Version-4 (Jan-Feb 2014)
Version-1 Version-2 Version-3 Version-4 Version-5 Version-6
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Error detection and correction has got a great practical importance in maintaining information (data) integrity across noisy channels. Convolutional encoding is considered as one of the forward error correction (FEC) schemes. A Viterbi decoder (VD) uses the Viterbi algorithm for decoding a bit stream that has been encoded using FEC based on a convolutional code. In this proposed work, a simulation of convolutional encoder and Viterbi decoder presented. This paper focuses on the performance study of Viterbi algorithm by varying parameters like constraint length, generating polynomials, traces back lengths and also modulation technique. The code rate considered is ½. In each case the Signal to Noise ratio (SNR) is varied from -2 to 6 and the computation of Bit Error Rate (BER) is performed.
Keywords: FEC, Viterbi Decoder, Constraint length, Generator polynomial, Trellis diagram.[1] Bernard Sklar, Digital Communication Fundamentals and Application, 2001 pp. 314-374.
[2] Proakis, J. G., Digital Communication, McGraw-Hill Book Company, New York, Jan. 2000, pp 413-534.
[3] S. K. Hasnain, Azam Beg and M S Ghazanfar Monir, "Performance Analysis of Viterbi Decoder Using a DSP Technique", in 8th IEEE International Multi topic Conference (ITMIC'04), Lahore, Pakistan, 2004, pp. 201-207.
[4] V Viterbi A.J., "Error Bounds For Convolutional Codes And An Asymptotically Optimum Decoding Algorithm," IEEE Trans. Inf. Theory, vol. IT13, April 1967, pp.260-269.
[5] H Omura, J.K., "On the Viterbi Decoding Algorithm" (correspondence), IEEE Trans. Inf. Theory, vol. IT15 Jan. 1969, pp177-179.
[6] G. D. Forney Jr., "Convolutional codes I: Algebraic structure" IEEE Trans. Inform. Theory vol. IT-16 no. 6 pp. 268 - 278, 1970.
[7] S.V.Viraktamath, Dr.G.V.Attimarad, V.P.Gejji, Ravi. H "Error Control Mechanism Using CODEC", "International Conference on Communication Software and Networks 2009" (ICCSN 2009), February 27 - 28, 2009. Macau, China. Page No 549; 978-0-7695-3522-7/09 $25.00 © 2009 IEEE; DOI 10.1109/ICCSN.2009.142.
[8] S.V.Viraktamath, Dr.G.V.Attimarad, "Impact of constraint length on performance of convolutional CODEC in AWGN channel for Image applications" has been published in "International Journal of Engineering Science and Technology (IJEST)", Vol. 2(9), 2010, 4697-4701. ISSN: 0975-5462.
[9] Abdulfattah Mohammad Obeid, Alberto Garc´ıa Ortiz, Ralf Ludewig and Manfred Glesner, "Prototyping of a High Performance Generic Viterbi Decoder", 13th IEEE International Workshop on Rapid System Prototyping (RSP‟02).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Embedded Based Low Cost Pulse Oximeter |
Country | : | India |
Authors | : | S. Prince Samuel || B. Thilagavthi |
: | 10.9790/2834-09140710 |
Abstract: This paper deals with the Measurement of heart rate and oxygen saturation. The developed real-time pulse monitoring system has a pair of light-emitting diodes (LEDs), one LED has a wavelength in red and other is in infrared region. The light is detected by a photodiode. The LEDs and photodiode are packed in Velcro strip such that it faces the patient's fingertip. The pulse data is calculated by Atmega16 microcontroller unit. Pulse data is read every second and stored in microcontroller. The Measured Parameters were displayed in the LCD Module.
Keywords: Heart rate, Microcontroller, Oxygen Saturation, Pulse Oximeter.[1] Soroor Behbahani, Mohammad Ali Pishbin, "New Oxygenation Method Based On Pulse Oximeter", American Journal of Biomedical Engineering 2012, Vol No. 2, Issue No.4,pp 185-188,Jan 2012.
