Indian Institute of Technology Guwahati

Displaying 1-40 of 43 results

  • White Papers // Oct 2012

    An Adaptive Throughput, Spectral, Energy Efficient and Fair Network Configuration in Pervasive Environment

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Indian Institute of Technology Guwahati

  • White Papers // May 2012

    Performance Optimization in Single Channel Directional Multi-Interface IEEE 802.11s EDCA Using Beam Prioritization

    Single channel multi-interface IEEE 802.11s Wireless Mesh Network(WMN) is a promising technology for increasing spatial reuse of wireless channel using high gain directional antennas. Use of single channel in WMN is advantageous for providing different services (like community mesh networking, vehicular mesh networking, etc.) by different frequency channels so that...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2012

    Load Balancing In-Bound Traffic in Multihomed STUB Autonomous Systems

    In the Internet, with many competing networks each trying to optimise its own bandwidth, a stub network has limited knowledge about user demands, available network resources and routing policies of other networks. This uncertainty makes the task of interdomain traffic engineering for a stub network very challenging. The basic aim...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Nov 2011

    Fixing Data Anomalies With Prediction Based Algorithm in Wireless Sensor Networks

    Data inconsistencies are present in the data collected over a large Wireless Sensor Network (WSN), usually deployed for any kind of monitoring applications. Before passing this data to some WSN applications for decision making, it is necessary to ensure that the data received are clean and accurate. In this paper,...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Oct 2011

    Cross Layer Adaptation for QoS in WSN

    In this paper, the authors propose QoS aware MAC protocol for Wireless Sensor networks and its cross layer extension to network layer for providing QoS in delay sensitive WSN scenarios. In WSNs, there can be two types of traffic, one is event driven traffic which requires immediate attention and another...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jun 2011

    Pricing Of Average Strike Asian Call Option Using Numerical PDE Methods

    In this paper, a standard PDE for the pricing of arithmetic average strike Asian call option is presented. A Crank-Nicolson Implicit Method and a Higher Order Compact finite difference scheme for this pricing problem are derived. Both these schemes were implemented for various values of risk free rate and volatility....

    Provided By Indian Institute of Technology Guwahati

  • White Papers // May 2011

    An Active Host-Based Intrusion Detection System for ARP-Related Attacks and Its Verification

    Spoofing with falsified IP-MAC pair is the first step in most of the LAN based-attacks. Address Resolution Protocol (ARP) is stateless, which is the main cause that makes spoofing possible. Several network level and host level mechanisms have been proposed to detect and mitigate ARP spoofing but each of them...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Mar 2011

    Stage Staffing Scheme for Copyright Protection in Multimedia

    Copyright protection has become a need in today's world. To achieve a secure copyright protection the authors embedded some information in images and videos and that image or video is called copyright protected. The embedded information can't be detected by human eye but some attacks and operations can tamper that...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2011

    On the Construction of m-Sequences Via Primitive Polynomials With a Fast Identification Method

    The paper provides an in-depth tutorial of mathematical construction of maximal length sequences (m-sequences) via primitive polynomials and how to map the same when implemented in shift registers. It is equally important to check whether a polynomial is primitive or not so as to get proper m-sequences. A fast method...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2011

    An Efficient Load Balancing Architecture for Peer-to-Peer Systems

    Structured peer-to-peer systems like Chord are popular because of their deterministic nature in routing, which bounds the number of messages in finding the desired data. In these systems, DHT abstraction, Heterogeneity in node capabilities and Distribution of queries in the data space leads to load imbalance. The authors present a...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2011

    Caching of Routes in Ad Hoc On-Demand Distance Vector Routing for Mobile Ad Hoc Networks

    Ad hoc networks are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. Recent comparative studies between Ad hoc on demand routing protocols like Ad hoc On demand Distance Vector routing (AODV) and Dynamic Source Routing (DSR) (the two on demand routing...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    MAP Estimation of CFO and STO for a Convolutionally Coded OFDM System

