963 research outputs found

    Analyzing the Reduced Required BS Density due to CoMP in Cellular Networks

    Full text link
    In this paper we investigate the benefit of base station (BS) cooperation in the uplink of coordinated multi-point (CoMP) networks. Our figure of merit is the required BS density required to meet a chosen rate coverage. Our model assumes a 2-D network of BSs on a regular hexagonal lattice in which path loss, lognormal shadowing and Rayleigh fading affect the signal received from users. Accurate closed-form expressions are first presented for the sum-rate coverage probability and ergodic sum-rate at each point of the cooperation region. Then, for a chosen quality of user rate, the required density of BS is derived based on the minimum value of rate coverage probability in the cooperation region. The approach guarantees that the achievable rate in the entire coverage region is above a target rate with chosen probability. The formulation allows comparison between different orders of BS cooperation, quantifying the reduced required BS density from higher orders of cooperation.Comment: Accepted for presentation in IEEE Globecom Conf., to be held in Atlanta, USA, Dec. 2013. arXiv admin note: text overlap with arXiv:1302.159

    DC Electrical Resistivity Studies in bulk YBCO/Ag composites

    Get PDF
    Bulk YBCO sample is prepared using chemical route method. Ag is used as composite because of its advantageous properties. The samples are characterized by the vs T measurement performed by FOUR PROBE METHOD. Data are collected by automatic programming and analyzed for the behaviour. SEM is done to study the grain morphology. It is found that by increase in the weight percentage of Ag in the composite sample the transition temperature decreases slightly. From SEM images, it is observed that the grains become smaller in sizes as compared to prestine

    Reforming History: Turkey’s Legal Regime and Its Potential Accession to the European Union

    Get PDF
    For the past decade, Turkey and the European Union (EU) have had serious discussions about Turkey\u27s possible entrance into the EU. The intensity of these talks, however, has always been tempered by Turkey\u27s extremely questionable human rights practices. The most marked aspects of this record are the country\u27s treatment of the Kurdish minority and its quashing of political dissent through the heavyhanded use of its legal system. In this note, I will argue that, despite Turkey\u27s increasing political and economic stature in the world, it will not be able to gain entry into the EU until it is able to sufficiently address these human rights problems to the satisfaction of the EU and the international community in general

    An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication

    Full text link
    Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required. Reduced operation in multiplication will increase the functional speed of ECC arithmetic. These goals can be achieved using ancient multiplication algorithm namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16 Vedic mathematics Sutras (algorithms). Nikhilam Sutra is efficient for multiplying two large decimal numbers. The Sutra reduces multiplication of two large numbers into two smaller numbers multiplication. The functional speed of Elliptic Curve Cryptography can be increased using Nikhilam method for scalar multiplication

    DNA Encoded Elliptic Curve Cryptography System for IoT Security

    Full text link
    In the field of Computer Science and Information Technology Internet of Things (IoT) is one of the emerging technologies. In IoT environment several devices are interconnected and transmit data among them. There may be some security vulnerability arise within the IoT environment. Till date, IoT has not been widely accepted due to its security flaws. Hence to keep the IoT environment most robust, we propose a stable security framework of IoT with Elliptic Curve Cryptography (ECC) using DNA Encoding. The ECC is most lightweight cryptography technique among other well known public key cryptography techniques. To increase encryption complexity, DNA encoding mechanism of DNA computing with ECC is preceded

    Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network

    Full text link
    Potential capacity of processors is enhancing rapidly which leads to the increase of computational ability of the adversary. As a result, the required key size for conventional encryption techniques is growing everyday for complex unbreakable security communication systems. The Public Key Cryptography (PKC) techniques which use larger keys cannot be fitted in tiny resource constrained Wireless of Things (WoT) devices. Some Symmetric Key Cryptosystems (SKC) use smaller keys, which can be fitted in the tiny devices. But in large networks where the number of nodes is in the order of 103, the memory constraint does not allow the system to do so. The existing secure data communication in insecure medium uses various conventional encryption methods like Public Key Cryptography (PKC) and Symmetric Key Cryptosystems (SKC). Generally, modern encryption methods need huge processing power, memory and time. Also in some cases, Key Pre-distribution System (KPS) is used among different communicating devices. With the growing need for larger key size in the conventional secure communication system, the existing resources in the communicating devices suffer from resource starvation. Hence, the need of a novel mechanism for secure communication is inevitable. But the existing secure communication mechanisms like PKC, SKC or KPS do not ensure elimination of resource starvation issue in tiny devices during communication. In these existing conventional mechanisms, the plain text is generally converted into cipher text with greater size than the plain text at the device level, which leads to resource starvation. At the time of transmission, the cipher text at the device end requires more bandwidth than the plain text which puts bandwidth overhead on the broadcast channel (BC)

    A Study on the Mainstream’s Gaze in the Works from Margin

    Get PDF
    The imagery of ‘eyeing’,’ gazing’ and ‘re-visioning’ recurrently occur in the works of the writers who belong to the marginalized (in terms of race, sex, and class) communities. They examine their images in American literature and society as well and feel to re-construct identy that has so far been constructed in the ‘gaze’ of the mainstream. Their essential selves have been castrated and essentialized within some stereotypes by the racist and phallocentric culture. So, after a long period of subjugation, they look back afresh with a view to gain sovereignty over their own sense of identity. This paper seeks to study those marginalized writers’ view over the gazing proceess of the dominant groups. To persue the study I have concentrated upon some works by the writers who belong to the marginalized communities in America. These are the novels, The Native Son (1940) by Richard Wright and The Bluest Eye (1970) by Tony Morrison, and some poems of Adrienne Rich. In their writings, each writer has explored the functioning of the mechanism of ‘gaze’ leading to the internalization of the hegemonic ideology and inferiority. Thus, they dismantle the dominant ‘gaze’ and reconstruct identity in a fictional world which result in en-visioning  a new world to come. Keywords: Gaze, Revision and Reconstruction of Identity, Mainstream, Marginalized in terms of Race and Sex, Ideology
    corecore