[2] Sangeeta Bagha, Laxmi Shaw, "A Real Time Analysis Of PPG Signal For Measurement Of Spo2 And Pulse Rate", International Journal of Computer Applications, Vol No. 36,Issue No.11,pp 45-50, December 2011 .
[3] Md.Mokarrom Hossain, A.S.M.Mohsin, Md.Nasimul Islam Maruf, Md. Asaduzzaman Shoeb and Ifat Al-Baqee, "An Advanced Architecture & Instrumentation For Developing The System Of Monitoring A Oxygen Saturation Of A Patient", International Journal of Engineering and Technology, Vol No.2, Issue No.6,pp.598-602, December 2010.
[4] N. Watthanawisuth, T. Lomas, A. Wisitsoraat, A.Tuantranont,"Wireleless Wearable Pulse Oximeter For Health Monitoring Using Zigbee Wireless Sensor Network", IEEE Transactions On Electronics and Computer Technology, Vol No.2, Issue No.3, July 1, 2010.
[5] Mohamed A. Zaltum a, b, M. Shukri Ahmad a, Ariffuddin Joret c and M.Mahadi Abdul Jamil, "Design And Development Of A Portable Pulse Oximetry System", International Journal of Integrated Engineering, Vol No.2,Issue No.4,pp 37-43,December 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of EPABX System Using Internet Protocol |
Country | : | India |
Authors | : | Parmar B. P. || Mary G. S. || Gohil R. |
: | 10.9790/2834-09141114 |
Abstract: In this 21st century, we are living in the world of science & technology. Due to rapid growth in the field of industries, large amount of communication is required between the inter-departments of a particular industry for obtaining all information regarding a particular product from its manufacturing point to the deliv-ery of that particular product to the customers. So with respect to the previous scenario in large scale industries a system was developed for solving the problems of internal & external communication in a industry with its several other branches which are lo-cated at a far distances in nationwide. The system used was C–DOT 256 PORT RURAL AUTOMATIC EX-CHANGE (ABBREVIATED AS C-DOT 256P RAX). This system was designed to suit the distinctive needs of developing countries like India. In our organisation we need 312 port line. Due to this limitation we introducing new system called IN-TERNET PROTOCOL BASED EPABX. In this system we can use 1064 ports for the communication purpose and with this system we will be able to increase the number of users and reduce the call rates.
[1] J.Kalyan Prasad, B.Anil Kumar. Analysis of SIP and Realization of Advanced IP-PBX features. (978-1-4244-8679-3/11/$26.00 ©2011 IEEE.
[2] LIU, Q. F., ZHOU, H. H., and QIN, Y. J., "Design and Implementation of SIP Phone Based on SCTP and DCCP", Telecommunica-tion Engineering, 48, 1, January 2008, pp. 32-36.
[3] ZHANG, B. C., HE, Q. L., and QU, K., "The Design and Realization of Distance Teaching System Based on SIP Protocol", Mi-croelectronics & Computer, 24, 3, March 2007, pp. 150-153.
[4] Lu, W., Zeng, W. H., "The Research of Asterisk-An Open Source PBX",Computer Systems Applications, February 2007, pp. 80-83.
[5] J. Saldaña, J. Aznar, E. Viruete, J. Fernández-Navajas and J. Ruiz-Mas,"QoS Measurement-Based CAC for an IP Telephony sys-tem", QShine2009,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Health Care for Cattles Using Telecommunication |
Country | : | India |
Authors | : | Joshi D. A. || Gharge A. P. || Gohil R. |
: | 10.9790/2834-09141518 |
Abstract: Health care for cattle's using telecommunication is a concept that has evolved to address the issues of call routing from the current healthcare dynamics. The aim to decongest to reduce costs, for both Companies and farmers, and making healthcare available to all who need it is met. The action expected from the valerians as a result of such monitoring is to make clinical decisions on whether the patient requires: Immediate treatments Urgent doctor visit Continued monitoring The judgment on which patients can be put into a continuous monitoring mode Instead of frequents visits by veterinary doctors.
