A performance evaluation of various security assessments in WiMAX
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 8
Abstract
One of the technologies that can lay the foundation for the next generation (fourth generation [4G]) of mobile broadband networks is popularly known as WiMAX. WiMAX stands for worldwide interoperability for microwave access belongs to IEEE 802.16 standard family. WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. With the growing popularity of WiMAX security risk have increased in many folds. In this paper we study the WiMAX security arc hitecture, physical Layer Threats, MAC Layer Threats, authentication, authorization and rough base station in WiMAX
Authors and Affiliations
Pankaj chouhan , S. R. Mansore
Implementation on FPGA for Tuned Low Complexity Modified Curve Fitting Algorithm
An effort is made to minimize the arithmetic intricacy of signal by using the VHDL module on FPGA. A curve fitting algorithm is used for finding the fundamental frequency of a given signal. Modification of algorithm is r...
Mining on Medicine Data
In this paper, we propose an approach for Mining as well as data clustering, we have taken some medical data set we not only able to find out the disease detail as well as clustering. Cluster analysis itself is not...
Optical Character Recognition Using Artificial Neural Network
— In this paper, an Optical Character recognition system based on Artificial Neural Networks (ANNs). The ANN is trained using the Back Propagation algorithm. In the proposed system, each typed English letter is rep...
A Survey on Prevention of Black Hole Attack in an Ad-Hoc Network
An ad-hoc network is a group of wireless and mobile nodes that function without any open infrastructure and has the capability to form a temporary network dynamically. Ad-hoc On-demand Distance Vector (AODV) is one...
Normalization of Intuitionistic Fuzzy Rough Relational Databases
In this paper, a method of normalization of a relational schema with intuitionistic fuzzy rough attributes in first normal form is presented. The method is implemented by an example which shows that how the proce...