    The authors propose a Maximum A-Posteriori (MAP) based blind algorithm for Carrier Frequency Offset (CFO) and Symbol Timing Offset (STO) estimation, for a convolutionally Coded Orthogonal Frequency Division Multiplexing (COFDM) system, in an Additive White Gaussian Noise (AWGN) channel. They derive the MAP estimators mathematically. It is observed that though...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Channel Capacity of Adaptive Transmission Schemes Using Equal Gain Combining Receiver Over Hoyt Fading Channels

    Closed-form expressions for the channel capacity of an L-branch equal gain combining diversity receiver over Hoyt (Nakagami-q) fading channels is derived for adaptive transmission schemes. To obtain capacity expressions, probability density function of the combiner out put signal-to-noise ratio (SNR) is used. The capacity expressions are given in terms of...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Robust Video Hashing Using the 3D-DWT

    Robust or perceptual hash functions for video extract hashes on the basis of the perceptual contents of videos. Besides being sensitive to content differences in distinct videos, such a hash function should be robust against the content-preserving operations. This paper presents a solution for the hashing of videos at the...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Research and Application of One-Class Small Hypersphere Support Vector Machine for Network Anomaly Detection

    In recent years, machine learning technology often used as a recognition method of anomaly in anomaly detection. In this paper, the authors have proposed a One-class Small Hypersphere Support Vector Machine classifier (OCSHSVM) algorithm, which builds a learning classifier model via both normal and abnormal network traffic. This combination of...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Enhancing the Performance of the Bayesian Pursuit Algorithm

    Finding sparse solutions to under-determined systems of linear equations has recently got a plethora of applications in the field of signal processing. It is assumed that an ideal noiseless signal has sufficiently sparse representation. But in practice a noisy version of such signal can only be observed. In this paper,...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Removal of Random-Valued Impulse Noise Using Sparse Representation

    This paper proposes a novel two-stage denoising method for removing random-valued impulse noise from an image. First, an impulse noise detection scheme is used to detect the pixels which are likely to be corrupted by the impulse noise (called the noise candidates). Then the noise candidates are reconstructed by using...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Multi-Variability Speech Database for Robust Speaker Recognition

    In this paper, the authors present their initial study with the recently collected speech database for developing robust speaker recognition systems in Indian context. The database contains the speech data collected across different sensors, languages, speaking styles, and environments, from 200 speakers. The speech data is collected across five different...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Significance of Speaker Information in Wideband Speech

    In this paper, speech signal having information up to 4 kHz is termed as NarrowBand (NB) speech and the other having information up to 8 kHz is termed as WideBand (WB) speech. The objective is to demonstrate the significance of speaker information present in the WB speech. A Speaker Verification...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Image Denoising Based on Laplace Distribution with Local Parameters in Lapped Transform Domain

    In this paper, the authors present a new image denoising method based on statistical modeling of Lapped Transform (LT) coefficients. The lapped transform coefficients are first rearranged into wavelet like structure, then the rearranged coefficient subband statistics are modeled in a similar way like wavelet coefficients. They propose to model...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Bimodal Biometric Person Authentication Using Speech and Face Under Degraded Condition

    In this paper, the authors present a bimodal biometric system using speech and face features and tested its performance under degraded condition. Speaker Verification (SV) system is built using Mel-Frequency Cepstral Coefficients (MFCC) followed by delta and delta-delta for feature extraction and Gaussian Mixture Model (GMM) for modeling. A Face...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    A Clustering Based Channel Model for Indoor Wireless Communication

    A number of radio channel models based on either geometrical or statistical methods have been proposed in literature. Many such models tend to simplify the scattering environment in indoor radio medium by assuming uniform distribution of scatterers and thereby overestimate the performance of the communication system. In this paper, the...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Stressed Speech Processing: Human Vs Automatic in Non-Professional Speakers Scenario

    This paper analyzes the effect of stress in human and automatic stressed speech processing tasks for speech collected from non-professional speakers. The database of 33 keywords is collected under five stress conditions, namely, neutral, angry, happy, sad and Lombard from fifteen speakers. The first study is to understand the ability...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Authenticating Encrypted Data

