JTMGE Vol. 6 No. 1 (April 2015)
Permanent URI for this collection
Browse
Browsing JTMGE Vol. 6 No. 1 (April 2015) by Title
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item General Framework of Compressive Sampling and its Applications for Signal and Image Compression A Random Approach(Chitkara University Publications, 2015-04) Prabhat ThakurCompressive sampling emerged as a very useful random protocol and has become an active research area for almost a decade. Compressive sampling allows us to sample a signal below Shannon Nyquist rate and assures its successful reconstruction if the signal is sparse. In this paper we used compressive sampling for arbitrary signal and image compression and successfully reconstructed them by solving l1 norm optimization problem. We also showed that compressive sampling can be implemented if signal is sparse and incoherent through simulations.Item On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography(Chitkara University Publications, 2015-04) Prabhdeep Kaur; Sheetal KalraSecure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system. Elliptic Curve Cryptography (ECC) has emerged as one of the most successful Public Key Cryptosystem that efficiently meets all the security challenges. Comparison of ECC with other Public Key Cryptosystems (RSA, Rabin, ElGamal) shows that it provides equal level of security for a far smaller bit size, thereby substantially reducing the processing overhead. This makes it suitable for constrained environments like wireless networks and mobile devices as well as for security sensitive applications like electronic banking, financial transactions and smart grids. With the successful implementation of ECC in security applications (e-passports, e-IDs, embedded systems), it is getting widely commercialized. ECC is simple and faster and is therefore emerging as an attractive alternative for providing security in lightweight device, which contributes to its popularity in the present scenario. In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments. Furthermore, we have carried out security, functionality and performance comparisons of these schemes and found that they are unable to satisfy their claimed security goals.Item Performance Analysis of Indoor Optical Wireless Links(Chitkara University Publications, 2015-04) Ram Kumar Sharma; Hemani Kaushal; Prabhat Kumar SharmaIndoor wireless optical communication is a good alternative to existing mature RF technology. However various challenges in indoor optical wireless technology are due to free space loss, ambient light, and multi path dispersion causing inter symbol interference (ISI). The degradation in performance due to these facts is very much influenced by the channel topology. So in this paper the performance of indoor optical configuration has been analyzed using three types of channel topologies viz., directed (LOS), non-directed (LOS), and multi beam diffused link for various transmitter and receiver design parameters. The analysis has been carried using Optiwave simulation tools.Item Simulating and Analysing the Impact of Routing Protocols on Different Parameters of WSNs(Chitkara University Publications, 2015-04) Anish Soni; Rajneesh RandhawaEnergy efficiency of Wireless Sensor Networks has become an essential requirement and is the main issue for researchers. Various routing, data dissemination and energy efficient protocols have been designed for Wireless Sensor Networks where energy issue has been given more stress. Sensors in wireless sensor networks work on battery and have limited energy. Hence, network has limited lifetime. Routing protocol plays a major role in deciding for how much time a network will survive. All routing algorithms tend to increase the lifetime of WSN while maintaining factors like successful and real-time delivery of a message. This paper aims towards studying different categories of routing protocols and finally four hierarchical routing protocols LEACH, EHRP, SEP and FAIR have been simulated. The performance of each routing protocol has been measured on some performance metrics like network lifetime, packets transferred to BS, number of dead nodes etc and finally concluded that how a routing protocol can impact the network lifetime.