Pankaj Vyas

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Use case based approaches for software requirement analysis have been used extensively in software development industry to capture functional and behavioral requirements. But use-case based techniques for requirement analysis has not been found to be much effective and supportive enough for capturing non-functional requirements such as safety requirements.(More)
Security is the major anxiety in mobile ad hoc network because of its characteristics such as lack of central coordination, dynamic topology; infrastructure less. In such network nodes can easily be in and out and each node has capability to route the packets.Ad hoc network is more susceptible to various kinds of threats such as black hole, Sybil attack,(More)
Recent trends have indicated the increased use of object oriented technology not only for the design and development of traditional softare but also for safety critical software. There has been an ongoing effort for the application of traditional well documiented and well tested hardware safety and reliability analysis techniques to software. Software(More)
Wireless Broadband Access service is now a day’s more popular for data transmission. Traditional high-speed broadband solutions rely upon wired technologies specifically digital subscriber line (DSL). Wi-Fi is helpful in providing any type of connectivity such as the fixed or portable connectivity while not the need of LoS (Line of Sight) of the base(More)
Wireless communication system with multiantenna arrays has been a field of intensive research on the last years. The application of multiple transmitting antennas and Receiving Antennas both sides can significantly enhance the channel capacity and data rate. The review of the performance limitations of MIMO system becomes very important since it will give(More)
The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary(More)
Signals acquired through any modern sensors suffer from variety of noises resulting from stochastic variations and deterministic distortions or shading. Hence it is desired to smooth the noisy signal to obtain a signal with higher quality. The paper proposed a neural network based adaptive noise cancellation technique for a system with multichannel(More)
  • 1