    Traditionally Message Authentication Codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper, the authors propose to integrate the two in a framework where the parameterized hash value of...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    A Printed 2.4 GHz/5.8 GHz Dual-Band Monopole Antenna for WLAN and RFID Applications With a Protruding Stub in the Ground Plane

    Design of a simple microstrip fed folded strip monopole antenna with a protruding stub in the ground plane for the application in the WLAN and RFID is presented. The antenna has two resonant paths, one in the radiating element (folded strip) and other in the protruding stub of the ground...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Oct 2010

    Reconstruction of Aggregation Tree in Spite of Faulty Nodes in Wireless Sensor Networks

    Recent advances in Wireless Sensor Networks (WSNs) have led to many new promising applications. However data communication between nodes consumes a large portion of the total energy of WSNs. Consequently efficient data aggregation technique can help greatly to reduce power consumption. Data aggregation has emerged as a basic approach in...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Aug 2010

    An Investigation on Efficient Spreading Codes for Transmitter Based Techniques to Mitigate MAI and ISI in TDD/CDMA Downlink

    The authors investigate efficient spreading codes for transmitter based techniques of Code Division Multiple Access (CDMA) systems. The channel is considered to be known at the transmitter which is usual in a Time Division Duplex (TDD) system where the channel is assumed to be the same on uplink and downlink....

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Aug 2010

    A Fast Adaptive Tomlinson-Harashima Precoder for Indoor Wireless Communications

    A fast adaptive Tomlinson Harashima (T-H) precoder structure is presented for indoor wireless communications, where the channel may vary due to rotation and small movement of the mobile terminal. A frequency-selective slow fading channel which is time-invariant over a frame is assumed. In this adaptive T-H precoder, feedback coefficients are...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Apr 2010

    Little Dragon Two: An Efficient Multivariate Public Key Cryptosystem

    Public key cryptography has several practical applications, for example in e-commerce systems for authentication (electronic signatures) and for secure communication. The most widely used cryptosystems RSA and ECC (elliptic curve cryptosystems) are based on the problems of integer factorisation and discrete logarithm respectively. Integer factorisation and discrete logarithm problems are...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Performance of a L-Branch Predetection EGC Receiver Over Independent Hoyt Fading Channels for M-Ary Coherent and Noncoherent Modulations Using PDF Based Approach

    Performance of a L-branch pre-detection equal gain combining receiver has been analyzed in independent Hoyt fading channels with arbitrary fading parameters applying classical Probability Density Function (PDF) based approach. An approximate but highly accurate PDF of the sum of independent Hoyt random variables has been used for the analysis. Simple...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Modeling of Propagation Characteristics of Non-Linear Transmission Lines With Loss

    Non-linear transmission lines have been widely studied for millimeter and sub-millimeter wave applications based on their capability to generate and propagate solitons. Such lines are usually realized by periodically loading a transmission line with Schottky diodes, or any other voltage dependent capacitors. However the governing equations of these become complex,...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Impact of Multiple UWB Devices on IEEE 802.11a WLAN Systems

    The objective of this paper is to assess the effects of multiple UWB devices emission on the IEEE 802.11a WLAN receiver. The data rates and SINR of WLAN is evaluated with and without the UWB interference. Approximate path loss model is used to calculate the UWB signal power that interferes...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Adaptive Routing for Ad Hoc Wireless Networks Providing QoS Guarantees

    A cluster-based route discovery and dynamic route management protocol for ad hoc networks with inaccurate information for given QoS (Quality of Service) requirements has been proposed and compared with existing routing protocols. The proposed scheme is much more scalable, the route discovery is faster (O(logN)against O(N), N being the number...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    CRESQ: Providing QoS and Security in Ad Hoc Networks

    Ad hoc networks, which have seen drastic increase in their usage scenarios and convergence of different applications' traffic lately, are getting ready to support QoS and secure traffic. Existing protocols for ad hoc networks provide little or no support for QoS and security. Authors present a new routing protocol 'CRESQ'...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Angle and Time of Arrival Statistics for Indoor UWB Communication

