RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Geographic Routing Protocol : A Review

        Harminder Kaur,Harsukhpreet Singh,Anurag Sharma 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.2

        Mobile Adhoc Networks (MANETs) are the self-organized networks in which connections are not established for exchange the information. In MANET, there are major problems like scalability, dynamic topology, high mobility and routing. The network can be damaged due to the high mobility. Topology based routing can fail when there is a dynamic change in the network topology. To avoid these problems, Geographic routing is used. The geographic routing protocols are more efficient and scalable when there is a dynamic change in the network topology and when the mobility is high. In this paper, we have surveyed on the Hybrid Routing and Geographic routing protocol. The hybrid routing can be done into two ways i.e. greedy routing and face-2 algorithm or perimeter routing.

      • Avoiding Buffer-Overloading in the Wireless Sensor Network

        Rupali saini,Harsukhpreet Singh 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.12

        The main problem of wireless sensor network is congestion occur due to buffer-overloading. Due to this issue, the performances of the network such as network throughput and packet loss are affected. To reduce the buffer-overloading from the WSN a comparative study has been done between AODV and QAODV using queue length buffer-overloading equation. In this paper, we proposed QAODV using queue length buffer-overloading equation through which major cause of congestion, buffer-overloading is reduced from the network.

      • Energy Optimization of Hierarchical Wireless Sensor Networks using RFID Algorithm

        Tarun Sharma,Harsukhpreet Singh,Anurag Sharma 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.6

        Wireless Sensor Network is built of more than a few nodes where each node is linked to one sensor. The main challenging task in this network is lifetime and energy consumption. The LEACH protocol is energy efficient protocol to reduce their energy consumption different modes is applied on the sensor nodes. These modes are sleep, Active and ready mode. These modes are applied on LEACH protocol and this enhancement is called RFID protocol. The main problem exists in RFID protocol is of clock synchronization due which packet loss happened in the network which reduce network performance. To overcome this problem, proposed contention Avoidance Algorithm (RTS /CTS). In this technique cluster, head nodes send RTS packets containing a NONCE feed to all its cluster members. The member nodes would adjust their clocks according to the feed and revert back with CTS packets are synchronization their clocks. The proposed technique has been implemented in Network Simulator. The graphical results show that proposed technique performs batter than LEACH, RFID protocol in terms of throughput, energy and packet loss, Delay and control overhead in the network.

      • Performance Analysis of IEEE 802.15.4/Zigbee Networks Under Route Information Based AODV Routing Algorithm

        Rohit Ranjan,Harsukhpreet Singh,Anurag Sharma 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.12

        In the field of wireless communication, zigbee is a latest technology in wireless network based on IEEE 802.15.4 standard. On IEEE 802.15.4 standard based zigbee network uses low power sensor nodes to ensure reliable, process, collect, and store the data. The sensor nodes have low cost, smaller in memory size and used in lower coverage area first two layers based on IEEE 802.15.4 standard are PHY and MAC layer. Routing protocols are divided in two categories that are reactive protocol and proactive protocol. AODV routing protocol comes under reactive protocol. It creates route between source and destination when needed. When source node has data to transmit to the destination node then it will create RREQ (route request message) and send to all neighbors in the network, when the destination node found or neighbor node found the route to destination then they will generate a RREP (route reply message) and forward back to source node. After the creation of route between source node and destination node they can exchange the data.

      • A Survey on Applications of Adaptive Neuro Fuzzy Inference System

        Navneet Walia,Sharad Kumar,Harsukhpreet Singh 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.11

        In this paper we presented an architecture and basic learning process underlying in fuzzy inference system and adaptive neuro fuzzy inference system which is a hybrid network implemented in framework of adaptive network. In real world computing environment, soft computing techniques including neural network, fuzzy logic algorithms have been widely used to derive an actual decision using given input or output data attributes, ANFIS can construct mapping based on both human knowledge and hybrid learning algorithms. This study involves study of ANFIS strategy ANFIS strategy is employed to model nonlinear functions, to control one of the most important parameters of the induction machine and predict a chaotic time series, all yielding more effective, faster response or settling times.

      • Effective Analysis of Lung Infection using Fuzzy Rules

        Sharad Kumar Tiwari,Navneet Walia,Harsukhpreet Singh,Anurag Sharma 보안공학연구지원센터 2015 International Journal of Bio-Science and Bio-Techn Vol.7 No.6

        Soft Computing is a consortium of methodologies which works synergistically and provides an ability to make decision from reliable data or expert’s experience. Nowadays different types of soft computing techniques such as neural network, fuzzy logic, genetic algorithm and hybrid system are largely used in medical areas. In this paper, algorithm for analysis of lung infection is presented. The main focus is to develop system architecture to find probable disease stage patient may have. Severity level of disease is determined by using rule base method. The algorithm uses output of Rulebase and entered by user to determine level of infection.

      • Performance Enhancement of WDM-PON FTTH Network by Using Decision Feedback and Feed forward Equalizations

        Sooraj Parkash,Anurag Sharma,Manoj Kumar,Harsukhpreet Singh 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.8

        In this paper, Decision Feedback Equalization (DFE) and Feed forward Equalization (FFE)based on minimum mean square error optimization has been employed to improve the performance of 32 channels, gigabit capacity WDM-PON network. An optical line terminal (OLT) installed at the transmitter end which continuous transmit 32 channels having different colors (wavelengths) of 20GB/s data rate , which is multiplexed by optical multiplexer and transmit through standard single mode fiber (SMF) having length 40km. A link design for 1:64 optical splitters is used as Passive Optical Network (PON) element which creates communication between OLT to different end users. It is observed that FFE and DFE significantly reduce BER by 1.0798e-010, 1.1556e-011, 1.2960e-010 and 8.8979e-009 at four different wavelengths 1550nm, 1559.6nm, 1562.8nm and 1574.8nm by using NRZ (non return zero) modulation format at 20GB/s for 64 users having 40km fiber length respectively. Sharp increase in BER 2.6916e-002, 4.6519e-002, 3.8804e-001 and 5.1570e-002 occurs if data rate increases up to 25 GB/s.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