Version-2 (Nov-Dec 2016)
Version-1 Version-2 Version-3 Version-4
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Top Efficiency on Communication Theory |
Country | : | México |
Authors | : | J. M. Velázquez-Arcos || J. Granados-Samaniego || T. D. Navarrete-González |
Abstract: Nowadays we know that at least for discrete systems there is an equivalence between Time Reversal and the use of meta materials for the so called overcoming of the diffraction limit. But it remains a question concerning the efficiency on transporting information. In this paper, we make a review of some previous works to the end of make a fusion between the uses of any of these two equivalent phenomena and two new fields namely the Plasma Sandwich Model, and the association of a new class of electromagnetic resonances and left-hand-materials conditions. On the aim to obtain a rule that guides us for obtaining an observable parameter we recall some of our results concerning communication theory and we define a measure of the loss of information when left-hand materials conditions domains a broadcasting process........
Keywords: Communication theory, Time reversal, Resonances on a channel, Left-hand materials
[1]. J. M. Velázquez-Arcos and J. Granados-Samaniego, Wave propagation under confinement break, IOSR Journal of Electronics and
Communication Engineering (IOSR-JECE)e-ISSN: 2278-2834, p- ISSN: 2278-8735. Volume 11, Issue 2, Ver. I (Mar-Apr. 2016),
PP 42-48www.iosrjournals.org.
[2]. J. M. Velàzquez-Arcos, J. Granados-Samaniego and C. A. Vargas, Electromagnetic scalar and vector potentials on the problem of
left-hand materials conditions, Electromagnetic in Advanced Applications, 2016, edited by IEEE
[3]. J. Granados –Samaniego, J. M. Velàzquez-Arcos, and C. A. Vargas, Resonant technology and electromagnetic packaging,
International Conference on Electromagnetic Advanced Applications 2015, Torino, Italia 2015.
[4]. J. M. Velàzquez-Arcos, J. Granados-Samaniego and C. A. Vargas, Fredholm and Maxwell equations in the confinement of
electromagnetic field, International Conference on Electromagnetic Advanced Applications 2015, Torino, Italia 2015.
[5]. [5] J. M. Velázquez-Arcos, J. Granados-Samaniego, C.A. Vargas, Resonance regime on a plasma sandwich simulates a left-hand
material broadcasting condition, Electromagnetics in Advanced Applications (ICEAA), 2014 International Conference pp.137-140,
3-8 Aug. 2014 doi: 10.1109/ICEAA.2014.6903842.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Evaluation of Convolutional Coding for the Reduction of AWGN in a Communication Channel for Digital Video Broadcasting Terrestrial |
Country | : | Nigeria |
Authors | : | Ajibodu F.A || Adetona Z.A |
Abstract: Common channel impairments such as noise, interference and fading are known to degrade data transmission in a telecommunication channel. Channel coding seeks to achieve the transformation of signals to improve communication performance through the alteration of data sequence characteristics. Thus the converted sequence contains structured redundancy which enables the transmitter or receiver to decide how to process the data to correct the channel impairments. In this study, a Simulink model was used to describe the use of convolutional encoder and Viterbi decoder blocks to improve transmission in the AWGN channel. The study utilized IEEE and ETSI standards in developing the model..........
Keywords: AWGN,BER,DVB-T, modulation, punctured convolution coding, SNR.
[1] S. Semenov, & K. Evgenii. "Channel model and reliable communication", Modulation and coding techniques in wireless communication(Chichester, West Sussex, U.K:John Wiley & Sons, pp. 21-30, 2011).
[2] A. R Fourouzan., M. Nasiri-Kenari& J. A. Salehi "Performance analysis of Time-hopping spread-Spectrum Multiple-Access Systems: Uncoded and coded Schemes". IEEE Tran. on communications. 1(4): 671-681, 2002.
[3] Mathworks, "Error detection and correction," [online]. Available at www.mathworks.com/help/comm/ug/error-detection-and-correction.html. Retrieved 25 August, 2016.
[4] J. Tuominen, & J. Plosila, Asynchronous Viterbi Decoder in Action Systems, TUCS Technical Report No 710, p. 7. 2005.
