963 research outputs found
Analyzing the Reduced Required BS Density due to CoMP in Cellular Networks
In this paper we investigate the benefit of base station (BS) cooperation in
the uplink of coordinated multi-point (CoMP) networks. Our figure of merit is
the required BS density required to meet a chosen rate coverage. Our model
assumes a 2-D network of BSs on a regular hexagonal lattice in which path loss,
lognormal shadowing and Rayleigh fading affect the signal received from users.
Accurate closed-form expressions are first presented for the sum-rate coverage
probability and ergodic sum-rate at each point of the cooperation region. Then,
for a chosen quality of user rate, the required density of BS is derived based
on the minimum value of rate coverage probability in the cooperation region.
The approach guarantees that the achievable rate in the entire coverage region
is above a target rate with chosen probability. The formulation allows
comparison between different orders of BS cooperation, quantifying the reduced
required BS density from higher orders of cooperation.Comment: Accepted for presentation in IEEE Globecom Conf., to be held in
Atlanta, USA, Dec. 2013. arXiv admin note: text overlap with arXiv:1302.159
DC Electrical Resistivity Studies in bulk YBCO/Ag composites
Bulk YBCO sample is prepared using chemical route method. Ag is used as composite because of its advantageous properties. The samples are characterized by the vs T measurement performed by FOUR PROBE METHOD. Data are collected by automatic programming and analyzed for the behaviour. SEM is done to study the grain morphology. It is found that by increase in the weight percentage of Ag in the composite sample the transition temperature decreases slightly. From SEM images, it is observed that the grains become smaller in sizes as compared to prestine
Reforming History: Turkey’s Legal Regime and Its Potential Accession to the European Union
For the past decade, Turkey and the European Union (EU) have had serious discussions about Turkey\u27s possible entrance into the EU. The intensity of these talks, however, has always been tempered by Turkey\u27s extremely questionable human rights practices. The most marked aspects of this record are the country\u27s treatment of the Kurdish minority and its quashing of political dissent through the heavyhanded use of its legal system. In this note, I will argue that, despite Turkey\u27s increasing political and economic stature in the world, it will not be able to gain entry into the EU until it is able to sufficiently address these human rights problems to the satisfaction of the EU and the international community in general
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
Multiplication is one of the most important operation in Elliptic Curve
Cryptography (ECC) arithmetic. For point addition and point doubling in ECC
scalar (integer) multiplication is required. In higher order classical
(standard) multiplication many intermediate operations are required. Reduced
operation in multiplication will increase the functional speed of ECC
arithmetic. These goals can be achieved using ancient multiplication algorithm
namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16
Vedic mathematics Sutras (algorithms). Nikhilam Sutra is efficient for
multiplying two large decimal numbers. The Sutra reduces multiplication of two
large numbers into two smaller numbers multiplication. The functional speed of
Elliptic Curve Cryptography can be increased using Nikhilam method for scalar
multiplication
DNA Encoded Elliptic Curve Cryptography System for IoT Security
In the field of Computer Science and Information Technology Internet of
Things (IoT) is one of the emerging technologies. In IoT environment several
devices are interconnected and transmit data among them. There may be some
security vulnerability arise within the IoT environment. Till date, IoT has not
been widely accepted due to its security flaws. Hence to keep the IoT
environment most robust, we propose a stable security framework of IoT with
Elliptic Curve Cryptography (ECC) using DNA Encoding. The ECC is most
lightweight cryptography technique among other well known public key
cryptography techniques. To increase encryption complexity, DNA encoding
mechanism of DNA computing with ECC is preceded
Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network
Potential capacity of processors is enhancing rapidly which leads to the
increase of computational ability of the adversary. As a result, the required
key size for conventional encryption techniques is growing everyday for complex
unbreakable security communication systems. The Public Key Cryptography (PKC)
techniques which use larger keys cannot be fitted in tiny resource constrained
Wireless of Things (WoT) devices. Some Symmetric Key Cryptosystems (SKC) use
smaller keys, which can be fitted in the tiny devices. But in large networks
where the number of nodes is in the order of 103, the memory constraint does
not allow the system to do so. The existing secure data communication in
insecure medium uses various conventional encryption methods like Public Key
Cryptography (PKC) and Symmetric Key Cryptosystems (SKC). Generally, modern
encryption methods need huge processing power, memory and time. Also in some
cases, Key Pre-distribution System (KPS) is used among different communicating
devices. With the growing need for larger key size in the conventional secure
communication system, the existing resources in the communicating devices
suffer from resource starvation. Hence, the need of a novel mechanism for
secure communication is inevitable. But the existing secure communication
mechanisms like PKC, SKC or KPS do not ensure elimination of resource
starvation issue in tiny devices during communication. In these existing
conventional mechanisms, the plain text is generally converted into cipher text
with greater size than the plain text at the device level, which leads to
resource starvation. At the time of transmission, the cipher text at the device
end requires more bandwidth than the plain text which puts bandwidth overhead
on the broadcast channel (BC)
A Study on the Mainstream’s Gaze in the Works from Margin
The imagery of ‘eyeing’,’ gazing’ and ‘re-visioning’ recurrently occur in the works of the writers who belong to the marginalized (in terms of race, sex, and class) communities. They examine their images in American literature and society as well and feel to re-construct identy that has so far been constructed in the ‘gaze’ of the mainstream. Their essential selves have been castrated and essentialized within some stereotypes by the racist and phallocentric culture. So, after a long period of subjugation, they look back afresh with a view to gain sovereignty over their own sense of identity. This paper seeks to study those marginalized writers’ view over the gazing proceess of the dominant groups. To persue the study I have concentrated upon some works by the writers who belong to the marginalized communities in America. These are the novels, The Native Son (1940) by Richard Wright and The Bluest Eye (1970) by Tony Morrison, and some poems of Adrienne Rich. In their writings, each writer has explored the functioning of the mechanism of ‘gaze’ leading to the internalization of the hegemonic ideology and inferiority. Thus, they dismantle the dominant ‘gaze’ and reconstruct identity in a fictional world which result in en-visioning a new world to come. Keywords: Gaze, Revision and Reconstruction of Identity, Mainstream, Marginalized in terms of Race and Sex, Ideology
- …