An Approach to reduce Non-linearity of HIPERLAN/2 system using Neural Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
Simulation of ETSI’s High Performance Local Area Network Type 2(HIPERLAN/2) is presented. In this paper we present performance of HIPERLAN/2 model via a MATLAB/Simulink simulation with the original MATLAB/Simulink model and the model using Neural Networks LVQ (Linear Vector Quantization) algorithm. MATLAB/Simulink modeling demonstrates that the performance of HIPERLAN/2 with Neural Network reduces the Nonlinearity of the original model to a great extent.
Authors and Affiliations
Roshni pandurangi Bhokare, Shubhangi Rathkanthiwar
Shared Assessing For Distributed Data with Proficient Client Revocation in Cloud
Cloud gives administrations like information stockpiling and information partaking in a gathering. Clients can remotely store their information on cloud and appreciate the on-interest brilliant applications and admin...
Low Power Design of A SRAM Cell for Embedded Memory
This paper presents a new SRAM cell to reduce power consumption with the feedback technique by using Schmitt Trigger in the proposed circuitry design. By the proposed design we may reduce the power consumption and ar...
Scalable Technique to Answer Continuous Aggregation Queries Using Network Of Aggregators Of Dyanmic Data Items
Continuous aggregation queries are used to monitor the changes in data with time varying for online decision making. For continuous queries, a low-cost and scalable technique using a network of aggregators. Individua...
Lifetime Enhancement of Wireless Sensor Networks Through Overhead Reduction
Wireless Sensor Networks (WSNs) can provide low cost solutions to various real world problems. WSNs consist of spatially dispersed autonomous sensors to monitor physical or environmental condition, such as sound, tem...
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...