

Comparing PSWF, Hermite Pulses For High Speed Communication Using N-PSM |
Pages: 90-95 (6) | [Full Text] PDF (497 KB) |
P JADHAV, J GOMES |
St. Francis Institute of Technology Mumbai, Department of Electronics and TelecommunicationN-PSM Technique, Transceiver, PSWF, Hermite, Correlation |
Abstract - Wireless technologies provide quick and easy access to information. Data rate/throughput is very important for multimedia communication. High-speed communication is recently achieved by using technologies such as UWB, OFDM etc. N-Dimensional Pulse Shape Modulation (N-PSM) is one of the modulation technique used to achieve high data rate based on the family of orthogonal pulses e.g. Prolate Spheroidal Wave Function (PSWF) and Hermite waveforms. Transceiver system based on N-PSM using PSWF and Hermite has been implemented in MATLAB and compared in this paper. Performance evaluation of the N-PSM is carried out over Additive White Gaussian Noise (AWGN) channel for different values of N to measure Bit Error Rate (BER). It has been found that a combination of PSWF and Hermite pulses can be used for high-speed modulation if these pulses are orthogonal to each other since both the types of pulses achieve same bit error rate over AWGN. |
Index Terms - N-PSM Technique, Transceiver, PSWF, Hermite, Correlation |
C itation - P JADHAV, J GOMES. "Comparing PSWF, Hermite Pulses For High Speed Communication Using N-PSM." International Journal of Computer Networks and Communications Security 5, no. 5 (2017): 90-95. |
Security issues in Protocols of TCP/IP Model at Layers Level |
Pages: 96-104 (9) | [Full Text] PDF (607 KB) |
AM Alotaibi, BF Alrashidi, S Naz, Z Parveen |
University of Hail, Department of Computer Science, Hail, Saudi Arabia |
Abstract - It is widely recognized that data security has become of critical importance for most organizations. This paper gives an overview of the security issues in the Transmission Control Protocol (TCP)/Internet Protocol (IP) model, specifically the protocol of each layer. The paper defines the functionality of each layer in TCP/IP model within the popular protocol for each. Then it investigates each protocol attack by covering their purposes and how they work. Overall, the objective of this research is to conclude which layer and protocol have become the biggest issues in TCP/IP layers. |
Index Terms - Network Security, TCP/IP Models, Security Threats, Data Protection, Internet Protocol, Flood |
C itation - AM Alotaibi, BF Alrashidi, S Naz, Z Parveen. "Security issues in Protocols of TCP/IP Model at Layers Level." International Journal of Computer Networks and Communications Security 5, no. 5 (2017): 96-104. |
Adaptive Scheme for Outliers Detection in Wireless Sensor Networks |
Pages: 105-114 (10) | [Full Text] PDF (763 KB) |
BO Yenke, M Aboubakar, C Titouna, AAA Ari, AM Gueroui |
LASE Laboratory, University of Ngaoundere, CAMEROONLI-PaRAD Laboratory, Universite Paris Saclay, University of Versailles Saintt-Quentin-en-Yvelines, FRANCEDepartment of Computer Science, Faculty of Mathematics and Computer Science, University of Batna 2, ALGERIADepartment of Mathematics and Computer Science, Faculty of Science, University of Maroua, CAMEROON |
Abstract - Nowadays, Wireless Sensor Networks (WSNs) have become a way of information gathering and monitoring. These particular kinds of ad hoc networks find applications in various fields such as healthcare, army and environment, etc. However, WSNs are subjected to a number of faults, either due to the worst communication links, the hostile environment in which they are deployed or due to energy constraints. Thereby, to ensure the Quality of Service (QoS) in such networks, it is important that WSNs become capable of detecting and recovering erroneous data. In this way, many outlier detection techniques have been proposed. These techniques are based on information theory, statistics and other techniques. The Nearest Neighbour Search is one of these techniques. It uses the Euclidean or Mahalanobis distance for detecting outliers in a given sensor networks. In this paper, we proposed a distributed adaptive approach for the detection of outliers. The proposed approach is based on Euclidean or Mahalanobis distance, depending on the size of the data collected. Extensive experiments have been conducted and the results confirmed the effectiveness of the proposal. |
Index Terms - Wireless Sensor Networks, Outlier Detection, Mahalanobis Distance, Eucidean Distance, Fault Tolerance |
C itation - BO Yenke, M Aboubakar, C Titouna, AAA Ari, AM Gueroui. "Adaptive Scheme for Outliers Detection in Wireless Sensor Networks." International Journal of Computer Networks and Communications Security 5, no. 5 (2017): 105-114. |