[1] Dr. Akram A., Prof. Al-Mashouq k., Dr. Al-Hokail z Remote Monitoring Using Wireless Cellular Networks; (IJACSA,Vol. 4, No. 2, 2012.
[2] Mashael S.; Mznah A; Diabetes Monitoring System Using Mobile Computing Technologies; IJDIWC Vol. 4, No 2,79-83 The Society of Digital Information and Wireless Communications, 2013.
[3] Ahmed B., Abdulrahman H.; Rizwan M.; Qureshi J. and Khan A; Novel Component-Based Development model For Sip-Based Mobile Application; IJSEA, Vol.3, No.1, January 2012.
[4] www.convergencetechnologycenter.org
[5] http://www.ibef.org/industry/healthcare-india.aspx
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cognitive radio networks are developed for solutions to spectrum inefficiency problem. In this Paper, we propose spectrum decision framework that will capable of maintaining data loss rate at lower level and total capacity at higher level. The objective of the spectrum decision framework for real time applications traffic, MVSD (Minimum Variance Based Spectrum Decision) will implement which determines the spectrum bands to minimize the capacity variance i.e. it maintains the data loss rate although the number of users increases and for best effort applications traffic, MCSD (maximum Capacity Based Spectrum Decision) will implement which decides spectrum bands to increase or maximize the total capacity. Spectrum decision framework is separate or reduces the all spectrum decision functionalities from spectrum sharing. Spectrum decision framework provides efficient bandwidth utilization.
Keywords: Cognitive radio networks, spectrum decision, spectrum resource management, minimum variance based spectrum decision, maximum capacity based spectrum decision.
[1] Won-Yeol Lee, Student Member, IEEE, and Ian F. Akyildiz, Fellow, IEEE, "A Spectrum Decision Framework for Cognitive Radio Networks", IEEE Transactions on Mobile Computing, vol. 10, no. 2, Feb. 2011.
[2] I.F. Akyildiz, W.-Y. Lee, M.C. Vuran, and S. Mohanty, "A Survey on Spectrum Management in Cognitive Radio Networks," IEEE Comm. Magazine, vol. 46, no. 4, pp. 40-48, Apr. 2008.
[3] W.-Y. Lee and I.F. Akyildiz, "Optimal Spectrum Sensing Framework for Cognitive Radio Networks," IEEE Trans. Wireless Comm., vol. 7, no. 10, pp. 3845-3857, Oct. 2008.
[4] L. Cao and H. Zheng, "Distributed Rule-Regulated Spectrum Sharing," IEEE J. Selected Area in Comm., vol. 26, no. 1, pp. 130-145, Jan. 2008.
[5] W.-Y. Lee and I.F. Akyildiz, "Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks," IEEE Transactions on Mobile Computing, vol. 11, no. 4, Apr. 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Image fusion using discrete complex wavelets is used to improve signal to noise ratio and good quality and shift invariant. This technique can be used for fusion of complementary information images as well as multi model image fusion. The proposed algorithm is very simple, easy to implement and could be used for real time applications. A Novel region- based method increase flexibility. A dual tree complex Wavelet transforms (DT-CWT) is used to segment the features of input images, to produce region map. Characteristics of each region are calculated and a region based approach is used to fuse the images, region-by-region , in the Wavelet domain .This method gives results comparable to pixel based fusion methods , but despite an increase in complexity.
Key words: Discrete complex wavelet, Dual tree complex wavelet transform(DT-CWT),Image Fusion, Pixel-Based Fusion, Region-Based Fusion
[1]. Shih-Gu Huang, "Wavelet for Image Fusion".
[2]. Susmitha Vekkot, and Pancham Shukla "A Novel Architecture for Wavelet based Image Fusion".World Academy of Science, Engineering and Technology 57 2009.
[3]. H. Maˆıtre and I. Bloch. Image fusion. Vistas in Astronomy, 41(3):329–335, 1997.
[4]. H. Li, S. Manjunath, and S. Mitra. Multisensor image fusion using the wavelet transform. Graphical Models and Image Processing, 57(3):235–245, 1995.
