Uday B. Desai

Learn More
In wireless transmission of ECG, data latency will be significant when battery power level and data transmission distance are not maintained. In applications like home monitoring or personalized care, to overcome the joint effect of previous issues of wireless transmission and other ECG measurement noises, a novel filtering strategy is required. Here, a(More)
We propose a Path Unaware Layered Routing Protocol (PULRP) for dense underwater 3D sensor networks. An uplink transmission is considered, where a set of underwater sensor nodes report events to the sink node. PURLP algorithm consists of two phases. In the first phase (layering phase), a layering structure is presented which is a set of concentric spheres,(More)
DS-CDMA is a popular multiple access technology for wireless communications. However, its performance is limited by multiple access interference and multipath distortion. Multiuser detection and space time processing are two signal processing techniques employed to improve the performance of DSCDMA. Two minimum probability of error based space-time(More)
We propose a unified cross layer routing protocol with multiple constraints for CDMA multihop cellular networks (MCN). Multiple constraints are imposed on intermediate relay node selection and source to destination path selection. The relay node constraints for routing protocol design are cooperation, interference caused to other nodes and sufficient(More)
Finding an optimal routing path in adverse underwater environment in an Underwater Sensor Network (UWSN) has always been a challenging task. Maintaining the network life for a longer duration by utilizing nodes’ energy is also critical. By taking these issues into consideration we propose an Energy optimized Path Unaware Layered Routing Protocol (E-PULRP)(More)
This paper presents a novel method of blind image watermarking in contourlet domain. We have used spread spectrum technique for additive watermark embedding. A correlation detector is used to detect the embedded pseudorandom sequence. The binary logo thus retrieved proves authenticity of the image. The similarity of the retrieved binary logo with the(More)