Communications

Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victim’s encrypted network traffic in order to identify user’s parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual Private Network (VPN) or even change protocols parameters to protect his/her privacy.

375 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    In this letter, a compact pattern reconfigurable filtering microstrip antenna is presented with broad bandwidth, good selectivity at the passband edge, and flat gain frequency response. The pattern reconfigurable filtering antenna has four resonant modes which can be adjusted independently, three of them are created by multi-mode resonator (MMR) and the other one is by radiator. The four resonant modes are well distributed in desired band and the resonant mode of radiator is located between the first two resonant modes of MMR.

    173 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    In this paper, we present the Tree Exploration Discovery Protocol (TEDP), proving that shortest paths can be built at the same time that the topology information is gathered, without extra messages compared to LLDP.

    194 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    The MATLAB program provides the performance of a sliding window based detection for a pulse radar signal.

    278 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    The MATLAB program provides the performance of a sliding window based detection for a pulse radar signal.

    258 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    An integration process for the fabrication of thin film bulk acoustic wave resonator (FBAR) above the CMOS IC is proposed. An adhesive-bonding-based film transfer technique is utilized to transfer high resistivity Si film onto a CMOS chip. Benzocyclobutene (BCB) is used as an adhesive film. It is a heat resistive polymer and processes of temperature up to 300 C are allowed on it. The CMOS is protected by BCB and thus is not damaged by plasma and chemical treatments.

    66 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    The dataset is an extensive collection of labeled high-frequency Wi-Fi Radio Signal Strength (RSS) measurements corresponding to multiple hand gestures made near a smartphone under different spatial and data traffic scenarios. We open source the software code and an Android app (Winiff) to create this dataset, which is available at Github (https://github.com/mohaseeb/wisture). The dataset is created using an artificial traffic induction (between the phone and the access point) approach to enable useful and meaningful RSS value

    398 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    I.INTRODUCTION ANN artificial neural networks recover your reproducible sound and vision clarity as its low carbon energy using silicon wave the effect it produces near bomb devices is extremely affective to sensory nerves and site versioning of 32 feet.Net is useful for all societies across the world fighting against nuclear weapons its basically Cognitive Sciences integrated Computer Science seismic activity detection using its waves in Bluetooth. Devices as they are short haul waves for long distance communication.

    1008 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Media-based modulation (MBM) is an attractive modulation scheme where
    information bits are conveyed by digitally controlling the ON/OFF status
    of radio frequency mirrors (which are parasitic elements) placed near the transmit antenna. The MBM alphabet (which is the set of channel fade

    89 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    One important topic to work is to create a good set of malicious web characteristics, because it is difficult to find one updated and with a research work to support it .

     

    1258 views
  • Communications
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Pages