National Institute of Technology Jalandhar

Displaying 1-6 of 6 results

  • White Papers // Oct 2012

    Performance Evaluation of WiMAX Network with AMC and MCCDMA for Mobile Environments

    The WiMAX forum is based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) based adaptive Physical Layer (PHY) layer. In this paper, the performance of WiMAX PHY layer is investigated for two PHY layer modifications, link adaption algorithm (Adaptive Modulation and coding, AMC) and MCCDMA (hybrid OFDM system with multiple access...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Sep 2011

    Investigations on Energy Efficiency for WSN Routing Protocols for Realistic Radio Models

    In this paper, the authors have extended the Prowler simulator by integrating different realistic radio models into it and comparatively analyzed the effect of the channel behavior on the network layer specifically the WSN routing protocols. The simulation results indicate that the CF protocol consumes the highest energy amongst all...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Jul 2011

    Pair-Wise Key Establishment Scheme for Wireless Sensor Network Using LU Matrix

    Wireless sensor networks are use in wide range of applications, such as military, health, scientific, commercial. However, developing sensor network applications is obvious challenging issue, due to extreme resource limitations of nodes, the unreliability of radio communication, and the necessity of low power operation. This paper present pair wise key...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Jun 2011

    Security for Wireless Sensor Network

    Wireless sensor network is highly vulnerable to attacks because it consists of various resource-constrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security...

    Provided By National Institute of Technology Jalandhar

  • White Papers // May 2011

    Heterogeneous Distributed Energy-Efficient Target Supervising Protocol for Wireless Sensor Networks

    In this paper, a heterogeneous distributed energy-efficient target supervising protocol for wireless sensor networks have been reported. Here, the authors have proposed new distributed energy efficient algorithms HADEEPS, based on the scheduling that allow sensor nodes can interchange its state into idle, sleep and active modes. The network lifetime increases...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Aug 2010

    Comparative Investigations and Performance Evaluation for Multiple-Level Association Rules Mining Algorithm

    Various applications of computers, database technologies and automated data collection techniques require large amount of data to be collected into databases. It, therefore, creates great demands for analyzing such data and turning it into useful knowledge. Data mining or Knowledge Discovery in Database (KDD) emerges as a solution to the...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Oct 2012

    Performance Evaluation of WiMAX Network with AMC and MCCDMA for Mobile Environments

    The WiMAX forum is based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) based adaptive Physical Layer (PHY) layer. In this paper, the performance of WiMAX PHY layer is investigated for two PHY layer modifications, link adaption algorithm (Adaptive Modulation and coding, AMC) and MCCDMA (hybrid OFDM system with multiple access...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Jun 2011

    Security for Wireless Sensor Network

    Wireless sensor network is highly vulnerable to attacks because it consists of various resource-constrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Jul 2011

    Pair-Wise Key Establishment Scheme for Wireless Sensor Network Using LU Matrix

    Wireless sensor networks are use in wide range of applications, such as military, health, scientific, commercial. However, developing sensor network applications is obvious challenging issue, due to extreme resource limitations of nodes, the unreliability of radio communication, and the necessity of low power operation. This paper present pair wise key...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Sep 2011

    Investigations on Energy Efficiency for WSN Routing Protocols for Realistic Radio Models

    In this paper, the authors have extended the Prowler simulator by integrating different realistic radio models into it and comparatively analyzed the effect of the channel behavior on the network layer specifically the WSN routing protocols. The simulation results indicate that the CF protocol consumes the highest energy amongst all...

    Provided By National Institute of Technology Jalandhar

  • White Papers // May 2011

    Heterogeneous Distributed Energy-Efficient Target Supervising Protocol for Wireless Sensor Networks

    In this paper, a heterogeneous distributed energy-efficient target supervising protocol for wireless sensor networks have been reported. Here, the authors have proposed new distributed energy efficient algorithms HADEEPS, based on the scheduling that allow sensor nodes can interchange its state into idle, sleep and active modes. The network lifetime increases...

    Provided By National Institute of Technology Jalandhar

  • White Papers // Aug 2010

    Comparative Investigations and Performance Evaluation for Multiple-Level Association Rules Mining Algorithm

    Various applications of computers, database technologies and automated data collection techniques require large amount of data to be collected into databases. It, therefore, creates great demands for analyzing such data and turning it into useful knowledge. Data mining or Knowledge Discovery in Database (KDD) emerges as a solution to the...

    Provided By National Institute of Technology Jalandhar