Version-3 (Jan-Feb 2014)
Version-1 Version-2 Version-3 Version-4 Version-5 Version-6
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the last 25-30 years, wireless communications have become an essential part of people's lives all over the globe. Currently, commercial high data rate mobile services are pro-vided with a peak data rate of 28Mbps using a bandwidth of 5MHz. However, this peak data rate is insufficient and even higher transmission rates are already desired, especially when multiple users and multimedia traffic are considered.
[1]. J. Wang, H. Zhu and N. J. Gomes "Distributed Antenna System for Mobile Communications in High Speed Trains", IEEE Journals on selected areas in communications. Vol. 30, No. 4, May 2012.
[2]. G. Barbu, "E-Train - Broadband Communication with moving trains Technical Report - Technology state of the art," Jun. 2010, available online at http://www.uic.org/etf/publication/publication-detail.php?codepub=19014.
[3]. Japan Central Railway Company, "Extensive Internet Environment on the Next Generation High-Speed Train 'Series N700'," available online at http://www.docin.com/p-98849721.html.
[4]. "ITRI claims success in WiMax trial on high-speed train," available for members at http://www.digitimes.com/Tornado/V4/SearchEnd.asp#top1.
[5]. Wikipedia, the free encyclopedia, "Global System For Mobile Communications- Railway", http://en.wikipedia.org/wiki/GSM-R.
[6]. H. Zhu, S. Karachontzitis, and D. Toumpakaris, "Low-complexity resource allocation and its application to distributed antenna systems," IEEE Wireless Commun., June 2010.
[7]. H. Zhu, "Performance comparison between microcellular and distributed antenna systems," IEEE J. Sel. Areas Commun. , vol. 29, pp. 1151-1163, June 2011.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Power theft problem now days causes huge loss to electricity board , it is necessary to prevent so that a lot of power can be saved. This paper determines the greatest opportunity for energy savings by continuously monitoring and controlling power theft from the electric meter by taking readings from it . The normal practice for power theft is to short the input and output terminals or to place magnet on the wheel in case of old meters.By wireless power theft monitoring it is possible to sense the current flow through the line & energy feedback using a circuit breaker.
[1] Milan Verle- "Architecture & programming of 8051".
[2] Mazidi, Mazidi, McKinlay- "The 8051 microcontroller and Embedded Systems".
[3] M.A. Oliveira and C.C. Barioni, "Technical loss calculation bydistribution system segment with corrections from measurements,"Proc.20th international Conference and Exhibition on Electricity Distribution, Prague, Czech Republic, June 2009, pp. 1–4.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, a different Double Negative (DNG) metamaterial is demonstrated to upgrade the performance of Microstrip Patch Antenna (MPA). The scattering parameters are utilized to plan and corroborate the DNG structure. The proposed DNG is then employed as a superstrate of MPA which reduces the surface waves and edge diffracted waves of an antenna and therefore reduces its losses.
[1] L. Angeles, "Compsite Right/Left –Handed Transmission Line Metamaterial," IEEE Microwave Magzine, pp. 34–50, September 2004.
[2] V. G. Veselago, "The Electrodynamics of Substances with Simultaneously Negative values of ɛ and μ ," Soviet Phys Usp 10 (1968), 509-514.
[3] A. Mallik, S. Kundu, and O. Goni, "Design of a novel Two-rectangular U-Shaped Double Negative Metamaterial," IEEE no. 978-1-4799-0400-6/ 2013
[4] J. Franklin, J. Biddle, Bohdan Balko, "Double Negative Materials ( DNM ) Phenomena and Applications," Institute of Defense Analysis central research Program, July 2009.
[5] R. Marques, F. Martin, M. Sorolla, "Metamaterial with negative paramters, theory, design and microwave applications," John Wiley & Sons, Inc. 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Securing M2m Post-Quantum Secret Key Cryptography |
Country | : | India |
Authors | : | Arshiya I 1, Sekar R. |
: | 10.9790/2834-09132227 |
Abstract: In this paper, an FPGA implementation of a RC6 Block cipher symmetric-key cryptosystems (SKCs) is used. It represents a first step towards securing machine-to-machine (M2M) systems using strong, hardware-assisted SKC. PKC algorithms require a very large amount of CPU cycles to encrypt one block of data. In SKC sender and receiver only have to specify the shared key in the beginning and later they can begin to encrypt and decrypt messages between them using that key. Ex: AES (Advanced Encryption Standard) and Triple DES (Data Encryption Standard).
