Communications

Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victim’s encrypted network traffic in order to identify user’s parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual Private Network (VPN) or even change protocols parameters to protect his/her privacy.

Categories:
1140 Views

In this letter, a compact pattern reconfigurable filtering microstrip antenna is presented with broad bandwidth, good selectivity at the passband edge, and flat gain frequency response. The pattern reconfigurable filtering antenna has four resonant modes which can be adjusted independently, three of them are created by multi-mode resonator (MMR) and the other one is by radiator. The four resonant modes are well distributed in desired band and the resonant mode of radiator is located between the first two resonant modes of MMR.

Categories:
398 Views

In this paper, we present the Tree Exploration Discovery Protocol (TEDP), proving that shortest paths can be built at the same time that the topology information is gathered, without extra messages compared to LLDP.

Categories:
340 Views

The MATLAB program provides the performance of a sliding window based detection for a pulse radar signal.

Categories:
901 Views

The MATLAB program provides the performance of a sliding window based detection for a pulse radar signal.

Categories:
548 Views

An integration process for the fabrication of thin film bulk acoustic wave resonator (FBAR) above the CMOS IC is proposed. An adhesive-bonding-based film transfer technique is utilized to transfer high resistivity Si film onto a CMOS chip. Benzocyclobutene (BCB) is used as an adhesive film. It is a heat resistive polymer and processes of temperature up to 300 C are allowed on it. The CMOS is protected by BCB and thus is not damaged by plasma and chemical treatments.

Categories:
197 Views

The dataset is an extensive collection of labeled high-frequency Wi-Fi Radio Signal Strength (RSS) measurements corresponding to multiple hand gestures made near a smartphone under different spatial and data traffic scenarios. We open source the software code and an Android app (Winiff) to create this dataset, which is available at Github (https://github.com/mohaseeb/wisture). The dataset is created using an artificial traffic induction (between the phone and the access point) approach to enable useful and meaningful RSS value

Categories:
1156 Views

I.INTRODUCTION ANN artificial neural networks recover your reproducible sound and vision clarity as its low carbon energy using silicon wave the effect it produces near bomb devices is extremely affective to sensory nerves and site versioning of 32 feet.Net is useful for all societies across the world fighting against nuclear weapons its basically Cognitive Sciences integrated Computer Science seismic activity detection using its waves in Bluetooth. Devices as they are short haul waves for long distance communication.

Categories:
2308 Views

Media-based modulation (MBM) is an attractive modulation scheme where
information bits are conveyed by digitally controlling the ON/OFF status
of radio frequency mirrors (which are parasitic elements) placed near the transmit antenna. The MBM alphabet (which is the set of channel fade

Categories:
275 Views

One important topic to work is to create a good set of malicious web characteristics, because it is difficult to find one updated and with a research work to support it .

 

Categories:
3969 Views

Pages