    Wireless communication systems require proper understanding of the spatial and temporal characteristics of the propagation channel. This paper presents a geometrical based single bounce model for indoor Ultra WideBand (UWB) communication in which the multipath reflection is accounted by uniform distribution of scatterers placed in the clusters of elliptical region...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Performance of $L$-MRC Receiver over Independent Hoyt Fading Channels

    Performance of a maximal ratio combining receiver has been analyzed in independent Hoyt fading channels for an arbitrary number (L) of branches. Mathematical expressions for the probability density function of the combiner output signal-to-noise ratio, amount of fading, outage probability and the average bit error rate performance for binary, coherent...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Capacity Analysis of Dual -SC and -MRC Systems Over Correlated Nakagami-m Fading Channels With Non-Identical and Arbitrary Fading Parameters

    Closed-form expressions for the capacity of dual branch, Selection Combining (SC) and Maximal-Ratio Combining (MRC) diversity systems operating in correlated Nakagami-m fading channels with non-identical and arbitrary fading parameters have been presented. Different power and rate adaptation techniques available in literature has been considered for the capacity analysis. A study...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Speaker Information From Subband Energies of Linear Prediction Residual

    The objective of this paper is to describe the significant speaker information present in the subband energies of the Linear Prediction (LP) residual. The LP residual mostly contains the excitation source information. The subband energies extracted using the mel filterbank followed by cepstral analysis provides a compact representation. The resulting...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Poly-Dragon: An Efficient Multivariate Public Key Cryptosystem

    In this paper the authors propose an efficient multivariate public key cryptosystem. Public key of the cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables. However, it is possible to reduce the public key size by writing it...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Sep 2009

    A Distributed Algorithm for Hexagonal Topology Formation in Wireless Sensor Networks

    Hexagonal wireless sensor network refers to a network topology where a subset of nodes have six peer neighbors. These nodes form a backbone for multi-hop communications. In a previous work, the authors proposed the use of hexagonal topology in wireless sensor networks and discussed its properties in relation to real-time...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Speaker Information From Subband Energies of Linear Prediction Residual

    The objective of this paper is to describe the significant speaker information present in the subband energies of the Linear Prediction (LP) residual. The LP residual mostly contains the excitation source information. The subband energies extracted using the mel filterbank followed by cepstral analysis provides a compact representation. The resulting...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Modeling of Propagation Characteristics of Non-Linear Transmission Lines With Loss

    Non-linear transmission lines have been widely studied for millimeter and sub-millimeter wave applications based on their capability to generate and propagate solitons. Such lines are usually realized by periodically loading a transmission line with Schottky diodes, or any other voltage dependent capacitors. However the governing equations of these become complex,...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Stressed Speech Processing: Human Vs Automatic in Non-Professional Speakers Scenario

    This paper analyzes the effect of stress in human and automatic stressed speech processing tasks for speech collected from non-professional speakers. The database of 33 keywords is collected under five stress conditions, namely, neutral, angry, happy, sad and Lombard from fifteen speakers. The first study is to understand the ability...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Enhancing the Performance of the Bayesian Pursuit Algorithm

    Finding sparse solutions to under-determined systems of linear equations has recently got a plethora of applications in the field of signal processing. It is assumed that an ideal noiseless signal has sufficiently sparse representation. But in practice a noisy version of such signal can only be observed. In this paper,...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Removal of Random-Valued Impulse Noise Using Sparse Representation

    This paper proposes a novel two-stage denoising method for removing random-valued impulse noise from an image. First, an impulse noise detection scheme is used to detect the pixels which are likely to be corrupted by the impulse noise (called the noise candidates). Then the noise candidates are reconstructed by using...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Image Denoising Based on Laplace Distribution with Local Parameters in Lapped Transform Domain

    In this paper, the authors present a new image denoising method based on statistical modeling of Lapped Transform (LT) coefficients. The lapped transform coefficients are first rearranged into wavelet like structure, then the rearranged coefficient subband statistics are modeled in a similar way like wavelet coefficients. They propose to model...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Oct 2012

