Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Compact Quad-Band Sickle-Shaped Monopole Antenna for GSM 900/WiMax/WLAN Applications

    Sujit Goswami1,*, Sujit Kumar Mandal1, Soumen Banerjee2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 397-410, 2022, DOI:10.32604/cmc.2022.025657

    Abstract In this paper a novel, compact, microstrip-fed, quad-band monopole antenna is presented for the application of Global System for Mobile communication (GSM 900), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). The proposed antenna comprises of a sickle-shaped structure with four circular arc strips, and a modified rectangular ground plane. The four strips of the antenna are independently responsible for the four different resonant frequencies of the operating bands and can be tuned separately to control the radiation performance. The proposed quad-band antenna is designed to resonate at 940 MHz for GSM 900, 2.5 and 3.5 GHz for… More >

  • Open Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307

    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks.… More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad is a convention utilized for… More >

Displaying 1-10 on page 1 of 3. Per Page