Comparative Analysis of KALMAN and Least Square for DWT Based MIMO-OFDM System (English)
- New search for: Awasthi, Neha
- New search for: Sharma, Sukesha
- New search for: Awasthi, Neha
- New search for: Sharma, Sukesha
In:
Advanced Informatics for Computing Research
1
;
30-38
;
2018
- Article/Chapter (Book) / Electronic Resource
-
Title:Comparative Analysis of KALMAN and Least Square for DWT Based MIMO-OFDM System
-
Contributors:Awasthi, Neha ( author ) / Sharma, Sukesha ( author )
-
Published in:Advanced Informatics for Computing Research , 1 ; 30-38Communications in Computer and Information Science ; 956, 1 ; 30-38
-
Publisher:
- New search for: Springer Singapore
-
Place of publication:Singapore
-
Publication date:2018-11-28
-
Size:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Small–Signal Gain Investigation of Folded Cascode Op-AmpsSharma, Anil / Sharma, Tripti et al. | 2018
- 15
-
Analysis of the Impact of Diverse Pulse Shaping Filters on BER of GFDM System Incorporated with MRC Diversity Combining SchemeKumar, Pawan / Kansal, Lavish et al. | 2018
- 30
-
Comparative Analysis of KALMAN and Least Square for DWT Based MIMO-OFDM SystemAwasthi, Neha / Sharma, Sukesha et al. | 2018
- 39
-
Equivalent Circuit Modelling for Unimorph and Bimorph Piezoelectric Energy HarvesterAsthana, Prateek / Dwivedi, Apoorva / Khanna, Gargi et al. | 2018
- 50
-
Exact BER for MDPSK and MPSK over Generalized Rician Fading ChannelKansal, Veenu / Singh, Rajanbir / Singh, Simranjit et al. | 2018
- 63
-
Electrical Signal Analysis of Different Types of Oxygen Efficient PlantsKumar, Anurag / Sood, Neetu / Saini, Indu et al. | 2018
- 74
-
A Dual-Band MIMO Antenna Using RF Switch for LTE Mobile Handset ApplicationsGupta, Aahat / Chawla, Paras et al. | 2018
- 86
-
Design and Implementation of a Wideband U Slot Microstrip Patch Antenna Using DGS for C BandRajawat, Asmita / Saxena, Nikita et al. | 2018
- 96
-
Fractional Order PID Controller Design for DFIG Based Wind Energy Conversion SystemThakur, Renuka / Thakur, Ritula et al. | 2018
- 106
-
Modeling and Validation of Shunt Active Power Filter by Using OPAL-RTKumar, Sanjeev / Thakur, Ritula et al. | 2018
- 117
-
Real Time Simulation of IEEE 9 Bus System for Fault Analysis Using Transient ResponseSingh, Ankit Kumar / Thakur, Ritula et al. | 2018
- 127
-
Low Transconductance OTA Based Active Comb Filter for Biomedical ApplicationsSahu, Anil Kumar / Sahu, Arvind Kumar et al. | 2018
- 138
-
Performance Improvement of MIMO-FBMC Systems Using Different Diversity Combining Schemes Through AWGN and Rayleigh ChannelsKaur, Satwinder / Kansal, Lavish / Gaba, Gurjot Singh / El Bakkali, Mohamed / Tubbal, Faisel Em et al. | 2018
- 155
-
Comprehensive Analysis of Personalized Web Search Engines Through Information Retrieval Feedback System and User ProfilingMakvana, Kamlesh / Patel, Jay / Shah, Parth / Thakkar, Amit et al. | 2018
- 165
-
A Survey of Semantic Multi Agent System to Retrieve and Exchange Information in HealthcarePinal, Shah / Amit, Thakkar et al. | 2018
- 175
-
Integration of ICT in Curriculum - A Case Study of Botswana Junior Secondary SchoolsSiamisang, Peggy / Kumar, Rajiv / Narayanan, Sreekumar / Chandirakasan, Neelamegam et al. | 2018
- 193
-
Mining on the Basis of Similarity in Graph and Image DataSrivastava, Vishal / Biswas, Bhaskar et al. | 2018
- 204
-
HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud EnvironmentKaur, Jaspreet / Sharma, Sumit et al. | 2018
- 217
-
Decision Support System for Plant Disease IdentificationThandapani, Sachin Prabhu / Senthilkumar, Subikshaa / Shanmuga Priya, S. et al. | 2018
- 230
-
Optimizing Performance of User Web Browsing SearchSunita / Rana, Vijay et al. | 2018
- 243
-
A Distributed Key Management Protocol for Wireless Sensor NetworkChoudhary, Vishal / Taruna, S. et al. | 2018
- 257
-
Internal Network Penetration Testing Using Free/Open Source Tools: Network and System Administration ApproachKumar, Rajiv / Tlhagadikgora, Katlego et al. | 2018
- 270
-
