Series-1 (July-August 2019)July-August 2019 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Reduction Efficient Relay Assisted D2D Networks in mmwave Technology |
| Country | : | India |
| Authors | : | Subin B. Michael || Shiras S. N. |
| : | 10.9790/2834-1404010112 ![]() |
Abstract: Device-to-device (D2D) communication, which can offload data from base stations by direct transmission between mobile devices, is a promising technology for the fifth generation (5G) wireless networks. However, the limited battery capacity of mobile devices is a barrier to fully exploit the benefits of D2D communication. Meanwhile, high data rate D2D communication is required to support the increasing traffic demand of emerging applications. Relay-assisted D2D communication in millimeter wave (mmWave) based 5G networks to address these issues.To design an efficient relay selection and power allocation scheme, formulate a multi-objective combinatorial optimization problem, which balances the trade-off between total transmit power and system throughput. The problem...........
[1]. Bojiang Ma, Hamed Shah-Mansouri and Vincent W.S. Wong, IEEE "Full-duplex Relaying for D2D Communication mmWave based 5G Networks".IEEE Transaction July 2018.
[2]. G. Fodor et al., "Design aspects of network assisted device-to-device communications," IEEE Commun. Mag., vol. 50, no. 3, pp. 170– 177,Mar. 2012.
[3]. C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, "Resource sharing optimization for device-to-device communication underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2752–2763, Aug. 2011.
[4]. C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, "Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks," in Proc. IEEE Global Commun. Conf., Anaheim, CA, USA, Dec. 2012, pp. 4542–4547.
[5]. K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, "Device-to device communication as an underlay to LTE-advanced networks," IEEE Communications Magazine Volume: 47 , Issue: 12 , Dec. 2009.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Arduino Mega based PET Feeding Automation |
| Country | : | India |
| Authors | : | B. Ravi Babu || P. Pavan Kumar || Dr. P. G. Kuppusamy |
| : | 10.9790/2834-1404011316 ![]() |
Abstract: Keeping pets takes many commitments. This includes keeping them company, showing your concerns and of course, feeding them on time and in the correct way. However, not everyone is a pet expert taking care of your pet's diet can be hard and time consuming. One of the top health concerns of pets are overeating and obesity. Especially at younger age, they are usually satisfied with however much is given to them. Many adult pets are fed unscientifically that later may cause short lifespan. Another problem of feeding pets is that owners might not always be home.........
Index Terms - Embedded system, Arduino, Ethernet, RFID
[1]. Perfect Petfeeder Lux Model." Pillar Pet Products, Inc.
[2]. https://www.arduino.cc/en/Main/arduinoBoardMega/
[3]. https://learn.parallax.com/tutorials/language/propeller-c/propeller-csimple-devices/read-4x4-matrix-keypad
[4]. https://components101.com/misc/4x4-keypad-module-pinoutconfiguration-features-datasheet
[5]. https://www.engineersgarage.com/electronic-components/16x2-lcdmodule-datasheet
- Citation
- Abstract
- Reference
- Full PDF
Abstract: We are living in the new era of information. We need to keep information about every aspect of life and that information need to be secured from attacks. To be secured, information needs to be hidden from unauthorized access i.e. confidentiality and protected from unauthorized change i.e. integrity and also available to an authorized entity when it is needed i.e. availability. Information is now distributed but these three requirements have not changed. Cryptography is the technique which is can ensure for secure transmission of the data. Cryptography's main advantage is that the information is somehow distorted, scrambled by the sender, an encryption key......
[1] ShariquaIzhar, AnchalKaushal, Ramsha Fatima, Mohammed A Qadeer-"Enhancement in Data Security using Cryptography and Compression"- 2017 7th International Conference on Communication Systems and Network Technologies
[2] Taranpreet Singh Ruprah-"Advance Encryption and Decryption Technique using Multiple Symmetric Algorithm",Computer Science & Engineering Department Anna SahebDange College of Engineering & Technology ,Ashta-Sangli, India,ruprahtaran@gmail.com
[3] Mikha Dayan Sinaga, Nita Sari Br Sembiring, FrintoTambunan, Charles JhonyManthoSianturi -"Hybrid Cryptography WAKE (Word Auto Key Encryption) and Binary Caesar Cipher Method for Data Security",Faculty of Engineering and Computer Science,UniversitasPotensiUtama ,Jl. K.L. YosSudarso Km. 6,5 No. 3A – Medan, 20241, Indonesia
[4] Jawahar Thakur1, NageshKumar2-"DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", International Journal of Emerging Technology and Advanced Engineering ,ISSN 2250-2459, Volume 1, Issue 2, December 2011
[5] Vishwa Gupta, Gajendra Singh and Ravindra Gupta-"Advanced Cryptography Algorithm for Improving Data Security",International Journal of Advanced Research in ComputerScience and Software Engineering, vol. 2, January 2012.
