31 research outputs found

    Advancements of MultiRate Signal processing for Wireless Communication Networks: Current State Of the Art

    Get PDF
    With the hasty growth of internet contact and voice and information centric communications, many contact technologies have been urbanized to meet the stringent insist of high speed information transmission and viaduct the wide bandwidth gap among ever-increasing high-data-rate core system and bandwidth-hungry end-user complex. To make efficient consumption of the limited bandwidth of obtainable access routes and cope with the difficult channel environment, several standards have been projected for a variety of broadband access scheme over different access situation (twisted pairs, coaxial cables, optical fibers, and unchanging or mobile wireless admittance). These access situations may create dissimilar channel impairments and utter unique sets of signal dispensation algorithms and techniques to combat precise impairments. In the intended and implementation sphere of those systems, many research issues arise. In this paper we present advancements of multi-rate indication processing methodologies that are aggravated by this design trend. The thesis covers the contemporary confirmation of the current literature on intrusion suppression using multi-rate indication in wireless communiquE9; networks

    Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature

    Get PDF
    Cognitive radio (CR) has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands. A prerequisite to this secondary access is having no interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection is an engaging method due to its simplicity and efficiency. However, the major disadvantage of energy detection is the hidden node problem, in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band. Cooperative spectrum sensing (CSS) which uses a distributed detection model has been considered to overcome that problem. On other dimension of this cooperative spectrum sensing, this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing. As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence/absence of a PU signal, malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs. Then, the effect of erroneous sensing results propagates to the entire CRN. This type of attacks can be easily launched since the openness of programmable software defined radio (SDR) devices makes it easy for (malicious or compromised) SUs to access low layer protocol stacks, such as PHY and MAC. However, detecting such attacks is challenging due to the lack of coordination between PUs and SUs, and unpredictability in wireless channel signal propagation, thus calling for efficient mechanisms to protect CRNs. Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios

    Multi-Channel Scheduling with Optimal Spectrum Channel Hole Filling (MCS-OSHF) for Cognitive Radio Wireless Networks

    Get PDF
    In this study, a contemporary method of scheduling algorithm has been proposed for working on scheduling of varying size data-frames transmission in CR based wireless networks. The objective of the proposed model is to achieve maximum throughput, and also reduction of loss of dataframes in the transmission. Some of the key elements that are considered in the development of the model are optimal bandwidth and idle channel availability. Using the three level hierarchical approach, the scheduling strategy is constructed. The optimal idle channel allocation, allocation with considerable transmission intervals allocation and optimal multiple channels models are considered at respective levels in the hierarchy in the proposed algorithm. The proposed model while tested under simulated environment in comparison to the other two bench marking models, the outcome depicts that the process is more efficient and supports in improving the overall process of scheduling of data-frames as per the desired objectives of the model

    A NOVEL APPROACH FOR REDUCTION OF HUFFMAN COST TABLE IN IMAGE COMPRESSION

    Get PDF
    Huffman codes are being widely used as a very efficient technique for compressing image. To achieve a high compressing ratio, the cost table need to be reduced. A new approach has been defined which reduces the cost table of the traditional Huffman Algorithm. This paper presents a minor modification to the Huffman coding of the binary Huffman compression algorithm. A study and implementation of the traditional Huffman algorithm is studied. In this paper a new methodology has been proposed for the reduction of the cost table for the image compression using Huffman coding Technique. Compared with the traditional Huffman coding the proposed method yields the best results in the generation of cost tables. The advantages of new binary Huffman table are that the space requirement and time required to transmit the image is reduced significantly

    Multiple Frequencies Sequential Coding for SSVEP-Based Brain-Computer Interface

    Get PDF
    BACKGROUND: Steady-state visual evoked potential (SSVEP)-based brain-computer interface (BCI) has become one of the most promising modalities for a practical noninvasive BCI system. Owing to both the limitation of refresh rate of liquid crystal display (LCD) or cathode ray tube (CRT) monitor, and the specific physiological response property that only a very small number of stimuli at certain frequencies could evoke strong SSVEPs, the available frequencies for SSVEP stimuli are limited. Therefore, it may not be enough to code multiple targets with the traditional frequencies coding protocols, which poses a big challenge for the design of a practical SSVEP-based BCI. This study aimed to provide an innovative coding method to tackle this problem. METHODOLOGY/PRINCIPAL FINDINGS: In this study, we present a novel protocol termed multiple frequencies sequential coding (MFSC) for SSVEP-based BCI. In MFSC, multiple frequencies are sequentially used in each cycle to code the targets. To fulfill the sequential coding, each cycle is divided into several coding epochs, and during each epoch, certain frequency is used. Obviously, different frequencies or the same frequency can be presented in the coding epochs, and the different epoch sequence corresponds to the different targets. To show the feasibility of MFSC, we used two frequencies to realize four targets and carried on an offline experiment. The current study shows that: 1) MFSC is feasible and efficient; 2) the performance of SSVEP-based BCI based on MFSC can be comparable to some existed systems. CONCLUSIONS/SIGNIFICANCE: The proposed protocol could potentially implement much more targets with the limited available frequencies compared with the traditional frequencies coding protocol. The efficiency of the new protocol was confirmed by real data experiment. We propose that the SSVEP-based BCI under MFSC might be a promising choice in the future

    Differential requirements for Tousled-like kinases 1 and 2 in mammalian development

    Get PDF
    The regulation of chromatin structure is critical for a wide range of essential cellular processes. The Tousled-like kinases, TLK1 and TLK2, regulate ASF1, a histone H3/H4 chaperone, and likely other substrates, and their activity has been implicated in transcription, DNA replication, DNA repair, RNA interference, cell cycle progression, viral latency, chromosome segregation and mitosis. However, little is known about the functions of TLK activity in vivo or the relative functions of the highly similar TLK1 and TLK2 in any cell type. To begin to address this, we have generated Tlk1- and Tlk2-deficient mice. We found that while TLK1 was dispensable for murine viability, TLK2 loss led to late embryonic lethality because of placental failure. TLK2 was required for normal trophoblast differentiation and the phosphorylation of ASF1 was reduced in placentas lacking TLK2. Conditional bypass of the placental phenotype allowed the generation of apparently healthy Tlk2-deficient mice, while only the depletion of both TLK1 and TLK2 led to extensive genomic instability, indicating that both activities contribute to genome maintenance. Our data identifies a specific role for TLK2 in placental function during mammalian development and suggests that TLK1 and TLK2 have largely redundant roles in genome maintenance
    corecore