Raja Iqbal

  • Citations Per Year
Learn More
The widespread applications of mobile ad hoc networks (MANET) and scarce network resources have lead to the development of many protocols in this field. The need of time is to find a protocol which makes efficient use of resources and improves the overall performance of the network. This paper focuses on enhancing the performance of ad hoc on demand(More)
In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure(More)
The blind equalizer relies on the knowledge of signal’s constellation and its statistics to perform equalization. The major drawback is that the blind equalizer will typically take a longer time to converge as compared to a trained equalizer. Variable Step-Size LMS (VSLMS) algorithms have been introduced to optimize the speed and steady-state error. The(More)
Web-services are frequently used for interaction among various portals. If a Web-service is accessible to one client, it will be accessible for the rest of the world as well, with a limited option of restrictions on access. In order to control the accessibility of a Web-service, we have proposed 'access logic' to be incorporated within the same(More)
Interleave Division Multiple Access (IDMA) is a multiuser scheme which enables user separation on the basis of interleavers. Interleaver design can allow the IDMA system to approach near Shannon limits of channel capacity. Interleaver combats against Intersymbol Interference (ISI), channel fading and all sorts of noises. In addition, interleavers provide(More)
This paper presents a novel technique of image Enhancement which can be widely used in medical and biological imaging to improve the image quality. The principle objective of enhancement is to process an image so that the result is more suitable than the original image for a specific application. Image enhancement enhances weak edges or weak features in an(More)
The next generation of broadband mobile communication system will face challenges caused by propagation characteristics of channel with much broader bandwidth as well as the need for a much higher throughput in a high mobility situation. Since radio bandwidth spectrum is limited, it is necessary to find techniques to increase spectral efficiency. The advent(More)
We report a simple, inexpensive, rapid, and one-step method for the fabrication of a stable and biocompatible superhydrophobic and superhemophobic surface. The proposed surface comprises candle soot particles embedded in a mixture of PDMS+n-hexane serving as the base material. The mechanism responsible for the superhydrophobic behavior of the surface is(More)
This paper proposes a Multi-Stream Cipher Stegnographic technique for high volume and secure data hiding in digital video and images. The proposed technique enables high rate of data embedding along with provisioning of confidentiality, integrity and authenticity security services. Embedding is carried out in spatial domain utilizing multiple stream ciphers(More)
Practical performance analysis of a 2×2 Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system is performed with various receiver structures. In addition, performance of energy detection based spectrum sensing is also evaluated using Universal Software Radio Peripheral (USRP) based test-bed. Live Video is(More)