V. Jawahar Senthil Kumar

Learn More
— In this paper, we study the VoIP capacity of IEEE 802.11b (DCF), i.e., the maximum number of simultaneous voice calls that can take place in a WLAN cell. This capacity is highly dependent on the chosen codec and on the distance from the access point (AP) to the users. Thus several codecs are studied, namely G711, GSM-EFR, and G723.1. All users are assumed(More)
  • P Mayil, Vel Kumar, Chennai M Karthikeyan
  • 2012
The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k-anonymity is one method to protect the data. The problem in(More)
This Paper Analyze the performance of Unsymmetrical trimmed median, which is used as detector for the detection of impulse noise, Gaussian noise and mixed noise is proposed. The proposed algorithm uses a fixed 3x3 window for the increasing noise densities. The pixels in the current window are arranged in sorting order using a improved snake like sorting(More)