In cognitive radio systems, the secondary user senses a spectrum band formally allocated to the primary user and utilizes free spectrum bands or white spaces for its transmissions. In this paper, the effect of secondary service optimal power allocation on cognitive radio systems has been investigated. They have formulated and ...Download Now
Quantum Key Distribution (QKD) is a secure key distribution technology, which provides information theoretic or unconditional security. BBN DARPA quantum network and SECOQC network of secrets are the examples of such networks. Research is also in progress for the integration of QKD with the protocols in different layers of OSI ...Download Now
Modern informal learning models require linking experiences in the training environments with experiences in the real-world. However, data about real-world experiences is notoriously hard to collect. Social spaces bring new opportunities to tackle this challenge, supplying digital traces where people talk about their real-world experiences, which can become valuable resource, ...Download Now
Security is a selective project that is typically understood, produced and expressed in terms of differentiation and exclusion; it is rarely for all. This is notably so in post-conflict cities such as Baghdad and Basra, where the principal political weapons are coercion and intimidation, territoriality is a significant facet of ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?