[5] E. P. J. Tozer (Ed.) Broadcast Engineer's Reference Book(CRC Press, Burlington, 2013).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Home Energy Management System Based on Raspberry Pi Using Iot |
Country | : | India |
Authors | : | P Lakshmi Venkata Sruthi || B Tulasi Sowjanya |
Abstract: The design and development of a smart monitoring and controlling system for household electrical appliances in real time, IOT based raspberry pi home automation has been reported in this project. Increasing power consumption is becoming a huge problem. In this project, we propose an intelligent energy distribution system with a fixed power use of every home. This is designed in order to reduce the frequent power cut off. Moreover monitoring and controlling of home appliances is developed with the help of internet automatically. The main aim is to provide low cost and flexible operation. The goal is to develop a newly equipped well designed prototype for consumers in home to limit the usage of power. This helps users and power distribution centre to manage the power in an efficient manner, practically applied in home with the help of Raspberry Pi. Internet provides the data effectively, in order to manage the power by controlling the home appliances
Keywords: Raspberry pi, energy meter, wireless sensor network
[1]. Nagender Kumar Suryadevara, Subhas Chandra Mukhopadhyay, Sean Dieter Tebje Kelly, and Satinder Pal Singh Gill "WSN-Based Smart Sensors and Actuator for Power Management in Intelligent Buildings" 1083-4435, 2014 IEEE.
[2]. Ardam H. and Coskun I., "A remote controller for home and office appliances by telephone", IEEE Transactions on Consumer Electronics, vol. 44, no. 4,pp. 1291-1297, 1998.
[3]. Baudel T. and Beaudouin-Lafon M., "Charade: remote control of objects using free-hand gestures", Communications of the ACM, voI. 36, no. 7,pp. 28-35, 1993.
[4]. Bromley K., Perry M., and Webb G. "Trends in Smart Home Systems, Connectivity and Services", www.nextwave.org.uk,2003.
[5]. Kushiro N. , Suzuki S., Nakata M., Takahara H. and Inoue M., "Integrated home gateway controller for home energy management system", IEEE International Conference on Consumer Electronics, pp. 386-387,2003.
[6]. Magazine for Raspberry Pi users "The MagPi "
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Digital Signature with Acknowledgement Based Clone Detection for wsns |
Country | : | India |
Authors | : | P.Balasubramani || S.Maria Antony || G.SathishKumar || R.Krishnaveni || B.Priyadharshini |
Abstract: The main objective of this paper is to improve the network security in hostile environment by detecting the clone nodes.Hence malicious nodes accessing the secret information isavoided. In this paper, duplicate node detection approach followed by clone nodes deduction was proposed for wireless sensor network(WSNs) and it is found to be working efficiently. Static sensor network based implementation calledTime Deployment Approach (TDA) is designed and compared with the former approaches. The work also focused on energy savings of both static sensor network as well as mobile sensor network.
Keywords: Wireless Sensor Network(WSNs) Digital Signature Algorithm(DSA), network security, duplicate node detection.
[1] Kwantae Cho, Minho Jo, "Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks" IEEE systems Journal, vol,7 ,No. 1,march 2013.
[2] R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, "On the detection of clones in sensor networks using random key predistribution," IEEE Trans. Syst. Man Cybern., vol. 37, no. 6, pp. 1246–1258, Nov. 2007.
[3] H. Choi, S. Zhu, and T. F. L. Porta, "SET: Detecting node clones in sensor networks," in Proc. Security Privacy Commun. Netw. Workshops, 2007, pp. 341–350.
[4] K. Xing, F. Liu, X. Cheng, and D. H. C. Du, "Real-time detection VI. Conclusion of clone attacks in wireless sensor networks," in Proc. ICDCS, 2008, pp. 3–10,
[5] B. Sun, L. Osborne, Yang Xiao and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Communications, pp. 56-63, October 2007.[8] Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-walk based approach to detect clone attacks in wireless sensor networks," IEEE J.Sel. Areas Commun., vol. 28, no. 5, pp. 677–691, Jun. 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Realization of Bloom Filter for Error Free Transmission Applications |
Country | : | India |
Authors | : | Pavani K || Raghavaiah B |
Abstract: Error correction techniques play an important role in today's life. To make the things easier a numerous techniques are introduced. One of the efficient techniques is BLOOM FILTER method. Blooming filters are used in numerous applications one of them is communication and networking. Researchers are still in work on bloom filters to enhance their usage in new scenarios. Reliability is the major challenge that which the advanced electronic circuits are facing due to thermal, radiation and manufacturing violations........
Keywords: Blooming filters, soft errors, error correction
[1]. B. Bloom, "Space/time tradeoffs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422–426, 1970.
[2]. A. Broder and M. Mitzenmacher, "Network applications of bloom filters: A survey," in Proc. 40th Annu. Allerton Conf., Oct. 2002, pp. 636–646.
[3]. A. Moshovos, G. Memik, B. Falsafi, and A. Choudhary, "Jetty: Filtering snoops for reduced energy consumption in SMP servers," in Proc. Annu. Int. Conf. High-Perform. Comput. Archit., Feb. 2001, pp. 85–96.
[4]. C. Fay et al., "Bigtable: A distributed storage system for structured data," ACM TOCS, vol. 26, no. 2, pp. 1–4, 2008.