    An Adaptive Throughput, Spectral, Energy Efficient and Fair Network Configuration in Pervasive Environment

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Performance of a L-Branch Predetection EGC Receiver Over Independent Hoyt Fading Channels for M-Ary Coherent and Noncoherent Modulations Using PDF Based Approach

    Performance of a L-branch pre-detection equal gain combining receiver has been analyzed in independent Hoyt fading channels with arbitrary fading parameters applying classical Probability Density Function (PDF) based approach. An approximate but highly accurate PDF of the sum of independent Hoyt random variables has been used for the analysis. Simple...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Performance of $L$-MRC Receiver over Independent Hoyt Fading Channels

    Performance of a maximal ratio combining receiver has been analyzed in independent Hoyt fading channels for an arbitrary number (L) of branches. Mathematical expressions for the probability density function of the combiner output signal-to-noise ratio, amount of fading, outage probability and the average bit error rate performance for binary, coherent...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Impact of Multiple UWB Devices on IEEE 802.11a WLAN Systems

    The objective of this paper is to assess the effects of multiple UWB devices emission on the IEEE 802.11a WLAN receiver. The data rates and SINR of WLAN is evaluated with and without the UWB interference. Approximate path loss model is used to calculate the UWB signal power that interferes...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Angle and Time of Arrival Statistics for Indoor UWB Communication

    Wireless communication systems require proper understanding of the spatial and temporal characteristics of the propagation channel. This paper presents a geometrical based single bounce model for indoor Ultra WideBand (UWB) communication in which the multipath reflection is accounted by uniform distribution of scatterers placed in the clusters of elliptical region...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Capacity Analysis of Dual -SC and -MRC Systems Over Correlated Nakagami-m Fading Channels With Non-Identical and Arbitrary Fading Parameters

    Closed-form expressions for the capacity of dual branch, Selection Combining (SC) and Maximal-Ratio Combining (MRC) diversity systems operating in correlated Nakagami-m fading channels with non-identical and arbitrary fading parameters have been presented. Different power and rate adaptation techniques available in literature has been considered for the capacity analysis. A study...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2012

    Load Balancing In-Bound Traffic in Multihomed STUB Autonomous Systems

    In the Internet, with many competing networks each trying to optimise its own bandwidth, a stub network has limited knowledge about user demands, available network resources and routing policies of other networks. This uncertainty makes the task of interdomain traffic engineering for a stub network very challenging. The basic aim...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // May 2012

    Performance Optimization in Single Channel Directional Multi-Interface IEEE 802.11s EDCA Using Beam Prioritization

    Single channel multi-interface IEEE 802.11s Wireless Mesh Network(WMN) is a promising technology for increasing spatial reuse of wireless channel using high gain directional antennas. Use of single channel in WMN is advantageous for providing different services (like community mesh networking, vehicular mesh networking, etc.) by different frequency channels so that...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Channel Capacity of Adaptive Transmission Schemes Using Equal Gain Combining Receiver Over Hoyt Fading Channels

    Closed-form expressions for the channel capacity of an L-branch equal gain combining diversity receiver over Hoyt (Nakagami-q) fading channels is derived for adaptive transmission schemes. To obtain capacity expressions, probability density function of the combiner out put signal-to-noise ratio (SNR) is used. The capacity expressions are given in terms of...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Authenticating Encrypted Data

    Traditionally Message Authentication Codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper, the authors propose to integrate the two in a framework where the parameterized hash value of...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Bimodal Biometric Person Authentication Using Speech and Face Under Degraded Condition

    In this paper, the authors present a bimodal biometric system using speech and face features and tested its performance under degraded condition. Speaker Verification (SV) system is built using Mel-Frequency Cepstral Coefficients (MFCC) followed by delta and delta-delta for feature extraction and Gaussian Mixture Model (GMM) for modeling. A Face...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    A Printed 2.4 GHz/5.8 GHz Dual-Band Monopole Antenna for WLAN and RFID Applications With a Protruding Stub in the Ground Plane

