October 2009
Public key cryptosystems based on chaotic Chebyshev polynomials
Due to rapid developments in limits and possibilities of communications and information transmissions, there is a growing demand of cryptographic techniques, which has spurred a great deal of intensive research activities in the study of cryptography. This paper describes a public key encryption based on chebyshev polynomials by Alfred et al. (1996). We discuss the algorithm for textual data and present...
October 2009
Neural network based CAD model for the design of rectangular patch antennas
A new method of calculation of patch dimensions of a rectangular microstrip patch antennas using Artificial Neural Network (ANN) has been adopted in this paper. An ANN model has been developed and tested for rectangular patch antenna design. It transforms the data containing the dielectric constant (εr), thickness of the substrate (h), and antenna’s dominant-mode resonant frequency (fr) to...
October 2009
Supporting intelligent terminals by cross-layer adaptation over HSDPA network
Next generation of mobile networks will support intelligent terminals having different categories and generating traffic with various qualities of service (QoS) requirements. To provide an end-to-end QoS, application terminals need to be adaptive and deal with network changing conditions. Knowledge has to be shared between network layers to obtain the highest possible adaptivity. In this context, we propose...
October 2009
Applying machine learning techniques for e-mail management: Solution with intelligent e-mail reply prediction
In today’s world, much of our communication is done via e-mail. Many companies and internet users now view e-mail as one of their most critical personal and business applications and would experience serious consequences if their e-mail messages could not be available or experience high volume of messages which lead to congestions, overloads and limited storage space coupled with un-organized e-mail...
Advertisement
Advertisement