[5]. F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese, "An improved construction for counting bloom filters," in Proc. 14th Annu. ESA, 2006, pp. 1–12.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Analysis of a Compact Water Based Cylindrical Dielectric Resonator Antenna |
Country | : | India |
Authors | : | Sukla Basu |
Abstract: A simple DRA (Dielectric Resonator Antenna) made of water filled hollow porcelain cylinder operating in L band (1GHz-2GHz) and S band ( 2GHz-4GHz) is designed and its performance characteristics is analyzed. The attractive feature of this simple configuration is its small size compared to operating wavelength (30cm-7.5cm). Effects of water level and exciting probe length on resonant frequency of this antenna are investigated. With the increase in water level increase of number of resonant frequency within the said frequency ranges is observed........
Keywords: Dielectric Resonator Antenna, Liquid based Dielectric Resonator Antenna, Frequency Tuning of DRA, L and S Band DRA
[1]. Sukla Basu, 'A compact liquid based cylindrical dielectric resonator antenna for s band', International Journal of Electronics , Electrical and Computational System,Vol.4 Special Issue, September,2015.
[2]. Rongguo Zhou, Hailiang Zhang, and Hao Xin, 'A Compact Water Based Dielectric Resonator Antenna', Proceedings of Antennas and Propagation Society International Symposium (APSURSI, 2009), IEEE, p-1-4.
[3]. Steven G. O'Keefe and P. K Simon,'Tunability of Liquid Dielectric Resonator Antennas', Antennas and Wireless Propagation Letters, vol. 6, 2007.
[4]. Singh , K. R. , P.K. Singhal , 'Tunable Liquid Dielectric Antenna', International Journal of Engineering and Technology, 2012, 223-230, Science Publishing Corporation.
[5]. Fayad,H. and P. Record, 'Broadband liquid antenna', Electronics Letters vol. 42, No.3,2006
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Data Transmission and Acquisition for Alive detection |
Country | : | India |
Authors | : | Apurva Mundhada || Maithili Deshmukh |
Abstract: Wireless sensor network have a broad range of application in the category of detection and monitoring. Data acquisition plays an important role in the field of modern industry control .In any cases remote data should be transferred to monitor center which is far away from the manufacturing field .Traditional data acquisition system by means of wires could not satisfy the requirements, as there is rapid development of embedded system, wireless communication technology and depend on 3G as wireless data transmit terminals will be in use widely in industry.........
Keywords: Arduino, Heart Beat Sensor, RF Module
[1]. Timothy, Knilans,T.-C.,Chou,L.S.R..Electrocardiography in Clinical Practice Adult and Pediatric B Saunders; 4th edition, 1996
[2]. Madden, Dave and Steel, Michael,"How to Choose a Data Acquisition Platform", Design Engineering, Sept., 1998
[3]. PPTS Lab "Programming and Expert Center India"
[4]. Ravariu C.; Babarada F. "The E-healthcare Point of Diagnosis Implementation as a First Instance", Data Compression, Communications and Processing (CCP)
[5]. William stalling, "Wireless Communication and Networking" PRENTICE-HALL of India Pvt. Ltd. Online/ http://www.alldatasheet.com/datasheetpdf/pdf /8866/NSC/LM35.html
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Coding for Pseudo Device by Linux Character Device Driver |
Country | : | India |
Authors | : | Navneet Kr. Pandey || Prof. Prabhakar Dubey || Saurabh Bhutani |
Abstract: Linux is a free Operating system and have major advantage that their internal are open for all to view. Usually OS (Operating system) has a dark and mysterious area whose code is restricted to small number of programmer's. Linux helped to democratize OS. Device Driver provide gateway to approach the code without being overwhelmed by complexity. To interact with hardware devices Device Driver is the most important software of OS. DD (DeviceDriver) must be reliable and efficient because any wrong operation can fatal system error and hardware performance depend on device driver
[1]. A. Rubini, Linux Device Drivers, O'Reilly &Associates,Sebastopol, Calif., 1998
[2]. T. Burke, M.A. Parenti, A. Wojtas. Writing Device Drivers: Tutorial and Reference, Digital Press, Boston,1995.
[3]. Linux Operating System Documentation,http://www.sunsite.unc.edu/pub/Linux
[4]. Robert Love, Linux Kernel Development, Second Edition, 2005
[5]. A. Rubini, "Dynamic Kernels: Modularize Device Drivers," Linux J.,Issue 23, Mar. 1996
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of an off Grid Photovoltaic system for New Office Buildings |
Country | : | India |
Authors | : | Dr. N. V. Eldhose || P. P. Joseph |
Abstract: Renewable energy sources are increasingly being used to reduce the burden on conventional utility based system and simultaneously to reduce the carbon footprint. This work proposes a PV based Off Grid that can be used in new office buildings. The growth of DC operative appliances like laptop, LED bulbs, mobiles are rapidly increasing and therefore a DC/DC converter is a good alternative to meet the electricity need from the local DER (Distributed Energy Resources) and helps in improving the system efficiency. Here the solar energy will be converted to AC using an inverter..............
