Skip to main content
ad hoc networks. Typically, every node in an ad hoc network serves as a router for other nodes, and paths from source to destination oflen require multiple hops. Compared to wired networks, wireless ad hoc networks have less bandwidth,... more
    • by 
    •   10  
      LogicMobile Ad Hoc NetworksComputer NetworksRouting protocols
In this paper we will overview the use of data hiding techniques in digital images. In particular we will describe how one can use steganography to hide biometric information in a digital image. This proposed technique proposes a quite... more
    • by 
    • Computer Science Engineering
The paper presents an electromagnetic Interference and Compatibility Analysis for ARABSAT and Eutelsat Networks. The analysis suggests that ARABSAT has to accept certain constraints required to protect Eutelsat. An EIRP spectral density... more
    • by 
    •   2  
      Satellite CommunicationsElectromagnetic Interference and Compatibility
A fuzzy logic-based control scheme is developed to automatically focus the R G B guns in projection TVs. The control scheme can be easily implemented in a manufacturing production line environment. Such an implementation could result in... more
    • by 
This paper presents a novel authentication and encryption method for an RFID system. In this paper, DES (Data Encryption Standard), algorithm will be used to encrypt and verify accuracy data within an RFID tag. The new DES algorithm use... more
    • by  and +1
    •   2  
      RFID Security and PrivacyData Encryption
This paper introduces a new technique to hide scanned document in a digital image. It is a one-to-one matching between the pixels from the cover image to the pixel in scanned documents image. The proposed algorithm is an efficient... more
    • by  and +1
    •   3  
      Scanned DocumentsInformation EmbeddingSecret Communication
With the immense development in the field of communication almost every business is partially dependent on internet. Cloud’s computing popularity has changed the way in which companies and individuals can think to process the data and to... more
    • by  and +1
    •   4  
      Computer ScienceComputer NetworksMobile Cloud ComputingCloud Computing Security
The aim of this paper is to produce the detailed, credible scientific reports on RFID components and give end users the information they need to choose the right components for their application. This paper introduced an investigation to... more
    • by 
    •   2  
      AntennasRFID Technology
In medical sciences and particular in cardiology related area, ECG machine is considered a basic equipment to get the fundamental knowledge about proper functioning of heart. In this work the aim is to make energy efficient ECG machine... more
    • by  and +2
Technology has totally changed the culture and working of people. With every passing day it is gaining popularity and becoming one of the most important gadgets of our lives. Researchers are enthusiastically pursuing areas of research... more
    • by  and +1
    •   4  
      Sensors and SensingVirtual ArchitectureSmart HomesElectronics Smart Devices
The goal of this paper is to carry out compatibility analysis of ARABSAT 2A at 30.50 E to determine satellite system and networks that have potential to generate harmful electromagnetic interference to ARABSAT 2A at 30.50 E Systems and... more
    • by 
    •   3  
      RadioSatellite CommunicationsMicrowave Link Design
Technology has totally changed the culture and working of people. With every passing day it is gaining popularity and becoming one of the most important gadgets of our lives. Researchers are enthusiastically pursuing areas of research... more
    • by 
    •   4  
      Virtual ArchitectureSmart HomeElectronics Smart DevicesSmart Vehicle
Internet of Things has brought exciting changes in the social norms, work environments and prospects for future generations. These devices (Things) have already changed the way our networks are used for communication. With the... more
    • by 
    •   4  
      Organ DonationSmart HealthIoT SecurityIdentity of Things (IDoT)
With the increasing global energy demand, clean and affordable sources of energy are being adopted over time. Road Power Generation (RPG) is thus an alternate to conventional electricity generation. RPG technologies generate electrical... more
    • by 
    • Renewable Energy
The Internet of Things (IoT) equipped sensor systems to gather data from sensors and analyze it through billions of interconnected devices and smart motes. Due to the purpose of deployment easiness and reduced operational cost, wireless... more
    • by 
    • Computer Networks
Introduction of Internet of Things in our lives have brought drastic changes in the social norms, working habits, ways of completing tasks and planning for future. Data about our interactions with everyday objects can be effectively... more
    • by 
Today we are encircled by multiple problems, such as global warming, drought, wildfires, Hurricanes and tropical storms etc; among them, flooding is one of the major problems; however, the flood hazards are probably rising due to an... more
    • by 
Introduction of Internet of Things in our lives have brought drastic changes in the social norms, working habits, ways of completing tasks and planning for future. Data about our interactions with everyday objects can be effectively... more
    • by 
Fossil fuels and Nuclear power is responsible for about 82% of the current Energy Production in the US. While a small part is still being met by renewable energy sources, engineers are working hard on finding new sources of Energy.... more
    • by 
    • Charge controller
In today’s technological era, most new generations are using memes because the phenomenon of memes is rapidly gaining in popularity. In addition, various modifications and parodies use social and cultural phenomena to transform an... more
    • by 
    • Machine Learning