[1] Securing M2M With Post-Quantum Public-Key Cryptographyie-Ren Shih, YongboHu, Ming-Chun Hsiao, Ming-Shing Chen, Wen-Chung Shen, Bo-Yin Yang, An-Yeu Wu, Senior Member, IEEE, and Chen-Mou Cheng IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, VOL. 3, NO. 1, MARCH 2013
[2] . An improve RC6 algorithm with the same structure of encryption and decryption. Gil-Ho Kim; Jong-Nam Kim;Gyeong-Yeon Cho Advanced Communication Technology,2009. ICACT 2009.11th International Conference on Volume:02 Publication Year : 2010, Page(s):1211-1215
[3] CRIPTOR1.0. VLSI Implementation of the RC6 Block Cipher International Journal of Computer Applications (0975 – 8887) Volume 42– No.16, March 2012
[4] P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput. vol. 26, no. 5, pp. 1484–1509, Oct. 1997
[5] A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM vol. 47, no. 6, pp. 53–57, Jun. 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Mobile ad hoc network (MANET) is a temporary multi-hop wireless network that consists of mobile nodes which have the ability to communicate with each other without having fixed network infrastructure or central base station. The open access nature of wireless links in MANETs makes them susceptible to the Denial of service attacks such as Blackhole, Grayhole and etc. The disadvantage of the most ratified routing protocols like Ad hoc On-demand Distance vector( AODV) routing protocol is the fact that they have been developed without considering security mechanisms in advance hence resulting in the vulnerability of MANETs to such malicious attacks.
[1]. Tanu, Satinder and Das "Security Threats in Mobile Adhoc Network: A Review" in IJCNWC, Vol. 2, No. 1, 2012
[2]. Supriya and Manju "Manet Security Breaches: Threat to a Secure Comm. Platform" IJANS, Vol. 2, No. 2, April 2012.
[3]. Nisha, Simranjeet Kaur, Sandeep AroraJose "Analysis Of Black Hole and Gray Hole attack On RP- AODV In MANET", IJERT, ISSN:2278-0181, Vol. 2 Issue 8, Aug - 13.
[4]. Sharmila, Muruga, "A recent secure intrusion detection system for Manets", ICISC-2013, Vol 3, Special Issue 1.
[5]. F Richard, Helen, Bu and, Du "Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks", JWCN (Springer journal), 2013.
[6]. Nisha P John "A New Approach for the Detection of Black hole Nodes in AODV Based Mobile Ad-Hoc Networks", IJERT, Vol. 2 Issue 1, January- 2013, ISSN: 2278-0181.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Highly Scalable Single List Set Partitioning in Hierarchical Trees Image Compression |
Country | : | Iraq |
Authors | : | Ali Kadhim Al-Janabi |
: | 10.9790/2834-09133647 |
Abstract: A highly scalable image compression system produces a compressed image that can be easily decoded at several bit-rates (qualities) and resolutions (sizes). This is a very interesting feature in the heterogeneous environments of the Internet to satisfy the different user's requests. This paper proposes a new algorithm termed Highly Scalable-Single List-SPIHT (HS-SLS). The proposed HS-SLS algorithm produces a highly scalable bit-stream that is both rate and resolution scalable. The flexible bit-stream of the HS-SLS encoder can easily be adapted to various resolution requirements at any bit-rate using a very simple scaling process that is performed on-the-fly and without the need to decode the bit-stream. A unique feature of the new algorithm is that it has low memory requirement and low complexity due to its simple memory management.
[1] Salomon D., "Data Compression: the Complete Reference," third 3rd ed., Springer, 2004
[2] D. Taubman and M. Marcellin, "JPEG2000: Image Compression Fundamentals, Standards, and Practice", 2nd ed. Norwell, MA: Kluwer, 2002.
[3] Vetterli M. and Kovaccevic J., "Wavelets and Subband Coding," Prentice-Hall, New Jersey, 1st edition, 1995.
[4] Rabbani M. and Joshi R., "An Overview of the JPEG 2000 Still Image Compression Standard," Signal Processing: Image Communication, Vol. 17, No. 1, pp. 3-48, Jan. 2002.
[5] D. Taubman et al, "Embedded Block Coding in JPEG2000," Signal Processing: Image Communication Vol. 17, No. 1, pp. 49-72, Jan. 2002.
[6] Ordentlich E. et al, "A Low-Complexity Modeling Approach for Embedded Coding of Wavelet Coefficients," Proc. IEEE Data Compression Conf. (Snowbird), pp. 408-417, March 1998.