    Design of a simple microstrip fed folded strip monopole antenna with a protruding stub in the ground plane for the application in the WLAN and RFID is presented. The antenna has two resonant paths, one in the radiating element (folded strip) and other in the protruding stub of the ground...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Multi-Variability Speech Database for Robust Speaker Recognition

    In this paper, the authors present their initial study with the recently collected speech database for developing robust speaker recognition systems in Indian context. The database contains the speech data collected across different sensors, languages, speaking styles, and environments, from 200 speakers. The speech data is collected across five different...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    MAP Estimation of CFO and STO for a Convolutionally Coded OFDM System

    The authors propose a Maximum A-Posteriori (MAP) based blind algorithm for Carrier Frequency Offset (CFO) and Symbol Timing Offset (STO) estimation, for a convolutionally Coded Orthogonal Frequency Division Multiplexing (COFDM) system, in an Additive White Gaussian Noise (AWGN) channel. They derive the MAP estimators mathematically. It is observed that though...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Significance of Speaker Information in Wideband Speech

    In this paper, speech signal having information up to 4 kHz is termed as NarrowBand (NB) speech and the other having information up to 8 kHz is termed as WideBand (WB) speech. The objective is to demonstrate the significance of speaker information present in the WB speech. A Speaker Verification...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Robust Video Hashing Using the 3D-DWT

    Robust or perceptual hash functions for video extract hashes on the basis of the perceptual contents of videos. Besides being sensitive to content differences in distinct videos, such a hash function should be robust against the content-preserving operations. This paper presents a solution for the hashing of videos at the...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    Adaptive Routing for Ad Hoc Wireless Networks Providing QoS Guarantees

    A cluster-based route discovery and dynamic route management protocol for ad hoc networks with inaccurate information for given QoS (Quality of Service) requirements has been proposed and compared with existing routing protocols. The proposed scheme is much more scalable, the route discovery is faster (O(logN)against O(N), N being the number...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2010

    CRESQ: Providing QoS and Security in Ad Hoc Networks

    Ad hoc networks, which have seen drastic increase in their usage scenarios and convergence of different applications' traffic lately, are getting ready to support QoS and secure traffic. Existing protocols for ad hoc networks provide little or no support for QoS and security. Authors present a new routing protocol 'CRESQ'...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jun 2009

    Recognition of Isolated Speech Signals Using Simplified Statistical Parameters

    The authors present a novel scheme to recognize isolated speech signals using certain statistical parameters derived from those signals. The determination of the statistical estimates is based on extracted signal information rather than the original signal information in order to reduce the computational complexity. Subtle details of these estimates, after...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Sep 2009

    A Distributed Algorithm for Hexagonal Topology Formation in Wireless Sensor Networks

    Hexagonal wireless sensor network refers to a network topology where a subset of nodes have six peer neighbors. These nodes form a backbone for multi-hop communications. In a previous work, the authors proposed the use of hexagonal topology in wireless sensor networks and discussed its properties in relation to real-time...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Mar 2011

    Stage Staffing Scheme for Copyright Protection in Multimedia

    Copyright protection has become a need in today's world. To achieve a secure copyright protection the authors embedded some information in images and videos and that image or video is called copyright protected. The embedded information can't be detected by human eye but some attacks and operations can tamper that...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Oct 2010

    Reconstruction of Aggregation Tree in Spite of Faulty Nodes in Wireless Sensor Networks

    Recent advances in Wireless Sensor Networks (WSNs) have led to many new promising applications. However data communication between nodes consumes a large portion of the total energy of WSNs. Consequently efficient data aggregation technique can help greatly to reduce power consumption. Data aggregation has emerged as a basic approach in...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Apr 2010

    Little Dragon Two: An Efficient Multivariate Public Key Cryptosystem

    Public key cryptography has several practical applications, for example in e-commerce systems for authentication (electronic signatures) and for secure communication. The most widely used cryptosystems RSA and ECC (elliptic curve cryptosystems) are based on the problems of integer factorisation and discrete logarithm respectively. Integer factorisation and discrete logarithm problems are...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2009

