attacker, whose intention...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Analysis of PS Protocols Using Markov and Cluster Model in 802.11 WLANS

    In recent years, a series of Power Saving (PS) protocols has been proposed in the family of 802.11 standards to save energy for mobile devices. To evaluate their performance, many works have been carried out on test beds or simulation platforms. However, till now, there is a lack of accurate...

    Provided By ESTIJ

  • White Papers // Apr 2012

    Performance Comparison of Ad-Hoc Network Routing Protocols Using NS-2 Simulator

    Ad-hoc networks are basically self organizing, self configuring and peer to peer multi-hop mobile wireless networks in which the information packets are transmitted in a 'Store and forward' manner from a source to an arbitrary destination via intermediate nodes. The main objective of this paper is to evaluate the performance...

    Provided By ESTIJ