[7] Lian C. Jr. et al, "Analysis and Architecture Design of Block-Coding Engine for EBCOT in JPEG2000" IEEE Trans. Circuits and Systems for Video Technology, Vol. 13, No. 3, pp 219-230, March 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: During periods of background seismicity large variations in temperature occur due to crustal deformation. Earthquakes are preceded due to ground lengthening, tilting or shortening. A large amount of heat energy at the earth's core tries to find a path to come out from one way or the other. In this paper, we present an instrumentation system to study the variations in temperature that occur prior to an earthquake. The changes in the temperature and relative Humidity are sensed by using Smartec sensors SMT16030 and SMTHS07.The Smartec temperature sensor SMT16030 is a sophisticated active full silicon temperature sensor with a digital output.
[1] Peter M Shearer, Introduction to Seismology, (Cambridge University Press, Cambridge, 1999) p.p.(20-31).
[2] Alok K Gupta, Somnath Dasgupta, Physics and Chemistry of Earth's interior crust mantle and core, (Springer India, 2009) p.p ( 3-23).
[3] Kalsi H.S, Electronic Instrumentation, (McGraw Hill Publication, 2004) p.p.(425-446).
[4] Jan Axelson, The Microcontroller idea book: Circuits program and Applications, (Penram international, India, 1994) p.p (153-166).
[5] Mazidi M.A,Mazidi J, Pic Microcontroller and Embedded Systems, (Pearson Education, India p.p (187-194).
[5] Geoff Sanders,Lionel Therons, GPRS Networks, (John Wiley and Sons, 2009).
[6] Nair J.M,Gupta S.J,Jashank M, GPRS Transmission of Onsite Temperature Variations, Proc. International conference & Workshop on emerging trends in technology, India, 2013, 289-293.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Efficient routing protocols can provide significant benefits to mobile ad hoc networks in terms of both performance and reliability. Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust dynamic routing protocol In ad hoc network networks, in order to make them reliable and secure one need to analyze the routing mechanisms which are called as the MANET routing protocols and also transport protocols also required. In the research work, we have to do the investigation of mobile ad hoc network protocols like ad hoc on demand routing protocol AODV, DSDV and DSR protocol using the different TCP types like TCP Reno, TCP New Reno,
[1]. David B. Johnson, David A. Maltz "Dynamic Source Routing in Ad Hoc Wireless Networks", Computer Science Department, Carnegie Mellon University, 1996.
[2]. CHARLES E. PERKINS, "AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING", 2000.
[3]. HOU-TSAN LEE*, FENG-LI LIAN, AND TING-CHUN FONG, "CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL BASED ON BANDWIDTH ESTIMATION", JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, VOL. 33, NO. 3, PP. 489-494 (2010)
[4]. J. BROCH, D JOHNSON AND D. MALTZ , "THE DYNAMIC SOURCE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS (DSR)," IETF INTERNET-
[5]. DRAFT,19 JULY 2004 C.E. PERKINS AND E.M. ROYER , "AD-HOC ON-DEMAND DISTANCE VECTOR (AODV) ROUTING," PROC. OF 2ND IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 1999
[6]. C.E. PERKINS, E.M. ROYER AND S.R. DAS , "AD HOC ON-DEMAND DISTANCE VECTOR (AODV) ROUTING,", RFC 3561, JULY 2003
[7]. C.E. PERKINS AND P. BHAGWAT , "HIGHLY DYNAMIC DESTINATION SEQUENCED DISTANCE VECTOR ROUTING (DSDV) FOR MOBILE COMPUTERS," PROC. OF ACM SIGCOMM'94, 1994
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | TRM Array Antenna Failure Compensation Using Extended PSO |
Country | : | India |
Authors | : | Singh Gurpreet, Singh Maninder |
: | 10.9790/2834-09136168 |
Abstract: TRM array antenna is used in wireless communication system. There are various problem which may occur while the transmission of the data. The biggest problem is of routing. This paper focuses on the optimized routing using PSO which would be compared with the routing of GA. This paper also focuses on the comparison of PSO and GA when compensated to the antennas. Keywords: TRM ARRAY ANTENA, GA, PSO, Wireless Communication.
[1]. Narwant S. Grewal, Munish rattan and Manjeet S. Patterh, "A linear antenna array failure correction Using firefly algorithm", progress in electromagnetics research m, vol. 27, 241{254, 2012}.
[2]. Jung-Hoon Han, Sang-Ho Lim and Noh- Hoon Myung, "Array antenna trm failure compensation using Adaptively weighted beam pattern mask Based on genetic algorithm," ieee antennas and wireless propagation letters, vol. 11, 2012.
[3]. Lal c. Godara, "Application of antenna arrays to mobile Communications, part ii: beam-forming And direction-of-arrival considerations," proceedings of the ieee, vol. 85, no. 8, august 1997.
