SEARCH

Found 5346 related files. Current in page 1

macam macam access point wireless

Evaluating the Enhancing Capacity of Multiple Carrier  Code Division Multiple Access (Mc-Cdma) Syste

In Communication system, the system capacity and performance are adversely affected and degraded by interference. Hence, power control plays a prominent role in an interference-limited system, which increases the efficiency by mitigating the adjacent and co-Channel interference in the system. In this paper, primarily power control is said to be used in maintaining the acceptable Carrier to Interference Ratio (CIR) by meeting some Quality of service (QoS) requirements Objective function that is defined as maximum channel capacity in a power constraint scenario. The signals in a radio channel undergo different propagation effects like reflection, refraction, scattering and shadowing. Hence, the distribution of users across subcarrier groups as well as their transmission powers within a given cell has a significant effect on how users and power are accordingly distributed elsewhere in the network to maximize the capacity of the system thereby enhancing its performance

Improving Wireless Sensor Network Performance Using  BigData and Clustering Approach

Well-organized big data get together in the densely distributed sensor networks is, therefore, a challenging research area. One of the most effective solutions to address this challenge is to utilize the sink node’s mobility to facilitate the data gathering. While this technique can reduce energy consumption of the sensor nodes, the use of mobile sink presents additional Challenges such as determining the sink node’s trajectory and cluster formation prior to data collection. In this paper, we propose a new mobile sink routing and data gathering method through network clustering based on modified ExpectationMaximization (EM) technique. In addition, we derive an optimal number of clusters to minimize the energy consumption. The effectiveness of our proposal is verified through numerical results.

Solar power for Wireless Sensor Networks in  Environment Monitoring Applications-A Review

Routing in Wireless Sensor Networks has to take into account the limited battery resources of the nodes. Sensor nodes can also be powered by other energy sources like solar energy. This paper provides a review of Environment monitoring using Wireless Sensor Networks. The issues related to environment sensor networks is highlighted. The real time applications in environment monitoring is presented with emphasis on energy conservation. Furthermore in this paper we address the problem of scavenging energy using solar powered devices.

Influence of Peer in Purchase Decision Making of     Smart Phone: A Study Conducted in Coimbatore

This article discussing about recently launched Google Android platform, and its online application marketplace for Android smart phones. The project examines the paths to success for third-party developers building applications for Android smart phones by comparing them with application development for the Apple iPhone and factors that influencing mobile brand selection while purchasing new mobiles. Research on related topics shows this mobile ecosystem benefits thirdparty developers and those application vendors play a critical role in contributing to the success of Android. In the current scenario most of the youngsters having Android smart phones in their hands, the reason for this development in a short period is usage social media such as face book, twitter and all other applications. Android platforms are simplified the use of social medias and access of it. In this article we can know further about this Android platform and its influence of peer purchase decision

Data Control Model for Secure Access of Customer  Information

This study was conducted with the aim of investigating how access control would secure customer information in Kenya. This study was guided by the set out objectives: first to determine how data control mechanisms enhance security access, secondly to investigate the security issues on access of customer information and thirdly to develop Secure Data Access Control (SEDAC) model. In achieving these objectives a self administered questionnaire was developed and distributed to randomly selected respondents. The findings of the study were analyzed using SPSS. The Security Data Access Control (SEDAC) model was developed for and recommended for adoption by the end users as a guide to enlighten the novice worker who constitutes a large number of the work force.

Rapidsoft Systems Mobile Application Development Organization

Rapidsoft Systems has extensive domain knowledge when it comes to wireless and mobile application solutions. We like to build smart phone applications for cellular operators and handset manufacturers, game developers, as well as ring tone developers. We develop solutions using J2ME, Brew, iPhone, Palm Pre, Windows Mobile, Flashlite and Symbian platforms, that allow rapid deployment and sophisticated user functionality. We are one of the few mobile software development companies that can work across all major mobile platforms available today.

Review on Basic Clustering Techniques for  Heterogeneous Wireless Sensor Networks

Clustering technique is the basic technique used in the wireless sensor network to enhance the lifetime of a sensor network by mitigating energy consumption and provide efficiency, scalability, and security. Formerly sensor nodes are considered to be homogeneous in which each node has the same processing capacity, energy and functionality, but to prolong network lifetime researches has been evolved to infuse heterogeneity in wireless sensor network such as to provide different energy level to some nodes. In this paper, we present a survey on basic clustering techniques for Heterogeneous wireless sensor networks.

Efficient Majority Logic Fault Detection in Memory  Applications with Difference-Set Codes

Even a small transition delays and little faults create major concern in digital circuits. It Produce greater impact on not only for simple memory but also for most of the memory applications. This paper presents an error-detection method for difference-set cyclic codes with majority logic decoding. Majority logic decodable codes are suitable for memory applications due to their capability to correct a large number of errors. However, they require a large decoding time that impacts memory performance. The proposed fault-detection method significantly reduces memory access time when there is no error in the data read. The technique uses the majority logic decoder itself to detect failures, which makes the area overhead minimal and keeps the extra power consumption low. The proposed method detects the occurrences of single error, double error ,triple error in the received code words obtained from the memory system.

The Stacked Semi-Groups and Fuzzy Stacked Systems on  Transportation Models

This paper touched the concept of a new system of abstract algebra .Where we relied on a set of semi order, and the stack of elements in the form of a matrix. We proved that this system is a semi-group, after providing the fuzzy system to the system, and access to the algebraic operations determine the significance of any element in the set and reliance on the location element in the set . Identify new methods to resolve the issues of transportation models in Operations Research.

Simulation of Different Routing Protocols in MANET  Using NS2

Mobile Ad hoc Network (MANETs) is an infrastructure – less network which is created by deploying the mobile nodes carrying wireless devices, able to route the data through multi hop fashion. MANETs uses distributed routing approach. In this paper, analysis of different classification of routing protocols such as: Reactive (AODV, DSR) Proactive (DSDV) and Hybrid protocols ZRP (Zone Routing Protocols) has been done using NS2 simulator. The above work analysis has been done on the following QoS parameters such as: Packet Delivery Ratio, Average Throughput, Routing Overhead and Average Delay

« previous  123456789