[5]. G. Piella. A general framework for multiresolution image fusion: from pixels to regions. Information Fusion, 4:259–280, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The hardware implementation of the cryptography core which incorporates multiple algorithm for security purpose was already developed but if the architecture is capable of switching between the algorithms used for encryption /decryption as controlled by the host computer dynamically, then the security over the data path will be increased by making the attempt for hacking too difficult. The continuous increase in demand for security in electronic systems and communication systems which lacks a secure architecture has resulted in the need to provide cryptography architecture with high secure core. This proposed architecture implements two symmetric algorithms namely the standard DES and complex DES (CDES) algorithms. Representing these algorithms in the functional block level and also using the new concept of common S-Box , results in operations that are common to all the two algorithms, thus there is an area reduction of 14.5% in cryptography core with 2 S-Boxes rather than using 11 S-Box.
[1] Advanced Encryption Standard (AED), Nov.2001.FIPS standards publication 197.
[2] Atul Kahate, "Cryptography and Network Security", 2003.
[3] Data Encryption Standards (DES), Oct.1999.FIPS standards publications.
[4] William stalling, "‟Cryptography and Network Security Principles and Practice‟‟.
[5] John Daemen and Vincent Rijmen, "AES proposal: Rijndael".
- Citation
- Abstract
- Reference
- Full PDF
[1]. Ralph J. Broad, "Recent Developments in Batteries for Portable Consumer Electronics Applications", Interface 8: 3, fall 1999, Electrochemical Society, Pennington, NJ.
[2]. R. Selim and P. Bro, "Performance Domain Analysis of Primary Batteries", Electrochemical Technology, J. Electrochem. Soc. 118(5) 829, (1971).
[3]. D. I. Pomerantz, "The Characterization of High Rate Batteries", IEEE Transactions Electronics, 36 (4) 954 (1990).
[4]. V. Drori, and C. Martinez, "Smart Battery Chips Maximize Usable Battery Capacity and Battery Life", Battery Power Products and Technology, April 1999.
[5]. "American National Standards Specification for Dry Cells and Batteries", ANSI C18.1M-1999, American National Standards Institute, Inc., January 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of Robotic Vision Algorithm for Medical Application |
Country | : | India |
Authors | : | Reena Mercy S. || Mrs. Parnasree Chakraborty |
: | 10.9790/2834-09143846 |
Keyword: Reconfigured machine learning algorithm, nursing robots, motion detection, bleeding.
[1] Cyberbotics. Webots: Professional mobile robot simulation. International Journal of Advanced Robotic Systems, 1(1):39–42, 2004.
[2] K. Fujiwara, Kanehiro F., S. Kajita, K. Yokoi, H. Saito, K. Harada, K. Kaneko, and H. Hirukawa. The first human-size humanoid that can fall over safely and stand-up again. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pages 1920–1916, 2003, Las Vegas, NV, USA.
[3] P.-B. Wieber. On the stability of walking systems. In Proceedings of the International Humanoid and Human Friendly Robots, 2002.
[4] R. M. Murray, Z. Li, and S. S. Sastry. A Mathematical Introduction to Robotic manipulation. CRC Press, Boca Raton, 1994.
[5] K. Ogata, K. Terada, and Y. Kuniyoshi. Real-time selection and generation of fall damagae reduction actions for humanoid robots. In Humanoids08, pages 233–238, Dec. -3 2008, Daejeon, Korea.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: EIGRP, BGP, OPNET, Load Balancing, Routing Updates, Autonomous System, Routing Policy.
[2] Kevin Butler, Patrick McDaniel," A Survey of BGP Security Issues and Solutions", Proceedings of the IEEE, Volume- 98, No- 1, January 2010.
[3] R. Perlman, Interconnections," Bridges, Routers, Switches, and Internetworking Protocols", 2nd ed. Reading, MA: Addison Wesley, 1999.
[4] C. Ellison and B. Schneier," BTen risks of PKI: What you're not being told about public key infrastructure", Comput. Security J., vol. 16, no. 1, 2000.