[4]. C. A. Ballanis, "Antenna theory analysis and design," 2nd edition, john willey and son's inc .• new york, 1997.
[5] Elliott, R. S., "Antenna Theory and Design", revised edition, john wiley, new jersey, 2003.
[6]. R. L. Haupt, and d. H. Werner, "Genetic algorithms in electromagnetics", IEEE press wiley-interscience, 2007.
[7]. R. L. Haupt, "Optimized element spacing for low sidelobe concentric Ring arrays," IEEE trans. Antennas propag., vol. 56(1), pp. 266-268, Jan. 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Image Processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications. Various techniques have been developed in Image processing during the last four to five decades. Most of the techniques are developed for enhancing images obtained from unmanned spacecrafts, space probes and military reconnaissance flights. Image Processing systems are becoming popular due to easy availability of powerful personnel computers, large size memory devices, graphics software etc.
[1.] Guruprasad Bhat, Vidyadevi G Biradar , H Sarojadevi Nalini, " Artificial Neural Network based Cancer Cell Classification (ANN – C3)", Computer Engineering and Intelligent Systems, Vol 3, No.2, 2012.
[2.] Almas Pathan, Bairu.K.saptalkar, "Detection and Classification of Lung Cancer Using Artificial Neural Network", International Journal on Advanced Computer Engineering and Communication Technology Vol-1 Issue:1.
[3.] Dr. S.A.PATIL, M. B. Kuchanur, " Lung Cancer Classification Using Image Processing," International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012.
[4.] Mokhled S. AL-TARAWNEH, "Lung Cancer Detection Using Image Processing Techniques," Leonardo Electronic Journal of Practices and Technologies Issue 20, January-June 2012, p. 147-158.
[5.] Fritz Albregtsen, "Statistical Texture Measures Computed from Gray Level Coocurrence Matrices," International Journal of Computer Applications, November 5, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This work aimed to synthesize, from computer simulations, radiation patterns of linear arrays of acoustic projectors of the piston type (Tompilz). This paper also has the focus to analyze the behavior of these radiation patterns when varying some parameters and characteristics of the array and radiating elements. For the array, it was considered the influence of variations related to the number of elements and the distance between them. For the elements, it was analyzed the changes in the diagrams when the product between the radius of the projector's head and the acoustic wavenumber was varied. These parameters were chosen because of his notorious influence in the shape of radiation patterns. Also, it was investigated the influence of radiation on patterns of multipath and Doppler spread, as well as the efficiency of a LMS (Least Mean Square) filter applied in the received signal. These results find application in the design of linear arrays of projectors and the development of beamforming techniques.
Keywords: array, element factor, array factor, radiation pattern, Tompilz.
[1] C. A. Balanis, Antenna theory: analysis and design ( Hoboken, NJ: Wiley Interscience, 2005).
[2] W. L. Stutzman e G. A. Thiele, Antenna theory and design ( Hoboken: Wiley, 2013).
[3] F. B. Gross, Smart antennas for wireless communications with MATLAB ( New York; London: McGraw-Hill ; McGraw-Hill [distributor], 2005).
[4] J. D. Kraus e R. J. Marhefka, Antennas for all applications ( New York: McGraw-Hill, 2002).
[5] C. H. Sherman e J. L. Butler, Transducers and arrays for underwater sound ( New York; London: Springer, 2011).
[6] R. P. Hodges, Underwater acoustics analysis, design, and performance of sonar ( Hoboken, NJ: Wiley, 2010).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Satellite communication systems operating at Ka band and Ku band frequencies must affect the problem of propagation impairments which includes fading due to rain, clouds, snow for obtaining the required performance. Rain affects the signal most and involved is absorption & scattering. Auto-Regressive Integrated Moving Average (ARIMA) model is used to generate and predict the time series values for rain attenuation. The predicted values obtained for different window size of the ARIMA model and analysis is done in terms of error matrix.
Keywords: ARMA model, ARIMA model, KU-band, Time series, Time series analysis.
[1] M. Sridhar 1, K. Padma Raju2, Ch. Srinivasa Rao3, D. Venkata Ratnam1," Prediction and Analysis of Rain Attenuation using
ARIMA Model at Low latitude Tropical Station",International Journal of Advanced Research in Electrical, Electronics and
Instrumentation Engineering Vol. 2, Issue 7, July 2013.
[2] A. Mauludiyanto, G. Hendrantoro, Member, IEEE, M. H. Purnomo, Member, IEEE, T. Ramadhany, and A. Matsushima, Member,
IEEE "ARIMA Modeling of Tropical Rain Attenuation on a Short 28-GHz Terrestrial Link" IEEE ANTENNAS AND WIRELESS
PROPAGATION LETTERS, VOL. 9, 2010.
