Manish Saxena

Learn More
Distributed Denial of Service (DDoS) Attacks has been increasingly found to be affecting the normal functioning of organizations causing billions of dollars of losses. Organizations are trying their best to minimize their losses from these systems. However, most of the organizations widely use the Intrusion Prevention System (IPS) to observe and manage(More)
INTRODUCTION The aim of this study was to evaluate the effect of short-term oral valproic acid (VPA) on the vision and visual fields of patients with retinitis pigmentosa (RP). METHODS In this prospective, nonrandomized trial, 10 patients (20 eyes) with established RP were treated with oral VPA 500 mg/day for 3 months. Visual acuity was monitored using(More)
This paper presents the performance analysis of VBLAST based multiple input multiple output orthogonal frequency division multiplexing (MIMOOFDM) system with respect to bit error rate per signal to noise ratio (BER/SNR) for various detection techniques viz zero forcing (ZF), minimum mean square error (MMSE) and maximum likelihood (ML). A 2X2 MIMO-OFDM(More)
In this rapid changing world in wireless communication, dual or multiband antenna has been playing a key role for wireless service requirements. Wireless local area network (WLAN) and Worldwide Interoperability for Microwave Access (WiMAX) have been widely applied in mobile devices such as handheld computers and smart phones. These two techniques have been(More)
In this paper we show the Channel coding plays a very important role in OFDM systems performance. The structure of OFDM systems makes channel coding more effective in confronting fading channels. Sometimes Coded OFDM is known as COFDM. The role of channel coding in conjunction with frequency and time interleaving is to provide a link between bits(More)
Information hiding technique is a new kind of secret communication technology. Steganography has been proposed as a new alternative technique to enforce data security. A perfect audio Steganographic technique aim at embedding data in an imperceptible, robust and secure way and then extracting it by authorized people. Hence, up to date the main challenge in(More)