[5] M. Lepinski and S. Kent," An Infrastructure to Support Secure Internet Routing", Internet Draft draft-ietf-sidr-arch-08.txt, Jul. 2009.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Alamouti, hydrophone, projector, MIMO, OFDM.
[2] M. Stojanovic, Underwater Acoustic Communication (Wiley Encyclopedia of Electrical and Electronics Engineering, 2000).
[3] M. Stojanovic e J. Preisig, Underwater Acoustic Communication Channels - Propagation Models and Statistical Characterization, IEEE Communications Magazine, Volume 47, 2009.
[4] L. Liu, S. Zhou e J. Cui, Prospects and Problems of Wireless Communication for Underwater Sensor Network, Wiley WCMC Special Issue on Underwater Sensor Networks, 2008).
[5] Jordi Ribas, Underwater Wireless Video Transmission using Acoustic OFDM (Massachusetts Institute of Technology, 2009).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey: A Cognitive Radio for Wireless Communication |
Country | : | India |
Authors | : | Bijal K. Jariwala || Varia Ravi Manilal |
: | 10.9790/2834-09145763 |
Keywords: cognitive radio (CR), spectrum hole, cognitive radio's fundamentals and cycle, primary users(PU), secondary users(SU), different sensing techniques, IEEE 802.22.
[2] Federal and C. Commission, facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies, FCC reports and order, ET Docket no. 3-108, 2005
[3] S.Haykin,Cognitive Radio: Brain-Empowered Wireless Communications, IEEE Journal on Selected Areas In Communication, 23(2), 2005, 201-220.
[4] J. mitola and G.Q. Maguire, Cognitive Radio: Making software radios more personal, IEEE personal communications magazine, 6(4), 1999, 13-18.
[5] Beibei Wang and K. J. Ray Liu , Advances in Cognitive Radio Networks: A Survey, IEEE Journal of Selected topics in signal processing, 5(1),2011.19-23.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Study of OFDM & MC-CDMA in WiMAX System |
Country | : | India |
Authors | : | Anjali Koranga || Geeta Joshi |
: | 10.9790/2834-0914646 |
Keywords: AMC, MC-CDMA, OFDM, WiMAX, Adaptive OFDM.
[2] L. Hanzo et al., "OFDM and MC-CDMA for Broadband Multi-User Communications", Wiley, 2003.
[3] Vinit Grewal and Ajay K. Sharma "Performance Evaluation of WiMAX Network with AMC and MCCDMA for Mobile Environments", International Journal of Multimedia and Ubiquitous Engineering Vol. 7, No. 4, October, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Digital Image Encryption Based on RSA Algorithm |
Country | : | Egypt |
Authors | : | Ali E. Taki El_Deen, El-Sayed A. El-Badawy, Sameh N. Gobran |
: | 10.9790/2834-09146973 |
Abstract: Information Security has become an important issue in data communication. Cryptography has come up as a solution, and plays an important role in information security systems. This paper presents an introduction to the science of cryptography and explains the RSA cryptosystem. It also presents the comparison between RSA cryptosystem with DES and Blowfish cryptosystems applied on greyscale image.
Keywords: Cryptography, Information security, Image Encryption, RSA, DES, Blowfish
2008.
[2] Monica Borda, "Fundamentals in Information Theory and Coding", ISBN: 978-3-642-20346-6, 2011.
[3] Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, "An Introduction to Mathematical Cryptography", ISBN: 978-0-387-77993-5,
2008.
[4] Borko Furht, Darko Kirovski, "Multimedia Encryption and Authentication Techniques and Applications", ISBN: 0-8493-7212-7,
2006.
[5] Andreas Uhl, Andreas Pommer, "Image and Video Encryption from Digital Rights Management to Secured Personal
Communication", ISBN: 0-387-23403-9, Springer, 2005.
[6] Richard A. Mollin, "Codes: The Guide to Secrecy from Ancient to Modern Times", ISBN-10: 1-58488-470-3, 2005.
[7] Christof Paar, Jan Pelzl, "Understanding Cryptography", ISBN 978-3-642-04100-6, Springer, 2010.