[3] R. Billinton, H. Chen and R. Ghajar, "Time-series models for reliability evaluation of power systems including wind energy,"Micro
electron. Reliab., vol. 36, pp. 1253-1261, 1996.
[4] Jie YANG, Zenliang GAO, Jianbin TANG, Ying CHEN, "A Practical Predictive Control Algorithm for Embedded System and
Its Application", Journal of Computational Information Systems 6:11, 3501-3508, 2010
[5] M. Shafie-khah1, M. Parsa Moghaddam⇑, M.K. Sheikh-El-Eslami2." Price forecasting of day-ahead electricity markets using a
hybrid forecast method." 15 October 2010 Energy Conversion and Management 52 (2011) 2165–2169
[6] G. Hendrantoro, A. Mauludiyanto, and P. Handayani, "An autoregressive model for simulation of time-varying rain rate," in Proc.
Symp. Antenna Appl. Electromagn./URSI Conf., Ottawa, ON, Canada, Jul. 20–23, pp. 613-616, 2004.
[7] Yanhua YU, Jun WANG, Xiaosu ZHAN, Junde SONG," Novel anomaly detection approach for telecommunication Network
proactive performance monitoring", Front. Electr. Electron. Eng. China 2009.
[8] Shkelzen CAKAJ "Rain Attenuation Impact on Performance of Satellite Ground Stations for Low Earth Orbiting (LEO) Satellites
in Europe" Int. J. Communications, Network and System Sciences, 2009.
[9] Bo Wanga, Neng-ling Taia,*, Hai-qing Zhaib, Jian Yeb, Jia-dong Zhuc, Liang-bo Qic, "A new ARMAX model based on
evolutionary algorithm and particle swarm optimization for short-term load forecasting" Electric Power Systems Research 78
(2008) 1679–1685.
[10] Peiyuan Chen, Troels Pedersen, Birgitte Bak-Jensen and Zhe Chen, "ARIMA based time series model of stochastic wind power
generation".
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The Strategic Management consists of the planning and the risky analysis of the activities involved on the decision process. Once the possible settings are a result of the variability of the parameter trends involved in the phenomenon, the risk is unavoidable. These concepts make the strategic management more efficient, because they support the theoretical basis of the theme. This work is based on the "Science of Data Analysis" and its comprehension allows a better basis in order to make up a decision through the creation of knowledge, which comes from the information obtained from the available network data. This work is devoted to data analysis methods and results of its application in the technical and operational data of a GSM mobile communication network used as a case study . The use of these techniques is possible in other mobile networks such as Wi-Fi (Wireless Fidelity), WiMAX (Worldwide Interoperability for Microwave Access), UMTS (Universal Mobile Telecommunication System), LTE (Long Term Evolution) and NGN (Next Generation Networks), among others. The results obtained allow the research of possible future scenarios for the development of effective strategic management. The authors are not aware of similar work published in the open technical literature.
Keywords: Mobile Communications Systems, Methods of Decision Support, Data Analysis, Predictive Models.
[1] O. Gea, Application of Methods for Data Analysis on Mobile Communication Systems (Brazil: MSc Thesis - Federal Fluminense University, 2010).
[2] A. Damodaran, Gestão Estratégica do Risco: uma referência para a tomada de decisão de riscos empresariais (Brazil: 1st Edition, Bookman, 2009).
[3] D. Oliveira, Planejamento Estratégico - Conceitos, Metodologia e Práticas (Brazil: 6th Edition, Atlas, 1992).
[4] L. P. Fávero, Análise de Dados: modelagem multivariada para tomada de decisões (Brazil: 1st Edition, Elsevier, 2009).
[5] L. Jukka and M. Matti, Radio Interface System Planning for GSM/GPRS/UMTS (New York: 1st Edition, Klumer Academic Publishers, 2002).
[6] M. D. Yacoub, Foundations of Mobile Radio Engineering (Florida : CRC Press, 1993).
[7] C. Ragsdale, Modelagem e Análise de Decisão (Brazil: 2nd Edition, Cengage Learning, 2009).
[8] M. C. Goldbarg and H. P. L. Luna , Otimização Combinatória e Programação Linear (Brazil: 1st Edition, Campos, 2000).
[9] M. P. E. Lins and G. M. Calôba, Programação Linear - com aplicações em teoria dos jogos e avaliação de desempenho (data envelopment analysis) (Brazil: 1st Edition, Interciência Ltda., 2006).
[10] D. N. Gujarati, Econometria Básica (Brazil: 3th Edition, Makron Books Ltda, 2000).