22 research outputs found

    Performance Analysis of Multiple Access Techniques for LTE system under Symbol Error Rate (SER) Calculation

    Full text link
    In the recent years, so many technologies in multiple access trends have influenced the field of Wireless Sensor Networks in significant ways. Various trends are readily available technology of ubiquitous wireless sensor networks as well as wireless communication networks and progress in the development of two multiple access techniques are compared in this scenario: the OFDMA and SC-FDMA. The OFDMA and SC-FDMA transceivers are modeled and simulated considering both the interleaved and localized subcarriers mapping schemes. WSNs have the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. To prolong the networklsquo;s hop in terms of single and two hop using both techniques should be used in the sensor nodes. The minimization of computing and storage platforms as well as the development of novel micro sensors and sensor materials with high reliability force encourages technology in research on WSN. In this paper, we will proposed the field of multipath routing in wireless sensor networks, and mainly focus on the technology of SER of WSNs

    Literature Survey of Security Enhancement in MANET Routing Protocols of WLANs

    Full text link
    A Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. One of the main issues in such networks is performance- in a dynamically changing topology; the nodes are expected to be power-aware due to the bandwidth constrained network. Another issue in such networks is security - since every node participates in the operation of the network equally, Malicious nodes are difficult to detect. There are several applications of mobile ad hoc networks such as disaster recovery operations, battle field communications, etc. The most active research area under MANET routing protocol is security. MANETs have certain unique characteristics that make them vulnerable to several types of attacks. Since they are deployed an open environment where all nodes co-operate in forwarding the packets in the network, Malicious nodes are difficult to detect

    Formulation and Assessment of an Instant Degrading Film of the Poorly Soluble Medicament Cilnidipine

    Get PDF
    Cilnidipine, also known as dihydropyridine, is a calcium antagonist that has that chemical formula. It does this by blocking L-type calcium channels, which prevents calcium from entering the capillaries. This results in a reduction in blood pressure. When taken orally in tablet form, the medicine has a lower bioavailability than when it is injected. This is because it is less water-soluble. A substance was produced as a result of the combination of PEG 400 and propylene glycol that was neither hard nor sticky in nature. Inclusion complexes that are produced with cyclodextrin contribute to an improvement in the drug\u27s solubility and release. We studied the influence that PEG 400 and propylene glycol would have on the formula by using a factorial arrangement. A 32-full factorial design was utilised in order to attain the maximum level of optimization for the rapidly disintegrating film. In in vitro drug release investigations using PEG 400 and propylene glycol, independent parameters such as pH, thickness, weight uniformity, percent drug content, folding endurance, and disintegration time were examined and analysed

    Study of Photoluminescence Behaviour of Porous Silicon Samples Prepared at 20 mA Current Density

    Get PDF
    The paper presents a study on a series of porous silicon films of various thicknesses, prepared at 20 mA current density using a photoluminescence fitting model to determine the average crystallite size of sphe-rical shaped interconnected silicon quantum dots. Discrepancy in photoluminescence behavior of the samples is well explained with this model. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/3097

    An Unusual Hernia Complication: A Late Presentation

    No full text
    A 67-year-old man presented with a 10-year history of intermittent right iliac fossa pain. His only significant past medical history was an inguinal hernia repair 10 years ago. After investigations, the patient underwent a laparotomy. He had a localised caecal perforation secondary to a misplaced prolene suture. A right hemicolectomy was performed
    corecore