Keywords: DC Nano Grid, Distributed Energy Resources, MPPT, Payback period, PV Systems.
[1]. John A. Duffie, William A. Beckman, Solar Engineering of Thermal Processes – 2nd edition, (New York; Wiley Publications; 1991.)
[2]. Raja Rajeswari L., Krishna Bhanu C. V. "Design of Stand-Alone Photovoltaic System "International Journal of Engineering Research and Applications", IJERA ISSN: 2248-9622, 39(2), March -April 2013, 510-515
[3]. X. Liu, P. Wang and P. Loh, "A hybrid AC/DC micro grid and its coordination control," IEEE transaction on Smart Grid, 2(2), June 2011, 278– 286.
[4]. R. Abe, H. Taoka, and D. McQuilkin, "Digital Grid: Communicative Electrical Grids of the Future," IEEE Transactions on Smart Grid, 2(2), June 2011, 399-410.
[5]. Ishaq M., Ibrahim U.H., Abubakar, H. ‟Design of an Off Grid Photovoltaic System: A Case Study of Government Technical College, Wudil, Kano State", International Journal of Scientific & Technology Research, ISSN 2277-8616, 2(12), December 2013, 172-181.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Simulation of Advanced Encryption Standard Algorithm |
Country | : | India |
Authors | : | A Sowmya || K Tarakeswara rao |
Abstract: Advanced Encryption Standard (AES) is an encryption standard used for securing information. AES is a block cipher algorithm that has been analyzed extensively and is now used widely. AES is very secure and has no known weakness. In this work, both encryption and decryption will be carried out with the key length of 128 bits, that is, both AES encrypter and the AES decrypter were integrated. Hence the input block and secret key will be provided for encryption and the cipher block and same secret key will be provided to the decryption to get the proper block as output. All the transformations of both Encryption and Decryption will be developed using VHDL language and will be verified with the help of its simulation result using XILINX ISE simulator.............
Keywords: architecture; background; crypto graphical methods; block-diagram; encryption; key expansion; decryption; simulation results
[1] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999, available at via http://www.nist.gov/CryptoToolkit.
[2] Kaur, S., &Vig, R., "Efficient implementation of AES algorithm in FPGA device" Proceedings - International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, 2, 179–187. doi:10.1109/ICCIMA.2007.180
[3] "Design of a High Throughput Crypto Devices Based on AES" , International Journal of Engineering science & Innovative Technology(IJESIT), Volume 2, Issue 1, January 2013
[4] Marcelo B. de Barcelos Design Case, "Optimized performance and area Implementation of Advanced Encryption Standard in Altera Devices.
[5] Tilborg, Henk C. A. van. "Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial", New York Kluwer Academic Publishers, 2002
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Simulation of Virtual LANs (VLANs) Using OPNET |
Country | : | Iraq |
Authors | : | Sarah Ali Abdullah |
Abstract: Virtual LANs (VLANs) offer a method of dividing one physical network into multiple broadcast domains. This paper simulates a VLAN using OPNET. Different scenarios are designed and simulated, where a step by step procedure using the workspace of OPNET is given. The first scenario network is tested for the cases when the network composed of (10 PCs & 5 servers) and (24 PCs & 6 servers). This scenario is given for the purpose of comparison increased network size with no VLAN configuration. The second scenario is a 3_vlan configuration for the same network in the first scenario............
Keywords: LAN; VLAN; Switch; Router; traffic
[1]. David Passmore, John Freeman, "The Virtual LAN Technology Report", March 7, 1997 http://www.3com.com /nsc/200374.html.
[2]. Patricia Thaler, Norman Finn, Don Fedyk, Glenn Parsons, Eric Gray, "IEEE 802.1Q", March 10, 2013.
[3]. Komal Sharma, Meenu Yadav, Megha Pundir, Isha Malhotra, and Jaskaran Singh," VLAN & Its Implementation over ATM by using IP: a communication ", Discovery Engineering, Volume 2, Number 8, November 2013.
[4]. Rik Farrow, "VLAN INSECURITY", on 2014-04-21http:// rikfarrow.com/Network/net0103.html.
[5]. Mathias Hein, David Griffiths, Orna Berry, "Switching Technology in the Local Network: From LAN to Switched LAN to Virtual LAN", February 1997.