Review of Comparative Analysis of Empirical Propagation model for WiMAX
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 10
Abstract
The propagation models for path loss may give different results if they are used in different environment other than in which they were designed. In this paper we review of compare the different path loss empirical propagation models with measured field data. For comparative analysis we use the long distance path loss model, Stanford University Interim (SUI) Model, Hata model, Okumura’s Model, COST231 Extension to Hata Model and ECC-33 model The field measurement data is taken in urban (high density region), sub urban (medium density region) and rural (low density region) environments at 900 MHz & 1800 MHz frequency with the help of spectrum analyzer. After analyzing the results COST-231 and SUI Model shows the better results in all the three environments particularly in urban and sub urban environments.
Authors and Affiliations
Mr. Sachin S. Kale , Mr. A. N. Jadhav
Mitigating Denial of Service Attacks in Wireless Networks
The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS att...
The Efficient load balancing in the parallel computer
Recently Cpu workload hardware Technology and multiprocessor Service are developing rapidly. Mathematically computation must be completed within a certain time period .Through the mathematical Analysis our Study Iden...
E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are many security challenges associated with the use of Inter...
Fault identification and diagnosis using greedy Back Tracking approach in large-scale network
In this paper, we discuss the problems in large scale networks failure information. For this We propose a fault identification system initiate by an application when the application identify the incidence of a failure...
Secure Re-encryption in Unreliable Cloud using Synchronous clock
In this Paper With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. To keep the shared data confidential against untrusted cloud service provi...