Performance Analysis of Receiver Diversity Incorporated WiMAX SystemsSharma, Akanksha / Kansal, Lavish / Gaba, Gurjot Singh / El Bakkali, Mohamed / Tubbal, Faisel Em et al. | 2018
- 282
-
Multi-source Energy Harvesting System for Sensor NodesGarg, Neha / Garg, Ritu et al. | 2018
- 294
-
Analysis and Comparison of Localization Approaches in WSN: A ReviewKaur, Bhupinder / Prashar, Deepak et al. | 2018
- 310
-
Inferring Causal Gene Regulatory Networks Using Time-Delay Association RulesAhmed, Syed Sazzad / Roy, Swarup / Choudhury, Pabitra Pal et al. | 2018
- 322
-
Assessment of Different Security Issues, Threats with Their Detection and Prevention Security Models in Mobile Cloud Computing (MCC)Vishal / Kaur, Bikrampal / Jangra, Surender et al. | 2018
- 334
-
Neural Network Based Test Case Prioritization in Software EngineeringThakur, Akshit / Sharma, Gitika et al. | 2018
- 346
-
Blockchain-Based Security Aspects in Internet of Things NetworkPohrmen, Fabiola Hazel / Das, Rohit Kumar / Khongbuh, Wanbanker / Saha, Goutam et al. | 2018
- 358
-
A Comparative Analysis of Different Intrusion Detection Techniques in Cloud ComputingBakshi, Aditya / Sunanda et al. | 2018
- 379
-
An Intrusion Detection Method Using Artificial Immune System ApproachLyngdoh, Juniorika / Hussain, Md. Iftekhar / Majaw, Suktilang / Kalita, Hemanta Kumar et al. | 2018
- 388
-
Fault Aware Improved Clustering Algorithm to Improve Execution Time of the CloudletsKaur, Jasleen / Kaur, Kamaljit et al. | 2018
- 401
-
Cooperative Mitigation of DDoS Attacks Using an Optimized Auction Scheme on Cache ServersGulihar, Prachi / Gupta, B. B. et al. | 2018
- 413
-
A Comprehensive Study of Mobile Computing in TelemedicineAtta-ur-Rahman / Dash, Sujata / Kamaleldin, Mahi / Abed, Areej / Alshaikhhussain, Atheer / Motawei, Heba / Amoudi, Nadeen Al. / Abahussain, Wejdan / Sultan, Kiran et al. | 2018
- 426
-
A Survey on Information Diffusion Models in Social NetworksSingh, Shashank Sheshar / Singh, Kuldeep / Kumar, Ajay / Shakya, Harish Kumar / Biswas, Bhaskar et al. | 2018
- 440
-
CoIM: Community-Based Influence Maximization in Social NetworksSingh, Shashank Sheshar / Singh, Kuldeep / Kumar, Ajay / Biswas, Bhaskar et al. | 2018
- 454
-
Anomaly Detection in MANET Using Zone Based AODV Routing ProtocolPrasanna Lakshmi, G. S. / Patil, Shantakumar B. / Patil, Premjyothi et al. | 2018
- 469
-
Abstract Model of Trusted and Secure Middleware Framework for Multi-cloud EnvironmentSaxena, Deepika / Vaisla, Kunwar Singh / Rauthan, Manmohan Singh et al. | 2018
- 480
-
User Behavior-Based Intrusion Detection Using Statistical TechniquesMalek, Zakiyabanu S. / Trivedi, Bhushan / Shah, Axita et al. | 2018
- 490
-
Three-Level Leach Protocol to Increase Lifetime of Wireless Sensor NetworkTrehan, Anamika / Gupta, Preeti / Agrawal, Sunil et al. | 2018
- 501
-
Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSNKaur, Harkiranvir / Singh, Preeti / Garg, Nidhi / Kaur, Pardeep et al. | 2018
- 512
-
ITS-Application-Priority-MAC (ITS-APMAC) for Reliable Communication Over VANETsWaraich, Paramjit / Batra, Neera et al. | 2018
- 524
-
Trust Based Congestion Control Algorithm (TBCCA) in VANETSingh, Ravi Pratap / Singh, Dinesh et al. | 2018
- 536
-
Smart Cities in India: Revamping the Street Lighting System Using IOTVashishtha, Akash / Dhir, Saru / Hooda, Madhurima et al. | 2018
- 547
-
A Power Efficient Solution to Counter Blackhole and Wormhole Attacks in MANET Multicast RoutingSagwal, Rubal / Singh, A. K. et al. | 2018
- 559
-
Change Point Modelling in the Vulnerability Discovery ProcessSharma, Ruchi / Sibal, Ritu / Sabharwal, Sangeeta et al. | 2018
- 569
-
Modeling Vulnerability Discovery and Patching with Fixing LagShrivastava, A. K. / Sharma, Ruchi et al. | 2018
- 579
-
An Implementation of Malware Detection System Using Hybrid C4.5 Decision Tree AlgorithmKumar, Ajay / Singh, Shashank Sheshar / Singh, Kuldeep / Shakya, Harish Kumar / Biswas, Bhaskar et al. | 2018
- 590
-
Secure Online Polling: Based on Homomorphic Encryption Using (n,n) Secret Sharing SchemeKumar, Yogesh / Mishra, Arun et al. | 2018