    Poly-Dragon: An Efficient Multivariate Public Key Cryptosystem

    In this paper the authors propose an efficient multivariate public key cryptosystem. Public key of the cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables. However, it is possible to reduce the public key size by writing it...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Aug 2010

    An Investigation on Efficient Spreading Codes for Transmitter Based Techniques to Mitigate MAI and ISI in TDD/CDMA Downlink

    The authors investigate efficient spreading codes for transmitter based techniques of Code Division Multiple Access (CDMA) systems. The channel is considered to be known at the transmitter which is usual in a Time Division Duplex (TDD) system where the channel is assumed to be the same on uplink and downlink....

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Aug 2010

    A Fast Adaptive Tomlinson-Harashima Precoder for Indoor Wireless Communications

    A fast adaptive Tomlinson Harashima (T-H) precoder structure is presented for indoor wireless communications, where the channel may vary due to rotation and small movement of the mobile terminal. A frequency-selective slow fading channel which is time-invariant over a frame is assumed. In this adaptive T-H precoder, feedback coefficients are...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jun 2011

    Pricing Of Average Strike Asian Call Option Using Numerical PDE Methods

    In this paper, a standard PDE for the pricing of arithmetic average strike Asian call option is presented. A Crank-Nicolson Implicit Method and a Higher Order Compact finite difference scheme for this pricing problem are derived. Both these schemes were implemented for various values of risk free rate and volatility....

    Provided By Indian Institute of Technology Guwahati

  • White Papers // May 2011

    An Active Host-Based Intrusion Detection System for ARP-Related Attacks and Its Verification

    Spoofing with falsified IP-MAC pair is the first step in most of the LAN based-attacks. Address Resolution Protocol (ARP) is stateless, which is the main cause that makes spoofing possible. Several network level and host level mechanisms have been proposed to detect and mitigate ARP spoofing but each of them...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2011

    On the Construction of m-Sequences Via Primitive Polynomials With a Fast Identification Method

    The paper provides an in-depth tutorial of mathematical construction of maximal length sequences (m-sequences) via primitive polynomials and how to map the same when implemented in shift registers. It is equally important to check whether a polynomial is primitive or not so as to get proper m-sequences. A fast method...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2011

    An Efficient Load Balancing Architecture for Peer-to-Peer Systems

    Structured peer-to-peer systems like Chord are popular because of their deterministic nature in routing, which bounds the number of messages in finding the desired data. In these systems, DHT abstraction, Heterogeneity in node capabilities and Distribution of queries in the data space leads to load imbalance. The authors present a...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    Research and Application of One-Class Small Hypersphere Support Vector Machine for Network Anomaly Detection

    In recent years, machine learning technology often used as a recognition method of anomaly in anomaly detection. In this paper, the authors have proposed a One-class Small Hypersphere Support Vector Machine classifier (OCSHSVM) algorithm, which builds a learning classifier model via both normal and abnormal network traffic. This combination of...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Dec 2010

    A Clustering Based Channel Model for Indoor Wireless Communication

    A number of radio channel models based on either geometrical or statistical methods have been proposed in literature. Many such models tend to simplify the scattering environment in indoor radio medium by assuming uniform distribution of scatterers and thereby overestimate the performance of the communication system. In this paper, the...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Oct 2011

    Cross Layer Adaptation for QoS in WSN

    In this paper, the authors propose QoS aware MAC protocol for Wireless Sensor networks and its cross layer extension to network layer for providing QoS in delay sensitive WSN scenarios. In WSNs, there can be two types of traffic, one is event driven traffic which requires immediate attention and another...

    Provided By Indian Institute of Technology Guwahati

  • White Papers // Jan 2011

    Caching of Routes in Ad Hoc On-Demand Distance Vector Routing for Mobile Ad Hoc Networks

    Ad hoc networks are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. Recent comparative studies between Ad hoc on demand routing protocols like Ad hoc On demand Distance Vector routing (AODV) and Dynamic Source Routing (DSR) (the two on demand routing...

    Provided By Indian Institute of Technology Guwahati